Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 14:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://176.113.115.7/mine/random.exe
Resource
win10v2004-20250314-en
General
-
Target
http://176.113.115.7/mine/random.exe
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://2travelilx.top/GSKAiz
https://jrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://-furthert.run/azpp
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://easyfwdr.digital/azxs
https://jjrxsafer.top/shpaoz
https://upuerrogfh.live/iqwez
https://furthert.run/azpp
https://reformzv.digital/guud
https://apuerrogfh.live/iqwez
https://vquavabvc.top/iuzhd
https://advennture.top/GKsiio
https://0targett.top/dsANGt
https://uywmedici.top/noagis
Extracted
gcleaner
185.156.73.98
45.91.200.135
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/5312-580-0x0000000000400000-0x000000000073C000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3600d351d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3cf68c732.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6401642163.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Downloads MZ/PE file 16 IoCs
flow pid Process 142 5668 rapes.exe 294 5668 rapes.exe 368 5944 MSBuild.exe 381 5944 MSBuild.exe 198 4552 svchost015.exe 75 1084 msedge.exe 355 5668 rapes.exe 99 5668 rapes.exe 99 5668 rapes.exe 99 5668 rapes.exe 99 5668 rapes.exe 145 5668 rapes.exe 145 5668 rapes.exe 145 5668 rapes.exe 145 5668 rapes.exe 293 4656 svchost015.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3600d351d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3cf68c732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3600d351d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30da577cb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30da577cb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3cf68c732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6401642163.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6401642163.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 24 IoCs
pid Process 5152 random.exe 5668 rapes.exe 3992 v1BRaoR.exe 3012 Nehh6wZ.exe 3192 31W3sid.exe 244 NlmvJyQ.exe 5656 3600d351d6.exe 4552 svchost015.exe 5980 e3cf68c732.exe 4656 svchost015.exe 3084 1906bb1baa.exe 4044 6401642163.exe 5160 rapes.exe 4372 30da577cb9.exe 2624 77c5c6566e.exe 1492 8326b25cea.exe 6364 d0996a7dcc.exe 6508 31W3sid.exe 6632 DgQBvwg.exe 3556 exp.exe 5644 rapes.exe 1840 larBxd7.exe 6356 9sWdA2p.exe 6640 Rm3cVPI.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 3600d351d6.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine e3cf68c732.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine 6401642163.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\77c5c6566e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494500101\\77c5c6566e.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\blv20gPs\\exp.exe" DgQBvwg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6401642163.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494480101\\6401642163.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\30da577cb9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494490101\\30da577cb9.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000022b78-891.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 5152 random.exe 5668 rapes.exe 5656 3600d351d6.exe 5980 e3cf68c732.exe 4044 6401642163.exe 5160 rapes.exe 5644 rapes.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 3992 set thread context of 5312 3992 v1BRaoR.exe 137 PID 3012 set thread context of 632 3012 Nehh6wZ.exe 140 PID 3192 set thread context of 1324 3192 31W3sid.exe 151 PID 244 set thread context of 5892 244 NlmvJyQ.exe 157 PID 5656 set thread context of 4552 5656 3600d351d6.exe 159 PID 5980 set thread context of 4656 5980 e3cf68c732.exe 162 PID 3084 set thread context of 6000 3084 1906bb1baa.exe 165 PID 6508 set thread context of 4084 6508 31W3sid.exe 207 PID 6632 set thread context of 5944 6632 DgQBvwg.exe 215 PID 5944 set thread context of 1108 5944 MSBuild.exe 231 PID 5944 set thread context of 3540 5944 MSBuild.exe 235 PID 5944 set thread context of 2356 5944 MSBuild.exe 239 -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1064_1138583841\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1064_301998160\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1064_301998160\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1064_301998160\manifest.fingerprint msedge.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe MSBuild.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1064_1138583841\manifest.json msedge.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e592021.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI21D6.tmp msiexec.exe File created C:\Windows\Tasks\rapes.job random.exe File created C:\Windows\Installer\e592021.