Resubmissions
03-11-2024 15:35
241103-s1h9zsybln 103-11-2024 15:12
241103-slem9axgnm 1003-11-2024 15:09
241103-sjrj2azmaq 403-11-2024 14:57
241103-sbqb1awlhx 1003-11-2024 14:34
241103-rxqdfswjas 10Analysis
-
max time kernel
1200s -
max time network
1153s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03-11-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
boobee.txt
Resource
win10ltsc2021-20241023-en
General
-
Target
boobee.txt
-
Size
156B
-
MD5
32ed85782dac5ad9e97eee17d5a3bf5d
-
SHA1
f40f564a3265f90a1f41d6ffcfddf1d735d45dbf
-
SHA256
35dcb543ce32c17153d4401abc5da15d8c8db7b16d72c6e6dfe993eabcc87f86
-
SHA512
dcfc8e3084551e8a3b002c62ac54b7ae750940412faff211400e27ecb3d2918392af8ad6cc00921ddf8944549e526cd539005899395af5a5227f2942b74026a4
Malware Config
Extracted
rhadamanthys
https://93.123.39.202:6635/ff624c8432ecf0bb1430dae/9xsism3h.1irhf
Signatures
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 17 IoCs
Processes:
BitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exedescription pid process target process PID 868 created 2676 868 BitLockerToGo.exe sihost.exe PID 1720 created 2676 1720 BitLockerToGo.exe sihost.exe PID 224 created 2676 224 BitLockerToGo.exe sihost.exe PID 5776 created 2676 5776 BitLockerToGo.exe sihost.exe PID 4964 created 2676 4964 BitLockerToGo.exe sihost.exe PID 5072 created 2676 5072 BitLockerToGo.exe sihost.exe PID 2212 created 2676 2212 BitLockerToGo.exe sihost.exe PID 896 created 2676 896 BitLockerToGo.exe sihost.exe PID 3252 created 2676 3252 BitLockerToGo.exe sihost.exe PID 6124 created 2676 6124 BitLockerToGo.exe sihost.exe PID 5284 created 2676 5284 BitLockerToGo.exe sihost.exe PID 1740 created 2676 1740 BitLockerToGo.exe sihost.exe PID 1516 created 2676 1516 BitLockerToGo.exe sihost.exe PID 4732 created 2676 4732 BitLockerToGo.exe sihost.exe PID 5028 created 2676 5028 BitLockerToGo.exe sihost.exe PID 5916 created 2676 5916 BitLockerToGo.exe sihost.exe PID 4228 created 2676 4228 BitLockerToGo.exe sihost.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
Procmon64.exeProcmon64.exedescription ioc process File opened for modification C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File created C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File opened for modification C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File created C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe -
Sets service image path in registry 2 TTPs 2 IoCs
Processes:
Procmon64.exeProcmon64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCMON24\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCMON24.SYS" Procmon64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCMON24\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCMON24.SYS" Procmon64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Procmon.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000\Control Panel\International\Geo\Nation Procmon.exe -
Executes dropped EXE 24 IoCs
Processes:
2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exeProcmon.exeProcmon64.exeProcmon64.exeprocesshacker-2.39-setup.exeprocesshacker-2.39-setup.tmpProcessHacker.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exepid process 5504 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 1716 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 2244 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 5124 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 5456 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 5100 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 2488 Procmon.exe 5932 Procmon64.exe 5732 Procmon64.exe 5344 processhacker-2.39-setup.exe 5016 processhacker-2.39-setup.tmp 5396 ProcessHacker.exe 4928 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 444 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 712 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 5944 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 5344 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 3876 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 1556 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 836 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 1456 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 5756 2 Video Missha example promouting full hd 1080 view colloboration niv.exe 5936 1 Video Missha example promouting full hd 1080 view colloboration niv.exe 3696 2 Video Missha example promouting full hd 1080 view colloboration niv.exe -
Loads dropped DLL 12 IoCs
Processes:
ProcessHacker.exepid process 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe 5396 ProcessHacker.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 420 raw.githubusercontent.com 421 raw.githubusercontent.com 422 raw.githubusercontent.com 423 raw.githubusercontent.com 416 camo.githubusercontent.com 417 camo.githubusercontent.com 418 camo.githubusercontent.com 419 camo.githubusercontent.com -
Probable phishing domain 1 TTPs 1 IoCs
Processes:
description flow ioc stream HTTP URL 518 https://sourceforge.net/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8dcd282cf82a94ab 17 -
Suspicious use of SetThreadContext 17 IoCs
Processes:
2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exedescription pid process target process PID 5504 set thread context of 868 5504 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 1716 set thread context of 1720 1716 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 2244 set thread context of 224 2244 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5124 set thread context of 5776 5124 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5456 set thread context of 4964 5456 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5100 set thread context of 5072 5100 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 4928 set thread context of 2212 4928 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 444 set thread context of 896 444 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 712 set thread context of 3252 712 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5944 set thread context of 6124 5944 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5344 set thread context of 5284 5344 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 3876 set thread context of 1740 3876 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 1556 set thread context of 1516 1556 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 836 set thread context of 4732 836 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 1456 set thread context of 5028 1456 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5756 set thread context of 5916 5756 2 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe PID 5936 set thread context of 4228 5936 1 Video Missha example promouting full hd 1080 view colloboration niv.exe BitLockerToGo.exe -
Drops file in Program Files directory 42 IoCs
Processes:
