Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
a701ff816a94c1e54f8b2175d9fcfd19
-
SHA1
10d6f38310770edf01970e9572a111377c21d829
-
SHA256
9d52d6333a4b985ec7d0baece9f1c0c99c1cf4ea503f7b8bbce0fe38694d0a32
-
SHA512
ee1aa73fad205b7af497d8b6e9635b741ad3b487ae57d7572218c4f571515529a380f443d7cf80658e89f56ab41c91d7ab0eba25c2f2212b72d11e5bf9a7f070
-
SSDEEP
49152:VJsTOoPfF0soK6KfVOBOHWGguR42KXFLhVwc5pxhTdQ:TkOahPltk2yu+VvwypfdQ
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4448-673-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e031295939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e031295939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e031295939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e031295939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e031295939.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e031295939.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsDAAFBAKECA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b9109a6886.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7059f8aad9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 82da05e945.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e031295939.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 872 chrome.exe 5904 chrome.exe 6056 chrome.exe 2624 chrome.exe 920 msedge.exe 4516 msedge.exe 3216 msedge.exe 3960 msedge.exe 3620 msedge.exe 4768 chrome.exe 2860 chrome.exe 3428 chrome.exe 2288 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e031295939.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7059f8aad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82da05e945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 82da05e945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsDAAFBAKECA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b9109a6886.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b9109a6886.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e031295939.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsDAAFBAKECA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7059f8aad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DocumentsDAAFBAKECA.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 82da05e945.exe -
Executes dropped EXE 11 IoCs
pid Process 208 DocumentsDAAFBAKECA.exe 3124 skotes.exe 4108 skotes.exe 4448 82da05e945.exe 2384 b9109a6886.exe 1452 7059f8aad9.exe 3672 f4761c225c.exe 5824 e031295939.exe 4508 boARaXv.exe 5492 skotes.exe 6108 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine DocumentsDAAFBAKECA.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 82da05e945.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine b9109a6886.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 7059f8aad9.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine e031295939.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 3396 file.exe 3396 file.exe 6108 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e031295939.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e031295939.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b9109a6886.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008821001\\b9109a6886.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7059f8aad9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008822001\\7059f8aad9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f4761c225c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008823001\\f4761c225c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e031295939.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008824001\\e031295939.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cc1-221.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3396 file.exe 208 DocumentsDAAFBAKECA.exe 3124 skotes.exe 4108 skotes.exe 4448 82da05e945.exe 2384 b9109a6886.exe 1452 7059f8aad9.exe 5824 e031295939.exe 5492 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job DocumentsDAAFBAKECA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4260 4448 WerFault.exe 131 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsDAAFBAKECA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4761c225c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82da05e945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7059f8aad9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9109a6886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boARaXv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e031295939.