Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
15e30b215f9ffa75cb1b5286ab26b6d0
-
SHA1
80b925698720de26222a4d7415d7a3fd711168e6
-
SHA256
2f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667
-
SHA512
07671ee48bcad3227533758762185fbc7e2368eebd1466360946679cb0a47ce62c0f9b8fbc4c0f06b293bf539b9cf46d82f1b12821b4f0e1f218f61464153311
-
SSDEEP
49152:SYoLk1jvI12b/7453Q6eRjtw4Vp3D7ZIETY9Axyh7r:9nIz3xKjW4uETY9AY5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/5004-905-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
963c9a7913.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 963c9a7913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 963c9a7913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 963c9a7913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 963c9a7913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 963c9a7913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 963c9a7913.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Smokeloader family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
Lumma111.exed918ef76c4.exefd30c723a4.exeskotes.exefile.exe1be17768ca.exe963c9a7913.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Lumma111.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d918ef76c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd30c723a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1be17768ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 963c9a7913.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 1932 chrome.exe 2988 chrome.exe 5704 chrome.exe 4552 chrome.exe 5692 chrome.exe 5880 chrome.exe 4780 chrome.exe 2876 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exeskotes.exe1be17768ca.exefd30c723a4.exe963c9a7913.exeskotes.exeLumma111.exed918ef76c4.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1be17768ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd30c723a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 963c9a7913.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 963c9a7913.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Lumma111.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd30c723a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Lumma111.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d918ef76c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d918ef76c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1be17768ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exeGuidanceConnectors.exed918ef76c4.exefile.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation GuidanceConnectors.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation d918ef76c4.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 14 IoCs
Processes:
skotes.exeGuidanceConnectors.exeImposed.comLumma111.exed918ef76c4.exe1be17768ca.exefd30c723a4.exeImposed.coma40cfe8784.exe963c9a7913.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4828 skotes.exe 2176 GuidanceConnectors.exe 5064 Imposed.com 3220 Lumma111.exe 5004 d918ef76c4.exe 1008 1be17768ca.exe 788 fd30c723a4.exe 1540 Imposed.com 3192 a40cfe8784.exe 4732 963c9a7913.exe 6084 skotes.exe 4920 service123.exe 1100 skotes.exe 5080 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
file.exeskotes.exeLumma111.exe1be17768ca.exed918ef76c4.exefd30c723a4.exe963c9a7913.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine Lumma111.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1be17768ca.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine d918ef76c4.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine fd30c723a4.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 963c9a7913.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 4920 service123.exe 5080 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
963c9a7913.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 963c9a7913.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 963c9a7913.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a40cfe8784.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007800001\\a40cfe8784.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\963c9a7913.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007801001\\963c9a7913.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1be17768ca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007798001\\1be17768ca.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fd30c723a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007799001\\fd30c723a4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007800001\a40cfe8784.exe autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 1948 tasklist.exe 1944 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