processhacker-2.39-setup.tmpdescription ioc process File created C:\Program Files\Process Hacker 2\is-DPLLP.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-DQ8LR.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-5V3H8.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\DotNetTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedTools.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-8NFIO.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\x86\plugins\is-DF8D6.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedNotifications.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\HardwareDevices.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-4ROS5.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-VR85G.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-GMF3E.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\x86\is-FAF1L.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-QLO2B.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-GJDM2.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-EP98K.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-CNNSS.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-KDU1I.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\unins000.dat processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\ProcessHacker.exe processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\peview.exe processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\WindowExplorer.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-949FG.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-R6I3C.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\NetworkTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\UserNotes.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\unins000.dat processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-SLJFH.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-IO5TG.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-DODU0.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-TD8RC.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\x86\plugins\DotNetTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\x86\ProcessHacker.exe processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\Updater.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-N29EF.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-4PGJF.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\OnlineChecks.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\SbieSupport.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-TL3UB.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedServices.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ToolStatus.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-ROKOK.tmp processhacker-2.39-setup.tmp -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\processhacker-2.39-setup.exe:Zone.Identifier firefox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2236 868 WerFault.exe BitLockerToGo.exe 1444 868 WerFault.exe BitLockerToGo.exe 4208 1720 WerFault.exe BitLockerToGo.exe 5540 1720 WerFault.exe BitLockerToGo.exe 216 224 WerFault.exe BitLockerToGo.exe 3756 224 WerFault.exe BitLockerToGo.exe 5736 5776 WerFault.exe BitLockerToGo.exe 3876 5776 WerFault.exe BitLockerToGo.exe 4636 4964 WerFault.exe BitLockerToGo.exe 3384 4964 WerFault.exe BitLockerToGo.exe 4456 5072 WerFault.exe BitLockerToGo.exe 2212 5072 WerFault.exe BitLockerToGo.exe 5344 2212 WerFault.exe BitLockerToGo.exe 4504 2212 WerFault.exe BitLockerToGo.exe 4632 896 WerFault.exe BitLockerToGo.exe 2336 896 WerFault.exe BitLockerToGo.exe 1372 3252 WerFault.exe BitLockerToGo.exe 3312 3252 WerFault.exe BitLockerToGo.exe 2596 6124 WerFault.exe BitLockerToGo.exe 4456 6124 WerFault.exe BitLockerToGo.exe 2028 5284 WerFault.exe BitLockerToGo.exe 3612 5284 WerFault.exe BitLockerToGo.exe 4144 1740 WerFault.exe BitLockerToGo.exe 6124 1740 WerFault.exe BitLockerToGo.exe 5472 1516 WerFault.exe BitLockerToGo.exe 3164 1516 WerFault.exe BitLockerToGo.exe 2688 4732 WerFault.exe BitLockerToGo.exe 1508 4732 WerFault.exe BitLockerToGo.exe 5460 5028 WerFault.exe BitLockerToGo.exe 2544 5028 WerFault.exe BitLockerToGo.exe 5744 5916 WerFault.exe BitLockerToGo.exe 6052 5916 WerFault.exe BitLockerToGo.exe 1528 4228 WerFault.exe BitLockerToGo.exe 5496 4228 WerFault.exe BitLockerToGo.exe -
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BitLockerToGo.exedialer.exedialer.exeBitLockerToGo.exedialer.exeprocesshacker-2.39-setup.tmpdialer.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exedialer.exedialer.exeBitLockerToGo.exeProcmon.exedialer.exeBitLockerToGo.exedialer.exedialer.exeBitLockerToGo.exedialer.exeprocesshacker-2.39-setup.exeBitLockerToGo.exeBitLockerToGo.exeBitLockerToGo.exedialer.exeBitLockerToGo.exedialer.exeBitLockerToGo.exeBitLockerToGo.exedialer.exeBitLockerToGo.exeBitLockerToGo.exedialer.exedialer.exedialer.exeBitLockerToGo.exedialer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language processhacker-2.39-setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Procmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language processhacker-2.39-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ProcessHacker.exefirefox.exefirefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Modifies registry class 20 IoCs
Processes:
Procmon64.exeProcmon64.exefirefox.exeProcmon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\DefaultIcon Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\DefaultIcon\ = "\"C:\\Users\\Admin\\Desktop\\Procmon64.exe\",0" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\DefaultIcon Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\ = "ProcMon Log File" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\Procmon64.exe\" /OpenLog \"%1\"" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\shell\open\command Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\shell Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\shell\open Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1 Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\.PML Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1 Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\ = "ProcMon Log File" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\.PML\ = "ProcMon.Logfile.1" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\DefaultIcon\ = "\"C:\\Users\\Admin\\Desktop\\Procmon.exe\",0" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\.PML Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\.PML\ = "ProcMon.Logfile.1" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\shell\open\command Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Procmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-3785588363-1079601362-4184885025-1000_Classes\ProcMon.Logfile.1\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\Procmon.exe\" /OpenLog \"%1\"" Procmon64.exe -
Processes:
ProcessHacker.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 ProcessHacker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ProcessHacker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ProcessHacker.exe -