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 82da05e945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 82da05e945.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3088 taskkill.exe 1116 taskkill.exe 1852 taskkill.exe 852 taskkill.exe 4460 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133769454162431879" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 3396 file.exe 3396 file.exe 3396 file.exe 3396 file.exe 3396 file.exe 3396 file.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 3396 file.exe 3396 file.exe 3396 file.exe 3396 file.exe 1212 msedge.exe 1212 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 920 msedge.exe 920 msedge.exe 3396 file.exe 3396 file.exe 3396 file.exe 3396 file.exe 208 DocumentsDAAFBAKECA.exe 208 DocumentsDAAFBAKECA.exe 3124 skotes.exe 3124 skotes.exe 4108 skotes.exe 4108 skotes.exe 4448 82da05e945.exe 4448 82da05e945.exe 2384 b9109a6886.exe 2384 b9109a6886.exe 1452 7059f8aad9.exe 1452 7059f8aad9.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 5824 e031295939.exe 5824 e031295939.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 5824 e031295939.exe 5824 e031295939.exe 5824 e031295939.exe 872 chrome.exe 872 chrome.exe 5492 skotes.exe 5492 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 872 chrome.exe 872 chrome.exe 872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeShutdownPrivilege 2624 chrome.exe Token: SeCreatePagefilePrivilege 2624 chrome.exe Token: SeDebugPrivilege 3088 taskkill.exe Token: SeDebugPrivilege 1116 taskkill.exe Token: SeDebugPrivilege 1852 taskkill.exe Token: SeDebugPrivilege 852 taskkill.exe Token: SeDebugPrivilege 4460 taskkill.exe Token: SeDebugPrivilege 224 firefox.exe Token: SeDebugPrivilege 224 firefox.exe Token: SeDebugPrivilege 5824 e031295939.exe Token: SeShutdownPrivilege 872 chrome.exe Token: SeCreatePagefilePrivilege 872 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 2624 chrome.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe 3672 f4761c225c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 224 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2624 3396 file.exe 89 PID 3396 wrote to memory of 2624 3396 file.exe 89 PID 2624 wrote to memory of 3492 2624 chrome.exe 90 PID 2624 wrote to memory of 3492 2624 chrome.exe 90 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 212 2624 chrome.exe 91 PID 2624 wrote to memory of 2024 2624 chrome.exe 92 PID 2624 wrote to memory of 2024 2624 chrome.exe 92 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 PID 2624 wrote to memory of 2556 2624 chrome.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc801bcc40,0x7ffc801bcc4c,0x7ffc801bcc583⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:23⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:33⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1852,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:83⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:13⤵
- Uses browser remote debugging
PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3364 /prefetch:13⤵
- Uses browser remote debugging
PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4636,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:13⤵
- Uses browser remote debugging
PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4760,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:83⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4680,i,15105751422473602622,3387175717438771158,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4812 /prefetch:83⤵PID:5064
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc801c46f8,0x7ffc801c4708,0x7ffc801c47183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:23⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:83⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵
- Uses browser remote debugging