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{90C11C8A-AD21-4E7E-BDFA-BD9C724A6087} msiexec.exe File created C:\Windows\Installer\e592025.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5976 5312 WerFault.exe 137 2220 6000 WerFault.exe 165 -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9sWdA2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rm3cVPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77c5c6566e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 77c5c6566e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8326b25cea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3600d351d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 77c5c6566e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language larBxd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3cf68c732.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6401642163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MSBuild.exe -
Checks processor information in registry 2 TTPs 42 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier MSBuild.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 1796 taskkill.exe 5200 taskkill.exe 5236 taskkill.exe 4888 taskkill.exe 5936 taskkill.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133885101531732320" msedge.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\10494510271\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings rapes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10494510271\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3218366390-1258052702-4267193707-1000\{949011A0-3F77-4265-A04D-1966DF55DE62} msedge.exe Key created \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\ProductName = "BatchInstallerFinal" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\PackageCode = "CEFEBEF251D3D34458A6CE4F5E1D0E42" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\PackageName = "38557b304a.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A8C11C0912DAE7E4DBAFDBC927A40678\DefaultFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06B55B94726C2574FA40E2F795DBA41E\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\A8C11C0912DAE7E4DBAFDBC927A40678 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\A8C11C0912DAE7E4DBAFDBC927A40678\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\06B55B94726C2574FA40E2F795DBA41E msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5152 random.exe 5152 random.exe 5668 rapes.exe 5668 rapes.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 632 MSBuild.exe 632 MSBuild.exe 632 MSBuild.exe 632 MSBuild.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5892 MSBuild.exe 5892 MSBuild.exe 5892 MSBuild.exe 5892 MSBuild.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5656 3600d351d6.exe 5656 3600d351d6.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5980 e3cf68c732.exe 5980 e3cf68c732.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 6000 MSBuild.exe 6000 MSBuild.exe 6000 MSBuild.exe 6000 MSBuild.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 6096 7zFM.exe 5244 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5244 taskmgr.exe Token: SeSystemProfilePrivilege 5244 taskmgr.exe Token: SeCreateGlobalPrivilege 5244 taskmgr.exe Token: SeDebugPrivilege 5312 MSBuild.exe Token: SeIncreaseQuotaPrivilege 5312 MSBuild.exe Token: SeSecurityPrivilege 5312 MSBuild.exe Token: SeTakeOwnershipPrivilege 5312 MSBuild.exe Token: SeLoadDriverPrivilege 5312 MSBuild.exe Token: SeSystemProfilePrivilege 5312 MSBuild.exe Token: SeSystemtimePrivilege 5312 MSBuild.exe Token: SeProfSingleProcessPrivilege 5312 MSBuild.exe Token: SeIncBasePriorityPrivilege 5312 MSBuild.exe Token: SeCreatePagefilePrivilege 5312 MSBuild.exe Token: SeBackupPrivilege 5312 MSBuild.exe Token: SeRestorePrivilege 5312 MSBuild.exe Token: SeShutdownPrivilege 5312 MSBuild.exe Token: SeDebugPrivilege 5312 MSBuild.exe Token: SeSystemEnvironmentPrivilege 5312 MSBuild.exe Token: SeRemoteShutdownPrivilege 5312 MSBuild.exe Token: SeUndockPrivilege 5312 MSBuild.exe Token: SeManageVolumePrivilege 5312 MSBuild.exe Token: 33 5312 MSBuild.exe Token: 34 5312 MSBuild.exe Token: 35 5312 MSBuild.exe Token: 36 5312 MSBuild.exe Token: SeIncreaseQuotaPrivilege 5312 MSBuild.exe Token: SeSecurityPrivilege 5312 MSBuild.exe Token: SeTakeOwnershipPrivilege 5312 MSBuild.exe Token: SeLoadDriverPrivilege 5312 MSBuild.exe Token: SeSystemProfilePrivilege 5312 MSBuild.exe Token: SeSystemtimePrivilege 5312 MSBuild.exe Token: SeProfSingleProcessPrivilege 5312 MSBuild.exe Token: SeIncBasePriorityPrivilege 5312 MSBuild.exe Token: SeCreatePagefilePrivilege 5312 MSBuild.exe Token: SeBackupPrivilege 5312 MSBuild.exe Token: SeRestorePrivilege 5312 MSBuild.exe Token: SeShutdownPrivilege 5312 MSBuild.exe Token: SeDebugPrivilege 5312 MSBuild.exe Token: SeSystemEnvironmentPrivilege 5312 MSBuild.exe Token: SeRemoteShutdownPrivilege 5312 MSBuild.exe Token: SeUndockPrivilege 5312 MSBuild.exe Token: SeManageVolumePrivilege 5312 MSBuild.exe Token: 33 5312 MSBuild.exe Token: 34 5312 MSBuild.exe Token: 35 5312 MSBuild.exe Token: 36 5312 MSBuild.exe Token: SeRestorePrivilege 6096 7zFM.exe Token: 35 6096 7zFM.exe Token: SeSecurityPrivilege 6096 7zFM.exe Token: SeDebugPrivilege 1796 taskkill.exe Token: SeDebugPrivilege 5200 taskkill.exe Token: SeDebugPrivilege 5236 taskkill.exe Token: SeDebugPrivilege 4888 taskkill.exe Token: SeDebugPrivilege 5936 taskkill.exe Token: SeShutdownPrivilege 3092 msiexec.exe Token: SeIncreaseQuotaPrivilege 3092 msiexec.exe Token: SeSecurityPrivilege 1772 msiexec.exe Token: SeCreateTokenPrivilege 3092 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3092 msiexec.exe Token: SeLockMemoryPrivilege 3092 msiexec.exe Token: SeIncreaseQuotaPrivilege 3092 msiexec.exe Token: SeMachineAccountPrivilege 3092 msiexec.exe Token: SeTcbPrivilege 3092 msiexec.exe Token: SeSecurityPrivilege 3092 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 5152 random.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe 5244 taskmgr.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1064 wrote to memory of 3396 1064 msedge.exe 86 PID 1064 wrote to memory of 3396 1064 msedge.exe 86 PID 1064 wrote to memory of 1084 1064 msedge.exe 87 PID 1064 wrote to memory of 1084 1064 msedge.exe 87 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 4816 1064 msedge.exe 88 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 PID 1064 wrote to memory of 3164 1064 msedge.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://176.113.115.7/mine/random.exe1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b4,0x7ff9af97f208,0x7ff9af97f214,0x7ff9af97f2202⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1836,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Downloads MZ/PE file
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2272,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2452,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3524,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4156,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4164,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5164,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5348,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5288,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5276,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5936,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5936,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6076,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6212,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6372,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6280,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6916,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=6908 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7048,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=7060 /prefetch:82⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7208,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=7224 /prefetch:82⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7252,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=7376 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7060,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=7084 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6736,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:82⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6580,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=7676 /prefetch:82⤵PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4284,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=4476 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4448,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4404,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=4748 /prefetch:82⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5228,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,18011273622443242714,17529836739075062618,262144 --variations-seed-version --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3724
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:1920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6012
-
C:\Users\Admin\Downloads\random.exe"C:\Users\Admin\Downloads\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5152 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5668 -
C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"C:\Users\Admin\AppData\Local\Temp\10492200101\v1BRaoR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5312 -s 10445⤵
- Program crash
PID:5976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"C:\Users\Admin\AppData\Local\Temp\10492700101\Nehh6wZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
-
C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10493560101\31W3sid.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Checks SCSI registry key(s)