NTFS ADS 3 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Misha Video.rar:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\ProcessMonitor.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\processhacker-2.39-setup.exe:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 3 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXENOTEPAD.EXEpid process 3720 NOTEPAD.EXE 3548 NOTEPAD.EXE 5788 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mspaint.exetaskmgr.exeBitLockerToGo.exedialer.exepid process 4196 mspaint.exe 4196 mspaint.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 868 BitLockerToGo.exe 868 BitLockerToGo.exe 5208 dialer.exe 5208 dialer.exe 5208 dialer.exe 5208 dialer.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
taskmgr.exeProcmon64.exeProcessHacker.exepid process 4364 taskmgr.exe 5932 Procmon64.exe 5396 ProcessHacker.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
Procmon64.exeProcmon64.exepid process 5932 Procmon64.exe 5732 Procmon64.exe 676 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exeAUDIODG.EXE7zG.exe7zG.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exetaskmgr.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe1 Video Missha example promouting full hd 1080 view colloboration niv.exe2 Video Missha example promouting full hd 1080 view colloboration niv.exe7zG.exeProcmon64.exeProcmon64.exeprocesshacker-2.39-setup.tmpdescription pid process Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 1680 firefox.exe Token: 33 5960 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5960 AUDIODG.EXE Token: SeDebugPrivilege 1680 firefox.exe Token: SeRestorePrivilege 4464 7zG.exe Token: 35 4464 7zG.exe Token: SeSecurityPrivilege 4464 7zG.exe Token: SeSecurityPrivilege 4464 7zG.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeRestorePrivilege 2956 7zG.exe Token: 35 2956 7zG.exe Token: SeSecurityPrivilege 2956 7zG.exe Token: SeSecurityPrivilege 2956 7zG.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 5504 2 Video Missha example promouting full hd 1080 view colloboration niv.exe Token: SeDebugPrivilege 4364 taskmgr.exe Token: SeSystemProfilePrivilege 4364 taskmgr.exe Token: SeCreateGlobalPrivilege 4364 taskmgr.exe Token: SeDebugPrivilege 1716 1 Video Missha example promouting full hd 1080 view colloboration niv.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 2244 1 Video Missha example promouting full hd 1080 view colloboration niv.exe Token: SeDebugPrivilege 5124 2 Video Missha example promouting full hd 1080 view colloboration niv.exe Token: SeDebugPrivilege 5456 1 Video Missha example promouting full hd 1080 view colloboration niv.exe Token: SeDebugPrivilege 5100 2 Video Missha example promouting full hd 1080 view colloboration niv.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeRestorePrivilege 964 7zG.exe Token: 35 964 7zG.exe Token: SeSecurityPrivilege 964 7zG.exe Token: SeSecurityPrivilege 964 7zG.exe Token: SeDebugPrivilege 5932 Procmon64.exe Token: SeLoadDriverPrivilege 5932 Procmon64.exe Token: SeDebugPrivilege 5732 Procmon64.exe Token: SeLoadDriverPrivilege 5732 Procmon64.exe Token: SeDebugPrivilege 1680 firefox.exe Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp Token: SeDebugPrivilege 5016 processhacker-2.39-setup.tmp -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exe7zG.exe7zG.exetaskmgr.exepid process 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 4464 7zG.exe 2956 7zG.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exetaskmgr.exepid process 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
firefox.exemspaint.exeProcmon64.exeProcmon64.exepid process 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 4196 mspaint.exe 4196 mspaint.exe 4196 mspaint.exe 4196 mspaint.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe 5932 Procmon64.exe 5932 Procmon64.exe 5932 Procmon64.exe 5732 Procmon64.exe 5732 Procmon64.exe 5732 Procmon64.exe 1680 firefox.exe 1680 firefox.exe 1680 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 928 wrote to memory of 1680 928 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 1048 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe PID 1680 wrote to memory of 4388 1680 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2676
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5208
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5488
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5476
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5880
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5292
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5292
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6028
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5420
-
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\boobee.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3548
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1972 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23681 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97743326-3ae3-4086-b239-8672e3e11a69} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" gpu3⤵PID:1048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2344 -prefsLen 23717 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa99851f-588f-4057-a009-449194cb5879} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" socket3⤵
- Checks processor information in registry
PID:4388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 1 -isForBrowser -prefsHandle 3240 -prefMapHandle 3236 -prefsLen 23858 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a9f0be9-e5c9-4157-a4c7-19c8df1d5052} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3968 -childID 2 -isForBrowser -prefsHandle 3960 -prefMapHandle 3944 -prefsLen 29091 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45501ca5-4a1e-401b-b817-915efc2e8041} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:3644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4828 -prefMapHandle 4852 -prefsLen 29091 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8764989-a056-48cb-94da-9be20702cf82} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" utility3⤵
- Checks processor information in registry
PID:4764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5376 -prefMapHandle 5344 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac34c5f2-a3a4-431a-9935-845bff043b32} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 4 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1592ed22-a3ab-4b85-b8c6-867119072d7b} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5704 -childID 5 -isForBrowser -prefsHandle 5712 -prefMapHandle 5716 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79aaada9-1f41-4853-9965-f37d7cd32d7f} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6236 -childID 6 -isForBrowser -prefsHandle 6220 -prefMapHandle 6224 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c65a60fa-3931-441b-9473-f5ff160b8dbc} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:2476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2720 -childID 7 -isForBrowser -prefsHandle 4500 -prefMapHandle 3528 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da860103-5366-4e5a-bcae-3e43259be624} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3540 -childID 8 -isForBrowser -prefsHandle 6464 -prefMapHandle 3532 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d044258-2763-4354-bcf7-a6b83e827b29} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6196 -childID 9 -isForBrowser -prefsHandle 6464 -prefMapHandle 5748 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {605397ae-01f0-41ad-ac4d-9bd32267dfbe} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 10 -isForBrowser -prefsHandle 5216 -prefMapHandle 4608 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d88eed5e-4035-4455-bc45-a4c337135352} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -childID 11 -isForBrowser -prefsHandle 5344 -prefMapHandle 6732 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5ebb07c-9224-4c88-8d72-1d007795207e} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:2724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7388 -childID 12 -isForBrowser -prefsHandle 6748 -prefMapHandle 6504 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccfb2077-38af-4b95-b7ff-9cfe539708c4} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7600 -childID 13 -isForBrowser -prefsHandle 7340 -prefMapHandle 6976 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {561ae058-d0b2-4190-99b8-638425508245} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:3732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3708 -childID 14 -isForBrowser -prefsHandle 5912 -prefMapHandle 7076 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec401e99-ef7e-441d-9b0d-9d9df5933ac5} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:3572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7512 -childID 15 -isForBrowser -prefsHandle 7516 -prefMapHandle 4860 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c56cec5-dd09-422a-9aca-dd45ae7d67ef} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4504 -childID 16 -isForBrowser -prefsHandle 2720 -prefMapHandle 7280 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {957b393a-3a04-46bb-86b3-1c68d5e4973b} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5220 -childID 17 -isForBrowser -prefsHandle 5556 -prefMapHandle 7152 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f985afd6-e34b-4d52-9197-ef06ee36a9e7} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:2588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7368 -childID 18 -isForBrowser -prefsHandle 5376 -prefMapHandle 7264 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30cfe69b-76a6-4327-b41d-c2d33c8e88cd} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:2020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7216 -childID 19 -isForBrowser -prefsHandle 4672 -prefMapHandle 6592 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3229e9c5-ef52-4666-86ef-2f9c14f0a95f} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:1980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7340 -childID 20 -isForBrowser -prefsHandle 6592 -prefMapHandle 7064 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd076b55-fbc6-494c-932d-83558a4df83e} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7740 -childID 21 -isForBrowser -prefsHandle 7660 -prefMapHandle 7668 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a47ea70-88ba-4fce-9c4f-46197295d5fb} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2588 -childID 22 -isForBrowser -prefsHandle 5568 -prefMapHandle 6820 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8e4db0a-5897-48e5-8dd3-5fe4763435da} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:2504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7120 -childID 23 -isForBrowser -prefsHandle 7080 -prefMapHandle 5268 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bf8c7d4-d645-4201-a990-456c84e1646e} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8556 -childID 24 -isForBrowser -prefsHandle 8596 -prefMapHandle 8580 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {561d18bf-fb24-4850-97a9-e1026a67c1f5} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8708 -childID 25 -isForBrowser -prefsHandle 8524 -prefMapHandle 8516 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc25f9be-fb24-4736-8aea-f26bf4601f88} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8344 -childID 26 -isForBrowser -prefsHandle 8532 -prefMapHandle 7204 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b93f6bd7-43b9-4516-8b25-cf98663a3173} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:3216
-
-
C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5344 -
C:\Users\Admin\AppData\Local\Temp\is-JQUAK.tmp\processhacker-2.39-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-JQUAK.tmp\processhacker-2.39-setup.tmp" /SL5="$504B0,1874675,150016,C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Program Files\Process Hacker 2\ProcessHacker.exe"C:\Program Files\Process Hacker 2\ProcessHacker.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
PID:5396
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8544 -childID 27 -isForBrowser -prefsHandle 8612 -prefMapHandle 7256 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb4ade47-2cfe-4ff3-a29b-1f3c465e453f} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:5072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7144 -childID 28 -isForBrowser -prefsHandle 8856 -prefMapHandle 5280 -prefsLen 28038 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2a079bf-d0c6-42da-a57d-0ec856ab6d5d} 1680 "\\.\pipe\gecko-crash-server-pipe.1680" tab3⤵PID:2280
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x4581⤵
- Suspicious use of AdjustPrivilegeToken
PID:5960
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5952
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap6703:80:7zEvent280201⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4464
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\info.txt1⤵
- Opens file in notepad (likely ransom note)
PID:5788
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\MacOS\instructions.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3720
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap17092:80:7zEvent130021⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2956
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\logo.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:5700
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5504 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 5443⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 5523⤵
- Program crash
PID:1444
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 868 -ip 8681⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 868 -ip 8681⤵PID:4736
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 5083⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 5043⤵
- Program crash
PID:5540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1720 -ip 17201⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1720 -ip 17201⤵PID:4416
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 4843⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 4763⤵
- Program crash
PID:3756
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5124 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5776 -s 4843⤵
- Program crash
PID:5736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5776 -s 4763⤵
- Program crash