file.exeskotes.exeLumma111.exed918ef76c4.exe1be17768ca.exefd30c723a4.exe963c9a7913.exeskotes.exeskotes.exepid process 4308 file.exe 4828 skotes.exe 3220 Lumma111.exe 5004 d918ef76c4.exe 1008 1be17768ca.exe 788 fd30c723a4.exe 4732 963c9a7913.exe 6084 skotes.exe 1100 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Imposed.comdescription pid process target process PID 5064 set thread context of 1540 5064 Imposed.com Imposed.com -
Drops file in Windows directory 2 IoCs
Processes:
file.exeGuidanceConnectors.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe File opened for modification C:\Windows\HeroesMistakes GuidanceConnectors.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5740 788 WerFault.exe fd30c723a4.exe 1996 5004 WerFault.exe d918ef76c4.exe -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
findstr.exefindstr.exetaskkill.exe963c9a7913.exeservice123.exeskotes.execmd.exetasklist.exefindstr.execmd.exeImposed.com1be17768ca.exefile.exeGuidanceConnectors.exea40cfe8784.exetaskkill.exeschtasks.exed918ef76c4.exefd30c723a4.exechoice.exeLumma111.exetaskkill.exetaskkill.exetaskkill.exetasklist.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 963c9a7913.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imposed.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1be17768ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GuidanceConnectors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a40cfe8784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d918ef76c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd30c723a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lumma111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Imposed.comdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Imposed.com Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Imposed.com Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Imposed.com -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
fd30c723a4.exefirefox.exed918ef76c4.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fd30c723a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fd30c723a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d918ef76c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d918ef76c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4832 taskkill.exe 4832 taskkill.exe 2312 taskkill.exe 1480 taskkill.exe 4772 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
file.exeskotes.exeImposed.comLumma111.exed918ef76c4.exe1be17768ca.exefd30c723a4.exechrome.exea40cfe8784.exe963c9a7913.exeskotes.exechrome.exeskotes.exepid process 4308 file.exe 4308 file.exe 4828 skotes.exe 4828 skotes.exe 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 3220 Lumma111.exe 3220 Lumma111.exe 5004 d918ef76c4.exe 5004 d918ef76c4.exe 1008 1be17768ca.exe 1008 1be17768ca.exe 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 788 fd30c723a4.exe 788 fd30c723a4.exe 788 fd30c723a4.exe 788 fd30c723a4.exe 788 fd30c723a4.exe 788 fd30c723a4.exe 4780 chrome.exe 4780 chrome.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 4732 963c9a7913.exe 4732 963c9a7913.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 4732 963c9a7913.exe 4732 963c9a7913.exe 4732 963c9a7913.exe 6084 skotes.exe 6084 skotes.exe 5704 chrome.exe 5704 chrome.exe 1100 skotes.exe 1100 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exechrome.exepid process 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
tasklist.exetasklist.exetaskkill.exechrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe963c9a7913.exechrome.exedescription pid process Token: SeDebugPrivilege 1948 tasklist.exe Token: SeDebugPrivilege 1944 tasklist.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeShutdownPrivilege 4780 chrome.exe Token: SeCreatePagefilePrivilege 4780 chrome.exe Token: SeDebugPrivilege 2312 taskkill.exe Token: SeDebugPrivilege 1480 taskkill.exe Token: SeDebugPrivilege 4772 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 4244 firefox.exe Token: SeDebugPrivilege 4244 firefox.exe Token: SeDebugPrivilege 4732 963c9a7913.exe Token: SeShutdownPrivilege 5704 chrome.exe Token: SeCreatePagefilePrivilege 5704 chrome.exe Token: SeShutdownPrivilege 5704 chrome.exe Token: SeCreatePagefilePrivilege 5704 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