PID:1324
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"C:\Users\Admin\AppData\Local\Temp\10494280101\NlmvJyQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494450101\3600d351d6.exe"C:\Users\Admin\AppData\Local\Temp\10494450101\3600d351d6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5656 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10494450101\3600d351d6.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494460101\e3cf68c732.exe"C:\Users\Admin\AppData\Local\Temp\10494460101\e3cf68c732.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5980 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10494460101\e3cf68c732.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494470101\1906bb1baa.exe"C:\Users\Admin\AppData\Local\Temp\10494470101\1906bb1baa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4572
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6000 -s 13045⤵
- Program crash
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494480101\6401642163.exe"C:\Users\Admin\AppData\Local\Temp\10494480101\6401642163.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\10494490101\30da577cb9.exe"C:\Users\Admin\AppData\Local\Temp\10494490101\30da577cb9.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\10494500101\77c5c6566e.exe"C:\Users\Admin\AppData\Local\Temp\10494500101\77c5c6566e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1880
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2036 -prefsLen 27099 -prefMapHandle 2040 -prefMapSize 270279 -ipcHandle 2116 -initialChannelId {5cb3da8b-f1f7-4efd-a041-e9d648d7f88c} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu6⤵PID:5568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2520 -prefsLen 27135 -prefMapHandle 2524 -prefMapSize 270279 -ipcHandle 2532 -initialChannelId {7feac29f-2d81-4ab0-a304-85815e796467} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket6⤵PID:540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3872 -prefsLen 25164 -prefMapHandle 3876 -prefMapSize 270279 -jsInitHandle 3880 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3888 -initialChannelId {6a0f4abe-83b0-482f-9d1d-baeda75de632} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab6⤵
- Checks processor information in registry
PID:1100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4060 -prefsLen 27276 -prefMapHandle 4064 -prefMapSize 270279 -ipcHandle 4160 -initialChannelId {04a2b608-714f-48e9-a083-72ef51556a83} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd6⤵PID:4472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3404 -prefsLen 34775 -prefMapHandle 3408 -prefMapSize 270279 -jsInitHandle 3364 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1576 -initialChannelId {63883b11-a874-4078-b257-bcb560e87ac9} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab6⤵
- Checks processor information in registry
PID:2052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 5196 -prefsLen 35012 -prefMapHandle 5248 -prefMapSize 270279 -ipcHandle 5256 -initialChannelId {9c3c3ff4-0452-4689-a841-e71a69c2df8a} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility6⤵
- Checks processor information in registry
PID:6808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5404 -prefsLen 32900 -prefMapHandle 5408 -prefMapSize 270279 -jsInitHandle 5412 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5424 -initialChannelId {eb4f96b3-0092-497c-9fee-46b349994f25} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab6⤵
- Checks processor information in registry
PID:6984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5440 -prefsLen 32900 -prefMapHandle 5444 -prefMapSize 270279 -jsInitHandle 5448 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5456 -initialChannelId {d5e2c592-339d-498c-9768-f2b8aa1066af} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab6⤵
- Checks processor information in registry
PID:6992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5476 -prefsLen 32900 -prefMapHandle 5480 -prefMapSize 270279 -jsInitHandle 5484 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5492 -initialChannelId {87e04e2a-39a0-4875-8a04-0329e6ff9d7d} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab6⤵
- Checks processor information in registry
PID:7000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6280 -prefsLen 33002 -prefMapHandle 1300 -prefMapSize 270279 -jsInitHandle 3084 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3872 -initialChannelId {d6f8a237-c8dc-40cf-91fa-f564e1554056} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 10 tab6⤵
- Checks processor information in registry
PID:5816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6276 -prefsLen 33002 -prefMapHandle 2952 -prefMapSize 270279 -jsInitHandle 3100 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6344 -initialChannelId {a8a69639-a245-4f64-9ba8-ce664236be4a} -parentPid 4588 -crashReporter "\\.\pipe\gecko-crash-server-pipe.4588" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 11 tab6⤵