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:13⤵
- Uses browser remote debugging
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:13⤵
- Uses browser remote debugging
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,8672575073420522391,17366877992565765807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:13⤵
- Uses browser remote debugging
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsDAAFBAKECA.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3812 -
C:\Users\Admin\DocumentsDAAFBAKECA.exe"C:\Users\Admin\DocumentsDAAFBAKECA.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\1008816001\82da05e945.exe"C:\Users\Admin\AppData\Local\Temp\1008816001\82da05e945.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xdc,0x104,0x7ffc80c1cc40,0x7ffc80c1cc4c,0x7ffc80c1cc587⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2284,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:27⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2332 /prefetch:37⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1900,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:87⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:17⤵
- Uses browser remote debugging
PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3280 /prefetch:17⤵
- Uses browser remote debugging
PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4644,i,13384106732259456239,10803818240989208819,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3652 /prefetch:17⤵
- Uses browser remote debugging
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6108
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 12926⤵
- Program crash
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008821001\b9109a6886.exe"C:\Users\Admin\AppData\Local\Temp\1008821001\b9109a6886.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\1008822001\7059f8aad9.exe"C:\Users\Admin\AppData\Local\Temp\1008822001\7059f8aad9.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\1008823001\f4761c225c.exe"C:\Users\Admin\AppData\Local\Temp\1008823001\f4761c225c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3672 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:1628
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fa23589-a927-4e88-9fdc-3441a7085c95} 224 "\\.\pipe\gecko-crash-server-pipe.224" gpu8⤵PID:1568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d6a234-9133-4a31-9a65-22ec1a0b1e83} 224 "\\.\pipe\gecko-crash-server-pipe.224" socket8⤵PID:380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3268 -childID 1 -isForBrowser -prefsHandle 2812 -prefMapHandle 1800 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a83a91a9-70df-4e39-b81d-c961e5be1d61} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab8⤵PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3628 -childID 2 -isForBrowser -prefsHandle 3620 -prefMapHandle 3616 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58b89a89-820c-4f55-828f-2a8d249c12b7} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab8⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4732 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4898eaec-27b7-41fa-bca8-d1135e1f7b64} 224 "\\.\pipe\gecko-crash-server-pipe.224" utility8⤵
- Checks processor information in registry
PID:5196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5388 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {967fee2b-9391-47e5-a02a-a77c9df48743} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab8⤵PID:5896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5504 -prefMapHandle 5404 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3dbe36fd-7357-4375-8120-e2614ed1e157} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab8⤵PID:5908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5696 -childID 5 -isForBrowser -prefsHandle 5704 -prefMapHandle 5708 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a2043bd-6675-4194-a9fa-3743002c81e5} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab8⤵PID:5920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008824001\e031295939.exe"C:\Users\Admin\AppData\Local\Temp\1008824001\e031295939.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5824
