Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
a81ebe2f3d7643056a33f3ff671626b0
-
SHA1
b6940c2609eb47b8579dc1ccc983ab42b14ada07
-
SHA256
da6390e0e3971f3acc3e14d20822d54fe6a893c4a00a588efafeff55240e4b2e
-
SHA512
9e2fdf99391de91cc8890652bf0d050cddd091c6cd0343f1e8d91d0301b2f5a55009c277dd718a02687ff7c061452ff42f5d9b2e70f765102f4d25ad66642e6b
-
SSDEEP
49152:QKbODzsO727BACWwis1d2yXDdOGuxnOJpSMjjH4:Tks3BAC9l1UyTbqnOJ5jjH
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6c12ffd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6c12ffd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6c12ffd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6c12ffd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6c12ffd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6c12ffd16.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab79dba669.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6c12ffd16.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54691fd985.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90c36e07c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsKKJDGDHIDB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae79cd1bc9.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 448 chrome.exe 2000 chrome.exe 5564 msedge.exe 6016 msedge.exe 6024 msedge.exe 5252 msedge.exe 5368 msedge.exe 1036 chrome.exe 3260 chrome.exe -
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6c12ffd16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6c12ffd16.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54691fd985.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90c36e07c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90c36e07c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae79cd1bc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae79cd1bc9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab79dba669.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsKKJDGDHIDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab79dba669.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54691fd985.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsKKJDGDHIDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 54691fd985.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation DocumentsKKJDGDHIDB.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 888 axplong.exe 3420 54691fd985.exe 1744 90c36e07c9.exe 5296 DocumentsKKJDGDHIDB.exe 2076 skotes.exe 3140 skotes.exe 3416 axplong.exe 808 ae79cd1bc9.exe 5300 ab79dba669.exe 5208 8d6831a32f.exe 5976 a6c12ffd16.exe 5476 skotes.exe 1056 axplong.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine DocumentsKKJDGDHIDB.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 54691fd985.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 90c36e07c9.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ae79cd1bc9.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ab79dba669.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine a6c12ffd16.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe -
Loads dropped DLL 3 IoCs
pid Process 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6c12ffd16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6c12ffd16.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\54691fd985.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001818001\\54691fd985.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90c36e07c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001819001\\90c36e07c9.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ae79cd1bc9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003778001\\ae79cd1bc9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab79dba669.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003779001\\ab79dba669.