Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
659a28dd5c85f4482c3818467461f372.exe
Resource
win7-20240903-en
General
-
Target
659a28dd5c85f4482c3818467461f372.exe
-
Size
1.8MB
-
MD5
659a28dd5c85f4482c3818467461f372
-
SHA1
a9f54c9aa53da8f3e8b47ab4ed4650b9e0df0f3f
-
SHA256
1e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe
-
SHA512
123c05cbc778406da4fab525c84fc8650c714826d8984a5de4753ccc17dcf59e43f4a2b48d16aa56d54466616f42d485e9b4307ce7a24fa56b1691064ec3c5cf
-
SSDEEP
49152:TQsjXkTmwxhOCTzyr9uInP/OkMk8X+dINgZcb:dnONHSUIe1Rxb
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
412c7a14e9.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 412c7a14e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 412c7a14e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 412c7a14e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 412c7a14e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 412c7a14e9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 412c7a14e9.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
1574073ef9.exeaxplong.exeDocumentsDBFHDHJKKJ.exeskotes.exe412c7a14e9.exeaxplong.exe659a28dd5c85f4482c3818467461f372.exeaxplong.execfe378ae6e.exe784ebe8352.exec82fa1a92a.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1574073ef9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsDBFHDHJKKJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 412c7a14e9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 659a28dd5c85f4482c3818467461f372.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfe378ae6e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 784ebe8352.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c82fa1a92a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exemsedge.exemsedge.exechrome.exechrome.exemsedge.exemsedge.exemsedge.exepid Process 2020 chrome.exe 3952 chrome.exe 2200 msedge.exe 4872 msedge.exe 728 chrome.exe 2216 chrome.exe 1792 msedge.exe 2232 msedge.exe 3144 msedge.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe784ebe8352.exe659a28dd5c85f4482c3818467461f372.exeaxplong.exe1574073ef9.exeDocumentsDBFHDHJKKJ.exe412c7a14e9.execfe378ae6e.exec82fa1a92a.exeskotes.exeaxplong.exeaxplong.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 784ebe8352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 659a28dd5c85f4482c3818467461f372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1574073ef9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1574073ef9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsDBFHDHJKKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 412c7a14e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 659a28dd5c85f4482c3818467461f372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfe378ae6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c82fa1a92a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 412c7a14e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfe378ae6e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsDBFHDHJKKJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 784ebe8352.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c82fa1a92a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
axplong.exe1574073ef9.exeDocumentsDBFHDHJKKJ.exeskotes.exe659a28dd5c85f4482c3818467461f372.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1574073ef9.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation DocumentsDBFHDHJKKJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 659a28dd5c85f4482c3818467461f372.exe -
Executes dropped EXE 12 IoCs
Processes:
axplong.exe1574073ef9.execfe378ae6e.exeaxplong.exeDocumentsDBFHDHJKKJ.exeskotes.exe784ebe8352.exec82fa1a92a.exe722380e476.exe412c7a14e9.exeskotes.exeaxplong.exepid Process 4084 axplong.exe 972 1574073ef9.exe 4672 cfe378ae6e.exe 368 axplong.exe 3140 DocumentsDBFHDHJKKJ.exe 4960 skotes.exe 3396 784ebe8352.exe 1828 c82fa1a92a.exe 2196 722380e476.exe 3232 412c7a14e9.exe 1344 skotes.exe 3352 axplong.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe659a28dd5c85f4482c3818467461f372.exeaxplong.exe1574073ef9.exeaxplong.exeDocumentsDBFHDHJKKJ.exe784ebe8352.exec82fa1a92a.execfe378ae6e.exeskotes.exe412c7a14e9.exeaxplong.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 659a28dd5c85f4482c3818467461f372.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1574073ef9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine DocumentsDBFHDHJKKJ.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 784ebe8352.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine c82fa1a92a.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine cfe378ae6e.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 412c7a14e9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine axplong.exe -
Loads dropped DLL 3 IoCs
Processes:
1574073ef9.exepid Process 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
412c7a14e9.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 412c7a14e9.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 412c7a14e9.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
axplong.exeskotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1574073ef9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001737001\\1574073ef9.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cfe378ae6e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001738001\\cfe378ae6e.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\784ebe8352.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003616001\\784ebe8352.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c82fa1a92a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003617001\\c82fa1a92a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\722380e476.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003618001\\722380e476.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\412c7a14e9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003619001\\412c7a14e9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cc9-386.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
659a28dd5c85f4482c3818467461f372.exeaxplong.exe1574073ef9.execfe378ae6e.exeaxplong.exeDocumentsDBFHDHJKKJ.exeskotes.exe784ebe8352.exec82fa1a92a.exe412c7a14e9.exeaxplong.exeskotes.exepid Process 2156 659a28dd5c85f4482c3818467461f372.exe 4084 axplong.exe 972 1574073ef9.exe 4672 cfe378ae6e.exe 368 axplong.exe 3140 DocumentsDBFHDHJKKJ.exe 4960 skotes.exe 3396 784ebe8352.exe 1828 c82fa1a92a.exe 3232 412c7a14e9.exe 3352 axplong.exe 1344 skotes.exe -
Drops file in Windows directory 2 IoCs
Processes:
DocumentsDBFHDHJKKJ.exe659a28dd5c85f4482c3818467461f372.exedescription ioc Process File created C:\Windows\Tasks\skotes.job DocumentsDBFHDHJKKJ.exe File created C:\Windows\Tasks\axplong.job 659a28dd5c85f4482c3818467461f372.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1574073ef9.execmd.exeDocumentsDBFHDHJKKJ.exe784ebe8352.exetaskkill.exe412c7a14e9.exeskotes.exetaskkill.exetaskkill.exe659a28dd5c85f4482c3818467461f372.execfe378ae6e.exe722380e476.exeaxplong.exec82fa1a92a.exetaskkill.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1574073ef9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsDBFHDHJKKJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 784ebe8352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 412c7a14e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 659a28dd5c85f4482c3818467461f372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfe378ae6e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 722380e476.