file.exeImposed.coma40cfe8784.exechrome.exefirefox.exechrome.exepid process 4308 file.exe 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 3192 a40cfe8784.exe 3192 a40cfe8784.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 3192 a40cfe8784.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 4780 chrome.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 5704 chrome.exe 5704 chrome.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
Imposed.coma40cfe8784.exefirefox.exepid process 5064 Imposed.com 5064 Imposed.com 5064 Imposed.com 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 4244 firefox.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe 3192 a40cfe8784.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4244 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exeGuidanceConnectors.execmd.exeImposed.coma40cfe8784.exefd30c723a4.exechrome.exedescription pid process target process PID 4308 wrote to memory of 4828 4308 file.exe skotes.exe PID 4308 wrote to memory of 4828 4308 file.exe skotes.exe PID 4308 wrote to memory of 4828 4308 file.exe skotes.exe PID 4828 wrote to memory of 2176 4828 skotes.exe GuidanceConnectors.exe PID 4828 wrote to memory of 2176 4828 skotes.exe GuidanceConnectors.exe PID 4828 wrote to memory of 2176 4828 skotes.exe GuidanceConnectors.exe PID 2176 wrote to memory of 4516 2176 GuidanceConnectors.exe cmd.exe PID 2176 wrote to memory of 4516 2176 GuidanceConnectors.exe cmd.exe PID 2176 wrote to memory of 4516 2176 GuidanceConnectors.exe cmd.exe PID 4516 wrote to memory of 1948 4516 cmd.exe tasklist.exe PID 4516 wrote to memory of 1948 4516 cmd.exe tasklist.exe PID 4516 wrote to memory of 1948 4516 cmd.exe tasklist.exe PID 4516 wrote to memory of 2160 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 2160 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 2160 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 1944 4516 cmd.exe tasklist.exe PID 4516 wrote to memory of 1944 4516 cmd.exe tasklist.exe PID 4516 wrote to memory of 1944 4516 cmd.exe tasklist.exe PID 4516 wrote to memory of 1020 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 1020 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 1020 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 4300 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 4300 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 4300 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 1932 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 1932 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 1932 4516 cmd.exe findstr.exe PID 4516 wrote to memory of 4920 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 4920 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 4920 4516 cmd.exe cmd.exe PID 4516 wrote to memory of 5064 4516 cmd.exe Imposed.com PID 4516 wrote to memory of 5064 4516 cmd.exe Imposed.com PID 4516 wrote to memory of 5064 4516 cmd.exe Imposed.com PID 4516 wrote to memory of 4048 4516 cmd.exe choice.exe PID 4516 wrote to memory of 4048 4516 cmd.exe choice.exe PID 4516 wrote to memory of 4048 4516 cmd.exe choice.exe PID 4828 wrote to memory of 3220 4828 skotes.exe Lumma111.exe PID 4828 wrote to memory of 3220 4828 skotes.exe Lumma111.exe PID 4828 wrote to memory of 3220 4828 skotes.exe Lumma111.exe PID 4828 wrote to memory of 5004 4828 skotes.exe d918ef76c4.exe PID 4828 wrote to memory of 5004 4828 skotes.exe d918ef76c4.exe PID 4828 wrote to memory of 5004 4828 skotes.exe d918ef76c4.exe PID 4828 wrote to memory of 1008 4828 skotes.exe 1be17768ca.exe PID 4828 wrote to memory of 1008 4828 skotes.exe 1be17768ca.exe PID 4828 wrote to memory of 1008 4828 skotes.exe 1be17768ca.exe PID 5064 wrote to memory of 1540 5064 Imposed.com Imposed.com PID 5064 wrote to memory of 1540 5064 Imposed.com Imposed.com PID 5064 wrote to memory of 1540 5064 Imposed.com Imposed.com PID 5064 wrote to memory of 1540 5064 Imposed.com Imposed.com PID 4828 wrote to memory of 788 4828 skotes.exe fd30c723a4.exe PID 4828 wrote to memory of 788 4828 skotes.exe fd30c723a4.exe PID 4828 wrote to memory of 788 4828 skotes.exe fd30c723a4.exe PID 5064 wrote to memory of 1540 5064 Imposed.com Imposed.com PID 4828 wrote to memory of 3192 4828 skotes.exe a40cfe8784.exe PID 4828 wrote to memory of 3192 4828 skotes.exe a40cfe8784.exe PID 4828 wrote to memory of 3192 4828 skotes.exe a40cfe8784.exe PID 3192 wrote to memory of 4832 3192 a40cfe8784.exe taskkill.exe PID 3192 wrote to memory of 4832 3192 a40cfe8784.exe taskkill.exe PID 3192 wrote to memory of 4832 3192 a40cfe8784.exe taskkill.exe PID 788 wrote to memory of 4780 788 fd30c723a4.exe chrome.exe PID 788 wrote to memory of 4780 788 fd30c723a4.exe chrome.exe PID 4780 wrote to memory of 1772 4780 chrome.exe chrome.exe PID 4780 wrote to memory of 1772 4780 chrome.exe chrome.exe PID 4780 wrote to memory of 3872 4780 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\1007643001\GuidanceConnectors.exe"C:\Users\Admin\AppData\Local\Temp\1007643001\GuidanceConnectors.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Frequently Frequently.cmd & Frequently.cmd4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3906415⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "ConventionTroopsStudiedTooth" Version5⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Accessing + ..\Entire + ..\Peripherals + ..\Et B5⤵