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8d6831a32f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003780001\\8d6831a32f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a6c12ffd16.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003781001\\a6c12ffd16.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cfe-485.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2292 file.exe 888 axplong.exe 3420 54691fd985.exe 1744 90c36e07c9.exe 5296 DocumentsKKJDGDHIDB.exe 2076 skotes.exe 3140 skotes.exe 3416 axplong.exe 808 ae79cd1bc9.exe 5300 ab79dba669.exe 5976 a6c12ffd16.exe 5476 skotes.exe 1056 axplong.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job file.exe File created C:\Windows\Tasks\skotes.job DocumentsKKJDGDHIDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab79dba669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d6831a32f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsKKJDGDHIDB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae79cd1bc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54691fd985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90c36e07c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6c12ffd16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 54691fd985.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 54691fd985.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3512 taskkill.exe 2856 taskkill.exe 5664 taskkill.exe 6132 taskkill.exe 5368 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133751664955722233" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 file.exe 2292 file.exe 888 axplong.exe 888 axplong.exe 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe 1036 chrome.exe 1036 chrome.exe 1744 90c36e07c9.exe 1744 90c36e07c9.exe 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe 3420 54691fd985.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5812 msedge.exe 5812 msedge.exe 5564 msedge.exe 5564 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeShutdownPrivilege 1036 chrome.exe Token: SeCreatePagefilePrivilege 1036 chrome.exe Token: SeDebugPrivilege 5368 taskkill.exe Token: SeDebugPrivilege 3512 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 5664 taskkill.exe Token: SeDebugPrivilege 6132 taskkill.exe Token: SeDebugPrivilege 6072 firefox.exe Token: SeDebugPrivilege 6072 firefox.exe Token: SeDebugPrivilege 5976 a6c12ffd16.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2292 file.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 1036 chrome.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 5208 8d6831a32f.exe 6072 firefox.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 5208 8d6831a32f.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 6072 firefox.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe 5208 8d6831a32f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6072 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 888 2292 file.exe 87 PID 2292 wrote to memory of 888 2292 file.exe 87 PID 2292 wrote to memory of 888 2292 file.exe 87 PID 888 wrote to memory of 3420 888 axplong.exe 91 PID 888 wrote to memory of 3420 888 axplong.exe 91 PID 888 wrote to memory of 3420 888 axplong.exe 91 PID 3420 wrote to memory of 1036 3420 54691fd985.exe 95 PID 3420 wrote to memory of 1036 3420 54691fd985.exe 95 PID 1036 wrote to memory of 3500 1036 chrome.exe 96 PID 1036 wrote to memory of 3500 1036 chrome.exe 96 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 1004 1036 chrome.exe 97 PID 1036 wrote to memory of 2372 1036 chrome.exe 98 PID 1036 wrote to memory of 2372 1036 chrome.exe 98 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 PID 1036 wrote to memory of 3412 1036 chrome.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\1001818001\54691fd985.exe"C:\Users\Admin\AppData\Local\Temp\1001818001\54691fd985.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe594ecc40,0x7ffe594ecc4c,0x7ffe594ecc585⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:25⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:35⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2404 /prefetch:85⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:15⤵