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c82fa1a92a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msedge.exefirefox.exefirefox.exe1574073ef9.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1574073ef9.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1574073ef9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chrome.exemsedge.exemsedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1412 taskkill.exe 1824 taskkill.exe 1524 taskkill.exe 4696 taskkill.exe 2944 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133751063648437505" chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
659a28dd5c85f4482c3818467461f372.exeaxplong.exe1574073ef9.execfe378ae6e.exechrome.exemsedge.exemsedge.exemsedge.exeaxplong.exeDocumentsDBFHDHJKKJ.exeskotes.exe784ebe8352.exec82fa1a92a.exepid Process 2156 659a28dd5c85f4482c3818467461f372.exe 2156 659a28dd5c85f4482c3818467461f372.exe 4084 axplong.exe 4084 axplong.exe 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe 4672 cfe378ae6e.exe 4672 cfe378ae6e.exe 972 1574073ef9.exe 972 1574073ef9.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 1968 msedge.exe 1968 msedge.exe 1792 msedge.exe 1792 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe 972 1574073ef9.exe 368 axplong.exe 368 axplong.exe 3140 DocumentsDBFHDHJKKJ.exe 3140 DocumentsDBFHDHJKKJ.exe 4960 skotes.exe 4960 skotes.exe 3396 784ebe8352.exe 3396 784ebe8352.exe 1828 c82fa1a92a.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exemsedge.exepid Process 728 chrome.exe 728 chrome.exe 728 chrome.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
chrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe412c7a14e9.exedescription pid Process Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeShutdownPrivilege 728 chrome.exe Token: SeCreatePagefilePrivilege 728 chrome.exe Token: SeDebugPrivilege 2944 taskkill.exe Token: SeDebugPrivilege 1412 taskkill.exe Token: SeDebugPrivilege 1824 taskkill.exe Token: SeDebugPrivilege 1524 taskkill.exe Token: SeDebugPrivilege 4696 taskkill.exe Token: SeDebugPrivilege 3384 firefox.exe Token: SeDebugPrivilege 3384 firefox.exe Token: SeDebugPrivilege 3232 412c7a14e9.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
659a28dd5c85f4482c3818467461f372.exechrome.exemsedge.exe722380e476.exefirefox.exepid Process 2156 659a28dd5c85f4482c3818467461f372.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 728 chrome.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
722380e476.exefirefox.exepid Process 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 3384 firefox.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe 2196 722380e476.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3384 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
659a28dd5c85f4482c3818467461f372.exeaxplong.exe1574073ef9.exechrome.exedescription pid Process procid_target PID 2156 wrote to memory of 4084 2156 659a28dd5c85f4482c3818467461f372.exe 85 PID 2156 wrote to memory of 4084 2156 659a28dd5c85f4482c3818467461f372.exe 85 PID 2156 wrote to memory of 4084 2156 659a28dd5c85f4482c3818467461f372.exe 85 PID 4084 wrote to memory of 972 4084 axplong.exe 91 PID 4084 wrote to memory of 972 4084 axplong.exe 91 PID 4084 wrote to memory of 972 4084 axplong.exe 91 PID 4084 wrote to memory of 4672 4084 axplong.exe 94 PID 4084 wrote to memory of 4672 4084 axplong.exe 94 PID 4084 wrote to memory of 4672 4084 axplong.exe 94 PID 972 wrote to memory of 728 972 1574073ef9.exe 99 PID 972 wrote to memory of 728 972 1574073ef9.exe 99 PID 728 wrote to memory of 1688 728 chrome.exe 100 PID 728 wrote to memory of 1688 728 chrome.exe 100 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 1632 728 chrome.exe 101 PID 728 wrote to memory of 3600 728 chrome.exe 102 PID 728 wrote to memory of 3600 728 chrome.exe 102 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 PID 728 wrote to memory of 1364 728 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\659a28dd5c85f4482c3818467461f372.exe"C:\Users\Admin\AppData\Local\Temp\659a28dd5c85f4482c3818467461f372.