Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 20:05
Static task
static1
General
-
Target
52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe
-
Size
5.7MB
-
MD5
bf1880424137bb4f4953ae6dd6600309
-
SHA1
48df32badd49c835b4ea075ff1dafcb8df9452cf
-
SHA256
52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181
-
SHA512
780fc2b8da38815fe4d31d9a20c3bdf4bed49effefc8792110415681671be32af7b1f085a6d553e3f74534baaf1c5437370ea6bdc75e033f2cffb171f49b1dc6
-
SSDEEP
98304:oRoJaep2/Zs+AKXEUovMEp1O8LkDJp9PDbxb8SJlaSdD0TtbzlaZAkKjiJgAkb:o6Jaep5KXE/vMzdJPpdaSp05bzlhkkYU
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/3492-157-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
2ed488aec4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2ed488aec4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2ed488aec4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2ed488aec4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2ed488aec4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2ed488aec4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2ed488aec4.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
3F58S.exeskotes.exe1u96i1.exe2G1337.exe31a8afa0d1.exe71f1bcf274.exe2ed488aec4.exeskotes.exebff84504fa.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3F58S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1u96i1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2G1337.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31a8afa0d1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71f1bcf274.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ed488aec4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bff84504fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 6068 chrome.exe 3596 chrome.exe 5572 chrome.exe 6156 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe1u96i1.exe2G1337.exeskotes.exe2ed488aec4.exeskotes.exebff84504fa.exe3F58S.exeskotes.exe31a8afa0d1.exe71f1bcf274.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1u96i1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2G1337.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2G1337.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ed488aec4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bff84504fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3F58S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1u96i1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31a8afa0d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31a8afa0d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 71f1bcf274.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 71f1bcf274.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ed488aec4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bff84504fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3F58S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1u96i1.exeskotes.exe31a8afa0d1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1u96i1.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 31a8afa0d1.exe -
Drops startup file 1 IoCs
Processes:
powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pbra.lnk powershell.exe -
Executes dropped EXE 17 IoCs
Processes:
N2A33.exee2p28.exe1u96i1.exeskotes.exe2G1337.exe31a8afa0d1.exemk.exe71f1bcf274.exebff84504fa.exeskotes.exe3F58S.exeskotes.exe4U203o.exe2ed488aec4.exeservice123.exeskotes.exeservice123.exepid process 1864 N2A33.exe 1616 e2p28.exe 4604 1u96i1.exe 4252 skotes.exe 2684 2G1337.exe 3492 31a8afa0d1.exe 1144 mk.exe 2904 71f1bcf274.exe 5520 bff84504fa.exe 5260 skotes.exe 3444 3F58S.exe 5860 skotes.exe 4600 4U203o.exe 6512 2ed488aec4.exe 6040 service123.exe 6204 skotes.exe 1828 service123.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe1u96i1.exe3F58S.exe2ed488aec4.exe71f1bcf274.exebff84504fa.exeskotes.exeskotes.exeskotes.exe2G1337.exe31a8afa0d1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1u96i1.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3F58S.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2ed488aec4.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 71f1bcf274.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine bff84504fa.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2G1337.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 31a8afa0d1.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 6040 service123.exe 1828 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