-
-
C:\Users\Admin\AppData\Local\Temp\1008825001\boARaXv.exe"C:\Users\Admin\AppData\Local\Temp\1008825001\boARaXv.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4448 -ip 44481⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
40B
MD5800547b40b40a6d57a70b74809b450fa
SHA1310a064c7ba82120f80af50892dcbe61b53f9d70
SHA256a562ff4b14badc73b0804883bf4ccfd9972e485123de5e5949981794f66ed936
SHA51239630e3b5069d0c66ea44069358cf01f180bf25103968f77d483a27deb7e91e796a1718ce9af2f438bebe8207537e735cd402d649e2adfa2ca7748faae2db949
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7eaccb1f-171f-44b3-a6cc-18a2f72ed360.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5c9413a6f2b1eaadd900c479277b31ed7
SHA15052c2e13d4d8de5a49fdd4c2c6d44e63754cdc0
SHA2563720de782aeecb4fccb34c4f091148d27dde4fced29f3d8bfe0666f1ad25fcfc
SHA512689210816a39ee807db0aa2ac007191b67e1cc2e48959e984c646055f59c720433b5670f7077f882ca48ba77e70b64408b905be45b848e64baf49834e82311de
-
Filesize
44KB
MD59063d8bfd1ee460cd5f2a209485fa66c
SHA10afd8138f9795640956624e7d00419f5c16c35f7
SHA2562c05f905205eb0f5d7d8acc160c53d6f5192f4768d5c1a9d7d295337f742f6f4
SHA5121a849cce6a94760dae8162eeb228e32d1565f24ce43e273f063a71c03c7a17568a98e8f67dfbb898d0d6565c61740b61924769452b51e35748bca21f9f2d7848
-
Filesize
264KB
MD5bc31dd98c62bd5fe8b60e210c7f15295
SHA16a57af508cb2a41d111a523d2838db079aae8370
SHA256807df9826cbcb18bfcb77714451aadbc1603c126988f1f2c3e5c1a1093f3e008
SHA51277f686d0b0715e574c39151428e031c38eef5dbf73819cf043a67955b142aa7eed08cad02a1b0e60a26493a38b9326f099107e46c2546a5a6fb81c73d75d4597
-
Filesize
4.0MB
MD57c2add234aaaa10e08d17d8869c753ea
SHA1796d21d32467c36fe4e3be8791b9ee7311d7d037
SHA256914728830a47cb01a0411067f8fa9f368972d7f8682bf9729210e62adb6ba071
SHA512feb8ba2f4ee5353577859f64010e5a6ef3ac2a22107677495216111c83367b424aa1c44647b68225fb81e5c78a66d9b66b0e32c912da08fcf66e6fd12529d38b
-
Filesize
317B
MD5a2cf9277da6afff2e4c52ee37dd3221f
SHA1b9bfe249d3fdc1079e5d8ab60e4e5374d5aa7356
SHA256309cd17ef4e2a394f58e72fc695eeb589584ba60191dcb39c37b376358045223
SHA512a27ce47ed91363fb8d2d683134bb219f54e9c4841f4f391fe9f7d0e6d828ab135512ad2859ccac368ea5b20eb255ff944a688f8096fb5d840e7ec6b28d436e69
-
Filesize
44KB
MD57406c5edf0ca60b700c825e9a4fb935e
SHA1794aac0c753dc733bc0e244f852413e11787b13b
SHA256c4419abfaa08549c6f619bf46b53903d92294b883afdd1e2a0bd8db12cc6f542
SHA51221bd544cb04b9b6ee4d9e42d016a736b0a0cc9fe2dd9e409aaaae8c5c49333a74cf4d515395f364a9d67eb97f90b3141e8308bcb497f07ed87efbca7c6d027c5
-
Filesize
264KB
MD59a4b923af6765501424e33f6d6dbea0f
SHA12e152ec3c33449bd42bf605b7c872b3c50b70cd4
SHA256f7ad6354b0c0ff850e75def060a2f1997da53201c6658c9e0ac833f6526f7059
SHA51261b7606f932f65ca5b16de30412b47903cd241d1a57935bb0b38e2a3d3f0c14aa8438c384268a6d76b47b0937e524262f944bdb1182f6a098d00f2e0ffbf82e6
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD506089ed7726a900b94b048c9b635dc17
SHA17df94bff13465a729e254b426966945f9435bacd
SHA2563548fced1a1021317e54640d7a76f283e833ac4677ca0dc95eb7dd698f9ea09c
SHA512e018216906dfc51cf17bee3ad9695cf589d6081c4412e6b91fcf98749fa27f1c7af4b2e58b14222ac81b5406e74ef7398806280880dd3e45a70a4ee31bda8dfe
-
Filesize
1KB
MD5e58ae855e22313b8e85c3266970d9921
SHA10cf2914a55a86f0b61cdc445ba5a1bca3691c2c3
SHA25640b7482f96c1f0d82a2d81b78f11d3cd9a35dc4ce3c3fccb54f4e6d2ff16951e
SHA512ff5521e5b52285720751614f8f04c3bbeb48392aad264fb7633411a77a898606f997feec699c003bbb1ee5ff043ed7e6cc15c5190601477d21c3936a492bbf71
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD596dee4b1a01dd249c19340fbabb8575e
SHA1f9cd0945ed2f204cd67ce80321229cf5b41e20d1
SHA2560159c08d2671b308e59fc2aec5ec6c3ab388cafce43906997c02f3e1779eab79
SHA512fb7efc043d2043915a9ffca9c2a8ef919793bae3e26474e4eb0db1ebeaa85ada5d3b50347d9fa1201a7a1e81f8425844e445d837a3a345c313f03ff2b050edfb
-
Filesize
333B
MD57e51dabfe30515b29b5be0051b07f194
SHA1e6e0c0cbaf66537d46465d5ccf49750cdeee9959
SHA256ea4927ac01d486a0b56567ae56258e07ae1306b115e3958fb5c3a0ce1795097b
SHA51249fc5a138e579de9f60d775d2d319f314eab95ec61f7dd241e409e3050a08144f6f3b2ec3a21b6072830b6961f523c3d95c3c2556a9ea33d3ef3881d42734c92
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD561b717a814f8df1cb9a9a832435d8447