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\1001737001\1574073ef9.exe"C:\Users\Admin\AppData\Local\Temp\1001737001\1574073ef9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbae2ecc40,0x7ffbae2ecc4c,0x7ffbae2ecc585⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1856 /prefetch:25⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:35⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:85⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4524,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:15⤵
- Uses browser remote debugging
PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4248,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4228 /prefetch:85⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4800,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:85⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4704,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:85⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4528,i,3324183068526972031,5118544086695726324,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4424 /prefetch:85⤵PID:2088
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbae2f46f8,0x7ffbae2f4708,0x7ffbae2f47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:25⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:85⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:15⤵
- Uses browser remote debugging
PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:15⤵
- Uses browser remote debugging
PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:15⤵
- Uses browser remote debugging
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4420 /prefetch:15⤵
- Uses browser remote debugging
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:25⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:25⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7542245640881944642,1606199584335860584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2632 /prefetch:25⤵PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsDBFHDHJKKJ.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Users\Admin\DocumentsDBFHDHJKKJ.exe"C:\Users\Admin\DocumentsDBFHDHJKKJ.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\1003616001\784ebe8352.exe"C:\Users\Admin\AppData\Local\Temp\1003616001\784ebe8352.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\1003617001\c82fa1a92a.exe"C:\Users\Admin\AppData\Local\Temp\1003617001\c82fa1a92a.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\1003618001\722380e476.exe"C:\Users\Admin\AppData\Local\Temp\1003618001\722380e476.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2196 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:3452
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d8beb0c-92a9-48f7-bb16-22f8ccb7969a} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" gpu10⤵PID:1796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb7cdf0e-4c36-4fb0-80ce-0e6dff52e3ae} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" socket10⤵PID:3396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2740 -childID 1 -isForBrowser -prefsHandle 3372 -prefMapHandle 3220 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4aab69f4-56e4-4b17-9bf8-6e0e0073c20d} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" tab10⤵PID:112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3968 -prefMapHandle 3964 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fb892b0-de29-48f0-81a1-c6e3a3e108f0} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" tab10⤵PID:2444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4568 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4508 -prefMapHandle 2792 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1970d14-387e-4e8d-b468-5b3f0ae7d708} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" utility10⤵