PID:3876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 224 -ip 2241⤵PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 224 -ip 2241⤵PID:3364
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5456 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 5123⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 5323⤵
- Program crash
PID:3384
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 4803⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 4763⤵
- Program crash
PID:2212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5776 -ip 57761⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5776 -ip 57761⤵PID:5708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4964 -ip 49641⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4964 -ip 49641⤵PID:5932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5072 -ip 50721⤵PID:5296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5072 -ip 50721⤵PID:1980
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap11512:86:7zEvent312751⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
-
C:\Users\Admin\Desktop\Procmon.exe"C:\Users\Admin\Desktop\Procmon.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Procmon64.exe"C:\Users\Admin\AppData\Local\Temp\Procmon64.exe" /originalpath "C:\Users\Admin\Desktop\Procmon.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5932
-
-
C:\Users\Admin\Desktop\Procmon64.exe"C:\Users\Admin\Desktop\Procmon64.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5732
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4928 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 4843⤵
- Program crash
PID:5344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 4603⤵
- Program crash
PID:4504
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:444 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 5123⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 5203⤵
- Program crash
PID:2336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2212 -ip 22121⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2212 -ip 22121⤵PID:5516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 896 -ip 8961⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 896 -ip 8961⤵PID:5780
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:712 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 4843⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 4763⤵
- Program crash
PID:3312
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5944 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 4763⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 4803⤵
- Program crash
PID:4456
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5344 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 4843⤵
- Program crash
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 5083⤵
- Program crash
PID:3612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3252 -ip 32521⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3252 -ip 32521⤵PID:5208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6124 -ip 61241⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 6124 -ip 61241⤵PID:5520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5284 -ip 52841⤵PID:5732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5284 -ip 52841⤵PID:4192
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3876 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 4803⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 4563⤵
- Program crash
PID:6124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1740 -ip 17401⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1740 -ip 17401⤵PID:5144
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1556 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 3483⤵
- Program crash
PID:5472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 4803⤵
- Program crash
PID:3164
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:836 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 4803⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 4763⤵
- Program crash
PID:1508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1516 -ip 15161⤵PID:5556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1516 -ip 15161⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4732 -ip 47321⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4732 -ip 47321⤵PID:2140
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 4803⤵
- Program crash
PID:5460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 4763⤵
- Program crash
PID:2544
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5756 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:5916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5916 -s 4843⤵
- Program crash
PID:5744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5916 -s 3483⤵
- Program crash
PID:6052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5028 -ip 50281⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5028 -ip 50281⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5916 -ip 59161⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5916 -ip 59161⤵PID:5764
-
C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\1 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5936 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 2083⤵
- Program crash
PID:1528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 4803⤵
- Program crash
PID:5496
-
-
-
C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"C:\Users\Admin\Desktop\2 Video Missha example promouting full hd 1080 view colloboration niv.exe"1⤵
- Executes dropped EXE
PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4228 -ip 42281⤵PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4228 -ip 42281⤵PID:5656
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b365af317ae730a67c936f21432b9c71
SHA1a0bdfac3ce1880b32ff9b696458327ce352e3b1d
SHA256bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4
SHA512cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b
-
Filesize
64B
MD52ccb4420d40893846e1f88a2e82834da
SHA1ef29efec7e3e0616948f9fe1fd016e43b6c971de
SHA256519c2c2ca0caf00db5b3eb2b79dfe42e6128161c13aeb4b4d8b86fbffc67e3d4
SHA512b2a000b33d4a9b2e886208fc78aeb3a986f7bd379fb6910da9f6577603aa6e8237cb552eabca70445f37b427419beeff0b061090cb952331b8db322ce2e58bc6
-
Filesize
132KB
MD5b16ce8ba8e7f0ee83ec1d49f2d0af0a7
SHA1cdf17a7beb537853fae6214d028754ce98e2e860
SHA256b4cc0280e2caa0335361172cb7d673f745defc78299ded808426ffbc2458e4d9
SHA51232de59c95d1690f4221b236376e282c8be1bb7f5d567592b935dcd798b36b80e86da81741c5845fa280386f75f6eafc9bbd41035362984150b134d24aede61eb
-
Filesize
140KB
MD5be4dc4d2d1d05001ab0bb2bb8659bfad
SHA1c0ed9e375b447b61c07c0b00c93bb81c87bcfc2e
SHA25661e8cd8de80a5c0d7ced280fe04ad8387a846a7bf2ee51bcbba96b971c7c1795
SHA51231389e268fe3bf1175fa3c251ca026f77dc59361b8425c9826f31d18c5174e6de68c6092aef187f2bd2c92d89b3093a660b2fe6189af369293c1117c856b5cdf
-
Filesize
136KB
MD54858bdb7731bf0b46b247a1f01f4a282
SHA1de2f9cbcec1e1fa891d9693fb3cadfdd4cfe1f60
SHA2565ae7c0972fd4e4c4ae14c0103602ca854377fefcbccd86fa68cfc5a6d1f99f60
SHA51241b39560e15d620733ca29dc37f55a939a653f99686ac86643ccc67fbb807ad95d1996b867319d98506f3b8a30772fff3c3317bbcc205987f48031923f674d9a