- System Location Discovery: System Language Discovery
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\390641\Imposed.comImposed.com B5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\390641\Imposed.comC:\Users\Admin\AppData\Local\Temp\390641\Imposed.com6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1540
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007744001\Lumma111.exe"C:\Users\Admin\AppData\Local\Temp\1007744001\Lumma111.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\1007797001\d918ef76c4.exe"C:\Users\Admin\AppData\Local\Temp\1007797001\d918ef76c4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa207acc40,0x7ffa207acc4c,0x7ffa207acc585⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,16585689818706842057,3461329398408672563,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:25⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,16585689818706842057,3461329398408672563,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2132 /prefetch:35⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,16585689818706842057,3461329398408672563,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2500 /prefetch:85⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,16585689818706842057,3461329398408672563,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:15⤵
- Uses browser remote debugging
PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,16585689818706842057,3461329398408672563,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3376 /prefetch:15⤵
- Uses browser remote debugging
PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,16585689818706842057,3461329398408672563,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3632 /prefetch:15⤵
- Uses browser remote debugging
PID:5692
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4920
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 15164⤵
- Program crash
PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007798001\1be17768ca.exe"C:\Users\Admin\AppData\Local\Temp\1007798001\1be17768ca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\1007799001\fd30c723a4.exe"C:\Users\Admin\AppData\Local\Temp\1007799001\fd30c723a4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa1034cc40,0x7ffa1034cc4c,0x7ffa1034cc585⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,6118487831524455779,3483237488028632084,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:25⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,6118487831524455779,3483237488028632084,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:35⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,6118487831524455779,3483237488028632084,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2488 /prefetch:85⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,6118487831524455779,3483237488028632084,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,6118487831524455779,3483237488028632084,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,6118487831524455779,3483237488028632084,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4448 /prefetch:15⤵
- Uses browser remote debugging
PID:2988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 15724⤵
- Program crash
PID:5740
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007800001\a40cfe8784.exe"C:\Users\Admin\AppData\Local\Temp\1007800001\a40cfe8784.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1944