2ed488aec4.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2ed488aec4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2ed488aec4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exeN2A33.exee2p28.exeskotes.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" N2A33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" e2p28.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\71f1bcf274.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006043001\\71f1bcf274.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bff84504fa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006044001\\bff84504fa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ed488aec4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006046001\\2ed488aec4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U203o.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
1u96i1.exeskotes.exe2G1337.exe31a8afa0d1.exe71f1bcf274.exebff84504fa.exeskotes.exe3F58S.exeskotes.exe2ed488aec4.exeskotes.exepid process 4604 1u96i1.exe 4252 skotes.exe 2684 2G1337.exe 3492 31a8afa0d1.exe 2684 2G1337.exe 2904 71f1bcf274.exe 5520 bff84504fa.exe 5260 skotes.exe 2904 71f1bcf274.exe 3444 3F58S.exe 5860 skotes.exe 6512 2ed488aec4.exe 6204 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
skotes.exedescription pid process target process PID 4252 set thread context of 5860 4252 skotes.exe skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1u96i1.exedescription ioc process File created C:\Windows\Tasks\skotes.job 1u96i1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4932 3492 WerFault.exe 31a8afa0d1.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
31a8afa0d1.exeskotes.exe4U203o.exe2ed488aec4.exetaskkill.exeschtasks.exetaskkill.exe52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exee2p28.exeskotes.exe3F58S.exetaskkill.exetaskkill.exeservice123.exeN2A33.exe1u96i1.exe2G1337.exe71f1bcf274.exebff84504fa.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31a8afa0d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4U203o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ed488aec4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2p28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3F58S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N2A33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1u96i1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2G1337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f1bcf274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bff84504fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe31a8afa0d1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 31a8afa0d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 31a8afa0d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
msedge.exemsedge.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 868 taskkill.exe 6544 taskkill.exe 6720 taskkill.exe 6792 taskkill.exe 6852 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
1u96i1.exeskotes.exe2G1337.exe31a8afa0d1.exemsedge.exemsedge.exe71f1bcf274.exebff84504fa.exeidentity_helper.exeskotes.exe3F58S.exeskotes.exechrome.exe4U203o.exe2ed488aec4.exepowershell.exemsedge.exemsedge.exeidentity_helper.exeskotes.exepid process 4604 1u96i1.exe 4604 1u96i1.exe 4252 skotes.exe 4252 skotes.exe 2684 2G1337.exe 2684 2G1337.exe 2684 2G1337.exe 2684 2G1337.exe 2684 2G1337.exe 2684 2G1337.exe 3492 31a8afa0d1.exe 3492 31a8afa0d1.exe 2684 2G1337.exe 2684 2G1337.exe 4620 msedge.exe 4620 msedge.exe 1884 msedge.exe 1884 msedge.exe 2904 71f1bcf274.exe 2904 71f1bcf274.exe 5520 bff84504fa.exe 5520 bff84504fa.exe 2904 71f1bcf274.exe 2904 71f1bcf274.exe 2904 71f1bcf274.exe 2904 71f1bcf274.exe 5884 identity_helper.exe 5884 identity_helper.exe 5260 skotes.exe 5260 skotes.exe 2904 71f1bcf274.exe 2904 71f1bcf274.exe 3444 3F58S.exe 3444 3F58S.exe 5860 skotes.exe 5860 skotes.exe 6068 chrome.exe 6068 chrome.exe 4600 4U203o.exe 4600 4U203o.exe 6512 2ed488aec4.exe 6512 2ed488aec4.exe 6512 2ed488aec4.exe 6512 2ed488aec4.exe 6512 2ed488aec4.exe 4600 4U203o.exe 4600 4U203o.exe 2432 powershell.exe 2432 powershell.exe 2432 powershell.exe 6028 msedge.exe 6028 msedge.exe 1236 msedge.exe 1236 msedge.exe 7708 identity_helper.exe 7708 identity_helper.exe 6204 skotes.exe 6204 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
Processes:
msedge.exechrome.exemsedge.exepid process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
taskkill.exechrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe2ed488aec4.exepowershell.exedescription pid process Token: SeDebugPrivilege 868 taskkill.exe Token: SeShutdownPrivilege 6068 chrome.exe Token: SeCreatePagefilePrivilege 6068 chrome.exe Token: SeDebugPrivilege 6544 taskkill.exe Token: SeDebugPrivilege 6720 taskkill.exe Token: SeDebugPrivilege 6792 taskkill.exe Token: SeDebugPrivilege 6852 taskkill.exe Token: SeDebugPrivilege 6932 firefox.exe Token: SeDebugPrivilege 6932 firefox.exe Token: SeDebugPrivilege 6512 2ed488aec4.exe Token: SeDebugPrivilege 2432 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