- Uses browser remote debugging
PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3956 /prefetch:85⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4516,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:85⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:85⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3160,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:85⤵PID:5296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe594f46f8,0x7ffe594f4708,0x7ffe594f47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:25⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:85⤵PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:15⤵
- Uses browser remote debugging
PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:15⤵
- Uses browser remote debugging
PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:15⤵
- Uses browser remote debugging
PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:15⤵
- Uses browser remote debugging
PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:25⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:25⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2556 /prefetch:25⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2348 /prefetch:25⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4172 /prefetch:25⤵PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsKKJDGDHIDB.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6104 -
C:\Users\Admin\DocumentsKKJDGDHIDB.exe"C:\Users\Admin\DocumentsKKJDGDHIDB.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\1003778001\ae79cd1bc9.exe"C:\Users\Admin\AppData\Local\Temp\1003778001\ae79cd1bc9.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\1003779001\ab79dba669.exe"C:\Users\Admin\AppData\Local\Temp\1003779001\ab79dba669.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\1003780001\8d6831a32f.exe"C:\Users\Admin\AppData\Local\Temp\1003780001\8d6831a32f.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5208 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T8⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking8⤵PID:6052
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6072 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac26325a-5a16-410b-aaed-1d6c6f787874} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" gpu10⤵PID:4620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19f0bc17-82e6-4010-8148-3aa59edbbf12} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" socket10⤵PID:4968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 2900 -prefMapHandle 3252 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54a3a364-2c6c-4ca8-9a2d-af7ddc9a4cd3} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab10⤵PID:4564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 2 -isForBrowser -prefsHandle 3640 -prefMapHandle 3636 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57bbb041-3c60-49fb-a01a-53dafdf767ba} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab10⤵PID:3820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4560 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4668 -prefMapHandle 4660 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e5a76da-01ca-47bf-b918-e808b2f1e152} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" utility10⤵
- Checks processor information in registry