-
Filesize
196KB
MD5bc61e6fb02fbbfe16fb43cc9f4e949f1
SHA1307543fcef62c6f8c037e197703446fcb543424a
SHA256f2805e0f81513641a440f1a21057a664961c22192cb33fca3870362c8f872d87
SHA5120bbfe53e1dd933a3080d9775ad890fcbd73f9820885efa6b69e9664261249f34eaae3870f74de8511734fc9a0114f36e1bfc529a032d303a8e3e583e37a506c6
-
Filesize
180KB
MD5a46c8bb886e0b9290e5dbc6ca524d61f
SHA1cfc1b93dc894b27477fc760dfcfb944cb849cb48
SHA256acd49f2aa36d4efb9c4949e2d3cc2bd7aee384c2ced7aa9e66063da4150fcb00
SHA5125a4d2e0fa7a1a14bc4c94a0c144bfbfcef1ecabe4dc15f668605d27f37f531934778f53e7377bab0ff83531732dc15e9fc40b16f2d1f7e925429681bd5bdca73
-
Filesize
134KB
MD5d6bed1d6fdbed480e32fdd2dd4c13352
SHA1544567d030a19e779629eed65d2334827dcda141
SHA256476aa6af14dd0b268786e32543b9a6917a298d4d90e1015dac6fb2b522cf5d2e
SHA51289362a7b675651f44649f0ea231f039e0b91aba9f84c91545f15e187c6cbd07bbf3648a4e232dfe5122cf5636e67c458f4f7dab49ed4de3f3a303aa396c41d1c
-
Filesize
222KB
MD512c25fb356e51c3fd81d2d422a66be89
SHA17cc763f8dc889a4ec463aaba38f6e6f65dbdbb8c
SHA2567336d66588bbcfea63351a2eb7c8d83bbd49b5d959ba56a94b1fe2e905a5b5de
SHA512927d785d03c1ee44b5e784b35a09168978b652f37fb73a1a2eeecd3583c28595fb030e8c1f87ab9a20beac4622775777820d1a2ad7219ba8b9ae8b6fbc4568a0
-
Filesize
95KB
MD537cbfa73883e7e361d3fa67c16d0f003
SHA1ffa24756cdc37dfd24dc97ba7a42d0399e59960a
SHA25657c56f7b312dc1f759e6ad039aac3f36ce5130d259eb9faad77239083398308b
SHA5126e0bfab9ff44f580f302cabd06fc537a9e24432effd94b50ab696b35f57a61772072b7f9045a9e99fa4bf3bc316f43ea25ab6c87517242e7957eb86575203bed
-
Filesize
243KB
MD53788efff135f8b17a179d02334d505e6
SHA1d6c965ba09b626d7d157372756ea1ec52a43f6b7
SHA2565713d40dec146dbc819230daefe1b886fa6d6f6dbd619301bb8899562195cbab
SHA512215d6c3665323901d41ae5151908c4e084a04a1558617016f0788194304e066410b92943bd6c119339727037ee02cfda893b9baf5603b2870d9fc5ae0c77ca7e
-
Filesize
110KB
MD56976b57c6391f54dbd2828a45ca81100
SHA1a8c312a56ede6f4852c34c316c01080762aa5498
SHA2560c11cdc3765ffb53ba9707b6f99ec17ae4f7334578a935ba7bcbbc9c7bdeed2e
SHA51254d8b39457f516d921bb907615ff60a46b6031e1444a443c9657e06d78c9fb0f637ae4756bb7b884e4dca2f55902372ad4ddba1d020abe02e0a381702ae270cc
-
Filesize
114KB
MD5e48c789c425f966f5e5ee3187934174f
SHA196f85a86a56cbf55ebd547039eb1f8b0db9d9d8d
SHA256fc9d0d0482c63ab7f238bc157c3c0fed97951ccf2d2e45be45c06c426c72cb52
SHA512efdb42e4a1993ee6aa5c0c525bd58316d6c92fbc5cebbc3a66a26e2cf0c69fe68d19bc9313656ad1d38c4aef33131924684e226f88ef920e0e2cd607054a857c
-
Filesize
133KB
MD50e8d04159c075f0048b89270d22d2dbb
SHA1d0fa2367d329909b6c9efcb3cc2c2902d8cf9b22
SHA256282696487ea5dc781788d5d8477b977f72b7c70f201c2af0cfe7e1a9fd8d749a
SHA51256440f3feddc124574debfe3789e14d908982d4d8e9516f42fab7db7bcecdd3badd2f75e005016a7b9d87a00d5646b8df722bae8fba3932198babbe5335cf197
-
Filesize
18KB
MD55d8df8cac01818558eb647bfef1ae235
SHA103fa115d42f0814cc58e68bc5b9aeb759bec5b56
SHA256c755985c79b986e5001dd7e10062bdde7f9702511e878d0666e08540dbad3c9d
SHA5125961eed67f54e8ebdb0ee45c833b3b0b9a82895d3d93e188415faf5e239984a94b1bb49479ba54ac1ad1580dfa778fc5e158b23df57591234e229595df4ecfac
-
Filesize
18KB
MD53c2dde73c321978357a5f5d14997e73d
SHA1e25f25fad7b37f87d92df50405967f5b2ce199fb
SHA25647df647410c6d8a532df8212adfdabf6ba11e7b2f2b2f75a8742b5bcbdb94839
SHA5129e684c0a2b331c95642a9d4e46d3522652a093f27729ab3c10f59f93338d43172bd273fa403b94516ecc677c55b4bfc8b603ceb04a236f7f3b9ef4f47ac131b0
-
Filesize
45KB
MD588e1f34fc56db1a818fad3b27dc1ccf9
SHA1377d86c29f6c72883d6c502e4de4c3470ba4d92a
SHA2569fed36d5a9c671cf61a28f2e935b31624d139adaef817923fe836d8f3d7c7ea2
SHA512d1b28e5a12ac6b08da3228aeacd515c5e48dce8abc0b70b4c51734e5902f0a135ddfd73721377454fe68af49c15422482c9a695a0e451a1b414f9732ad2377f3
-
Filesize
18KB
MD59c7889e25520eed030852b73154afa4f
SHA13c712b262c69da51315597f0fa7482c789343a5f
SHA256d00294c4fbe2ed5208d294c8e9f4c1c9f2e7506631bcbee10b1adebc7c7314e4
SHA51208507a96b3b7a352c89ae25bf0bf45ad92fab01b1971b9c77d4bd850ba8715a855d502279b599960b3a8fdb4356d49b64cfc89c8b53ad77d4c515f010fef7b81
-
Filesize
13KB
MD595a3e26cb602bcc0564a7340e187930e
SHA1b849db675f4629b5d922a3b01bba4e2d440a10cf
SHA256ceecf74dc03c23329a8e27369995d7c397277a03d2ae70b49f28769cc0bb44ed
SHA51256fb456bb7ea314ec536448a8ab5888bca81c5138be01b6f2a7b8fc32aed8a7d3eb87a74d6250342b0af0005923902bdebbb93432e9c34fdaa6741be480cf9ca
-
Filesize
16KB
MD5883985f611682eecade694958f354f42
SHA1b65c65ad9f49d0593063a5e56fefed358d314b7d
SHA2566fae0a08ccdc1a099a439c29567dd033b893576f85b3c88c52b3db8526efc941
SHA512be205a61aef6960fb359e1bd2bbb86ce3b6fa674b7edc980ca3c4da111ff95022611b4c96be924576d56a5a3ef42f9db2e07c7870eb4fb59893f071801774d1f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hohja4eo.default-release\cache2\entries\5B23235D54208C34AFF88FC6F18585FD8A8F8FAD
Filesize32KB
MD5e3d1eb9d81ea9f39d37a5bbfaa970640
SHA1aece1982acd1a637ff57aaac0da6053da5709609
SHA256d34ff0757b2836d6832f2827bd015f0ea6bab078667eb623af2067e011272b8e
SHA51299f582c88e892e78119e027b13d0cfc028b39105c53073ed563c38394c54d2d0e9e016c5901745004a3c753a778a109a8f77294e86ae63945df4eee603811dbe
-
Filesize
2.0MB
MD5223b222ce387a7f446d49a1ee9b572bb
SHA18ed888a02861142e5eb576385568c2ba0ddd8589
SHA2563e15995894f38b2eead95f7ff714585471f34f3af3d8f50a7f83344781502468
SHA512037b4787af5fb129a3b1e0ac9565e59d5a55ef26ccf93bc9adf685c08422071ee0d0eb4667cd2ce0d725c7dea0209c1d7d48baf58cd18dfb58de35bf7feef1a2
-
Filesize
785KB
MD51c96ed29e0136825e06f037bf10b2419
SHA1b74a55279474253639bebf9c92f10f947145ff30
SHA256b10cf8cdf541ca0dd6df79e66fb4b0854dcac717aba034ba0c4961bff92fd021
SHA5120e74854d9de4e3944b2cff9b5de7eb19fdec1fee6c9576cae6cd81741adf84eac421cb743b1df30183f645ffe849357b6a85b5be8d7f6e2efe289bbe4573e177
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD53c9f9520f80705babbb849818759dfa0
SHA18b22ed21f5d26c85402079ae4a678bf77be9c984
SHA256786b8797b0761ebe646b295aa7c57f07f55bfcf1f9f1aa19054682183d5016fb
SHA512f2cab3656c0760fdb38f8eaff33dd44bb4f555d01b0f71fc490748609e6ab3847d107d14b3bc6bc109952e0cca8e2e9ce59d51edfb5742714c703922b479077b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize15KB
MD55b04f0db2e3acb955c036a0b038062e5
SHA108dffd4ef448668e4ac2157fd215338c6bee774a
SHA256ba40f5c2e06b1a841bcf31b21360f6164804c057ec71c6791e64d0973b05fda4
SHA512679cdf8d13b628132750393f7195bd2fb07ccfd6a95743e021a6b704bc2ea31f6e98cf7bd426810a9fe3d0854c458f0a0ce3ab2ac94529e0dea979ba306c71d3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD5177c7154e7854e63fc20cb414f92e0fb
SHA130c2d4bf7daa91fcc72f2b0536407a060aabd2ba
SHA256ea6c230a7b53d5f345ae9a048f739574acd953faedd4f67bee616d3d6f14ae6c
SHA5120bf8925d0f34e2427ad0b03f963e8a611b49be5b74810c70c848b7aa84b4287989644b3cc681f5a22761413ff06d3348774b9680c51ff83e75bb91af82fe9e88
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize20KB
MD57295622c39c6bbfd3cb4c22506fd057a
SHA130add10550382e27882657bcb529f5c637235eab
SHA256f965c75ac9092db26a76e7d5d819d923abb2f667a454abf0bfa14742d956d97c
SHA512a5951c8260d506912e54fb0fa02fce732c468f54fdca8e39b4e97dee3216ce8a464b4147cd4132f3945b2a7009f7925482ce01fedfa07406da1018bc81f6b048
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize15KB
MD5805035867be2f2a6bbcb312dceea07a1
SHA11ce3fb50d4b2baf50fa44a13b94a14c1d1dd5504