1u96i1.exemsedge.exe4U203o.exechrome.exefirefox.exepid process 4604 1u96i1.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 4600 4U203o.exe 4600 4U203o.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 6068 chrome.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exe4U203o.exefirefox.exemsedge.exepid process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 6932 firefox.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 4600 4U203o.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 6932 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exeN2A33.exee2p28.exe1u96i1.exeskotes.exe2G1337.exemsedge.exedescription pid process target process PID 316 wrote to memory of 1864 316 52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe N2A33.exe PID 316 wrote to memory of 1864 316 52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe N2A33.exe PID 316 wrote to memory of 1864 316 52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe N2A33.exe PID 1864 wrote to memory of 1616 1864 N2A33.exe e2p28.exe PID 1864 wrote to memory of 1616 1864 N2A33.exe e2p28.exe PID 1864 wrote to memory of 1616 1864 N2A33.exe e2p28.exe PID 1616 wrote to memory of 4604 1616 e2p28.exe 1u96i1.exe PID 1616 wrote to memory of 4604 1616 e2p28.exe 1u96i1.exe PID 1616 wrote to memory of 4604 1616 e2p28.exe 1u96i1.exe PID 4604 wrote to memory of 4252 4604 1u96i1.exe skotes.exe PID 4604 wrote to memory of 4252 4604 1u96i1.exe skotes.exe PID 4604 wrote to memory of 4252 4604 1u96i1.exe skotes.exe PID 1616 wrote to memory of 2684 1616 e2p28.exe 2G1337.exe PID 1616 wrote to memory of 2684 1616 e2p28.exe 2G1337.exe PID 1616 wrote to memory of 2684 1616 e2p28.exe 2G1337.exe PID 4252 wrote to memory of 3492 4252 skotes.exe 31a8afa0d1.exe PID 4252 wrote to memory of 3492 4252 skotes.exe 31a8afa0d1.exe PID 4252 wrote to memory of 3492 4252 skotes.exe 31a8afa0d1.exe PID 4252 wrote to memory of 1144 4252 skotes.exe mk.exe PID 4252 wrote to memory of 1144 4252 skotes.exe mk.exe PID 2684 wrote to memory of 1884 2684 2G1337.exe msedge.exe PID 2684 wrote to memory of 1884 2684 2G1337.exe msedge.exe PID 1884 wrote to memory of 468 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 468 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe PID 1884 wrote to memory of 3176 1884 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe"C:\Users\Admin\AppData\Local\Temp\52af2843d7600137a6a9270453815eb245f156b8d29b67a7386f43bca161e181.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2A33.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2A33.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2p28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e2p28.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u96i1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u96i1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\1005956001\31a8afa0d1.exe"C:\Users\Admin\AppData\Local\Temp\1005956001\31a8afa0d1.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x168,0x144,0x16c,0x7fff6cf5cc40,0x7fff6cf5cc4c,0x7fff6cf5cc588⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2044,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:28⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1840,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:38⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2328,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:88⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:18⤵
- Uses browser remote debugging
PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:18⤵
- Uses browser remote debugging
PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,3458052108166903279,16064809248295458153,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4436 /prefetch:18⤵
- Uses browser remote debugging
PID:6156
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 19247⤵
- Program crash
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe"C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe"6⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pbra.lnk'); $s.TargetPath = 'C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe'; $s.Save()"7⤵