- Checks processor information in registry
PID:5432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 3 -isForBrowser -prefsHandle 5492 -prefMapHandle 5460 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5672e33-10bd-4c5b-962b-6dccc7f2a452} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" tab10⤵PID:5420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 4 -isForBrowser -prefsHandle 5748 -prefMapHandle 5692 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9113c66b-dbe0-4c64-b60d-679aac8fdf0e} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" tab10⤵PID:5376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5732 -childID 5 -isForBrowser -prefsHandle 5888 -prefMapHandle 5892 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0613410d-cff0-4562-b61f-70400da60dc5} 3384 "\\.\pipe\gecko-crash-server-pipe.3384" tab10⤵PID:5352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003619001\412c7a14e9.exe"C:\Users\Admin\AppData\Local\Temp\1003619001\412c7a14e9.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001738001\cfe378ae6e.exe"C:\Users\Admin\AppData\Local\Temp\1001738001\cfe378ae6e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:368
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1344
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3352
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD535f893efc1c7be82496b61fc231b69c3
SHA13a85a7b51727eb3f352022747a28d4c45884b60c
SHA256b051eb7b5d1f17a70562c66d2d96964b0eb88d5d7f2f4244dd76cd19b744a440
SHA512e4c5c861e317653958be181f579f2f4512c4de86aad0652625e7c1c98830d0e76a5a9ad1d8b2c3e26a850f20fd45f00147044b6d906e3fdc68902ff0fe490953
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
150B
MD5ceaf3f2b248a9ebb2b2eeae817406bf1
SHA1751964f23f2e07e991d1d9da4a2001270662e9e3
SHA256a926208ca238259e83fa5d82bdb128c2f1e54267346f9ec74322ce8a5c656b42
SHA512618b88f83c0a0a899c21ff02d1fb6a486b0ecb59a2c51f6f09769ce8be393e49d0ed766938ce9bb044aaaface03d653c76467609420a0fb344b6b66945edb94e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\202669c2-ab3e-4f0d-ad36-cff49b1dc56f.dmp
Filesize830KB
MD5446ee7089e794dad53027a0172ebbda8
SHA168bc512da45c93454c06ad8369365a88ca2191eb
SHA25613c79916a41cbbd1de3f07d515c0a5c9213aed1179ac6efb933c6843190ad70b
SHA5128d3ba968fc591442b8c2cc4419dc2d95ca35bacb1e899cce61f5adfed2e22079890691f7f3ade23d4bba4101c8a16766ce230fcc496bc008c811c045ecc28bfd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\e2a17ac1-e078-41ee-8d4a-2375f4c1daa1.dmp
Filesize826KB
MD55a7b9a2db907597618d1685aae3fde48
SHA1f526a2290a20dc7896506c0676c8457ad7ab9010
SHA25666ffb7583990fa264971ad80db2fcf846d3f5bd465c326daa18f9f470ce89971
SHA5127f5893896a8ed592c3cfab101c05ce6ecec9716769e5222f0fe65fe51d87307f3d4d05b129d3f123330ceb2bb0bad162a305a317886595af3958a10ad4e5e76b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f6d95afd-5fae-4e5b-bb01-979935577ad7.dmp
Filesize826KB
MD5c5c29b18dcfe09ac4e0cecbaebca4223
SHA167e2956b63383e89b58ade8f535ed146d0b7c4cb
SHA256df11a970c67e227733f21718f77ea21162960226e6953c0c23ebdde515f32a95
SHA512c2246edabbd36afcc26d383579c1c757dc00dbdb101f30059d369f8b358ed2848fb470106cd601aaaaa1056c2dbdc383201204414ae2dfdd82f022ab15434147
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD54a2771d47a4d92e21d718b191f732b88
SHA1664bd2f66df5925e0a506f3a05b00ac7036750d6
SHA2564bc281310b7d0b2b4e4e1414238dd9f388e04b523e42f5218ec123eea2e98d57