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58ae64e0-4b11-4f3e-9db7-8a1423b1f708} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" gpu6⤵PID:2400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33812613-41e6-4c49-bee0-ddf94fb6fdc0} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" socket6⤵PID:4688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3312 -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 3108 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1044 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0679a6e4-4c61-4d88-80c5-6a9b68933da2} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab6⤵PID:3744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4044 -childID 2 -isForBrowser -prefsHandle 4008 -prefMapHandle 4004 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1044 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9984146c-dd09-4e63-a35f-2ce79851ebc0} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab6⤵PID:2804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4628 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4672 -prefMapHandle 4668 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9830818a-7258-430e-b16c-ff134b1ba666} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" utility6⤵
- Checks processor information in registry
PID:5508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 3 -isForBrowser -prefsHandle 5544 -prefMapHandle 5540 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1044 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7cd23977-3080-42cd-835f-4fb3ac75b87a} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab6⤵PID:5400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5676 -childID 4 -isForBrowser -prefsHandle 5684 -prefMapHandle 5688 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1044 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7af2916-9c9f-464a-8006-27acec0f06af} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab6⤵PID:5388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 5 -isForBrowser -prefsHandle 5748 -prefMapHandle 5752 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1044 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc4572b9-147b-436f-881d-4c2dbbafa62e} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab6⤵PID:5364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007801001\963c9a7913.exe"C:\Users\Admin\AppData\Local\Temp\1007801001\963c9a7913.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 788 -ip 7881⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6084
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5004 -ip 50041⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD59e930267525529064c3cccf82f7f630d
SHA19cdf349a8e5e2759aeeb73063a414730c40a5341
SHA2561cf7df0f74ee0baaaaa32e44c197edec1ae04c2191e86bf52373f2a5a559f1ac
SHA512dbc7db60f6d140f08058ba07249cc1d55127896b14663f6a4593f88829867063952d1f0e0dd47533e7e8532aa45e3acc90c117b8dd9497e11212ac1daa703055
-
Filesize
44KB
MD5ae7b40963e4f89764a4092ff9b69993f
SHA1af1a652f7a031bfbaf30aa37e3e273b20d2d26f2
SHA2565c45c76e46e6b5435814c287140395277ed5ab02e86b181fceb2cf8a675cf67d
SHA51231628b69f92a7ef097c164054690c8f76c81ca729d54f6fd619d375fe37ba4bc1308aee6325310b6bebb406bc5becf011b1a1246f16d9c34c81fdfb9fa28ad4f
-
Filesize
264KB
MD5c75e8d92a226ffcf97272aecc0143a36
SHA1e306b5fc5c7c90434569fdb2cb1662ada8d6aab9
SHA2569f1366cf2ba0da229aae0b89cf4ee47dccb728f72e62d4b57b795cf495e6edc5
SHA51228d6a823b1cac3d197c034d443c61d844e844418483e6c4edf3ed38617b2c13223051d66ad3f92581523d99a305c3adc02836cb4b70cec4fe867371adcbb3e0c
-
Filesize
4.0MB
MD541ab5644f57d97d0a90aecf5c30ee411
SHA129194017c838ffe19473cd3308cc1a8f5c575fa4
SHA256cc260b411a32456999ff06e98fd4c8803eb5dc9ebc340b543850e4a88cce24ba
SHA512cc19eda51a1aac66dfb0a8b68c8a7bb32e9f8d20efb9ade64ff1492850e891484b47feab75b916329f79a6c25a1f535aea65363db8974ad83259d3e0f6762fe5
-
Filesize
317B
MD5fdcc5fe779f7392d849c59267cf204f1
SHA1922505792c66b74f41ad3bbc37b1c4da8a83c425
SHA256a433172638db2993f9f43c1b62312d45fe6f7e51b4f0a3fdf3e141403f570d20
SHA512193a9b1ac1c61ccda6f9c201c42d9c0806692b46b27f1bcd394668bdbd89d5a67b0adfcdc4e0d550092532f667533df1bc7524a8148d389b9ba21fab8719f27a
-
Filesize
44KB
MD5a934017798de5dcdd4e73629fa7535da
SHA11a9801c43cba8317cd1b6daf6ac0e80af0a27284
SHA2566fda5019dbaf55e531982302bb89e8fb1882f21d9d20a8cd7a50c7f8b8326c07
SHA51236c9bd7fc1029aad7de3f31286ec5eb80ada1f864710cca8f5e2673fb542ea28185dbcb3062e5b11a4c1b1ddf419d9cd2279b8b2f52f70d46a2b8154cc750ce0
-
Filesize
264KB
MD52a6348de2633966d9321fc0fdf04ad3c
SHA1b4c1b0e4d9f56874772bd38b14a0e3e5a9153a5c
SHA256d24fbb1284095d9a1d8c3fbe5112a52459932b44afaf48d937ea18ec62ad1fee
SHA5124db9074f52f7f7a3b4224de6922d8031f7069ba023017b7c34e61788c16968f06d9a040ea199a89085b9106bcc888b14f7bf2c35bfc03437a36aa25993b22a32
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD52bc899f2b710576670458c961fb15220
SHA128ac40f8beda22ccd777a582617b624842eb5804
SHA2563ce063b74974f291277abf19d3130162a923323ad83f848702b5cd0e18e3b18e
SHA512b5418995d14cd41f23a7fadc83104f0926aec6f003d2cd62534c38ec0f9b016b326ee1b29ae6ee1cfee21c35948e14dba3a30a48f8af18f12533a17b2feb016c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