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006043001\71f1bcf274.exe"C:\Users\Admin\AppData\Local\Temp\1006043001\71f1bcf274.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=71f1bcf274.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.07⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:1236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd647188⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:28⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:88⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:18⤵PID:6884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:18⤵PID:6880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:18⤵PID:7488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:88⤵PID:7700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:88⤵
- Suspicious behavior: EnumeratesProcesses
PID:7708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:18⤵PID:7812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:18⤵PID:7824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:18⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:18⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:18⤵PID:6352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12627343183468485658,15526610244611600870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:18⤵PID:6308
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=71f1bcf274.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.07⤵PID:7988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7fff7fd646f8,0x7fff7fd64708,0x7fff7fd647188⤵PID:8000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006044001\bff84504fa.exe"C:\Users\Admin\AppData\Local\Temp\1006044001\bff84504fa.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\1006046001\2ed488aec4.exe"C:\Users\Admin\AppData\Local\Temp\1006046001\2ed488aec4.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G1337.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2G1337.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2G1337.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff70ac46f8,0x7fff70ac4708,0x7fff70ac47186⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:26⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:86⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:16⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:16⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:16⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:86⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:16⤵PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:16⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:16⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:16⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:16⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3881921602811149093,1788386955641893455,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:16⤵PID:5724
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2G1337.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵PID:4992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7fff70ac46f8,0x7fff70ac4708,0x7fff70ac47186⤵PID:208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F58S.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F58S.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U203o.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4U203o.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4600 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵PID:6916
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2004 -prefMapHandle 2000 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f97010e5-1cd3-4ed5-a0fe-942f2fcc0eed} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" gpu5⤵PID:7108
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82550509-8c64-4dd2-a296-96f2b9928174} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" socket5⤵PID:5328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3052 -childID 1 -isForBrowser -prefsHandle 2848 -prefMapHandle 2996 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ff695d3-1dd6-478f-ae5b-293a1611f585} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab5⤵PID:5072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2792 -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3988 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1cf1c63-2656-4b93-97b2-23877714d4a6} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab5⤵PID:3596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4736 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4728 -prefMapHandle 4724 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9942644a-a097-4b1a-9cf1-55ee62d8af57} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" utility5⤵
- Checks processor information in registry