PID:5776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 5248 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcd2749e-46ef-427e-9e64-e3cf47a2c148} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab10⤵PID:5992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5392 -prefMapHandle 5388 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0824979-3d93-4514-a93d-aac5a13ae15b} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab10⤵PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 5 -isForBrowser -prefsHandle 5704 -prefMapHandle 5708 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {074b72bf-c39d-4efb-ae6e-e86642dd232f} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab10⤵PID:5688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003781001\a6c12ffd16.exe"C:\Users\Admin\AppData\Local\Temp\1003781001\a6c12ffd16.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5976
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001819001\90c36e07c9.exe"C:\Users\Admin\AppData\Local\Temp\1001819001\90c36e07c9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3140
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3416
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5476
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD58b26ec1dab6bb247d9b7132f384ede70
SHA1e964fccf66498e9da15f5471dca18cc7522dff95
SHA256bf010962c3fd7929317fafd684bd3b4f990ece8b58a52171280254c9d3113cee
SHA5127fd538914252d293a03dfc082c5fde6d524457d5f35ab7a00a628ed9563b369ed70a55bb90b173a36ad90456f4b10f0068894cd59cb7f9caf8e891c996e98699
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\188cd604-f487-45d9-9829-febfc3c8022e.dmp
Filesize826KB
MD57d349af2fc9ab6a255afb61f7176dc35
SHA1e41c75b2afec338ac3d43bda8ed9f5a773b655f4
SHA2563a79778584719b7e921c5084496401ebfafb5f7deeb908545f85e89985d36590
SHA512f872df4b38b574ec4a188e6adbd74838c2046f13dc8951e80306459d2ac5570ebbab8115802e7b13523e37231247307919382b7057fdebb33023f8ae15c781f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2a087a26-707c-4633-a814-379a5fcb0943.dmp
Filesize826KB
MD576dce7c48f2245f34226c095cf657647
SHA1a0cbeb2dfbdc66d75a3b343121cb751fb7a7a0e5
SHA2562e04db9512264abadde5f543ae71fa3b8a070ea700da36925e72465314250047
SHA51260160706df24d01b7d7eb04494e4aeb2b152bf15590261be007716562f3b6b1cbbccd6aa344f78eb49a704916becd2715a0ce1ab54c6754f8590009189ab7a6f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3bd32a95-9f7d-416d-a70a-649cb497ef40.dmp
Filesize826KB
MD57847791ca45fa955e00cecdab663f85c
SHA1f67aeb3796857253496498dd6ae2838af835fe32
SHA256597f670fe1d199047232ca34821c6abfca99c42a4c729ca756a17e949d6f22a6
SHA5128ab70152df69ce82f6ae90421095986838977ecc32775208eade484833c464e1841c99dda7d2fed7e06caddc98fe1f349d492fe3562beb4039db711f6b0cea04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bfc3ff03-fac9-4ba1-bf1a-4f8466aba7ad.dmp
Filesize838KB
MD5435cd781811b5d944d3e8de31af394fd
SHA1bbe7f6b4cda1143e940cf57fad589cb834d114f1
SHA256987026a6114d9651af2f7bf6c508ec131c41d6ab7ac226858e67bc2f1b6edfa5
SHA512d1be8a121c98edfc610ecc2ddf03eae23e2b73b60be08cec5ca442b2efcedd157721cf085d01cbf434ac89733d7ca76402e909fa082732c5d9a0edb9433b340a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c9473aac-5d8d-4ca5-9a22-43e1ec923784.dmp
Filesize838KB
MD58709f5110697112320d22273e53786f5
SHA131280b2fe1f9bd8ef29202f2788b6d1e58b43d02
SHA256fa08d8656ba71f86df0e3b59f31eec813b151113f4afe22c8c2d28db0a6b9ef8
SHA512817a6668266a94a2e3660b4aa0b014d58e63ee21963da8fa6af1e3b2055a8ac85148a0ce156edf376296fb882efd32504f49aab6911a6d3b306a4d0b6e1d908e
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD53e4cce500651abdcd5147c0c65d3605f
SHA13662b506921eb9d1feb958c77c3ec1920a5b195b
SHA256676bc062541db16ecb4fb12ac38312cfe8727ae19b895096d8b8bfdf369cf450
SHA5123ef85af064db28c3adc78da6049d2906bc62c5e24d779fe7e983770f90b7e1524c8613c4e4cc68f7be8d246a34011bbab9d5a80d04bd9b0026e22024bb7bc37e
-
Filesize