SHA512a0f511de11733ba5213e408aca3458e85c8d01b374527e7a96b2f53d100ad47df27e989e2134a231508e55aa3668c74d883b9f6c8b12c810efd2589177836dea
-
Filesize
5KB
MD59238e1437b6b87c0c144d0e4274e652c
SHA119b6160547ca223330e0b624b823fc22e21260e3
SHA256c861d15390676edf8a076fcc18c9b6893df03de9b6ff3a44a59103d33a213710
SHA51285ad5bdae6f9062528e38c88a6cb2855e04502ad5aadd3ca1c971dc02290aeda30e31062215d76bf99be9669b729f266b705cf34fc712195c0026192f901175c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b35f915ca2e0e9d6cfc4eb0e3ff34e3f
SHA1665a3006030236c676601ee97aab443d39f651eb
SHA256ca7f2e92e6f1cd5d3adc992120744761bef410537b8586f45d959fb8f666eb4a
SHA512118db70db2186ec6e0638044dc6f47494ef25875cc99c94a0a35a4bb5dfaa4e485934c5eafefb233c997ea03ed5544c9581a41dc320b2b1267feff761aefe1a8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5f814b81c08aacd6223b2f3da9d7f075f
SHA198f289c73e48ba53642e538ae66b100a0597d1c8
SHA2567f9fa33bf3843aaca54745dd6efc8e4f9f433239d197dff9d54ace81c806182b
SHA512d62939b9132e17f9cf6392ab28a9ea00975ebdac843c26515d7d1f39bc6c4e10044312269c37bd3e72507822dc337f2e3441f3c392ed91af59a07a5ec4a99761
-
Filesize
2.1MB
MD5060a60c50d1bf542196693a1981fd8d6
SHA1ca4c39fe59f290f19ae18c0542db63bf78f608a4
SHA25669d571654712d91c2f8609638335dcca2ff4e9246301cc51923f61715e9a90b2
SHA5123c2b00f9116bca043bab9e72a7a3cd381d277ba8068c11a9ff6b1b22d786a904a839a07bde32e33c6e6aae420e755113cd558ad87c9beb9d69adae7330a28491
-
Filesize
2.8MB
MD56e2c4f52317f80d158a5fedd04fed2d3
SHA1f9fe749527c3f7630a39d9e5db0df4b17df3bcb8
SHA2569279743466c28f2aa2556a38238cb48948e4715fb0d08807f7585f27ccf3c5ab
SHA512a1fc52510a9a3c15c90354d80ccb0af3b07621e232996c8c3e01629a6a2d6f5c2bf2ce9b4758e2f8e22203f23e58bf3a167f5ff97c7a617e1817d80602c695ec
-
Filesize
898KB
MD56010cc58ae7f82874ddf9dcace9c16be
SHA10cfe91f7210422d78435ee089aa706cea19cbb66
SHA256aa2cf058085a3a419c24e2af1d9fb669351fed4b09607832e980ec3e4b0a453b
SHA512bca89f6e27dba4720cec89bd502dba402171048a44efe5c9331398ef2d88713d16522fc0ce20ba81acabbf22bdaa02fa4639d1cb5d2ccea31065f8a42c5170b4
-
Filesize
2.7MB
MD5a8793bd11b447d3b40d7c11f1d803ce1
SHA1f06fac2137e0825a6715392db96c6609058f19ff
SHA256c51369d554807bcbd3ea1296da90f74eaf5a27139bde3cd27af5e4646f1b8249
SHA51272bde737a86397e6e09c2a6e36657019272693e84d4e77224ff34714f868b33be74ccf1d70c5de1d126d38cd52ff2f3db1a8b0c336132d8683102836bbfd841b
-
Filesize
1.8MB
MD5659a28dd5c85f4482c3818467461f372
SHA1a9f54c9aa53da8f3e8b47ab4ed4650b9e0df0f3f
SHA2561e0c279995b4cbe44ef6cd051ae88d31a3b8870663065439dfd05632deabd3fe
SHA512123c05cbc778406da4fab525c84fc8650c714826d8984a5de4753ccc17dcf59e43f4a2b48d16aa56d54466616f42d485e9b4307ce7a24fa56b1691064ec3c5cf
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD54c40076c18fcf00bfc5d0dc7733067f7
SHA1a18c0f9d1c35f9b4eb4aea3e28d180a3c44b8f9f
SHA256626738bee5dc5d6145fd562dc86ee2e1ec34f425d143ba714a1b17a65bf6cfa0
SHA51239b92cd4d98152bbb2b38a416503cb1138e924a90b370ad4121b7b4e4afd43de0f930974b168df76ecc65d54076642b66f483f39ed180db47a2fea283fdfc201
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize11KB
MD53f974b9e2d5fee4f636eba04d35266d8
SHA1605935a93ac963fa7d6d9b74a95e1bcfe1701b2e
SHA256e7d830ed7f2d1d5593f1d3d022c8daa9a097717fe51f6f80863cd7eaf5a699bb
SHA512d1ebaf7bbfec85c4048c1d2e43fa1a67f31ce7c3ca1650d34322b1922d7dc643299a44502bb37feebfe5ca6c63afa99edf6dc8750125b7a65473694662d8189f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e065746cac7e5dec564f5f7993ab5f50
SHA15047b9c4b0c4ee667384f6c245991d200911fcce
SHA2567cd76a36def420c1a57423fe2988723aa4d49d3b190fd8a17645da1dd1219b5d
SHA512f7aefd14ef549df6588e8c6a3d1c201a37597e1365789a131bb63366535a260d0181f5e7f7a0b3ba721f69656f71ba6174d9463a77424889fc8437579423a8bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a940dbef7539b7c35e6d45e2d36d54e7