336B
MD5d8442cf18cfa62b374a20b1342d4a11d
SHA17c9caee65c91aa1740e62d0add03d0edd8cb6527
SHA256e6483a929bb19772d5956efb4485f09ef3490c5512a11246e2a81c2bb7a0559d
SHA512b7236bd6418f643b5a8a65e98cd693a505b133a04f8013e0f8ec766a7cf03e7f5c322acb8acf5dccbf4872fa08cf2a58216f9615e1fccd092f1b607e86012c05
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD56e1fe958f7350faecc45c471ea46fb88
SHA13f03e7cd0490f05b9a29f42cd68f1c481a453e98
SHA2565cf7388373f47ec48e708716a85b9c1218803862888a91129805f47e2b4a7dca
SHA51281ab9fdeeb7c201a95f27d4108e96c645de43b955bf8a7c5f3fede97a50bbcbc6fd5945a2b3e73812bd09cbc38577fda71a8c1713f86007d46766d0cae95808b
-
Filesize
345B
MD59ac247e2c9a02d28ccbafa55d0fb1908
SHA154a3c0a7ae9f96c870512f92008eafdd958eed55
SHA2561482f16bea163dd96d11cec937a8d88c1dab5be799e06736edba41d77c82bb70
SHA5122d042be7047e31b4672949e77563acf4ce6cad14f00704a219aaec47ce752c7c3e7a760803e58530fc8644b3b465ae783001cd0e3529406878a19a5f6c8a6a17
-
Filesize
321B
MD53933136d0e4b8655a8e9f6200b33f5f2
SHA1ad920fcad5a42f21210d8bc7e95649c3e24db7c3
SHA256ecf38edf95e76315536a99a2059f1f82445ccaf90acb1ea79e05ab1bd8dacaf4
SHA5122e54b188cbd5c1f955ad0534cf241c31b8bc54bdd5e9d7543127024d4b573864db4b6f766501012269a59ef494b827abde927f555112c42f16397f004bef67e2
-
Filesize
8KB
MD5f0fff675abe79307ca8346c79fce248a
SHA1c7d3b0dc192ab0b090f184666a8541da1eb38b55
SHA256ffafb45d960acaf823a0db44e16d4eb5748e881e1b139be4067c05e22b398cde
SHA5126f12afdb7c869b57512598b11e3b015257d73848496a816a1613823046b8d85c4ab596f78d1ed131fd666c2f97ae1c5f069d0451c8b1c1bd5ed1acb0939228a5
-
Filesize
14KB
MD5ea47d32526c2670f315c45a156169fde
SHA13f1800b62afba87c07debe1a98b5d6c4eff1c045
SHA2560f5b51ce0db783b1aef5acd357192a6e8c5e8d62dd7469930e7c43a785173c7a
SHA5126f9ff3989083e05054a08929c17a470af6742eb3809adfc84e2685506c43a1e3d48611aa6f819fa04024a120b31ef3d54d289a0f49cc446d9a6508863d342edb
-
Filesize
317B
MD5e2dcf16224febfb48ab81f42adaf9e5f
SHA1dad799604987eb3a44e77a48dff84e58c9898ec3
SHA2565c3fdca3f506fc97d43743592b288151f7f72e6b5e5bc9b6f7e89edc823d960a
SHA512f0a037becd21065fc84541c96215429c9e6674f02a888b6441c54415f5398d83a14edc1a06cdba74ec51d74d1912b636eda658fa6c752e09087ae14cbc259fa0
-
Filesize
1KB
MD5e8be80aa28ff20d2fb5db4164beb089c
SHA1e077bc1dbd9691426fc12a965d5eb7a0a7e054c7
SHA256b9fd78e2d20e48e7157356b6dc202b9d7e69f2cdc4873eb71ab2c4cfd4393e71
SHA51242f8b26c5178b5291327abda5f92fac051e2cbc61a6d4bee2a96e89a4ca6d0caa0679f241e75de438836aedce9a081c161daf1d1681c83b308b5802bb8994b84
-
Filesize
335B
MD513bfb619cdacfbba3a1ce0dad47b3151
SHA1869898fd4b9367e04db0b8d755d56cfb3b98835a
SHA256858b93771a8c8d4e8834c789eb9a7b6e6cc74aad76e44baedfdf77f9d7eb1c6b
SHA51262d9c3461c70a3720533f585271831682265c2c274d4d328cf55c85500d62cbc6ab6b870da0cf0aa1927f98841fcbc442428886278295eaa8a390e3e25c23318
-
Filesize
44KB
MD59f8d30b271fd6e134786ef90e432e5cb
SHA11bc383eb1979572270dce7c2ab0ca7585c89147f
SHA25640e4df177c46a0eac9ca536904acc43bd9ce4795d768c7260b8c0800b2420302
SHA5125ea06b687363b50ab553bdd40c1784cfa88833379894ecc0e94985dbcae100f6710840e00262ae7e29b128dd10792725dec62ff6cb3c2e063fea30c98a0f0dfd
-
Filesize
264KB
MD54d562b3d53cc6c521938fba3e774f8ce
SHA1b272dd6b804ac62202790d0f3128d9399b02fd18
SHA256bd4068b0ae02bf8b8c01ee0495bdfeff7bcdf6cbd67176e2d43ce22cbc24dc39
SHA5126e3d824f75d354992a4da47df7b8a3a6d0a1bde87c13f88b198dcb781ef9e9669a4df6ca59b63c016274b24d8367cb452b0cb55b3bab6ed36baf582b4c7a9c13
-
Filesize
4.0MB
MD5f98f41e0e81f61760fe79a697a53d2f0
SHA1a77df8c6d80348a4cda08ec4fcedae3cc7dcd239
SHA2560b786157e734230df829a7fe738c2303e44da7048ec8f6e5dc28d4976e3f1830
SHA512f8e8cd1df8569cb437807f3471b6ee0f282c3ea301e4823cc90a348f2c6870eabd85d07f46236a80d06eb263713a90a41851878e0d58f34740a864cd3a82d4af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5cb416ea674486f40973b6b79317d9fe8
SHA132db3812ab1985e795c8454c4c1b228fc0c2dae8
SHA256a89e534eba941e0320affe99d3041b4db4ea3bca8d81942173c6551cfaa229d6
SHA51206ec07591a5286ab938957a09c755e70a342dfef3d1c7e8e5ccdba013fb272802a23e2b19fddf298e4fd8f94732a6ba6f20d6c6ef613253c1a63a9de0a3269e7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5ef689eed83c9c2f70cec967d70a3580a
SHA16dfbcd335d3b51f43a7ade3bcde7a1820bd1cf00
SHA2569807c77f9955450231490d459fb875833fa0644f2d3b24e737a34780b7b521e6
SHA51286c328b753ab92d98312f8d9b6cca000d5dde3cb7b6c66b37bdbf6a7933cafdcec53aeb6d1b78b2dd9f1c7181c40a5b6b3d9328298ab12f25092e7c1d88bcaf3
-
Filesize
741KB
MD5211dd0cc3da148c5bc61389693fd284f
SHA175e6bd440e37240fee4bf7ae01109093490ac5a7
SHA256645ee0535f2ada91b101c0029f2fb71de2a27c10a5446e84d3547968ea36eafe