152B
MD5d660babd5aa981a6b034c81092490b57
SHA1a6c923c0d4018c6f9c332d55ed6a999d7856bcc7
SHA2564825b7b479b335281f124b2ea1b834f37922c8003b1a2cf0e751a0981f843c2e
SHA512c8ceac3154db8f8788478576407e38278e8351fde07aea7e12613e0d85794122c89299a532159c76e77225c488e3a6b1052101c01b00b8319aef6df2aaa82d1a
-
Filesize
152B
MD55b64f3207429c474bcdc88a626e31f72
SHA120b3a0679d722660c61480c997b7ecd26d449422
SHA2565bfb98972b0f7fea176fcbfa7cc2b36e2eed7446021a8857d271f6fd7392adf6
SHA512ffbb5168de2153eb3127f91a78192752ee4da7eb52d67190692f368bed50b34e52792f96fa33c223c76e30089e16f374823d678bb5676f08c95ad961eceda186
-
Filesize
5KB
MD5e0303fe083b156562caeb17e8ff3fe4d
SHA1edc41b64cfb33b7867ed7ccf0bb161ee8b4f258f
SHA2569023ce38015cc3d4901b545a752c326c1efe935ecbed40ace483390452db8fd6
SHA512f04b49cdc5da83eb6c2b91a99bd1782d207aa345bdfdb0814a374af35b25f02783f521a30f156636c2e888b505eaf47f74c1166babceb0e8ad78c4b3584c59d5
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD574d71a9d053b1a8433a74271f5796b70
SHA1fa14378e3e2c999af85f3907b61a7c75bdc9b6a3
SHA256337cde37d2b3a2bf556d8255aa0dc3e4c80df130fd3ea91db08914ef4026efe6
SHA51299aaff2525bea6b87c1fce0f1472942929ea2c883d64512c7605ec320c1abc8b27a5e23c6b2f41502185975ccd63d2009814953fe612b672effca5eb63a12e4d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5db966b49b93ba953b718706269f4445d
SHA1520964f43196db036455e5d520678a14301a054d
SHA256e4fcda75e92523d05f0dce38c16273ea2a8727428bcbead3da51ba3523be6092
SHA512f45e44d922dad46f39bcc6081809b7080e2e4593c81f98ea322c99b46381723ca019464c112dd0ed5789c9b66817f84fed7b85cd48f3bb1b7a2f95310e2999c8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5388c949edb61dc81cf87cc58ca2360a8
SHA1ccdb85e418a07f30e249603be99c835ed017548d
SHA256250abcd92cb5296e6b19e6bce0750f941bc2870feea43fbd1b451ae2157e0147
SHA5127d4043c61f3e0a1c815f69e7a369f4802451748992c4f336bbf1c1c3629b24f01a396fa4b03725b3b38b866e1324a579b3fdba1702ab02d65b02303906a7ff6f
-
Filesize
2.0MB
MD57a7b151acbff6469cd2ace366a9317e6
SHA1de52d683649a73ab42b11ac334547b3b08d916af
SHA2569bd047162a8d770bd1e58f35aeb0060922c54d113c485fd4a077e138413d9e8a
SHA5129f0fc2d2b3f1d915446c73b4aa44dd4cee13f72d523cf08346178580e4ae970facee15c3aed4d946ca509ff49486a4e1c646674523d6da44075f8866e75a2811
-
Filesize
2.8MB
MD5df063d639509985ad55ecb88e1996ec7
SHA13d73ee7a250748a19a79f432f1f6f04d94cbd69b
SHA25618b0c50b7c874affa1f17f79d68db8fc8f51c2bbaca1a4e8ace5d6ee2e7e7b1a
SHA512005acbe97bed3d800aac04d151ac4f7a7122ad336125925a6c65c3e485ffdce7c12b5f15a86cf58190cf9df8e7eca351e8dd4305f64385d655a96113beedc541
-
Filesize
898KB
MD55b0a2ff070bb7ce5d571d25c7551b002
SHA11ebc1b0e42001aeeed5b70da38aeb069a6ffb30d
SHA2564e5b0242f3baf767f0d143c66043159f8064b6a83b74189de1976e025bff0d79
SHA512f8fac592b5d9a69a0304c25e38fe3540f96c2adf83c3a28fcceb6631546b87f56179fd87a54a3fb5ee23e26fe0a0165b898b3dbc62b5ddb0054cb62282b55132
-
Filesize
2.7MB
MD564f5f2474816a039d95c700e760f982e
SHA14bbba0dd55802404aba464eb77819b30284ba33d
SHA256a0bb58e919ed3cbdf13a85b4cede776e2a70b95b9882f4cd161a4c1d66d70fd8
SHA512e90841bd5ed7d0cab072b890b5551023793f383b305909d8d342c5ee7d29f3b5c0f2c2b0dbda235de5d1d53f31c105bf879fb06cb50aef78c483f68b35cf0c24
-
Filesize
1.9MB
MD5a81ebe2f3d7643056a33f3ff671626b0
SHA1b6940c2609eb47b8579dc1ccc983ab42b14ada07
SHA256da6390e0e3971f3acc3e14d20822d54fe6a893c4a00a588efafeff55240e4b2e
SHA5129e2fdf99391de91cc8890652bf0d050cddd091c6cd0343f1e8d91d0301b2f5a55009c277dd718a02687ff7c061452ff42f5d9b2e70f765102f4d25ad66642e6b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD566e7ec0ceec8d586eef7d63d20ccfbff
SHA148e7b69ae2df535075909b648e23f87d73019ae7
SHA2568d7584108ead758215df83fc9de30b2d87816279807301a82ed511e02ad1723e
SHA51281639b29d5405409b80bba6753499852b147ff975c725f5c9ea61b306ce4f4ef8f1fb551006839db083f8f03020bfa5f043be40974e2f90d7c3cf4faa6ab08c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5229092799b9ea5e1f95e3c5b9fd698b5