- Checks processor information in registry
PID:4636
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\10494510271\38557b304a.msi" /quiet3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\10494520101\8326b25cea.exe"C:\Users\Admin\AppData\Local\Temp\10494520101\8326b25cea.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\10494530101\d0996a7dcc.exe"C:\Users\Admin\AppData\Local\Temp\10494530101\d0996a7dcc.exe"3⤵
- Executes dropped EXE
PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2624
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Checks SCSI registry key(s)
PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:6632 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ojhx2hdq\ojhx2hdq.cmdline"4⤵PID:428
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA3F7.tmp" "c:\Users\Admin\AppData\Local\Temp\ojhx2hdq\CSC5DE500F5353F4C0F9B3B6912FCDA9CFD.TMP"5⤵PID:1252
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Downloads MZ/PE file
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5944 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#615⤵PID:1108
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#615⤵PID:3540
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#615⤵PID:2356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6356
-
-
C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6640
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5312 -ip 53121⤵PID:5476
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\random.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 6000 -ip 60001⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5160
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:6200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe1⤵PID:6288
-
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe2⤵PID:3448
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6436
-
C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"2⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rcjvcytu\rcjvcytu.cmdline"3⤵PID:6508
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB1B2.tmp" "c:\Users\Admin\AppData\Local\Temp\rcjvcytu\CSC73BE3A21A36D4FAC8D36D71E887374F1.TMP"4⤵PID:116
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:6692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5644
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a70839bf9727207b6c8b718d23e1c742
SHA12faccbfa07cfa5d6b2416b3242bbb968a3e5f129
SHA256ff9962049f2a7984b5f35e1a072348c4f7a0b947ec96108a9fbf9ead424db144
SHA512bcbde4a780708b90059a534e27c47e9c62850d6a71b2a22b24b231ba105234d0bfc238ef12ccd3dcbf21584e01901ed77384cc4394f73f458456058ae9f748f2
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD54013ebc7b496bf70ecf9f6824832d4ae
SHA1cfdcdac5d8c939976c11525cf5e79c6a491c272a
SHA256fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a
SHA51296822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22
-
Filesize
280B
MD5fed4ab68611c6ce720965bcb5dfbf546
SHA1af33fc71721625645993be6fcba5c5852e210864
SHA256c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4
SHA512f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5aaf0571cbb6ba53dd688aca2c92a2e79
SHA11c4c839376a23b7a1cb63ceeb9945d912899133b
SHA256625d5d29220ec460a47b0916c33f72789ad83e725434a42e978ae44910ed06ac
SHA5124186ee41e991285503bcb4299efc9e1f1a85865b91740c5c7cfdf8a757d79fc379856833aa63e60d7b1fe2a52772b6f50ee16cbc8e4d5ee021f3a6665f66a2ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe580308.TMP
Filesize3KB
MD54a4388c5fdcf248c8a16da033055b611
SHA1632822dc2607d94cbffae4a948d9b266caa02eac
SHA2569d92e9c4af01921d82ee71176a1d4d7456bf6138f97978642f8c8818b6b8b851
SHA5127e92743b4963a72065a3bf4302de9f5a3ae45907c4f60b4adc36d5c72801fb583981f32c99092d4a3e5f5ba12826349bafcf4cd575af28801dc04439bf9b2e65
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD57034ed449c21a6414c6774230ceff834
SHA1f38b69868eb3294da69a63553957600ea7bb7daf
SHA2564823589da99ea997cd533ebbb0597a838113302b786c90bf950627b0905f9d9e
SHA5126ba90c7d2a1cd98277bf6a68c3643096a170ee7e16013bce8985230f66e8df155d088af91b5e422fc94b25cb4bbf5a205474903be823a4e2659a86bfba8e15c9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
13KB
MD5c8f7cd519f7784db0195d7dfeaf6e339
SHA15e2886b24aa897b93cce74c120e20847fbba27ff
SHA256fed739cecfeb831956729117cf2d3940dcf27b36bf763f5c667d076228fa4938
SHA512da0a73f9e22d68b0180b723cf247b2cae7f08dc7e5d0e748cab32edcb0f7785c0a5ea701a83e786717bdd8611d690678211e0aafce0e3be4668c4dd043bb5a35
-
Filesize
36KB
MD59d3726720f243388f645a11b58050978
SHA137c497e4fba231518ab3895d1752dcd0cf0d0f5a
SHA256188697f22d597576d02fa961e8c95655420168dc664d06f1ae810c055ca6f631
SHA5121a88972ab4beb5c774c74dfc3b7ddc44394384c0183f3015a4d4c523125ce064df833fc803aa0f69e68cbabe9b9c6a59baff557a9a567221fd033ce9e774015b
-
Filesize
876B
MD5ac73debf6087c1d0f7775c1b4635c362
