Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 19:55
Static task
static1
General
-
Target
cedd75f3a781795bab964212a7e781e1.exe
-
Size
1.8MB
-
MD5
cedd75f3a781795bab964212a7e781e1
-
SHA1
450c262b1814c36b51cdb5868d96d02d5bbb60eb
-
SHA256
3a7fac7bd67e9b5e65ba91e95a49df1ca38d64be20f24342efb7cd29e22b4aec
-
SHA512
d45ed595aec66e0bd88d9b533d943a207bbe76ee4922aa50e05ba4d101ec624348f858feb0aff4a957a5d5085bc8f72c2ff98d1950f3e783f35e64c6686154fc
-
SSDEEP
24576:I2Itn71MxiC2DB4o+0l6vGuAJcWEN0m2tXw9wRFAXsc+c0AV9R0M+BH657UqShRg:KLh4k6OuA2NNNB2PiF0j0nMRfF
Malware Config
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
cryptbot
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6ba9109859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6ba9109859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6ba9109859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6ba9109859.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6ba9109859.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1736 created 1180 1736 54e67528aa.exe 21 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 54e67528aa.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 20 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ VR6f3vF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3c2c9bd3b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53OJIQ6WPTLRRVGBQ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ CAAEBKEGHJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ANEDNjf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 23535b832d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54e67528aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2b8e18946.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cedd75f3a781795bab964212a7e781e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e045532a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c126672f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f4d0d43e30.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5526afe930.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54e67528aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6ba9109859.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HKVEAYPH5IQNDV43K1ICWN.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2104 powershell.exe 780 powershell.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1988 chrome.exe 1976 chrome.exe 2892 chrome.exe 2068 chrome.exe 2208 chrome.exe 2444 chrome.exe 2560 chrome.exe 2088 chrome.exe -
Checks BIOS information in registry 2 TTPs 40 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54e67528aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54e67528aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54e67528aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2b8e18946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3c2c9bd3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CAAEBKEGHJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cedd75f3a781795bab964212a7e781e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c126672f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CAAEBKEGHJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23535b832d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e045532a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HKVEAYPH5IQNDV43K1ICWN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23535b832d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54e67528aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5526afe930.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e045532a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HKVEAYPH5IQNDV43K1ICWN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6ba9109859.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f4d0d43e30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f4d0d43e30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2b8e18946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3c2c9bd3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5526afe930.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53OJIQ6WPTLRRVGBQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53OJIQ6WPTLRRVGBQ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6ba9109859.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cedd75f3a781795bab964212a7e781e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ANEDNjf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c126672f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion VR6f3vF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion VR6f3vF.exe -