SHA168893b5e1c5e48ac228dd5648611609aa6afa6ed
SHA256a37fe0504ca340062e4690d415f0bdeefec9f9e294ceeb2158fb2f228008fe2f
SHA5127ae3b490e28bf4b0ce52b3996b8b2bd3b6c162af1a3e362e1d8437d00b7259e47f007a23851a920f363b527deec21367a64e8ab8d894724e60f8880eb50a76cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b8234226c31db2b799bf287c44f02c58
SHA1a48d2c7882759d836e07478c72e5e4c7512fd640
SHA2560c569493c6f0d38bbd3c9a3c63751f901887eaaeae00355f926f987e0ef9c97e
SHA51234c8d5e40ebaafb9e21b01d4355db0ec5a13358d84570e82fa4757375519000fc132578c7130b1c16c931fa01784e4f47d6a513fc573ac32fd61c5f54785ed24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52ab20863a6e383d794d05d369ad463c6
SHA1de85c017a952c5348941b47b89fd935e77012278
SHA256650f291c1a88c90175cef8aaf61a6a821d9e0625b538da89f10d14ef93a1c67c
SHA5129554cb00ba1efdd08e397e843f0084e063648273648f6648cd19c001d8e9ab4020943813c6fe6d5546fcfa5b3e67072fb07d8883f1bdd9a05b83a15866bd7adf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56cb8f0c213167b23e9fc19e16d1a03c3
SHA10c51de2dd9f6e892bb1faa74dea0cfe7cf782e7e
SHA2560728cc1759c4abe2382d6fd9144c907abb49ddd98d1fb192bce5bc50a1a882e5
SHA512233bf1f3c3c15a5c881b1adfbbacbc07938f664101d911e705934a094cf1ff3ce882aea4b493852ce8d44594f1c575849da93ce50897ecd2c97cb1b6fe1bfb93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a8d2d57f-3b57-4541-a617-f3fb363810ca
Filesize671B
MD5928b885248da76f1bf47147c3333e882
SHA119ef2cbadb052bce24264823310bec6043bf8de9
SHA256ca25d565c36d953271d50387f18247d9a0e11dab87ab12e5b3303174a6e791b8
SHA5120c3b954ed03faf1326f39e3d185148db5681efcde2c444283144ec482984205b6b05f7cb71c93fa3bb40cdac2fae0376fbb0fa44814475468919280b48dc9975
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\cd698a42-f736-47df-a239-be4649081a73
Filesize25KB
MD5c0839e1c1cbee54be112a6973f8b4e69
SHA17fb0d528405d57651515f1df11babee6d23587fb
SHA256600ecd91406c25b9797609eb4f7397dcddc25d2c6a6171bc3a6e0c69d9e2457b
SHA5128a6f874bd3ac2f79b5c5c8843f0dd7d0f1f8205127f9c0cd9ffadb3b4051e158d8a8ea3bcc1d0b57c27d1556e2b7e76fa4a7ad2e69b4f73d66eed781a278c685
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\ffe69413-d036-4d12-9df1-8bd40e38bb8a
Filesize982B
MD58bfb184d4185b9092399e64462991d37
SHA13969bceb720b4e0a0e8999128ced75ad599650bf
SHA2561929d12befab240897db305d2bf01291f3748eec6197b7619d41b8b307f33b58
SHA5122bebb1f5e52009314796b681ff86161f2b4574d5db640a290bf4bd34e4080db11f201a95f2c8aa9f49ef1c126a26069b17eaf7cc0b66da8a06e1e909cc0f48d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD532c9ba9cfb4d2cb59d0b98f204b2e745
SHA1592cb1df92ccc32fe93b9ab7645c0b8be5145a3d
SHA2561f9be894bc94be11c08509a324ce0047d9149fc128c81b2d582c57fea2c1b582
SHA512c0703744b41781181bb2cb293e774d565f32cab6d99f2c8404714c594fc49647f582256b93e361eb542e5e68311887a96121ca8fe9f773cef9357bc22e36c001
-
Filesize
15KB
MD5fdca8cbce5acde0c40b4dcc66cb52a80
SHA18ed868dc050c03e4f8919ef5eabf1b7669238849
SHA256abd79d9719fb81b596e64d513e3d905682c4673e23debdcd954bfb11be31503c
SHA512e97dd39f18fc2197bd739af9103fb5a68f1aeb51e799413571133b281831b0896cc8f08bab3b2042e779324353a348fba8ea4bb2421ffaf04dd4f57d782ad4a5
-
Filesize
10KB
MD524d17de96ca19551cf93ac067d723674
SHA1d7dc7bc050803cae5ddc533ba04758fcbc125a3c
SHA2568f9144192305c77d44cd2f06b01471b90a8c56c165b90770b89b279eb7d4e301
SHA51293288b1404bb596220791e972a3f28a6edff0da609382178a08f9d2b41cbd2562cc34a1b2d78728d3baecd4fed7f4d976a61200b1fa818d049766977aba725e6
-
Filesize
3.1MB
MD5c9b431e11a92861c471d47467d66da24
SHA1c585271fbc82891004f361e9b86c0cac43b904d5
SHA256e1fcfa4324ed72ca1c563e4c710b8071ef07d06f3d3c99a1518c9707af23f7de
SHA512a4539e09f956f04084f159b047667a20cca79221861ee7b1110bcd60b454ba577fdcd0a1f312ee73271ab0f84c1602a8abbf308d93cab23a37afc012b5a76c97