SHA156f0dabb296c757c69963296c175c1dd126a47dc
SHA256cbffcdafe3e64785b7bbd9c39759e24a6556e0267148ca97da4f8b58b34c6e95
SHA5124b62c9bff93025ef07a2948322e84a75f0081626f3ed88b1d00b4df78bb6099fd8e630cb9139a103e51b1d1d17bb47e55d2dea87c200937f194d1831e1b9a2ce
-
Filesize
23KB
MD5bf556c4e5bfa855f1625d2ca70509d74
SHA1a0e6d362a70c2b3840e0715389ace9e1b2c987b7
SHA256a1e281b1a816c8eb6482f3dd42dd479d2b66bf817d305bd8d98c5e0e8e5cdb3c
SHA5128446f1dc654e32456e5252ac715dbfd2e945e142e51baff51192942caf19e27ef9ada98c2e91ca261f1358518ddd10ebc07e5387ac69623b2de8177784d15e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe589ecb.TMP
Filesize467B
MD5d8e49ef1a4fcc3f26d96683078c24370
SHA1352eba1450f5710137a657d2ead786f02ae990f1
SHA25645766f7fc2c083b188eb6a267322ca4034fa0407d92cc9bd64b690a321fbade5
SHA512becae54c2e04f9999581791fbecf5460a4eba508725cdbbd89cac1d85991bdf05dc7c71254637b94e9e79b8c09386ffdb99400ef339371c2cbafd2bb28c47565
-
Filesize
34KB
MD582d9a7dcac4f41577a6748b6d0d65aaa
SHA197c519b5816f2bb23deedcb12f1a9f7f20f40995
SHA256794025909f4c98bd946e2ef9746ac6176ed041954a3fe00a0be9b4cc4d3fd060
SHA5121eab7733e466afe6824c5a3fea1db9841cef397429b04b03f2195aa0c6e2dce7f01f228707f90c661edd218e71568ec5896c8de89a53d7af7dc7a4a5ac7cbca3
-
Filesize
30KB
MD56bf3a9a46fcf6e509b38d26659185a51
SHA1eb0f3e4d0087a0f536bfa2ff28950a954f660b9b
SHA256818d6202c937b6f3c3b493534d1b8f60acb92f4b6fca4cb162ad25706f1511c6
SHA51232257094ff3973efb3344cf0e19748294f9cafb2d653f3b70010861abd0e8a718b6fc5a9b8982b509ab12238c0ef822ef1d7c7b1a65865fc033ca0da4a991a6d
-
Filesize
6KB
MD55094f6aff53de95abb579c2d044fa646
SHA1757dcbdd2990694dad05c2feb359ec786925eb23
SHA256d2eb8b1679cda147c488fd30c09efaf32531fc6fd71d2f37443fe681d34167a7
SHA512cad344b1c17760b333e3981ff5ed917431d53e6fe4b35fa01413e0bed6ddccc44aba47c0046f7d8849abc4dad23219d5916dd9036eecc983356ea807fca53de8
-
Filesize
7KB
MD5652f339c85680f9b9def886a9674d8c2
SHA1c613e963bab9f2899bec32de042300288655a034
SHA2564023aaf51ce043f570314088e371ac230e54b424a565983c0c1cbfd4da71a8f6
SHA512d2b6ba419249c634b33176e24a05aba47d880bb755232a63ef22cc193c8993294f3c204a013c04ff2ccb1d5faaac2e89fa1235b7727b5bb4acc02db6b1e69b41
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD55bf3266569d15770aee80bb264b4fd3b
SHA1d5455762f73ee4a5547417f870450f8898412be0
SHA25685f64290350a5941b921abff6ca3c4780abb91dc50bbe0035d7a92ee3425dcee
SHA512ec53aa0060749acee472fe3219d04f752dcbacdff8846bfb7ae50cabeb1598f7bcd0f7532548059ad403290dcb07b6212307d69418c912e86c6acee50d93d7af
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD5866664b3ce72c7dad2ffc552282ddd7c
SHA143404be154db8ee32dc7c59de01f015235e44de2
SHA256630af8886f6e7b8cb7b530ed641a4ddf20eec3bedd2a5aa60285b5a5805a603a
SHA512a0b5eb5438cedaa60b6f23ea9daaa3e71cddfca906f933f3a3a44d04cb63427a1fb6ea4153bf4027d767ef5620ab0e6712257f3ea5e508d74662f1596dfcc712
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD50fee43996bb0bf7d3bb6dfa7d5701a51
SHA12274738f98985dd764bea7aa784c5dbcf3ca6888
SHA2566fdf356d0c3767c83a3bf0736eeb0872bc3f59f4a1f67d4fe1bbdcd900102222
SHA512216ece9f8ff9db37a73ae04db56529fba0eb242a28fe29c9388ab483bff77007b7228b5ae6154cb12fc2c91613fe0ab4bc7620508a1a0a0e1e6245e1b131cc9e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\33b8gs3a.default-release\cache2\entries\A585344A45AF937E3AB7D706291A9A3ED8D581D9
Filesize13KB
MD57b9b6ed1388a40da877a84b4f2d90f60
SHA1274109de201717b80eb82f64da5f818cb94814db
SHA256054ed51bf5c0727e61109486a5bfb2abeafba8017ccd8b95ab4e0bffb189b6b6
SHA512f4325804ffbaa76f6fd7984bf664ed95246c30284ec5f365ba7249e4dde6838bc6dd1c3cfb9d9bac9aac1db70a7505f84b9f84adc2d1ced455642151a0dd4739
-
Filesize
3.5MB
MD5d546ca721b7eb5805324a652167e9d06
SHA1078ef0b03d72ad77b6c0aef6d5643548bd4014cd
SHA256b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064
SHA51279290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23
-
Filesize
674KB
MD532449d0a9a4698567ce8f4900e2cb370
SHA155817857ea2a8c6781eefd542f8f65bae756314a
SHA25616beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72
SHA512b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f
-
Filesize
351KB
MD5b319ac6eebf5309c09a2343aa872bb45
SHA136c20894e6b4eab76812276b35acf42b1e843bb8
SHA256d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566
SHA5129fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652
-
Filesize
674KB
MD5c6a119bfd5690fd9740d4b0ceda18c46
SHA1df5dab76f8b434996d47261010066764b514d016
SHA2569d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd
SHA5127b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a
-
Filesize
4.6MB
MD596f6dee92d3e2edaad3c7f95ad532e48
SHA1aedccebaddd835f9e57e31cc25c849638c47f99a
SHA256c6536170c6e574e2e906d7b455b77e25764688d4ed964a681aadcaff24bc66d3
SHA51260060136f1123e3ebc5b5bce8022b8be35242b0d35bc9ed008bf3a36b248751a7da0c1ea19d7d95e87a43cc6a6ad1fef1f60fa271ca88a3f5e25e3c6a62abb54
-
Filesize
4.4MB
MD540e16d22bb60822ed591832f8673ba22
SHA1e480ecddf1652e8d8040488e1f6e3b9c9684a2de