Executes dropped EXE 37 IoCs
pid Process 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 2816 CAAEBKEGHJ.exe 2332 skotes.exe 2736 Cq6Id6x.exe 2084 x0qQ2DH.exe 2648 f4d0d43e30.exe 1524 axplong.exe 2204 VR6f3vF.exe 2968 Cq6Id6x.exe 2056 kf5cl0F.exe 2420 trunk.exe 2160 trunk.exe 2616 ANEDNjf.exe 1400 23535b832d.exe 1736 54e67528aa.exe 2604 5526afe930.exe 2520 54e67528aa.exe 1992 e2b8e18946.exe 1624 4e045532a4.exe 1736 f3c2c9bd3b.exe 2524 a2620276bc.exe 3368 53OJIQ6WPTLRRVGBQ.exe 4088 6ba9109859.exe 1616 HKVEAYPH5IQNDV43K1ICWN.exe 3960 849a67a42f.exe 2400 7z.exe 1108 7z.exe 920 7z.exe 2988 7z.exe 1824 7z.exe 2792 7z.exe 3416 7z.exe 3436 7z.exe 3224 in.exe 3236 e2791f8a36.exe 1988 1c126672f8.exe -
Identifies Wine through registry keys 2 TTPs 20 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine e2b8e18946.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine f3c2c9bd3b.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 6ba9109859.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 5526afe930.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine VR6f3vF.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ANEDNjf.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 54e67528aa.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 1c126672f8.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine CAAEBKEGHJ.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine f4d0d43e30.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 54e67528aa.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 23535b832d.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 4e045532a4.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 53OJIQ6WPTLRRVGBQ.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine HKVEAYPH5IQNDV43K1ICWN.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine cedd75f3a781795bab964212a7e781e1.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe -
Loads dropped DLL 64 IoCs
pid Process 2452 cedd75f3a781795bab964212a7e781e1.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 2588 cmd.exe 2816 CAAEBKEGHJ.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2648 f4d0d43e30.exe 2648 f4d0d43e30.exe 2332 skotes.exe 2332 skotes.exe 2736 Cq6Id6x.exe 2332 skotes.exe 1524 axplong.exe 2420 trunk.exe 2160 trunk.exe 2332 skotes.exe 2332 skotes.exe 1524 axplong.exe 1524 axplong.exe 1524 axplong.exe 1524 axplong.exe 1524 axplong.exe 2332 skotes.exe 1524 axplong.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 1624 4e045532a4.exe 1624 4e045532a4.exe 2332 skotes.exe 2332 skotes.exe 1624 4e045532a4.exe 1624 4e045532a4.exe 2332 skotes.exe 2004 cmd.exe 2400 7z.exe 2004 cmd.exe 1108 7z.exe 2004 cmd.exe 920 7z.exe 2004 cmd.exe 2988 7z.exe 2004 cmd.exe 1824 7z.exe 2004 cmd.exe 2792 7z.exe 2004 cmd.exe 3416 7z.exe 2004 cmd.exe 3436 7z.exe 2004 cmd.exe 2004 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 53OJIQ6WPTLRRVGBQ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6ba9109859.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\23535b832d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007272001\\23535b832d.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\5526afe930.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007274001\\5526afe930.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\4e045532a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017064001\\4e045532a4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\f3c2c9bd3b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017065001\\f3c2c9bd3b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\a2620276bc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017066001\\a2620276bc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\6ba9109859.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1017067001\\6ba9109859.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001d88c-925.