PID:7392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 3 -isForBrowser -prefsHandle 5284 -prefMapHandle 5288 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95ce1160-9be0-4d72-88d3-e972ce9f3636} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab5⤵PID:8128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5464 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bde2e771-0409-44f1-8dab-bb0fb2d02ee3} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab5⤵PID:8188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5720 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8197447-aec5-4195-9e1f-2ac80d226468} 6932 "\\.\pipe\gecko-crash-server-pipe.6932" tab5⤵PID:5584
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5260
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3492 -ip 34921⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6204
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1828
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD57cd657689252f6e187103461e20f5b3c
SHA1b7d25c41cf8647eed146807514ccd3e1a0346925
SHA256de848323f395a0ebaff3073ac825f9b84aeb4855d95197f27881377d13cff032
SHA5120245dd348ed45fd9fe1419868ae5c44a561cbf6d2f17ba8d51100951910c0c861d4e6d80b00e3d784e25472e48d7be11c9000b75e3a1d91af1b7dd68afb30a24
-
Filesize
152B
MD592b7ee90cb6ee71d3e49153ff23c6ed6
SHA1868fae0e4d4169e57991c90123d7ac17dffbb0d7
SHA256ed23a79b8fd86a47c392d5426b2377d01e2c653d8a0af6f8b6310be230ffd6f5
SHA51274ec22f8beef2c0feefc4b3f9e261f69816b690e214d757fbffd830d51552284daa513fff83eddb60d066ac8dea7b7382e4b90f44b12aaf7461da204f7857cab
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\78753b88-bc8b-4703-8a90-c8333a7b49fd.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d12730a98818117a29286ee794138626
SHA1805bc031a65a1240130912fd5d0652b8ca17b335
SHA25676d442af43a20eea1478ad8d38d1f1246ea2869c8d95eb20c16ebe69f663a916
SHA512ebd837cad8f0fdc251ca62256ac18e58df11929ce719699a4a452cb0bd2d466af9cd00ded6098c88cdf539c3b76e7bd7e33824e92de3d5c4234fe29769c01bd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58a16b.TMP
Filesize264B
MD5f07d3f0fa86e58f474b05e5efe754f6a
SHA1bf3bc95a8826ce36891e144a7df548973eac3365
SHA2566cb1cc4be4eb89a42e966e30e5c6d195e0d105e7abb4b713afdf2120c39d1dcd
SHA512e4c035d162d78149ae68700b64cbd64493b9c7d049f5b02559354180b56cb33ae377372d1c47214479a96feed8cbcb7e35235f85b86e533d88e301663f2d96b1
-
Filesize
20KB
MD5a5315a8673db12b2b13470e6fb5b8a51
SHA18f267dcb29becf6d9540c4985252f890b106c8e5
SHA2567373ed0b876682f210d19b946f703163ca16935a9977f93299d2d7a9c1a2bfea
SHA51291da122e8b66b0dbb13c1835638850fbbe7bcc9af06b98f012bec3adba8943e7342138164d00eb6cb7cd768e0ced8e63150a26858f8f589a45c3107dc44438b8
-
Filesize
124KB
MD5ddca4c0c32fb6a8b5b235ebc07e37108
SHA15ac683d30d7f02fdde63e7917d9fa0bbdfacd540
SHA256158444f891745dbe8a48e686afb288b05858b3d0ec9607db998e3b58e4c02ac8
SHA5124d17b2ada0e8826c66078007a04e4de5cea270ba4435e612532e7adb34e925ed3a2b972fd93d142d4307a69e099b53e0881b7dc99116dffe537f4e231bf5d2ad
-
Filesize
36KB
MD5dbc9c6580e7d2d02f2a0b8803e399c71
SHA1a1e18e85a66e83e137ee439058ae7f6ca6676a58
SHA256ca17a1c744647e20001a24d52dd462d3cd1e1ef3f0dc54b528724810c7e7fbcc
SHA512d1dd0ff67cce331b69302c33ea9117a7c10b52e96ebbf9dab0c44c6a9394dfa6daccc85271aa7a182ac162e55c76bf1f541808593465a2cb3e5b7488c52f2f94
-
Filesize
331B
MD595cb22eb5d5a4549d498cf2d16f3a204
SHA117b3b30f22f3b311ac3152ac6d2272a0aa916643
SHA25604f365ae45eb88c738d93a6563e7cc2762bbc66828fba910f1ccfa65c22232f3
SHA5126c5169e64d929548d8da4fd3eff64aa697d8e3de0c3d23fc2e583d70a8edeacea10b96e2ee3b6a2e1898606c9a7e419362c5898fcec429ff58b6348d366c1ba8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
278B
MD5df4c07bb6b92f41c32734bc470c29e41
SHA1c3722967e791730863f6a2107c0379ca9c2be826
SHA256468a71139ea54b5e9fa2f8b50e66da8dfbcf55cd4d5d69cf5c316292198eb2bd
SHA512d9ec6aa803f1763df2ab60bf30817ae23334ccdf2e322c71e333ace06cd4543428ad3a305a9c0d6cfe1b8f835068372f476a156475ab63c8f86b6baa96ff84c1
-
Filesize
6KB
MD5ae126c64948882dbe83686b6e3aca370
SHA16606af5f4e4a08af08862f105fde934e2dc010e7
SHA256168c08e42598939faa686f0213193dff25407866e929ba1d905f7ea7cc25a655
SHA51228b24554fd8b2fa9bf8fb7e642cfc5b82b6b52104874f50657ea1a6b38fe581fc44da9929300a2d65c50d0eb2447f24c5526318d692cb6f5cd21bfa59e6074e3
-
Filesize
6KB
MD5f4985fd2dbaf9411a7a9682e0215b5f7
SHA10f6214d87407fb13abe7824973bafcaef46a7a30
SHA256a7ebb2eddc9a7da9a2cc8f86da4581476de485ed3342d399a978be6f1433ec1a
SHA512eadbd3c132c9428aa7744a0b29a38b46632017f49886ba4df90f30e569b0888944c25898ea913e54b7e2e1d21350187af0eee2430ec00563fc0b75382c5249ff
-
Filesize
5KB
MD50e426e40ea0c14e218a2508fc4e3e771
SHA192d55a917dbf271ff32a53483f1bd62245544951