SHA256dc19f89c3c4d8bd1cf5c773b8ed2513238f21f8fba58436608226c66a90c4397
SHA5125a20f932145768eb8c594e7285af0e1be9c666671b08e36cdc03c53d1d14d3f2b1cb05d2c62354d7074f29873c03f6052fe870af579ca16045f3c7d7a3b1753a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\AlternateServices.bin
Filesize30KB
MD5d36479b26c890ba41b21f824a7fc44b6
SHA134d18b7d8ed3b126fd9f0e9a8e3834ecf89b6d98
SHA25618ebd4aa6623d0165c57b85fcba066e93e5b633ef76ff23728e73e995dfff28f
SHA512913dad8024797580ea63dff2515a458c558cbcfe89416e986605e73cb5314cbd7fc6271b31b3770b02625156ce6365c613b9ea40df387e622fbc1107f7afc0d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\AlternateServices.bin
Filesize8KB
MD586415766758c6867fabd26409f7e1103
SHA1aaf6baea47b4d1b871e87e375e44506551b2bf8a
SHA256bb3cdda091f3793c2d12fec034d21cb895ad2e25c9e1b3d9388bd45a38a0986e
SHA51247ec140766ceb037f0b1615d33b94ecc7b062dc448806aef3cc8122fa688cd5500bc1670def120cec558fff1c8f3e04a221f036fc6e5161f64509988d0cb4e69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5efcdf94e9d6e1526507ede035f4b831f
SHA19f043a45dab9f44c9239a461836381fb22b509f9
SHA256c96b3c61520129f7a6899c459549df7d86ecaffa2bbd3312729e66ed20fc02cc
SHA512fecef6bff7ea9823672ebda2203566aa122bbe599c92155fb1d0e97ce181022137b55add2b413aadaa2eeca89d5393041fbbc5de40f6a96cb95b645a596ea862
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59e3f76f7e13a702d50e9eda039fa2e50
SHA10026baf4c7ff5db65fb96a27e1c64f35e797c80e
SHA256436db702e88362920d2782e97d9c4b7a965daa8945d15f85cb944f674dbaa8b7
SHA512b48128ef8550b7e12cf09817544ac2429c88415a4f3a87b2cb8d40c6b09c518b40401d77a1ba29cb9f2e0689ae9e48c21c080b7288d997de1bf319cd0e39b035
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\db\data.safe.tmp
Filesize51KB
MD5ff3cb7b20dca826a5bc379ff9b8a063c
SHA1fae25d23feeb28e5f32adcea024a57f23b17d057
SHA25676ba4388ebeb612c3650ae07b7e85d148e19f4b3a4b5d55f2f0acd8ffe1719cc
SHA512b8fd86e952f8ce0a655f1e6351a5bcbae5917749d2d50adcdd747b49bb8441d439f24569abdaa8e6352fddbb97ba3cf8c6df2e4f1a9c755fd60d13f42f1c9c53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\db\data.safe.tmp
Filesize81KB
MD55deb60c6003427365762869143044b18
SHA1ec6a6686812087d05c54d63c5b60269fae805b08
SHA25687ccdc57e1efe65abceceef90a3afed1a22026877336494c0efdfdea68112d29
SHA51250c23a6c31022bfdce5c6845304e737969234c06be2535955086fce0c954721ea74103fde5d9d71872be6e419d759afd0f27f73202ccdb1999c5a1668c2869c0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\pending_pings\2283a9fc-91e5-44cc-be37-a68cd5fe525a
Filesize27KB
MD578784cc8fc72006a31f595c5eb9fd78e
SHA10e984b0eff857278aa38a6ac212e4b07897d4bb6
SHA256910af1b81c189ba2c93fe15743c02e2e579a2a19270d95a230ad5308c45f90eb
SHA5128eb14ef6d959d908c7217d64084dfd6dae364a3676d93a0c9b2f5472532afbc265c0f983c67dcd8c919322b6158f1323d6d494e5957058578eaf10c07e17e30b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\pending_pings\85c0e6b7-f943-47bf-b649-fd575499d9bc
Filesize982B
MD52a67ae2bb066032e72cb37397776d94c
SHA1d3b68425e25817bed6ae2b78ea889bed9c300730
SHA256c306b419705cc130174b7eeb4f049007c4b6445c512edc2bd846275dc4b51e0f
SHA512040f94f36d2d0f38f4ff9efd4cf5d2af8806ec80c60023046c60d2944dfc9f65fc83e8673366a3fa410ee18d65c849f7e48cefade31dba177e3aeec5843bfc8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\pending_pings\ce3bc226-3450-40f6-a414-96c89ac70256
Filesize671B
MD5c76e3fa036cb67fbc0aa268c6d80a9dd
SHA19d37e22eaa27f62d8388387a8502ea8aafcc91c6
SHA2562149c8c770818464d0e548e506848a567c5aad29b76ac58cd1b7bc89baa59ae7
SHA512814c0cba40a39a8c838b38f41e9c30a171187649abd2b8a6c2a91a94ac6528f11ab84a80f80ce8e5043975add068fe3de5beacc99f801f4e8f940e3680f2b978
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\datareporting\glean\pending_pings\e370a6ff-25f7-4aea-b448-6c66404d416b
Filesize36KB
MD5c6a3524f370c63b65139cf0aadb32caa
SHA18c041fa3ae84126ff20d600d1d943d0f44c2bf71
SHA256e2b51f2d5362d8908ae30f0d08a3dd1ca368aeaa30cf83ed8ba6cbc06235226d
SHA512a700e4d96e114722e5744a4c5dc09622d41e7476c460cfc652f2d4e193ee64dbd029962c1f74970f83b81d898119665c711f3d44af667449a52de2cb30c02103
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD583bb31288b16390a60930c6bf7224c61
SHA17bf3c54cfa7bb44a02a225114857c54c5eb8ca28
SHA256c768c52f60a6fa6be780f2d871ccb070302b7e2b5108fafa5fc3478c6dddc4f6
SHA512f7b1b5ec234d665d07654d262275117be094e9ee0e231fd81fc11d20cdb50b9772483023f8e2518f011a16d44738025761d3edbe829f9b51613055c1cbda7529
-
Filesize
11KB
MD574909a59866ae0c4159fdddb0ee5b151
SHA1d493de9b9de96509963273e7326097619229fb01
SHA25683767f0c63cdee0b31de95b146acc7bc6e2cd696cc33fa4a15dc66fd940c980a
SHA51265c7cfcbc728da963fd9df564c128e57ac81b4d2477ac8ec88bdba27cc91a965c06ee14278f308c6f020c27bec165d6f5cab831c2620a2c787e4ac2e2a62e70d
-
Filesize
10KB
MD5a100c407b79b61ba699b3c3b104f21a7
SHA1f8eab58146953cf180796a76a9b3942e1d8d058d
SHA25627a39c7f86ca0544cc3c6b796cbaefe62be1553d6f3299c1dcd848f97f7bc089
SHA5127e4e54c8ee9d4cc7ccf8d52964ae1fe4d00e375bcb02f7d5d828f6e164a2d01cd2bd9a679090e5f685081987b03a8ad841ba532afd190a0b7b4e49fe176f7c00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\serviceworker-1.txt
Filesize341B
MD5a289d72038983aa2a35a211ff4b39fd7
SHA12dfd899ef5c5d659ca57156234c6d95477a77847
SHA256855b2b58d7cb22b3745cafe6a4a07e04ddb5195df52f41e0a6b122cc4163ac6e
SHA512df32ea374705c33e124ee7fe3359246bb92c03e350066d9a45877aec199b3acd2874e7613fd1202fe02655ce94bdd33670434bb782ce8e5994a2cb9d99e7a226
-
Filesize
153B
MD51485ac39a6ae858ecc09b0a9890ce862
SHA1a78678757bf88cc98198fe8c8729806b10676a5e
SHA25606e4caeb7bf82e184a255e840687c59a757021a80507078fab8832bcc5528267
SHA512dcf76c8adcb5cd27b7cd7d46c354ba21d1f9d9f60fc137bca8b991810d0bc9527a3161e600297f763ecce626eaf363fca5da69fdd8dea3e8af5dbe7fe4a21726
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD515ded9fc23c75572c2eb4868ce879b33
SHA1c9390bcd2c7ac0726cfde5402c8b684e25e3893a
SHA256c9c8ad6169867b82c6b74ace9ebb5e4368124821df34d2223714d75a4fcf6e70
SHA5129256af202705af7de875e374cbf8726269e690b1c3b9edc95fddfa7ed5cb5161419be0d0b15d9b28f85dbfe17b933f6f72a0fbf1da2e67b4bf7bfd056392d197
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD50f44c9640277abe082de3dc464457565
SHA1e3f56ece4dce946412c4b2eff7ec0c456b575b9f
SHA25605e88fdd808294688575806f004a1ff576c5a21c56f121223bc6e4ba95d98846
SHA5125b715c0cf2e6c35633ebeadfce3f3fc88ba0552773f59d3f38fa51bdf9f6c3af436b53861d21718798dede6aa62d2103e061493837af4390298cbe14f1ba52ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD5ce8d909e74981489d8314714d5f39162
SHA178c31b8ff8b899d6da2fe78eb82d4ecf3ef16b5f
SHA2568b61016e0e83954b9bd69f6edc55d1dcd75005b855c197d8c4c308ceb0b8b6eb
SHA51247dc1bcdbccfb4a932189bec3c6ad11f3c6d1d95a00cde39e250ae774c160bd3615dac92b58bd90a0610bd9ce77ca878009aca2b1db22152b2f2869417cbf496
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5e1c92a41d45d1372f6d10c9b871180e7
SHA1bbed64b0d86e2b083aa134f52a8d257b088cc05a
SHA256fd8f4966022fa2695ae3e13dc408f0948d6529b6e726578f9d1e44fa0f3139f0
SHA512767a5ba242e6b3c1b0f48fa254fbf248194329bcb7f1b2db611fa7023dfc49a0db76349b8da36733027970c613c8a95d23292f677eab0519e39793ef960104e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5bd01770b48e859c21e5f5af8c417661c
SHA15e42c59d497fc06da5e78874c812e93e52ba7308