SHA256d7d403896acf3911dd3a825b2320116bdad77adb6ffdc1fb89e04acea748906c
SHA5129579feaaec6478ab0cd5eeb529c116042351fb95b8060fe54f845f7678490b47922cf0246ec1548fa539ae7344f95f42de127e8280c6e40a024e61cbc337ba81
-
Filesize
667KB
MD50afa04b1f3d5b4eb402367bd172e0957
SHA17e0e77df6601ae29af49e85b741cec23b93bff6f
SHA256f0a9ef468c521425b19517c69a315ac2acbc2f1a6b48d3a29c2faf1777979205
SHA51299d89102a1cf337cae4644ba2ca12b15ab63573829aa6817f3d6381febc0133056d451f4b63dcf7c7cd14ce4ca2554221084fc1b18a29f4f0c00dabeaea9ef9c
-
Filesize
2.0MB
MD58978bcf53b3f0678ed355ec2f16e9cf4
SHA1d0691ac7211e21ac15b59a5ccac6e2d2788c6e1e
SHA256330fda4e036f1d227a5fa8e416559923b3dc5b9ed9bfb2e92ec22b48395f24b9
SHA512a59376e7c47bf226a97a068f3a3e5ae10c4f885613af8f9cc8eea0a52b08a4c13e314f14f3c8fd9c286ce435dcdf342d72647ca5a27ab666b3f9154f7bc86b5b
-
Filesize
2.4MB
MD58c7d359343cea4f85312bf683e8293ac
SHA1498a5c092fb946a73156f847eaf65dc58d3306f0
SHA25630cd9977b8c440fb6b9aadeca7e7d170058ae432b955ee5aba5da836e37789d0
SHA5124054bc770b7bbaddec618e1b11324b0a164cce07909fe2d6367bdc5c1932137ce02d7eb32c0e0f50ea81fb5cdfca4e7527ebfd2ecf7b1beae6877911bb33e23d
-
Filesize
950KB
MD5def1c8fa3b480332a08446920d5607b3
SHA126e92a2a2bed2ea3136b4f6e5a007d933cbc1be7
SHA256ad7af0d8b244f35b98fa378ad09289afd07f3463f2870208ba1cbefacf2f5537
SHA51262e9c987ad3bc9cdac0b46f5adfe3b890cc299359069f0505c864e9c6b5299e7623193fe668313865e1f32860af4e55f1544f4fc9770ce4b79143985d5c11fa9
-
Filesize
1.9MB
MD5d7661a891807b6508edab51e1cb60b25
SHA1ae6ea41a17ddd2995836ab9279207a5b444d539a
SHA2569395ad01afdd8d4a4b6dff33bf6e82e502d765f0a63315a88a97ba4279dcbb16
SHA512b909887acebba72a4f5f1516a51f64b9676fa77faa39b86283b639c7115e081d37758246b3f9d4bfaee726e3174d71154235da097b55ebbe943d942ec03883e4
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
18.2MB
MD52ed83182a2c54f262b0b63ab54ebe8f2
SHA14a3a0e023b11d89e21fe2d410d329dd3087cc259
SHA2566b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d
SHA5125c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97
-
Filesize
8.8MB
MD579615746124e8e66ce5d578fc7da30d5
SHA1dd2b73e558fc20179fe4abc998ffcdab3551c705
SHA256b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a
SHA51211c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e
-
Filesize
1.1MB
MD55adca22ead4505f76b50a154b584df03
SHA18c7325df64b83926d145f3d36900b415b8c0fa65
SHA256aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778
SHA5126192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e
-
Filesize
354KB
MD527f0df9e1937b002dbd367826c7cfeaf
SHA17d66f804665b531746d1a94314b8f78343e3eb4f
SHA256aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209
SHA512ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1064_2127331194\0b3a7d44-e881-4878-ba1d-3ec8a18f29a1.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\AlternateServices.bin
Filesize10KB
MD51c3ba3de769c5a901fa9612c3e4e0703
SHA16543744a22c135cc4fe92a93b3d7d0737989981a
SHA256eabfb8b3aa3e20aeab11170405a91a022e00a66d4f88b2432130a3da55259cf2
SHA512f04a42501a35cdc6f8e9d3305369caf5ab36a6109e44d60e57f3b6e9ad37903a90826a532ebfc069601ffd8d0da258babae5c7ad2cc2e85bcfc85cf311be73c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\AlternateServices.bin
Filesize25KB
MD577418a7c5b789d3ab17a86dd648be2d5
SHA1729d940f8f2e5cd793acb87e2bd6f4648c2d8de4
SHA256ec61e24cfa6252464adc63a03eeb3fd3abf308e3a86e66a8f58faa5753812d13
SHA512ec141171a57e721581b49394656154463e89b63eba0170132d9dfc5822be88076c07ba1323c99bc438dc847268fb6188941d4da97139ed2ac80513b54d1de16b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57307c8a4f16ef7a3aa1d387a39211483
SHA14447adcea151d1d33da213fa7354ed733f512d60
SHA2568d8af20a9de303b8f2b5059b15ce98b4c17cf6c6e477e2df7e5dcc3dee89ff30
SHA51255daccaa48bc6faef68495ec6e098d1e0a381942128774024edd7ce31b125e53de204b674a3bc07be64bf3e436afd5c543b1ce24122bdd88fbc43c616064b0cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5e0ea72ed5b60610613770c825de06422
SHA146fa82bbb8f881daa8ca57780023eeea83d0af33
SHA25687d6152700c2a3b9aeb6194aa0b48a2d3b43739f9a046b58c0826e689f571302
SHA512e82a5e1e5b7e82d3a5491682bf6f7280c04f4df4735399cd1b252d8056c76ac427496a1a8f9bfed096e27f1ede4e57eba06d4a9dc873efe590aa7f63640bf3e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\events\events
Filesize1KB
MD5df5fecabe54bccfd0083808345074bb4
SHA13535e1c77c7aa6c2c67812591d7eae217db21a29
SHA2565d3d91757e322baf6f8e2893b285e0b6ca46cec9016bfee24cdeacdf66e9c8f3
SHA512ead52c1767c0c4d96d4c67d8b0adee616b810471576a54691ef3ed7525de3316ec0c0c17ce52b73176cb0e192543f75016a4a00afbce4cb7d0486e6aca0276a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\events\events
Filesize4KB
MD587bd0546ac59fe5c247e6f6dd6051316
SHA142e755734d6481d1602e4255c10c35ebdd334285
SHA256f7e6dd3a3170003707d19553c67547c9c622321ceb7acd56f67b697e6f235704
SHA5124aeabde6b10ab3cdfffce889ec38ff9ccc053e1410d763ac66fe64f8e54369da065fb6738bf3c1500a4a4f2a6952640764856f1d6d379dc65f1eb72a7e9119c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\17593828-6b8e-48ff-9b94-46fb6490f998