SHA512628bb927b5a85674ed1f762d4c42e8e9f55859cd626ab0f01b7d47ee4c74ff5775ceafc4a45864344d5dd13e588fe60b6a121b00dac79276689d0a9970d12e89
-
Filesize
1.8MB
MD590e700a3800b87f46cbbc37be3724fd5
SHA125e3645bca71b87dbec92b55e5648452ffca782a
SHA2568cc02598acded7f8221865d08145297a9fc8162d626883fc9a72998c4a7f0da3
SHA512f06adebcc7d454a31ff36a3c2e8eedfc0086a638c7ec0fea6c0b41035ee03c2e329f3cef0e001939cab243fcfaae07a634f7839dd0fbb31942a793439df4ea8d
-
Filesize
4.2MB
MD5389910a7e7b0be062240be06d7ce5d31
SHA16c7f61dd43e11c3b5ee5bd21914ae5a9875adc7f
SHA256f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1
SHA512231c854c70859b52f000f0a374d63077dfb00ee3af1ceabc76e53ffb289008d4a94df7dd0c6ab7482ca350ee6ee8f9ca79b20881534295a6ab7a0bfe545d66a0
-
Filesize
1.8MB
MD591111dd3ea7dd1ea3a1e630a21ee2b2a
SHA1bd22a9a64ad86a997549a15534f6c871c2a16026
SHA25664b114b5a59209c3ec5fd1f23ffbe7201dcd7c0915325e93f4ff91237b49b8a1
SHA5123804386a06b8cf919084f0ae1903707d555280e40c70019cfb63f0bc2e10b5b86e2c5abe6eb5037ef1166f5637fafb409ec12e8228f51c5ff042657a0a9aee33
-
Filesize
1.8MB
MD533ce040234457605280e28c3bda4ae36
SHA15f3a7512ea1a032aabd60a2fd364d073ee2fc8f9
SHA2568e5a7beeec8489d20ca75c332acf7eb1460dca63256842479c3d5b1ca3f48d53
SHA512997e26d1137bc0e6594ce3d3bdc33013e3c684cd244294bb3c6da0c81696da55a6865830092193c8e233990712bde31e7ea3b198f94f0e55d7008aea10016e16
-
Filesize
901KB
MD51924c9838218650053d95a5bef2b5a0a
SHA1217a1dd7c2829fb941cb63970f9b701c925d5538
SHA256df321c17ae7ff0301cb6c6be1b808b326fd2336e48386aa3d801da8bf9dcb32d
SHA512b5a66c9cf8c7cfdc60a2a5c696974cd46c48b6baa38a074e8ce0bdf545d05943e9dc780a5bdb5a29e2214d17bf33a650ae08a36aea1714fe87ef01f6b657b3f5
-
Filesize
2.7MB
MD5fd4071d0f320cd91011328a0f904f284
SHA10517bc8db26f59694d620912f1c48d272b0fd740
SHA256bfce1247e957e64aa6903f2abf182dda3be39d0c07cc751db0b4639750495b12
SHA5129597cfe688f8b6c360ef5934936dbfa575db1eeb24451053c263a019daf96edc42cbef6a61d0fef31b3998a6b77ddb26217574dbb14337f47603887687a0e415
-
Filesize
224KB
MD56aaa6156bca65c60437b9dcf21a8566e
SHA174c4917b5006a2af825ed9e9d3bdaff7884aa11c
SHA256fe153e9df223598b0c2bba4c345b9680b52e1e5b1f7574d649e6af6f9d08be05
SHA51202f8a158815b29cfbad62403b5177ea5e073d84103e640441d901e12b2fbc4f2cd113924d2b06b09cf045c99b58a5527f2c68e6a664d8015f646672c11567199
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
52KB
MD50487661a3be3e516ecf90432e0f1a65b
SHA1548f56668cdfde2d71e714cd4e12e3a1419dfc31
SHA2561dbfc503087ed424d8befd455c6554ba03aa4c4c5e77f7b388dc412b6a99a70e
SHA5127f9027e567876bae2302652a2d63b457bc39f439ec6cd4d7d170423c5f27aa5b0479113b7d8c436cbc08ac76450b0e56c2d8dd42a219c7ad3dbbf693f935cf77
-
Filesize
919KB
MD5c09756dea58e68a563c05c98f2ee5822
SHA190675ae3c1a7f575dee20ceee5cbf3d761aee432
SHA2560d43333d98724395292ff88d573ad31c6ff65a0ec117e3a605b1009478f91ac8
SHA512c5b0bff60c4b44f62e224a58dbd508efb20f1324c85c62de13134f909a1cfd63349402d7472940992b6447685fbb665fd28929dc6693a5f3f1222173a8c477c7
-
Filesize
82KB
MD509d17ffb85794728c964c131c287c800
SHA1a1d7a2dea5e0763de64fb28892786617d6340a86
SHA256f913264e2aa6be78dae1261782f192ae4ef565439c5ad68a51c0397b33ee1475
SHA512d174de399777b691443de3abff35dde5040d84ea06f252e86ec5b76bc2c02dc0c5c430f0ed9bab83a69e128a7cea989a1a24c6f579947e448db1cc393838b1d6
-
Filesize
32KB
MD50e9173e00715288b2d6b61407a5a9154
SHA1c7ba999483382f3c3aba56a4799113e43c3428d5
SHA256aa4685667dd6031db9c85e93a83679051d02da5a396a1ad2ef41c0bdf91baf66
SHA512bb13d5de52ea0a0178f8474fceb7e9fc2d633baceacb4e057b976cac9131152076544891d0959fa22fe293eeee942ae0f6a2fdd3d3a4c050a39549baa2cb5ecd
-
Filesize
8KB
MD5283c7e0a2d03ff8afe11a62e1869f2e5
SHA1235da34690349f1c33cba69e77ead2b19e08dbc9
SHA25638582d3231748a788012e4c27a5ac0f54f9cb0467d60ecc247a31ea165edeef9
SHA512b9ba42910d150ce9e07542a501c4134fb668f9b4af70db1ed8fa402066c8fb5025cf4bb29abd91c877571361e71c582e1e7c5350b28c7bda18d6bf184e85273e
-
Filesize
58KB
MD56337b4a0ef79ecfc7a0e70beea5d5b5b
SHA1904aaf86b183865a6337be71971148e4ef55d548
SHA256024ad40c289bfdbea25aa7c319381595c700e6e9e92a951bc2e5df8a21382630
SHA5129b88533915190062002702b2b632e648a94f086b987040d3f22f1bc718a2e58fbcb6d85a9ad17c8ee34018364cd9486d52bef91d645cfc3608aa3b592fca6b48
-
Filesize
1KB
MD551c0f6eff2d7e54810b653329e530404
SHA152aef28dab5ba3202341fe2a34f64744f268b991
SHA256a8f5d7c5caed37fa9f6dc432c1f854f32564d6cf0fec70f4bede96ba4df4dcdd
SHA512ae804726dabe115186e5ccaf7827912b48517a8a4dea8bafa2d35286bc60cb1203cbe71b6936cc269bfa82c7037bacd79d9dbb586e49909fcb1d84e99e6f3fe7
-
Filesize
1.9MB
MD515e30b215f9ffa75cb1b5286ab26b6d0
SHA180b925698720de26222a4d7415d7a3fd711168e6
SHA2562f66b770e77265722c0de698db8c61e8dcb8c8883100a9f16f5d4b92067c1667