SHA256efcaa6b52bdc594fc62b9f74694fc046aa25dc7879c8062b036dcf114d15b929
SHA512be351ba1bf39d88fde7e94bb21992c735c78832e3eadf7d862b94529288dfd24a6841f496dd3522ad9c9a6930237ef1042856a5d2ac915d3045b924963cac36c
-
Filesize
6KB
MD57c69e0020f1711b442cc6fdb3df6550b
SHA13f6f90763237185c8932e781b8b4952fbf9bf756
SHA25694fe33d2969938371a8b12c49f4434a842ef27f4a831e17cd3fd65c6da6908e1
SHA512be4297ef96ddbe8db2a7893b790672ba6227407778dd879686955cd30032aaacacec97b50f3b0c61eccdf171a013436e6b06aa9ec73a4350f0e50d16b96fb441
-
Filesize
8KB
MD5a4095e385edc12ee2f76aac18cb84f1a
SHA1dedbabaaa712be566b7d756821b8c2e263ace123
SHA2567bfb42a148c4e737f66ca87754eb421585d6ba68d3203ce486fc89790625d439
SHA512700c9d5a238255c0c6da66ce96f59a031fda349b58f7df6451d4bd64d692e0f1d892bba1ec5a77621d62a39d71e220ca0a9930efffde876e31e6904f566cc9b3
-
Filesize
933B
MD53d5c783dfa948900545f714c91c40ea4
SHA1681ba6d1ae972c8a592c4553427cd2a7304a77b2
SHA256730f5600395a85554a7cff0c50301611358607bf2947edd779b80eed26f96be5
SHA5122bb80cb4c78660b756e13099dc06c0e9bf6152abc3a2945209aa07854cda3722447fc5fc85948948e067278959829e48bd27c7bd704f85d1691db2715cbd4444
-
Filesize
350B
MD5613d499f7c920b3726b64c76a18dc405
SHA1ada8f2358f62a09c0294b5f4e5fa2b98b031231e
SHA2566cb62f8cffc635c80e66e271d1d935ee0471dd6587ddbfdfb2312b8a71e25343
SHA512254e7ae7c26200d4ea99025622a3bc2167ff38c7d590282fb9599df9d2efee6f2e2531ce2f13036f21a696fdce332beb2f61c10900a59ff18b56ac457a38e8c3
-
Filesize
323B
MD5fc19ffa7e3240cc5fdaad277cb48e02d
SHA1a13474cccd9fb29ea23e5c49b1dce62044ea3eb3
SHA256b70840ef2477cb3b963dd4576b4d72cdd7d950398df73fe7bbed9553f2f2794d
SHA51250cd6802bd02ffa4a8652967a9beb3512ee46408fcbbed92484e42ae13384bfd0e8a628577c81ed957da798c03179e6d119548c8f9d6e1dec67c9df5729c8755
-
Filesize
371B
MD5f61ac346e692355305c8fc7fae4a864d
SHA130787f4ff79316901d889f0d5da8e738dd868e8b
SHA256712d6bc9d1cddba84565afaa41e0aaa0cccaf1f24ddaa000e64e4e6f27923bc4
SHA512e44a3faef14c28a9ab656fcf7454c857fc1298eaecb5ad21297567705970fce42a30c8c79a3865e68b0839668fec9cd403bc72964d530f089511702c66c00999
-
Filesize
128KB
MD5e08a05de7103b4548b40eb43ed93ed79
SHA1d61ad2d28bbac68916e6e8516b3c554e2f672f5f
SHA2566f09f57a37707d518e4fa038f361867731c21d54dc0554a618cb4f1bf33b3ee0
SHA5125eeb4f58c40b08329be6f4170d8f54101ade880021aa3640cf5a11159a6b0c15d262eb639903dc54ddeb4b6222c183006859c189144e191430cf4f037eced6c3
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
225KB
MD5144e11e55b20e606040541f7eac66c77
SHA18199fcdd41cf436dd8c7169eb509bc29c5db3f89
SHA2568ef44bbf58322ed3134efd3db792441aba09f35a812fab28c633f1fe78fbd829
SHA51241d07340044b882140a15061770059746d90f1343837d6354fe14b42539bff2e0307fd5ff577235952a5915981cc43085ad6bc691bfde8cf734866f852d3f667
-
Filesize
337B
MD545d44b0b818b7857efe536e98801e624
SHA1c4d90ec8a580c3f86441740c3e542f4f0f2c2883
SHA25610740489206a27ee1d54bd7b50a2540fe60f039e012c42586fb583e925bd2d9d
SHA51230790a45bf7f9a8893d066b55cec0b02177e36f57218d3c19cf45085f2f2d48eab5319a5d1c4bd97ce34e667f67a99ac989d755de09f6be4bf631eb0f5991bf3
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
10KB
MD500902a383c82f44de9714ded2c691034
SHA15716e41584823ee486ae2159efb01f3be42b248e
SHA256c521e5b82c0a3b3d4212d298bc9b6383f407171060a953c8806873a1a4f853c4
SHA512ff3a5e894e8a46074b9c437b7f637242e7b8233a28dd5101c46c8b966608c34d69604b2e8c0d59afb7d1e3ec10262a23efa3be8398ee5a66af840a5ec238a36b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5d001e9d459727a1de168b5dc9d59b333
SHA187d8b5417372d7bad6f1c15150de1a52fce2c714
SHA256a3578b83ff23bdb5ef6994122d457310f40dbf791073cd65d44c12ef2e990e53
SHA5123d216d2c4e4352f3e3fa8f1416667f79cb3bf2ae8e9c06470a5b4ad4c9d5ff7542409696ab4ff6fb097201f0628bd8a6e8876dcb70c2f264c35c8e5beaa69aa7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5c383531b623e1590d7790076ea5d8d8e
SHA1b990c4ba72ae7c8b10ea7240c14dec0eb7323b3b
SHA25644501b969e900c703a07271713433b956918812b8e314356aecba9ddf25993fc
SHA512d68a75f415db7f6f198a792f2cd49580d6038c365ab542556a1617174831308b708754da3a5948d47390c4742c5691f5603f1269a9876cda22a36eb615244407
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5ec16be641fe2876531dec9dbf48c9ccc
SHA167abd05b8fd833561407af27b944cc7ea9644649
SHA256e65ba5a4f81fa67b9e5cde0f2b01c83a24d08768a1064b4cbe2da509d871482b
SHA5123b2503b6b405bb47de36480be13613f9c73f9a1404d9364ac0b12f10d435e2640ae4bf84b73f028b5d8a39c7fcec9a483e56190e868643ccb4a1bbb5319c4787
-
Filesize
4.2MB
MD577eb79a7af5d8cdd242f7f9dba533963
SHA1f89c650c1587dc8f983f9639536c4ef00032b6de
SHA256650d696c30ec972a17a803a58db66bf671628124eedfd06101224958d47e4808