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 2452 cedd75f3a781795bab964212a7e781e1.exe 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 2816 CAAEBKEGHJ.exe 2332 skotes.exe 2648 f4d0d43e30.exe 1524 axplong.exe 2204 VR6f3vF.exe 2616 ANEDNjf.exe 1400 23535b832d.exe 1736 54e67528aa.exe 2604 5526afe930.exe 1992 e2b8e18946.exe 1624 4e045532a4.exe 1736 f3c2c9bd3b.exe 3368 53OJIQ6WPTLRRVGBQ.exe 1616 HKVEAYPH5IQNDV43K1ICWN.exe 4088 6ba9109859.exe 1988 1c126672f8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2736 set thread context of 2968 2736 Cq6Id6x.exe 70 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job CAAEBKEGHJ.exe File created C:\Windows\Tasks\axplong.job f4d0d43e30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 828 2836 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VR6f3vF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kf5cl0F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ANEDNjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2620276bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language a2620276bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HKVEAYPH5IQNDV43K1ICWN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage a2620276bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4d0d43e30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54e67528aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CAAEBKEGHJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e045532a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c126672f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedd75f3a781795bab964212a7e781e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ba9109859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2791f8a36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23535b832d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53OJIQ6WPTLRRVGBQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 849a67a42f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cq6Id6x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3c2c9bd3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54e67528aa.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3284 powershell.exe 1836 PING.EXE -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2780 taskkill.exe 896 taskkill.exe 2796 taskkill.exe 540 taskkill.exe 3000 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1836 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 cedd75f3a781795bab964212a7e781e1.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 2452 cedd75f3a781795bab964212a7e781e1.exe 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 2208 chrome.exe 2208 chrome.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 1988 chrome.exe 1988 chrome.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 2816 CAAEBKEGHJ.exe 2332 skotes.exe 2648 f4d0d43e30.exe 1524 axplong.exe 2204 VR6f3vF.exe 2056 kf5cl0F.exe 2104 powershell.exe 780 powershell.exe 2616 ANEDNjf.exe 1400 23535b832d.exe 1736 54e67528aa.exe 1736 54e67528aa.exe 1736 54e67528aa.exe 1736 54e67528aa.exe 1736 54e67528aa.exe 2160 dialer.exe 2160 dialer.exe 2160 dialer.exe 2160 dialer.exe 2204 VR6f3vF.exe 2204 VR6f3vF.exe 2204 VR6f3vF.exe 2204 VR6f3vF.exe 2604 5526afe930.exe 2968 Cq6Id6x.exe 2968 Cq6Id6x.exe 2968 Cq6Id6x.exe 2968 Cq6Id6x.exe 1992 e2b8e18946.exe 1624 4e045532a4.exe 2616 ANEDNjf.exe 2616 ANEDNjf.exe 2616 ANEDNjf.exe 2616 ANEDNjf.exe 1736 f3c2c9bd3b.exe 1624 4e045532a4.exe 1624 4e045532a4.exe 1624 4e045532a4.exe 1624 4e045532a4.exe 2524 a2620276bc.exe 3368 53OJIQ6WPTLRRVGBQ.exe 1616 HKVEAYPH5IQNDV43K1ICWN.exe 1616 HKVEAYPH5IQNDV43K1ICWN.exe 1616 HKVEAYPH5IQNDV43K1ICWN.exe 4088 6ba9109859.exe 4088 6ba9109859.exe 4088 6ba9109859.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeShutdownPrivilege 1988 chrome.exe Token: SeDebugPrivilege 2736 Cq6Id6x.exe Token: SeDebugPrivilege 2056 kf5cl0F.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 780 powershell.exe Token: SeDebugPrivilege 2780 taskkill.exe Token: SeDebugPrivilege 896 taskkill.exe Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 3000 taskkill.exe Token: SeDebugPrivilege 676 firefox.exe Token: SeDebugPrivilege 676 firefox.exe Token: SeDebugPrivilege 3368 53OJIQ6WPTLRRVGBQ.exe Token: SeDebugPrivilege 4088 6ba9109859.exe Token: SeRestorePrivilege 2400 7z.exe Token: 35 2400 7z.exe Token: SeSecurityPrivilege 2400 7z.exe Token: SeSecurityPrivilege 2400 7z.exe Token: SeRestorePrivilege 1108 7z.exe Token: 35 1108 7z.exe Token: SeSecurityPrivilege 1108 7z.exe Token: SeSecurityPrivilege 1108 7z.exe Token: SeRestorePrivilege 920 7z.exe Token: 35 920 7z.exe Token: SeSecurityPrivilege 920 7z.exe Token: SeSecurityPrivilege 920 7z.exe Token: SeRestorePrivilege 2988 7z.exe Token: 35 2988 7z.exe Token: SeSecurityPrivilege 2988 7z.exe Token: SeSecurityPrivilege 2988 7z.exe Token: SeRestorePrivilege 1824 7z.exe Token: 35 1824 7z.exe Token: SeSecurityPrivilege 1824 7z.exe Token: SeSecurityPrivilege 1824 7z.exe Token: SeRestorePrivilege 2792 7z.exe Token: 35 2792 7z.exe Token: SeSecurityPrivilege 2792 7z.exe Token: SeSecurityPrivilege 2792 7z.exe Token: SeRestorePrivilege 3416 7z.exe Token: 35 3416 7z.exe Token: SeSecurityPrivilege 3416 7z.exe Token: SeSecurityPrivilege 3416 7z.exe Token: SeRestorePrivilege 3436 7z.