SHA51207671ee48bcad3227533758762185fbc7e2368eebd1466360946679cb0a47ce62c0f9b8fbc4c0f06b293bf539b9cf46d82f1b12821b4f0e1f218f61464153311
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD51c730e4a710bb510299428f8fef03416
SHA1040c8c4577354b529873a277b76609bc17bf0362
SHA256a2c5034d5c81f845e47a741e5ea84a03ebe66d89712fedc0950803138a055dd6
SHA512526079b51a42e667f9159b820d77efe28cc4b21243265fef7d639a163bf4b33471ced848030633d94d419d290759ae83b7c24ed913c489337d75b4701de39f0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize7KB
MD579a49c7efdf40ecba2d24e4b7b5bf7b4
SHA1740414bd7fe07c520e0b0b8b3927f894fa86d640
SHA256750fe504fb553a9acd8876eb7cb5ba734cb2385291b81a7e12e613b165d23ac4
SHA51240edeaac520634380f6837723488019df893a599d89507cea3300bf79e611c0b300a53e6f8b7a6b9527ddaa77e6301a685dd145a59c39e2e28dbd615629be539
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize13KB
MD5df83b26e1fcbe6ad70aa23bc463211f1
SHA1f2039fdbabb1052d4f4b0e38a3acdd78f713d5ca
SHA256823da3bc3fa99b73fe3ae78787d0f95bee0ac7abdd656545fc6868db4bd40bc7
SHA5124d6aaae41fc1f22ecca84212cc8b9c5de4a14550446cd2c86b8a45868ad3e308f82738fe8afbe35de0f16779eb58917b2c2a3e564ea4332f3be95410f26a362c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD59d33668e014e3f1b2fcd99952835b039
SHA11682331f1be79d10d8b1809697d02f3278acb123
SHA256b45fac67f520d98109149491a866aae672720a1618b00dff2bd82d24c9f83ab4
SHA51243513adb488c9231b763f418a04a2e54e5ea369be785deb801f014aef00224f3ac8ea6776af1c536891ff12ba8031d7029b81cfa81a3e1d2cf0559814aac6841
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD58c77f483773fc4c08a8901b26ae87c57
SHA134f8a7d4ff729faa419366250d190c9a2537f44d
SHA2566fcb088277413aa84c3a1d8413aa68be3df92d4f3c9da1fbe60f330083223f61
SHA5127a61446f9eb2c59ac9825e0f5da9a79a2dd98537e95d6710be1141eb91c757cad830516fe27577953b60c386247e0a1b841d690e4655bd095ff04bdf83c85ceb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD510ab524f45e8e65b820bbbab8ab9648d
SHA1970be5e23f677608b0966d392623cc9eabc3ce2a
SHA25615d7f68c384168ddd3138f8190498c33df892976ef30a9c51aeef24efca74e97
SHA512b588accc0551f8b8632e403e88dd67c4791fc87be45676a8a465ee3fa74a500d668cf16dcb20b0dcbeed02b075b50acc1d0c0139f8dc25be2bef6b200c970bcf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD53e7f87fcaedb344d9fb878285d2e6825
SHA16cf48f6e34e027ad2d67c3622403e70b187cefd7
SHA2569894bd27d5a089bc6b6f3a02bf9d1e83675a56f715ce8e6ef496697090820069
SHA51223809e94c825d68ef756de6bfb1c6a73bd241c9283cdc1996712650403bab6fd7b9a913c222ebcac755761d750d623761fb4a683b2b76ccc78450f50f6f9790c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\ac5a82f6-fee3-430f-8b60-0184855a6332
Filesize982B
MD50c502741424ab972b195f3765c7091b0
SHA1f41402be6c103f65a822afb8f4c089c6555649cc
SHA256d56c927fd1311ac05954b60203ed68b7377ec9a218e63d4bf20d509ba72e468f
SHA51208d26d1a557e648d09f35233208323bb1c13e2204bd3fb968cb17ed60881e56b62fc2bc9dd47b27498e04e80afe6f54aef71f81181cb9b5f1d52ff7c731b8985
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\ba203a0a-07c3-464a-8304-7fff6d03b7bd
Filesize659B
MD5a4f9c611d27fe1ca914526e7d2669f1b
SHA188a93f2a835592dd2c0841a2f1e9c2cfa0a94090
SHA25614883293fc94dd1842588bf40d0bfef40803ba3e2048f8f372c6ff5297438fe8
SHA512ac9d503f230ac3cb59684d7eb6313660dbcd1f3ffc5fff8507b52788c5953b48bba4b65f48ebab7cebdcb11202a68d10e7a6d2a4a5ef87eeacf5e9da3c9aa625
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5eb7404a5174f5c772f108e1b0a801e09
SHA12376e5405467b70fd213389e09bd7b462ea6707a
SHA2563a88a9bf0346e3a3a18c9d15ec1f8212ae6d2ea4bf522ad5e2f2d4025b24ffd5
SHA512d88a9201b869924d6388be1239763ee54b798e82b2c2eca124cc9975c1a03aa4af176511e17ddc72f7e4c233908ed11bbf1c417de2c45545c671fb03b6ff3e48
-
Filesize
12KB
MD541bfa6e671888392351b49d7534596a0
SHA1f32b4d400e80047766c30bded9be269c7dd75c10
SHA256d3b4d913fba1dc6072548bd7199dcc925781b97a68ec2bfe55986fc6de6cacf7
SHA51214ade1e6909a5113d2b612ae9ab8372f3b219b8e67d02b6aa8842bfd34b542f66be49bde9e9b3653b8c0422824865e45d56a48980468f11d2919030e0919b680
-
Filesize
15KB
MD524c0517e991f811680eb0d894af36825
SHA1f9276f138f201b2401b69b1edc0d50c8539f1993
SHA256bba5ecf051b893ed90288990ed5908bf0d266a4a3b19e3247703ca7034731456
SHA5124a5a4dcf22f1e792b8893d63dffb6a212aa76a6e5fb7e66480c1551a1b39c380613c5aa28a174686c1072a3a1f5833da6723ad36e786146c81c1d1b0d0ccc7d3
-
Filesize
11KB
MD5b5dcdf78075a9aaa67e0506221cc1389
SHA1258529a788dcb25d99a1b513190c0990311eb37d
SHA25690b152a0b6e608b14e17b5a05afc59d56742357f256821a93848add81f0dece9
SHA512e62657e5838f45eec43d9f398e3e7209fe63207b99250d77d40c352dc4f6694e0550aad2a986f4e7761e768983fb7544a6b4fa50b998be24297c79a3281834f9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e