SHA256efef7801c1b554abedc5733af09bb8411577fdf951798d1013d692f8ef0e0ac7
SHA5129db29f8d935146caac5e5ad713f898fda739482d488e6d6e9ec07d4c903b6ffa09a29f2ae15e615681e6acff528cf938ad428039f5348ff6eb57996750e59dc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD51a5a9821eada1bc55ec9d1fc613bdb0a
SHA1b073835f33751ebcc7c3a82f6c6d32d9e5eba8aa
SHA256092fb72e92c12cad899c32ef735837ee58a21b7f8d68b0ef6980e457a02a2584
SHA512318f5e6960ae81fa45138ce030faa4a51ea77096e516508ab8961680771f45857a335b5884e50515ba251d12342a5f8bd8f31d0f2286a951a275686a30b693e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD56a0bff7ba31f13252cbbf793939a4a54
SHA1f4c4c1b16c5164606e4c2cf1bdf522c545b4bd58
SHA256d0fcfec79145a7a04d407bca4e17d290ebb2d135c3417209bd7414c0c5795e96
SHA512cdb2ddc40df21075445681465bf041879d84679eeda744592167396cb9ab24415e01b1af480533213a0d8c0d869a7fad37904516914a09f80e946d74caded320
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD569d4158fad0458299178a2655a32d8de
SHA150aee443586a5c83b9e4d07326fd700daf28dadb
SHA256e1bee425b42ccfdb03ed67772115824ae3f9bf5b32381119569eb005774cfa3d
SHA512add8762c36a923d0614398f74a7fca824cdebfb16ec0d38e2ce9e1327d5cbe22b82c51a247ae02c800f8e7f72129f52c81d7bb26c9c7455a9a60389da663f9e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize25KB
MD5dd30552ebaf93841997a3442174818c6
SHA19dc2b8f7ed8b05dc139d4c988175788aa3f76c72
SHA256a5dd8e74c986a0233331ab2652c0474e0c654e758e542d283c38b250ddfe2128
SHA51220bf042773e25e66583f41818dabe1ee71d1272f35bd1b550a2cc5dd79e054f19f65f4c2acae8ffe26c7950b15e51dca94f7731445cc2b1ca74142af77066be1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD55fed14c7fbec2d90db31c66457ef1486
SHA16a126ac507dd7871d257e60e0873257109a62a09
SHA256385694655eaccca7b2f8a0b512b2cb558bd4a5d1a4a237fb81ebb660472a0099
SHA512410d26c30ec88e01aa1dd8bd36d74222602848edcf7f038044c11175c57cf97696b4243d38f2520670b818fc0a4866f9f4a66f1fb97c931b972e067597f5c62d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD57c62b2d3f51d293041a115ad9ad0062c
SHA1e8094e60e693005de1a135140ec838d2de530705
SHA2566e05e8ecc605f495cb3e5b5df8ac2aee90c00ee6818c083cc61428c3966edb30
SHA512c565ba2384494b3f10c5b9e67dd7d3a8918869fd0874063bf7b2c7e9817f214495305e98561a06a170b505eb42bcea886ae54d719dfea305b40c9eac9a4ba7c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize8KB
MD5bc6d8fc4ab2891d30543589f9bcbf242
SHA1cf4da1d820817a80f29756e68e4cc21648cac6d7
SHA25607c8cd061c2fe447126a1266fff552a5a9e6a25646d6b7032a231fa9a15541ee
SHA512f8e9c0df4bfa1a54657ce7b2a3260625e52c6f4867c3b81f6a2ee8b5798a3f5127f5f4cb3e82f60627b4337d9a82b8f08125941a433a9ae52a82ec876115c7ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize9KB
MD5815cacf50419cea7a10901597ec42b1b
SHA1bcfb2c33ce7e05933a6094e42ce23d2c0d449aed
SHA2560d9065e141d925cb9306966d0432f639e746a8efc59e0aa76011ba1898162566
SHA512d0eb0734973f853c599e3f6462d15c2ad4f47dd6cd14d9a09665e019793116a9667ce144e0d49387f54dcfd1316ef687bd609d3de0ea261c335377c067ddde48
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD546ee27e5e9ec40e83f86b0fb85c3dcc7
SHA1872537c8b975d379a1e97e7efd54a58ce9f9c312
SHA256d8578ba96cfb73c03f17e42806bd53291519672c5784c7d405c0d7711f2825a6
SHA5122e437c3621353b6b06bb38eb893fae6fa8cfa727bf46de060ef42c4702769af11d9eba0a9cec3519c96f1d811e3e8d6a7ab4655557edfe41c59ff4510b7fd667
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\sessionstore-backups\recovery.baklz4
Filesize14KB
MD58fe2e228bfc5b9d6a70ed910f6df8bf4
SHA12f3b663c2ce26eef122f0589ce811838f4f21055
SHA256c9c6fe892195559ce9ae2b99eab9017b412031d9c76d405cec39087361605a88
SHA512b7514dce99775ce090205364c62078cfb527982a8a25bfd2cec4de882f24dda189c1e14e3a45f37cf7034b84bc4338dc2dbfe64618d411f596385eb542ee4281
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\storage\default\https+++mega.nz\cache\morgue\66\{6881ee85-50d2-43c3-9d99-889a9e61b942}.final
Filesize1KB
MD53efa9abd92666265dd81c4f4311a96f9
SHA141b6b716d67b93555e444cd453f3c6e3f8c9522c
SHA2565066b1841e8877db31312ef3af86f9bc9234c95071119e025764f45241a4e2e7
SHA5125961950f077501608a0f2975e7f69c483eeacc4eec4ac77fd650cc1131609501f87819f93ed23aa508a90426156abf038a859fac4112d2d4435bbb634027cd6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\storage\default\https+++mega.nz\idb\3713173747_s_edmban.sqlite
Filesize48KB
MD52e2b8477ebb5cf5b621aaef5b478b715
SHA174c4c008e99d5f7a0f55d071276a7f46ca42f71d
SHA256ba2e48f74764339ed12d59a9085a46fbddb8fa8a2fa5e73bd91960ff03a42d0c
SHA512c8c8586137a9d65e7d0d2270e329de463565af16604e49eb1382687343e3361fd44b1b8434fc1123ae03d1aeed7c6dc35e17ed5abe7bf47f5f1009a85a846fc5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\storage\default\https+++www.virustotal.com\cache\morgue\99\{dd8c65b1-75fc-4378-a9b6-d9be778e0763}.final
Filesize50KB
MD53bd181fab15a3ff79f4ec6203e8c11d8
SHA1ce265e4838dec0ab068ef5f3db78dbc0dc00a1e0
SHA256dda66a6bf5e20e27e7738723bb7db889b624066c7b4063b4398c401ec674902b
SHA512da8824488efa0247f01c7532b52d42f29f2cc27f57b76c505b829c7eab0877ec1b9875f7d3d60e2b135199f2ec19ed829baf7f380337b485658201148700c728
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hohja4eo.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize592KB
MD567287c62dfc01805e4f17841a62b3d52
SHA11837268c7af6c4297a06bc6d6e7eb161d7ae2760
SHA25630c3643c31702bda343b0efbfae8f1157137a361127b7413f27f4533c2e8a0e0
SHA5125095714be3c443d92124eb06ac1707ede7c74ca4931a4f5dfc077d3fe5b4a2fb314aecdeaf83dbb35f3418aeb60b8ebc3e3730094c8a917fec052918e63f56b3
-
Filesize
1KB
MD591e913aceefadf8cd7b9f0fa2069401e
SHA12bc4c5a228f6193de3b0b562bf23ac2d2b4c8aa2
SHA25652b1906a7dbcea34c0dc900095984d3b00190cbc3e1e5f48e8efc44f23af3fd8
SHA512b6629887cbfb9cefc30d5158fc01abb47682949ec0a2bb6cfb00ae18a9427a2a507ff54d45c3fef87c9becacaf9bc90cc51b119405fe9acc1a4c4ce1e7fc5d1f
-
Filesize
3.9MB
MD5c3e77b6959cc68baee9825c84dc41d9c
SHA1bc18a67ad4057dd36f896a4d411b8fc5b06e5b2f
SHA2563b7ea4318c3c1508701102cf966f650e04f28d29938f85d74ec0ec2528657b6e
SHA512f825521149f4e771c9f51abaa4fa956258a5393754ec7422692dc0c24c120ed9f103dd3953b47b7bb331dd4095b3e97b95fb35c4dfe03ce39574ba4b39b76d7d
-
Filesize
312B
MD5dbe5d4bc9d3108d88253a132728f66f6
SHA1c84ce29e50152cbd89b9d94a300274a99b11f09c
SHA256b78994027dee73ba47f6311cd364bbd320c20d6058ca852ba72dddcec7728354
SHA512d0459b1ef99bf1433f51df24c907787440b49ea9c33f7d405f822b2b7dc538b08b7a0b1d541f7c93173457bacdf9aaaabf0e9087902568b5bdcb3d05e1d57db4
-
Filesize
78KB
MD59acefc5b8ae72c8ef5cacde426efde6d
SHA19ef3d93c17a9cf3448a432f46ccb93132e8d5bc4
SHA256ad02285ad9342d05e3efd0dc3eb40267efc89930d6d7f480c7ccbc8f0360ca80
SHA512358cbd54aade8e0e89280ad76825f7617eabbb6e491b40101269ed27aef70b5fdb838d5051eefa3c59cf4fabe0ee9468164be8a96bda0f7fc7fbe6b5e3e6a7d9
-
Filesize
2.9MB
MD5213d09599b9761a8e78c20b3f8072636
SHA1815ae249e5dc5bcdd8576ff29d3ec39e20c761f7
SHA256d4ed579fdc1957fde0124dd41efd8d72af0529254984bfa5a3864ecd8b539252
SHA512f656e128fcb0269946cfa03adc5392676c17b18f309e0476b2153fe545e4d92641e7849b94743e84fce39366b0b72f04e725b7922ccf513deaba8aef833ad971
-
Filesize
2.2MB
MD554daad58cce5003bee58b28a4f465f49
SHA1162b08b0b11827cc024e6b2eed5887ec86339baa
SHA25628042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
SHA5128330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e