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2208 chrome.exe 1988 chrome.exe 2816 CAAEBKEGHJ.exe 2648 f4d0d43e30.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 676 firefox.exe 676 firefox.exe 676 firefox.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe 2524 a2620276bc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2836 2452 cedd75f3a781795bab964212a7e781e1.exe 32 PID 2452 wrote to memory of 2836 2452 cedd75f3a781795bab964212a7e781e1.exe 32 PID 2452 wrote to memory of 2836 2452 cedd75f3a781795bab964212a7e781e1.exe 32 PID 2452 wrote to memory of 2836 2452 cedd75f3a781795bab964212a7e781e1.exe 32 PID 2836 wrote to memory of 828 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 33 PID 2836 wrote to memory of 828 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 33 PID 2836 wrote to memory of 828 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 33 PID 2836 wrote to memory of 828 2836 4196QTKXW13E9FZH7JVJQF3BDLPY5.exe 33 PID 2452 wrote to memory of 1972 2452 cedd75f3a781795bab964212a7e781e1.exe 34 PID 2452 wrote to memory of 1972 2452 cedd75f3a781795bab964212a7e781e1.exe 34 PID 2452 wrote to memory of 1972 2452 cedd75f3a781795bab964212a7e781e1.exe 34 PID 2452 wrote to memory of 1972 2452 cedd75f3a781795bab964212a7e781e1.exe 34 PID 1972 wrote to memory of 2208 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 36 PID 1972 wrote to memory of 2208 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 36 PID 1972 wrote to memory of 2208 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 36 PID 1972 wrote to memory of 2208 1972 OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe 36 PID 2208 wrote to memory of 2388 2208 chrome.exe 37 PID 2208 wrote to memory of 2388 2208 chrome.exe 37 PID 2208 wrote to memory of 2388 2208 chrome.exe 37 PID 2208 wrote to memory of 408 2208 chrome.exe 38 PID 2208 wrote to memory of 408 2208 chrome.exe 38 PID 2208 wrote to memory of 408 2208 chrome.exe 38 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 692 2208 chrome.exe 39 PID 2208 wrote to memory of 956 2208 chrome.exe 40 PID 2208 wrote to memory of 956 2208 chrome.exe 40 PID 2208 wrote to memory of 956 2208 chrome.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2824 attrib.exe 3264 attrib.exe 3248 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\cedd75f3a781795bab964212a7e781e1.exe"C:\Users\Admin\AppData\Local\Temp\cedd75f3a781795bab964212a7e781e1.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\4196QTKXW13E9FZH7JVJQF3BDLPY5.exe"C:\Users\Admin\AppData\Local\Temp\4196QTKXW13E9FZH7JVJQF3BDLPY5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 6924⤵
- Loads dropped DLL
- Program crash
PID:828
-
-
-
C:\Users\Admin\AppData\Local\Temp\OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe"C:\Users\Admin\AppData\Local\Temp\OYIPP49A7OL4QAOZIAQ2CWDYSY0ASE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef76c9758,0x7fef76c9768,0x7fef76c97785⤵PID:2388
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:25⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:85⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:85⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2020 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2444 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2452 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1292 --field-trial-handle=1100,i,4621200978378565391,2450831086124789017,131072 /prefetch:25⤵PID:2860
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70a9758,0x7fef70a9768,0x7fef70a97785⤵PID:540
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1100 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:25⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1404 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:85⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1544 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:85⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2560 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2568 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1296 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:25⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3816 --field-trial-handle=1280,i,9847768393140717667,2646185713609839511,131072 /prefetch:85⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\CAAEBKEGHJ.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Users\Admin\Documents\CAAEBKEGHJ.exe"C:\Users\Admin\Documents\CAAEBKEGHJ.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"C:\Users\Admin\AppData\Local\Temp\1016920001\Cq6Id6x.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"C:\Users\Admin\AppData\Local\Temp\1016945001\x0qQ2DH.exe"7⤵