SHA512c77e7f2c740321b4b079e984e7df1f3968f487d7d01efee875b82af378f0da9f80601198b8a7dd7fd6c3ae4ea8591a03202d10ade319e97ae15d214799c3ae02
-
Filesize
8.9MB
MD5b56761ad16c0e1cdd4765a130123dbc2
SHA1fc50b4fd56335d85bbaaf2d6f998aad037428009
SHA256095a2046d9a3aeeefc290dc43793f58ba6ab884a30d1743d04c9b5423234ccdd
SHA51226c82da68d7eef66c15e8ae0663d29c81b00691580718c63cdb05097ae953cbe0e6ac35b654e883db735808640bc82141da54c8773af627a5eaea70b0acf77ed
-
Filesize
1.7MB
MD5f8d1d73a4b017ae508ee5172f7601906
SHA16feb8b7fa058b1f818ea2b2485b8435d87b218c6
SHA2564688b875a5efc11c995747658f96f517bf06631e4ab4a1c05d0718abdc33e5fe
SHA5121365b7dda13edae170c5022828edcfd708f5378d8fc83ba07433a2094e7137c1fdf47e18bf387d481ae2610b3ce13eacd8e6e9fcb63b4423f39536c4bd631e7a
-
Filesize
2.7MB
MD539307db79b786d76d1b6070fec77bc0b
SHA154546d19873479cff3fc1ba00a77c9433612c8d6
SHA256c6051a76f472b570bf9eb2a80faa638d370e415f0c7904ba4c4c044d673db69b
SHA5120da1eee41b9dd08c85f8809427e30bff86da2f811f5be29d0aefb951b377408b0a4899b25efd6d9f24d3c69be193a8adc465d18590d6f81a8df865fc68a75125
-
Filesize
898KB
MD5bc85ba0b82704f21ce658beb946953e6
SHA144901023eb719c38bb46d4a332ce6be193e52833
SHA2565b849304801df38fc27b0815ffb76af4a5fb2cc28d57234d5421de65e46a64f6
SHA5127fe40055c7127292e1271ccdcc5fb5e7fa83fa44d68d2a61242c45d45e6f67dac9e105a940d36b694197c591d89fd72084a59b5027db9fc6f1e9e8924808be35
-
Filesize
5.2MB
MD53ac5525893c5aba53b452419e783f4e3
SHA1bdc6bd46feb91e733678e61d16debbd9aa602f6c
SHA2568e74eaf572eef39248dc314d4407ecc2bfd58c12f4f7c89029c843e3dfd59d8e
SHA51269bc1dd7e88c10133f9fb072c56f56940add9efc5ca71c8a9d474d3fc8bc4a1b5ab0f19174704d715c24066388026a347cda040f0297c5b7e1dd368a4d70bb03
-
Filesize
3.4MB
MD598c81981f744f96c818ba5ffb7a48962
SHA13630fc24907ed8b0005ce4d091eedacbb5fe1c3b
SHA256be9c00e775c6aa400ebf21d75ce14c69dfb49557b2f3ed05d5f7430e4bd553f1
SHA512b59c070963f11fb1708ca357ea0b28a320c829bab4ab59e3ca72b1da7d43b96e16d0b1e0c8fa3dcb2796a16b4c2275ff9735b48d7d6cbccb3f67419a460230ab
-
Filesize
3.1MB
MD50a25084685b54b88100d89d2bf1fb4de
SHA15a67610f98d718816fc87ddb0c07bec46e0fd272
SHA256febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd
SHA512d9dd3e961b48ef0989d65d73b4726e15f5773d4075527a1fdc7e4a8a1bd94a0bb8317dfe039f15d0e97642e78d0388bfc19a25098d416a2e1856ce522db5a2d1
-
Filesize
3.0MB
MD52eb7dd5fc174ea7ce691ba15a1e34ba4
SHA14287676addcd538c2f5f975b6f2a9e8a415f2b37
SHA2566094e39d84c42971e1efba0875fa34052dc3d2cd24f8b884b383aaaf32fe3cec
SHA512b98cde63c0678552966025db56a15cf211d8d79513bd9a928bfee11909490aba53ceb1135cf88647196e079430bbd878828091840ebf822251f01f4c776a4e4a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD5dfc5b8a1275b4ebea4e7a45a85c2b942
SHA194a8a70cf022f581ab5e29fa9c5a0574d5fc20f4
SHA2563ed0530746cb27cfbb38a5aad093b919524401568ae33663f3ed011611f1a88d
SHA512555fbab3154093dd951bdcc8e5fea2242637e43d1bbead5c434c481f93f9ce9763c9f9cbc276e898c26556f4c1c78d1d56417b729c589ad6878dcf3cb2a76eca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize17KB
MD5ff1c0aa763884e819457f7fb43a87ce9
SHA171dad42a0412ea4a6f5c52ef5def9370ecf9a205
SHA25625f7f4194f1b384ecd0cda757e6681238d8292af0862d7aa4a5b0d4df73981ad
SHA51235431133546dd494006912c80b487b3f6a8739499752adf87933f731f5e8145131ed3c37b4c0873998a1cce9f506aa02513cdbee3e9cfb0a95cea8742b83628a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5d2efe1520b1653d69944d90351c7e24c
SHA1ead0da99c7f54ce5bc5b26f39b1100ffc9f9ba1d
SHA256f751d41f058d6b0f4e73d53e0d759250d0295b0ea74202c5b96ed5b61d5793fe
SHA512d240c3ab4a201d0ec8c93078a4c5ca90a6062eaa2f71c9970cc1a8536b8a3c91bb00c5a7594c902cba5ac87c1ce0c52f728d1ceee2cff2c6d475f84fc05fb1ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize27KB
MD5fcf1e80a54f4d3b35ca852f04b543610
SHA187131a8d085540bc96ee530f41136a8583d068db
SHA25630c807607cba513e534d19811d899ab6c9877706451d1d86af5c8abbe9443fbe
SHA5124fb07d83a2d2ff5852314ae7199f9e0138cb101c2c82d1747eebbc249011987bcd4e3f4de2763fe44eca26b6d0ee98cb004d1ca1a989c3f23ba217e207ec73f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize26KB
MD53f39a9bad688d02bb78b7059e93c1804
SHA16fdc61cab578749344f8e595a16f94e6fefea516
SHA25647ae37d5a8cbe432a91e623917d212eae5ff8426ab8b1928f4267cade552e988
SHA5129e432a72976a15811e05ed16dadda96bd519531c54b0fc905a474a329b0e41415155096fb474650717762fec805fc17dc2a865e1be4e6378013fd8153d2db125
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD564260c595d3aad2b99b2cf81e5e84ad8
SHA1865870291664e465c03f81a7806c91c7a9c4e1ed
SHA256a95ecb051862ad4298e4e7ea9d38e5f6b8d3daf77ced54a8c599cf483f88652c
SHA512c1f70a0cbcef35b0e15fc58a667c3c67e99773293692fd62b18e3fbe588c9054886bec47d04303739293870cc55493ff8d9ecee32b138d5f2ad701ed76a6e5f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD565ad36d91a9241fb6a98bac872cc02bc