Filesize883B
MD5579c3e339355163f0abb8a44c4e5c57a
SHA1790835aceb9fc058e2e6c82e70a051c22d456183
SHA256a6c5885fc046bcd72ca3545b835c405bb6e958c9672c2c4bafcaad49e4b8cc08
SHA512a4bd480a28c7264f24741d976f01a03a0b29a752672b13a0ab9792e232531fe7e32ad142bce4d201923dd15e3de6aa65d5077e99cf617338117c7e74808b574c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\20867d4f-81bb-4e28-bb32-1fe8951c602b
Filesize235B
MD534a29ef6e26670492d55a34bca4fa981
SHA137255782ffcd7ddc32109e7981daccd2079cf02d
SHA256921ace1762b173f199cbbf258b416aba7fb6ae7aa11995ef8c68c3ae345cbf7b
SHA512bf220ca60b3850c849dde4be0b69df8b28abb94a91a7085cd5dcbabab9d7bd5449efcef58aa23391467245072ea72b295beddc0a756acb3d222dba7a5863aca4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\3a17bd24-01ff-4f65-b124-13b2c0b88b0e
Filesize235B
MD5ae1e0206619ebe7a97608aa9b065eb13
SHA1a97e8a6c60169cadb628b952174f192de836e91a
SHA2562664f19a1242ff49d4fed0223e93228a946d380074052932233681bdc9c4dfac
SHA5125173ee90de5f84d4cbeedb53a59a7457c36d7ede68fab7fcbd61c75aa7d25c50b91584af46e3dd5ab25eace0496ea962cf47357f4c8c4b7c13eae5130c39f97f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\85e98741-4658-43ba-9259-9a4118270203
Filesize2KB
MD54aec388065cf12cf33db9753fcaa3452
SHA18df4980581bfe49cfa0c058432b2fa9a14f7171c
SHA256a7de9de957d9bcb1d97f5fde77036a7af7fe34d307c9670a36c833aae1a32dc1
SHA51225369659b3ae5dc56579464082ef983c6785e1928a9e2d631612880981790fe4df95f30af30788b5a94ea3451fc7f8aa7cfc8cf8fbf550305938759f8427eda8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\8c681518-afd1-4d61-ac51-20537ec299c2
Filesize886B
MD56fc47c77be40dd004c14d7821d5f9af0
SHA1ad4994bb926e64927d260a6d34a0ef31a77b34be
SHA256def4b41fe3080473b546cdca109c463bd8db7f57766cc2485f0b522716520469
SHA512ffcadd2832a99d7db07c94d0c537e2817d214ba66565e0ab56c313dbcf67514ca4bc7e21b6348db3cbbf022e6952212ea561dc3617082e66399ce46eac5c6b7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\datareporting\glean\pending_pings\f158d5a5-7c93-4275-b956-38cc8fc109fe
Filesize16KB
MD578766141762d504017250a5d3cf2b976
SHA13f9c23b53a4ae6c5216ab46bbfd5c2f91bc08651
SHA256a0517a9770ae0a8ce816803d1cf802bae2b6e0fcae42e31e054c05b39e587026
SHA512108e3837c0e0dbe29e2b8092d4bfdb21c2643549cdf11e67d3112a55429125ea22bb900e0deedf5c47267301c3b9980096e55ef3eedb87ec2601af59817eb13e
-
Filesize
16KB
MD51a88023be663525155d230e4662ea981
SHA1872d880b72eaf5c6cef2fcf1c569aadc1e835611
SHA256c016839d7aa78a6200b5a665deaccefe50fb09209c74079042d206d4a6deca2d
SHA512826b1682f9b12ea3a4d621ac740647b58bf7c0ca061a7a042b3df695478fd5d041718c65d5793ef7c7cf2348db20a954d990cb8586a314ae9364649a1b8d90cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
6KB
MD5af71b8a836a37f602ac06a0c5b28608e
SHA1d49cdc799eebccd2ebf44d16a1ae0468027b7b2e
SHA256ac39ab8e76a7d69b1949b53476575c1c87e7355e51dfc9b4bc4b6fa43080437d
SHA51227c440e9b0f79a529881c02163e9eb7ecfb57b8cd206dd1f35855b385a6dac3ffb040fb9e2b97dd675c653aef7793af77a584ce53c460441dd50f78609a1bc3c
-
Filesize
8KB
MD55f7a10106b08c4036457933e7466bd83
SHA18dc61532205f81ff17ed02584b745d1420503336
SHA25639e04bd86177d36745cfdd60610fb6da4dc19c043ec415cab9605c896b261dc8
SHA512d183bcb7eab4580877a42cb12cb69a4e0e8c92bc2f531063eb863f802f763aff19fb03f286df1ba5a5601838c13976bf275098ee7d50e58996b6039de0032419
-
Filesize
7KB
MD59ea4e79431a5928f63870bf1a929566f
SHA17784d75742f53e5b7ec570c7e52ccfc2abed673d
SHA2564dc69c9b55fe8df69112e1525e4f3a6d66fbc63b93642eb57f4ede3bee6740db
SHA512ba7460d132f466715bf142e6c322c2e28ababf6276dce1220533f34df2b51fa048a5061e073c4d96cea6a1ca8d63ad003e424e610c7e1c745d8f11ad2dc625b0
-
Filesize
6KB
MD589d88f773391d70ce7455e6aca5dce6e
SHA19bf477b1235ed3df4716bfecfc2c8b55b2f24d8a
SHA256d34d6bc7698906a3cf5cb469e26fe2b313a925517a3a171146c78756c583343e
SHA51249271512bd19619600d11cac8c5c88d880b72cd97c7d0dbbcfeaeb7d145c18516cd5ef10316a90ca1c907289e9c28b531c8ca6aec566443cbb50b6d3d167469c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5a660ee13b8e27db1858b230a096aa029
SHA1fd3778137f287ec361142e68c04adce496ec836b
SHA256d20c66645e0218b90bcf0d0eef0841e497a4544b3c99eb77140f65f92a5bd2c1
SHA512f6757924f2032baa381b7e89c60a17bc2b7c39993bc16dd04da677ba063a4c040288632dcb03db74fd4ba820275aac82144bbd26bef1e73b0fa3e0b791596640
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\33b8gs3a.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD54f24430436e3cd3b7a37b105f4d52ec3
SHA138545879e1eabb267ba695b56db151345dd2de5c
SHA2568a18ad41c8447aa008786f839731af1f2842df9b1f0c40f6a9c45bd6241f3c33
SHA51219472d328bc7c3dfd6c2d1884cdbd43eb817cc1ee819f726ad4b1615ef400076c24f237f331c4e5e2ba16a62984c84403319c16505324f6a90dd13b71bdf804a
-
Filesize
3.1MB
MD50bc69609d28f954c1349365683ce5230
SHA16fb6d7ec9d7b32a8f63059357655206042362dbc
SHA2569a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895
SHA5129ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92