- Executes dropped EXE
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\1016974001\f4d0d43e30.exe"C:\Users\Admin\AppData\Local\Temp\1016974001\f4d0d43e30.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\onefile_2420_133790254013892000\trunk.exeC:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007272001\23535b832d.exe"C:\Users\Admin\AppData\Local\Temp\1007272001\23535b832d.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\1007273001\54e67528aa.exe"C:\Users\Admin\AppData\Local\Temp\1007273001\54e67528aa.exe"9⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\1007274001\5526afe930.exe"C:\Users\Admin\AppData\Local\Temp\1007274001\5526afe930.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\1007275001\e2b8e18946.exe"C:\Users\Admin\AppData\Local\Temp\1007275001\e2b8e18946.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"C:\Users\Admin\AppData\Local\Temp\1017019001\VR6f3vF.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"C:\Users\Admin\AppData\Local\Temp\1017024001\kf5cl0F.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\jlpnkxawgp"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"C:\Users\Admin\AppData\Local\Temp\1017027001\ANEDNjf.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\1017063001\54e67528aa.exe"C:\Users\Admin\AppData\Local\Temp\1017063001\54e67528aa.exe"7⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\1017064001\4e045532a4.exe"C:\Users\Admin\AppData\Local\Temp\1017064001\4e045532a4.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\53OJIQ6WPTLRRVGBQ.exe"C:\Users\Admin\AppData\Local\Temp\53OJIQ6WPTLRRVGBQ.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\HKVEAYPH5IQNDV43K1ICWN.exe"C:\Users\Admin\AppData\Local\Temp\HKVEAYPH5IQNDV43K1ICWN.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017065001\f3c2c9bd3b.exe"C:\Users\Admin\AppData\Local\Temp\1017065001\f3c2c9bd3b.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\1017066001\a2620276bc.exe"C:\Users\Admin\AppData\Local\Temp\1017066001\a2620276bc.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:2956
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.0.1482299137\1908126699" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1168 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {15dc2939-fc80-4122-b5a6-2a5b28b85a65} 676 "\\.\pipe\gecko-crash-server-pipe.676" 1372 104dbe58 gpu10⤵PID:1084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.1.1514039859\795698097" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1520 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea6194fb-7172-4402-87e6-4b019c6a7b8b} 676 "\\.\pipe\gecko-crash-server-pipe.676" 1536 3fce158 socket10⤵PID:2160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.2.817609000\1236279275" -childID 1 -isForBrowser -prefsHandle 2156 -prefMapHandle 2152 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9af0a69-1632-45f3-af3e-68c5802bce16} 676 "\\.\pipe\gecko-crash-server-pipe.676" 2168 170c0858 tab10⤵PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.3.1920658888\191674443" -childID 2 -isForBrowser -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {82ab0e88-c23d-4512-8e80-18fe99c81604} 676 "\\.\pipe\gecko-crash-server-pipe.676" 2480 1bfa9858 tab10⤵PID:840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.4.634308971\1770311659" -childID 3 -isForBrowser -prefsHandle 3624 -prefMapHandle 3572 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {744dfab9-d744-4b67-8f8e-41e23cb0c6c3} 676 "\\.\pipe\gecko-crash-server-pipe.676" 3800 1f46e758 tab10⤵PID:3540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.5.1348229065\104451629" -childID 4 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b4335fb-3d02-4d76-86e7-d31dcfeba2ec} 676 "\\.\pipe\gecko-crash-server-pipe.676" 3900 1f46ea58 tab10⤵PID:3548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="676.6.1532539065\360122152" -childID 5 -isForBrowser -prefsHandle 4076 -prefMapHandle 4080 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 588 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3ab9713-f5ce-40bd-8d5b-4fbb18fe8a72} 676 "\\.\pipe\gecko-crash-server-pipe.676" 4064 1f46f358 tab10⤵PID:3576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017067001\6ba9109859.exe"C:\Users\Admin\AppData\Local\Temp\1017067001\6ba9109859.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\1017068001\849a67a42f.exe"C:\Users\Admin\AppData\Local\Temp\1017068001\849a67a42f.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"8⤵