SHA1b39823f37e6ef6c94ba1bd87c5997c9910ba8382
SHA25679a24b4c4294b9d343ba07728d7d0de6243da26c30b008cc921b4cf4a9653b8e
SHA512294f764919d535d42558c179ce9430ab4fb07e697d89ae3171cceee6b356e177e5ba67048d9464f6c7e6a9084a9e2e191962bf62e9c7e0613e73c91e686d32b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD577a230e503dfcd58fb81588ed8ef5430
SHA192f3cd1b3465fa3eace9ee6f41201ec92fea4914
SHA2566a5bf291a5d6617cde1d09b786363608d312d2b4940fb2e4756576b6ee3b096d
SHA512373e0a69ecf72bb11c43d7e8f2ea67611553e0eda33b1bee0f942d2684fedf3ff0117fee248881f84e742d8f8f649aafa248159ae745b2109da3bb4681bbc6ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ec9a1bba0baf3d6e1b714c718d624539
SHA1682f309b582f1361c4bc4cc9696df99726f9d292
SHA256918967df06cebf8368368c9f9603b9ed82aefe40d6ec1975a0c9f8d05db504ee
SHA51250affcd3f4bbba4519fbbfbaae680677d7ed32ebeab35cc12e3219516d4302e08cd02ed622e64702c3f5ce307f9c9665c0e1a0c4895171869ec102093a46accc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\05b5b6c2-750c-4865-bfc7-7e642967a1f7
Filesize671B
MD521bb8fe31857d49b45926c2da31345e4
SHA180c623e2569543007f610346310e343e3a7ace14
SHA256dc65eb89100aab9bed5a016f494335c474f2e664c874a6846a8d858f414fdc0e
SHA512b7f8953fa9ecb29c2347f61d933bd2d429beabe976006a65b1008ac7e51e5d6e75e33db0b52a4a0e86a006a601a872a0a42898029b480be4e87258584dbbddda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\c65f1723-f71e-4037-b2f3-ba3795c635a9
Filesize26KB
MD5e73b95135439e96e338647543e1baac6
SHA12aea173a169d81c9e6ba7b8e1cd0724a81dec3cb
SHA256faab048a74f7e2fe07090c2d989a97902230862b2e324f8f14102e63d26bb6a2
SHA51293eb5844861b0ae2c8ef5b4750b84610f4894429d5a52df2130948604059bc0df777f75773f1f9ae9c6fcb46ebb73f44654ccba43957818b3bb5b7e0de84a1cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e4e53d28-4d40-4f9e-b6cb-026e154eb74f
Filesize982B
MD5f43d3076c276f2e26221c67b65cd0e96
SHA1e273b868dc85c79776b4d1e5bef1ecf3ec71e3d8
SHA256fb89fcd81453fe3bcee9306c41bb88a23fbe09618e99d9d1808f5867cc139f30
SHA5122f8ef043ea0488b01d55d966bd800013f492c65676230c8c7f066fd964f2780b82e4c7c91f06e8f43592caba7d35c584ec5815a8102caf943d91f3e53ae9c787
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5185f10268f2a0546f6bef5355ae57ba4
SHA1b8f245e7e444edca6ad1086b63558fbcca6faa5a
SHA256f28e22b07e6d3a7c8b20b1c6836e27fe72aafe3434df1a593349d23d057ac2f9
SHA512a215fa888efe28aab8dc4ae11f2faad028be6a0cf139ca209d5c1eeca3d3ab3f5427384029fc8513943652f7dd6ee1f1c8cea8b939a63db40da9ac64af7e540d
-
Filesize
15KB
MD5001bf013da061ceca1305246d77365f6
SHA1322a7dc7e4d05dfe28c9d7f1d5fcd3abf06a82f2
SHA256400193070f7c551abf5ffe8c61f13f4868b2dcdc76069014ebef90a5fd6172dd
SHA512061c12c090b116267c9acbc2028bca1d6e1d55d3a46e693bf01537ba9e5d3e3e2c64bcbc521db9b193bb0525b78bbe9dbd9175a0f126ed2e460d3532348d3c92
-
Filesize
10KB
MD5525fc666fa1da786e1984d3b97c3aba4
SHA14129e44a9827ed49a029bfd1c2912da311f048ce
SHA256077f4eda7798354a4e06f4541646acf65d37609e21a4a58376a857d412056b34
SHA512b7e8e3cbee2cc696c5ec9a1ca5a0b2af101beecd499b4b278e36551a70ea650ab6bba8e3eeb4a59c5b763c54d2b93c1b9fb20a076d72185b3ae2cad3bf82a048
-
Filesize
12KB
MD59216b1287d6e9fa86b05569f28e819a4
SHA12ee9d7f4b7af07db30250496ec572ebe1f35fece
SHA2560fef53f92323e4366358ea0a7c05bdd7d31a87792b6945c29bad80345da71e6a
SHA512b4a933de26a3b9784f5ba967eb7ee7b390aedcc625d421afb6ecc147f3daeff415eae64a79e405c912d1a34ee0b803c9c4fddf469092a8722049077864974af1
-
Filesize
3.1MB
MD51582a0bf12e8fa3d52e9da870dc0ea38
SHA110d023b873d6d341ed6133b7f2b32663e4293edb
SHA256eb9528f3e318dc98e7c37bc977f096b5a77ff5e95ceeb7095926fa988466c08a
SHA512eb7a2bae0e51fa3aebf1be98592aecedde76b3da8c7a577e31476a60424533611a0d01221598c6ab0eef0c3582c241d2f33942b615585230ba94955693457528
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e