SHA13c0d85724d38147b6b630158162546adc9ecc448
SHA25625de4cbbef9926c2d4c3397d4fabbeaea5fdc353acc3e23e7d330474f6572c95
SHA5128a7e04cb66a1cb7bfe2df4facf245f36c3ba53ccdb2caec3ec4c4f13df7bfcd396be6216386001854ed187571213f9f91de0fe43bac30c896e310cd7fbc25be4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5b51fcaa2fb9b8ca35b407bc6770ba8e3
SHA1d0a2649db50ecb138aafcf3cc5070cec4e55af85
SHA2560093e933fd2c916581ab42b56abbdda01044828499c841289bd4b18974fa9133
SHA5120309002938e4f3b8ccd29f32b7f0fee553723288fef7bd98472cd8556cdd31e3abff4fb5f17ea2b3da289d0d03978ee9e9bece1f5a8950273ece31119b630a90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD543b7b398815be6d47c110287028d23f3
SHA1924c0c40b7f53c99d28968dc413ef41dd09c4ddf
SHA256b34367352f266b76fe6dce42c426d5c2b3e5b7dbcd183c0ef4d656b8a779b238
SHA512413eebd1c6903ebc1dc6745c3542ab093486cdb9fbba8e4514e1b7bf9d19cb8116fca1bdff738bd945b16fa186eca519336607a9dce16d98764faa20d3fe8842
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5b8218c575410e5743dd1a818afc35516
SHA1059bfa4832fc1cb1fdc9bb9962b6d234af3b9d1f
SHA2562167bc3343cab38440ea4bf1c2c9c33594e3f91bcfd3bd339e8d8fd83d546ed4
SHA5126927d60518bb02323ed75b66ed8c485c56383abc6fcee4e9b3df1f809461e4baac8d65a94e92428c1914a0339310ca105fd0d46eb5a6846dfb6997ef4eb27561
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a37b333f59d35ddcf3880e79289006c3
SHA1ee8df42ec3da4b886ac8f466fe2fa9d7ad646a20
SHA256f7c1eb9df2c9c45e820d5c4acf44b1c08f3d3499bd54356052abedc747aecb1c
SHA512c4d7cdac7c8c6264e576f2360b19fb3ebf3a0de052cf2272276f8cc2904b781cfcb89e74f96347dbbb37e863e51478d5035e1fb479609b63c34cd32ca7a7fb47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58ffd2a8bbd16193646ca55f4055780d3
SHA1faa0474cc82915bcf182ce0c182aa198443f3c3d
SHA25648dc03f65f3fc9601e58de8f3e50ba9c2c34e3caf7b4d1d5178b2d5d803544b5
SHA512723d31fa34d131b8b0d75d681f180d0dfec06a406a156a5b9880e7c2428f0cb8b8ba85b935be6d88c485d7614bc0618cc3f86bb114a2c0446c74c0a51822bffe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\035f879a-0058-4b46-825b-10e574314f53
Filesize671B
MD5c20db42cf769bfd1dd3bb04ede80e329
SHA11f690e7fcaf5081499273ca38b60ddcd189896f3
SHA256f1e67acc75c4372c0d8ea0dc3fdd5aa4eb76a9a924205ac764a59b0938b059b4
SHA512bcc52670d68007e5e5a64d66b6bec681eb9a10c3e6be0b399549d09dc2028e1d0c2f25eece18613847dc78d6efd69d2849c163cbdefd059690c8c9e279ebb6ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\0914109b-6114-4693-8b54-f0cdcd36c508
Filesize27KB
MD54a19adba8429b1e1168b5a4840a29849
SHA1399be98413527cf514b4581911e943eaa8dcc7be
SHA256eee30ecce1c01d335c15358a58e8009cf7e1aea47eb679ea825a4fc469879211
SHA51260259949f179431f2c6391ee6692372f344b83c7eb247e11f92025784ef4fa099a1f2da1fbbfe107d02aa5a4cb7d0e0fce14a6d5ad1cde0afb81573d678d3465
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\dd7f73b4-7374-40d9-bca2-29c0e1725868
Filesize982B
MD525952626e38c80513211cd5b712a9b46
SHA1f1e817cdacb6aa219331057202c5baf707807199
SHA2567f6a130bb7245ae1022934462358da7a3899a3ab182db4710a94c9aff98ab137
SHA512d217c7f86fad21df37cc096c48e4719a82fad2ca2d01a130c884a4ce912231e0c0c02af456039dfe9c7bd5a542de8fb31eca3799b6f98315079710706b20c1cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll.tmp
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
10KB
MD5a9485681e6f828678a344f7d83ec2294
SHA121a119d38fd00f1d05e8474dc7817a988d9ed84f
SHA2565894fcedec8170a661642e25e896ecc5ab688f594aab447d6c30d12ccc5d018c
SHA512e7e37b317da3c8d0239c8669c3a0427639166fb91a717139657938d7b34fd0338a942258f39750aa1d0d905d80a1cd5b05f8cefc65256f778c0494d5f8698124
-
Filesize
11KB
MD59beb41e3019fc358459e3884ca61dfdd
SHA19b99c16cdd8fab09c3540b8e6668099413b420a4
SHA2566b02ddaa2b04a1007d77e8b3b0d6926527283015dfff0e7cfe3e5fef9d9f2ba9
SHA5129329ecbee198e1502699935ba323e32669baf2607d62d1180df2a5f9614dc59fa919419b71f114c97ee9d35e7b1973cf6096d039e156f8b8485533a5519ec6f4
-
Filesize
10KB
MD564ccb81d7f83a15349ee831976ff3791
SHA1b46fd9954cef82008f65cf5e13090700bf5150e8
SHA256838a512eec19b89a259849ba6ddec63955c30f18fa7abbcaa75f27e4482cd416
SHA512dc2001e6cf98d48daa4ccf979f41ccfac86b194e9a749d2b09fd70ee4fece319cfd3a9f9a48186d338208803df37f7db3cdca7baec5a84576f9d323e5d00592b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.7MB
MD5c592113d763a9ad6b97bb4f9e6939ea2
SHA189320d0357dbebc65ab868d920c44529b1e75303
SHA256839a6f36596e842479bb2bbca29f13924d53582eea5edc6fdfde44686311b67e
SHA51261b513d4e0c30b353e24f889aabf3d94e70390c6f025c0af46968da3783edbc7b67c6f400dcc1cadce189cb867918959b617b9b519d662dc684252fb9b0b026d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e