- Loads dropped DLL
PID:2004 -
C:\Windows\system32\mode.commode 65,109⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"9⤵
- Views/modifies file attributes
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"9⤵
- Executes dropped EXE
PID:3224 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe10⤵
- Views/modifies file attributes
PID:3248
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe10⤵
- Views/modifies file attributes
PID:3264
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE10⤵
- Scheduled Task/Job: Scheduled Task
PID:3300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe10⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3284 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.111⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1836
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1017069001\e2791f8a36.exe"C:\Users\Admin\AppData\Local\Temp\1017069001\e2791f8a36.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\1017070001\1c126672f8.exe"C:\Users\Admin\AppData\Local\Temp\1017070001\1c126672f8.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1768
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Discovery
Browser Information Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD566b458a927cbc7e3db44b9288dd125cd
SHA1bca37f9291fdfaf706ea2e91f86936caec472710
SHA256481bc064a399c309d671b4d25371c9afba388960624d1173221eac16752dea81
SHA512897fade0ea8f816830aee0e8008868af42619005384e0a89da654ad16102cd5e7a607440bd99f9578cf951390d39f07020054cca74231cdc42a3cffa363d9869
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index-dir\the-real-index
Filesize48B
MD54f64214f632c3ea461f798f08e4b0ea0
SHA167c21f17e38b436647b1090570563bd61103fadc
SHA2565e125f0c83966887c3a03183932a04fbcf7152d832b7d8911a473c141bea4a40
SHA5123cb186091bb9e3c2f89a42183197786d85acf30bad32e26e2f98514b5698abd5425c43468efed03821a4f8b8bcf2386c972d386777a46926c3237ab8ae861b0c
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD579e0ec7bfdfb5ec125b306d06f9ad5c3
SHA1d6d6f80287ece6b98ecace418de03fefcb992e56
SHA2563228949ee8f2dda213b076c35215d914c41738464b856f6fb090616e66763dd3
SHA51291baff2975162b9427d68ed6614d81cf1daf55769be081965c8991f30335061b7e0ca80e69646f9cbd417dfb56f04ee9ac3900fd7b3d4db40e7bfcab7702ba3f
-
Filesize
20KB
MD53eea0768ded221c9a6a17752a09c969b
SHA1d17d8086ed76ec503f06ddd0ac03d915aec5cdc7
SHA2566923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512
SHA512fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG
Filesize204B
MD57b9b240bbcf98fa0569f14dde7a7e814
SHA1850fa9ecf0d2b076914bcb9cd3eb9534748e0bf6
SHA256fbe08cff98688d876865358820253a0bd0a10704fb0ef9b3bd15a0c3b6f29cdb
SHA512d045fdccbdb4a0ca69cd722ebe89fe16e99c48586e6c4c0ba5da8f4dab53d871025aabc6971c508b9764037bcfb6b18b44269a53ec641bc4076c0dd9a6d623c3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
Filesize
192B
MD5dc4bdec4df2ad93bfd22b499025ffde6
SHA156e9cac20b373f0ba26fc7173621ecfce13d9e4a
SHA25649d7ae15a7c1945703014efa75ed3ed6521ec81ff7a67c1078e29fc8500cfc55
SHA5129122e9f3217c2072938e477afd1f5c56fd9c1bc4d6350761c47d38b1e035ebb589a0e604581388ecce0573286507c14bf80a7acc23bb47448766b8b7ab066d67
-
Filesize
128KB
MD578d29b1f69d654a9de67465c7a4b392e
SHA14b6448874d3375ef795fb8d739d405a7249e832a
SHA2567df2d8f9ee061e8f490b9c8e5bfec1560e84b5a31fa30ecaf7d0dc43de0ebefe
SHA512a1e2cc351edf1c65d36b9fe98258e68dfde775456676dd0ee7db5ee50ed4ae7b8afa7b084291d3065de1aa0bc47539f7aaa7af7749d69fb130e909593ae858c7
-
Filesize
92KB
MD5cd9012f9650d183ad81c37c91623f036
SHA18b8b811031569d627a4c9961e799bd04f5c08c5d
SHA2565f76128dabdf448c9bd9e83c0b6ad3ec16ed9b3dc75daa2320039b0898628cbd
SHA512ba590c2b6b55c5b9cff368d668426c370641c72de21be6f2e781b2bc28a77cf7c49d7fc0e993d61246c8ec50a8e4eab867b7f283c42e7300358d8fd7cefb65d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\shared_proto_db\metadata\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
32KB
MD569e3a8ecda716584cbd765e6a3ab429e
SHA1f0897f3fa98f6e4863b84f007092ab843a645803
SHA256e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487
SHA512bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\js\index-dir\the-real-index
Filesize48B
MD552f690fa72319a810e310543df5cc078
SHA157ee5f9c82a70b787758cc06e497981d5caf8b7a
SHA2563c7f3882bc4ccfb1ebbadbdb0f9bac57ecdbd30abe0ee060967cb549ede8553f
SHA51227ee5cbd2d3f19fcfd10c420274b0eba640523012dc683fc670ecb6202adf2588e01ba0d5f3c527f685c210578e002932e22acc26d45e260a7f9f8fb2bf4f44e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD5e6639d17b28f08532c5f615bc6394b82
SHA166c939199b2e7ee73a6ce6cafaae107b413d5bdd
SHA25609cbae9cfac604f2415b6cb68424d1a399dd74142ad8915688cb638f38b75e26
SHA5120d773ca7a082728e79261a0808ad0765201dfa98f816fc4b27cfd59701b72b7c18f508c3f83b30ffb1e8b4a88bf7d3a00fff0a0f741e6552eba06ca5a914a1be
-
Filesize
76B
MD5cc4a8cff19abf3dd35d63cff1503aa5f
SHA152af41b0d9c78afcc8e308db846c2b52a636be38
SHA256cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a
SHA5120e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320
-
Filesize
193B
MD5c56e83939d766fcc9e49a0b2f5f93ed3
SHA1cea5376273d0c04d293f0a392da76cb46785ad13
SHA25686f32f4f219c71a474eb4a835a973699457dc7a3ca3f6d695571c91d7a079f72
SHA512001a1332aa931251f56a1757159e4a9d4c557525961efa52809ddd6fad5b82c52267bf82857e46befda9049fb1a2c9e4dda3878e58ac52446488e2ef5eec11a1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\MANIFEST-000002
Filesize50B
MD522bf0e81636b1b45051b138f48b3d148
SHA156755d203579ab356e5620ce7e85519ad69d614a
SHA256e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97
SHA512a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG
Filesize205B
MD583da8f715e7edbdb821dd2ef5ab55441
SHA1c92b139123d699e910b5b73cc9bec93dcab75d37
SHA256efa8b2d889e8810127614138d42e703e0adc9a5a8a19e20a0a3b09185b2a35e7
SHA512f5c1c3ef5e39a74eeaa9aa065ef68c2816c8ea3966b8c85722e8930e1bb1c96d97ee652aed64bff307105367a2bd567a13ff511daea06e2be53064f4f16f86ec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT~RFf77195a.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
193B
MD533f91ec727d01751dbeb9ff0559779d9
SHA117cbc345b1eebe6c77328e18ae6372abc1a3e834
SHA25609f375fca193d9cd8ebe3065c31e927100c8e17746fee859d2133a6e43e517b6
SHA512e76b6634cb38922fdd6a5ee81b2aba426a369f88eb7eb73c03a085bec2167245c92aed64026da77beaf2cbf5ce103116ffa7377a9c56dcd230ea28ed1dc16d56
-
Filesize
128KB
MD54b6eee791075cb9204a240030f68a381
SHA117c0ffbc5902714d43ffece06d994db0cc2bd160
SHA256e4a67c49171e389e5bfa166cfdb921c33b6d4ad7bea7037569a6bc0e3b5bfe3d
SHA512fa72c30f29e7d05b1d805a810afed51563e86dd5c7f20f0a7061ff3fff0e5cf0f0745fea7247d40bcd485d824defd3dc9d12e87991447fe4d16e9f0e5119e201
-
Filesize
92KB
MD5bf83a189aaf8977c91e337fe044f63a9
SHA1fb3d8ed7ac8dd52a03754d3aecab3403f2539dc1
SHA25645b04f527833f44ce8c8105e6e7d01db3088ab74b18ad92c32a794d9d52a6b0b
SHA51230d0373c1b1cbf465417218b33e0afd41518b25e78360e92fda6e4e3a5d9b1fac453287f6a6e6258b7c2af7196a09ebe165a5f4fb9108cf9e994f8223b499bd8
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5bedc5cbfb35cc06c74fdb0182b3cf264
SHA1ea2552b660f6f4a4ffe1f1c3e340da3a87ee8dd5
SHA256dc16ff42de493010247b826b9aac16739e99f4e2879670ce3fd26256b2123f24
SHA512fb9c5eb4ed0eb96c4a6de4515c6deaa62ebed6e477ae4acfd730d97818214f23d0674bd99a127833d5072b9c65047f4c50191c5a70b5b05a2756394d43b39390
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1bogwdvw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
10.2MB
MD5d3b39a6b63c3822be6f8af9b3813bbad
SHA100b020e5a1c05442612f2cec7950c2814b59b1b6
SHA256786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f
SHA512a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff
-
Filesize
1.9MB
MD5e43a8b85e3e4f3ab02a94b84c2d5893f
SHA19c2bc2000b8858516d717441c89dd987d5a19ddf
SHA256d027b34627eb19d6b5a432117148d21990678da6b218c595623a07492158e69e
SHA512136fc58786f1e70775ddfdc01e6659f4d8295a5b8d78154012f8aadc167cb9047d00cd1030f6da455e92d012ee86acf4e0071e502002502ddeee1758a4e0e1a2
-
Filesize
3.1MB
MD5f9b9f98592292b5cbf59c7a60e9ebaee
SHA159cc872fd0a11b259cc5b70893f35e9b5a7c8cbb
SHA2565688e9e0becc622c573af2a1af4ee0676ef3907e38a9258a7801b46b7ad64665
SHA512f27e4a96173aeb064f47d44ff445b1e15f6d4f39a4ad711c019bb29692caea56eb910970d22bc13ac5c57a256d71e77b12aa60c8405335a239781c57cb0eaf8e
-
Filesize
17.6MB
MD53c224e3fc892719dc1e302378e533579
SHA10a65062e1426a95bfeca355398b6fdc4912fb6b1
SHA25664cc7f7906fe1ebf0b6977892abd9aa36f5e525cb241964c3986ee9e1a18312d
SHA512554a26e9654eccce831e4adcee49d5e2507956935e562b134a86f332d867debfcd1f64fdb88fccb2e1eee810975d565dbc6ea1376516817ee38765e4bd733a49
-
Filesize
2.9MB
MD598c28cbc0f77f431bd470b389c8d5d84
SHA15043a0e8eabeab839570cdc732aa63f98964884d
SHA256c9bad96eda6069fda384604035910ecbb035a5f397ff1f20f890de308eaa7b08
SHA512c41e9eba47cc74c44f01582fd74f935969aabb3dab5d8ab34e0e117b2085d66f5b3ea9b4a05b85ee5f3575443d00385a8eed68c32ca68697020d0e00a66afed7
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
4.2MB
MD570434d35e134be744784cc4acf6e8179
SHA1bfd584fe0f50e158ef7df13350f00ddd1797a5c5
SHA256db554c37c8a4b97901452b495ea43e0c4bced715f393adec6993451eb244109d
SHA512eecdb906b01edeafc6c88ab38ba2ddcf38ef6a1140d59a1c52321da580440c036f05a5ce0a930dd379eb8a4376a577ecd3f8946f49d1f77b0fe22953f91c6f7b
-
Filesize
1.8MB
MD5d0bb2fa7815ae25e59827dd3e8a710ba
SHA1013aa5756aa4fea565a5e4f576af688dc65d7435
SHA256e9d6b68a7005d52a9caa77bd238493442a002b09eeb6c52542a587631a92de88
SHA512c7cffa0c187073df5361f0e1654a0fa6ba2da05d9c503c28c4ac5a8437b65830ac23eeb2507f834995c307c770d0ee2f8295c653abbb21dbc980b1f8aacc85b4
-
Filesize
947KB
MD530a31c79ab26328dfe4fcead06fe24f3
SHA189bf3e7f611e857923f1608fbf2b3d2c2f431d6c
SHA2564c6e5ed4a3b935a4bc196f9db806ad5b1ea078d59e6dff756347a57a2e5f2f9c
SHA5122ce67636672fe1b0fba30273aa2385b9bc5447c7a2d90e9f0037e0017d90e38233e5febf1cd03e90f06a4e891deccb0358a536272e5814e88e3a51a655213b8f
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
2.9MB
MD54452ec57b9f73248dc972b2b312757a8
SHA164864da549ac01ae995614ce1cff74fa4d534d0c
SHA256664e69b71a65f6affb6e66ec4711c67cbebbb58781d49cf5c0a0e2d33d869225
SHA512bb7be4b4529724464300c663bf42a1c4d30e16abb1f156a19161c863d91aad20270ec88f7a5bc74ea88e3415e13e6a65b7f9277a7d1af4742aad06fc3a9bee01
-
Filesize
2.9MB
MD5f04e6f4a98b27fccb18cdde586a3e946
SHA19bf30c2d707089f4b0afbb8d6ea4a7a8a2374691
SHA2565eb00b4d1604a197ddd4f16476ddcb649686de0160158c2a04136e7a62d0246b
SHA512841c22e9e66d490a918de842b5d5e458aeb9cc178d54e8a34ac6f4b81932e9305a41095cef70c8eb4b0582068cc492e26baa7440a921b86ee05833ffc0142bb5
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6TAM3AQ4SWIVVZDX69OR.temp
Filesize7KB
MD529c2393e35d19904067bc4b7f835a98f
SHA1998f84dd72f251f3f06a3df2d46769a60888396f
SHA256b770da3ebe31e07f23c63af7e444338a9824e718ed02c43a96c76b9c63d514fa
SHA5127ca89d6df9d8ea180ca4411d9fea87696689eca3b9fbb4f62f2255115d870434b73f513c496506897bae7662cdc40b6157139353ab00d4232f272b08ff4c0ce6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5dc1ec167d1159b736388f8a70a45ddc4
SHA1453574cdba0376b4d7ed016c7dee1ea97a84d554
SHA25676b7a9683257af7411968f70aac4f8f0f2698d9ab908b388bf29c1a8142620ee
SHA5124aa7db508110f899f1e3bafa69914949146926a21c375df1ca0c484f62c3bbff2ee020bea67659d29ac19a6c488c466b608061a030ecece52e015dfab5d03e1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\7a434ce8-9136-4032-8dad-7782c313bf45
Filesize745B
MD50512245539fdca02bdc690aadd03c0cd
SHA1f83fd722427883453ce9e94338b5ae3c11ddf8f3
SHA256f941dadb25c4fd718bd1293224a46c38870798063460bd8e5b01aa5e3e98e4ad
SHA512eb5fe1048e0c7990b231d5bd720f3c235065c6df6e32129d530d6354e451bacf0ac54bb6a1e5a28881962d8884c9b9c8b6ea23dafe46d61279b92f000b72fdef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\datareporting\glean\pending_pings\7c58fb35-68ed-4eef-bfb1-2244721ddf44
Filesize11KB
MD5ec9ffa10232aebe885c760fc0875352d
SHA1b4f5b39b178ae2a9be72141a829a4390644c4eaa
SHA256e88cfd1d7c9ecd411304ac522b5f625b8c66f3ab32561c87733086cf2fe14911
SHA5125468bfcc05c35da3e83ea058c1f54e435b79477a9fc307d278382f1bb364e5723fb71729e1388e3ca52d1bbd996c49e962026210984076600d59eaf1dd680e21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
Filesize
6KB
MD56ae8902615394652a94ad14e3f8a3b69
SHA1e7e0e6593cb1293b628d101f365cde9ef6de0a41
SHA25620d05a99f1cf9506702ec96aedcc36ee13f1fa8973b7fe9b298cac184569c7d6
SHA5124ea8f515eeac1b7d57db8d8b2638de7b4d0f84dd09a7549cf2f073dee73bb99b746e5d720b7af654667078474256c0fcdec1cad1aa9333b47944c2373c96b8b8
-
Filesize
6KB
MD508c1e01a0f558660db20383fca953360
SHA15fdbdd275935d38cb21388759bfdef0457af1bc6
SHA25650e8071de3ba3419cb31a4ba8fa1257d6bdfda1f9c5979d1f3ed1b1c3adacff5
SHA512db4a2fb610555efa6723359c296cfc2d68cd6c7673c1694017d227932a173cff42e2752cd8b0c6f99632cc1d314236dd1d3889df53fa30433db75e5aac8c955d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1bogwdvw.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD500b5210ce308bf31cbc0adc25f5f860c
SHA1b814ebe46bfb6830283c54fca9a3972e37e2cc5d
SHA2563bd99d977e77d27490517cdb4ff68d27b89fb214bd41dfdd02e2f40957b0b5fe
SHA5121fbacb838290ba733abc5a1724e7ba1e01777cdedab6c301f165355fc7846e7fd6e24fce57ac2e1c6c27f72f658a81f0b998e1edfc77898014cd74f09387faf1
-
Filesize
1.7MB
MD5ad032d27245fb875c3a6cca4ce138495
SHA139236146bf25941b206f447d1c90521b050d99ff
SHA256024252845c56aaf523d909ad02ddc6dc8160fbc0f5d5caa24b45af09afe3730d
SHA51209379949e8921144f092aca9e5aef72f027a81d8aea82c1986ca262cd5d69173cf23f07c2fa8a6a392eb41191431e6407b614f6384c7d163380e77d0ac36c2fb