SHA1cb616747feeae3dd600df160f9e8e7d7151379ee
SHA256314d2089bc41605a75502660e09f782394d5e80e960e7500f5ecf3d52f23bd65
SHA51250731f9c937671c09d4303091b78484ee7925d0153f7b39fc26487c6837004dc699e1a501b7ac80376f3086eb4d705989f369aed1b54635ba1dbd38f99bdd565
-
Filesize
348B
MD507996f03e0ccdb33a08cee240f4419aa
SHA1694d4a9efa483da094750e455c03a2def1ce5abb
SHA2565c05ca812d1a770ab6455a42155d6699621377211f3f64e8e0d1d4492dc71d43
SHA512893369ebbbf8db601627eac0477552fac25102ab20d35d927df1511c726e631bfe341723501d7bf4fd047779453e47bbc617ab5478395e80bb064c7e1cbaaaa9
-
Filesize
321B
MD55011eb37d7f5f58774a028bd4c75e4cc
SHA10fc75fdba7e58def30f90e49b174c622bc0581ac
SHA256566fa4675465545a8f00a33091a2c6d0fce5ab4789b52e2ef33c0cc97042147d
SHA512ef1a03bb6a87818ef7b351e319da44d938ad417a2404cbf37108cab81f588803ca1c692aa02952da6447a8eb13170a01330f9bd855bd998b2fecbf5ade2151ca
-
Filesize
8KB
MD584332f16ffbd05320cdb851f941484bb
SHA11bff38e59c5857d5e57561d2ba66a931ad859268
SHA2568fff74bb61683e92483ffc2e62ececd07f6266b1d17302cbb57ea17da1c65469
SHA512469d4e74667cf75430cd39e657b3bc3dd363e1591becf47763ddc88f99b0bbe903e913410bd1660b99377e60c764a49648eb24fdeed73c456c99060b1191f899
-
Filesize
18KB
MD520fca59dba0087612d7d9dcf06f3b811
SHA1ec34a9b5c61bd67e1a00d15e1a125271f692af74
SHA256edab0e44592f706a89f3cc23ffd2c6070e0a7bc855071c06fc3f299bb0abc9f3
SHA512def26beeba2c1f947d60074d44f743845ef87a389ad25f6641b52ec97737b65b18e484eeca10a34506dbe1b25d20293a49305927a6a51d26b4eed336d787681b
-
Filesize
317B
MD5c94d887239d12edb1c26e6e38b5d32c2
SHA1ee294ac9e7b12bef77a3ecc767636101add69d8d
SHA25691fd05e6e9d4c5d2d9547edda1083063c3b44eeefc0eb6d5c67b47670bcbce62
SHA51290725b7ef0a305241762757ca12cbfb3485b3e902929c4049d35d434562c044963f2b0d292af7339cd806731cf0b3ae27eca767debe40871f1013ed47e18ee7f
-
Filesize
1KB
MD55d4170fc4610647c9841057aa0e7102d
SHA1517090b546695c52b79fa9af0c29d85c6dfebda8
SHA256d005782c29b049ed6c52e95c70c873d491297e6ee36b2a269b162099f80f5e09
SHA5129b83aca1983d2c329b9b894d3e5378fb1e674b2d8f1b97b25edc9c4fc993d1bb087434d9dd0522f05726d1c9d57024fe25391ddcbb5ae90cc7d735aeaf0ccd2e
-
Filesize
335B
MD5f45886b1d72d24184f7683b06fe2cd50
SHA127a420899ab200dde79c3aaf6994e1c7465ed4e0
SHA256be27d6a195b282df262aa9fec821fd4a04e9663e0c3c4bb353ea971a77c6bd59
SHA5120b36eb8483672a198bbccc57901c27715913a1411daacd5efae5543ff0c51946685c0ad8c3aee4809b82ba599e8ba003e148c0af35c43e6fca29784b9ee5cf0c
-
Filesize
44KB
MD5b3efded82ef6232998957b06a1f124cc
SHA12828d6e43d9e9011ce51848f83061ae06d6c50ee
SHA256d0b700530abe4ab314ff72d0ebf2f3b2a4ad77ed3023a92d2111d05ed0b9ac1f
SHA5121a5f4f98bb4a1ab8c76b10fb0f17f22c4804d5c94bbeeca8111604a55964420d4a8c83032379901ac1cac67c1e178cb4e8e637e102c3b1b3619b4169b4ce3dfa
-
Filesize
264KB
MD507a66a574f38c7e441b78221b47207d0
SHA18c5ca5037427f3f0dce0569a4240248d820fbfc1
SHA256d8564fb884946ca93204d8e6d0682f57a2aa39bd5af5e874f25dbba6fbf3213e
SHA5126e021f2dd8334b33b96f8e498b0e2ba5936f704d4d760364a16092c5d39fa77bc8d5c3731fd88e092eb93a69f81bd32bd9523a96be4b6b82a746caecf2935798
-
Filesize
4.0MB
MD5e39f95ae48a87705c07abeae9503e503
SHA17780349ff35b9620ac9cfbcf777e193c57b12802
SHA256509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75
SHA5129e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
5KB
MD5f2fcbf9b608f63ac2bae98bcc77b75ba
SHA1f19f7c184ba876e832b54443e788cce2216aeb8e
SHA256aef8625999dab73ae0b2768e02901e4c566363dc1453f15796f743e79a80fa37
SHA5120e9d420e5304a59070a9381a0ef0ebfc7bf5be3c52d0bda4047e1783796d4d9f66b504e205f1469da023c890767c549367b43c61fbc186c152899b76962d699e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5a737d596182a3914a0123bc01a815864
SHA1d8a3f2346f1f4b3598cd2c9773491e9fc4b04fdc
SHA256ca573285a0da49717bbbe7b188ff1d9031e48259b097d621de2221d867cbfaf4
SHA512e6e57fb4cd987b0576376ebc34fb1067eb82465290302b3ee38b1a7775ca53bec85a92c39805539e0d87a063a8e23f57b2dc99585d8ab903664d3455debf7569
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD56f323f03642f9627dcfaeed81e40572c
SHA131dcecf6346977673b9c3ebdc66169373c8e5143
SHA2560e841fdf27252955fd4c9491ac2bb0f47ace6268868a9930b79db737ba938c98
SHA51298039505cc146d6cec999f5fa01aaa1b686de5781d3dcd7d0b6eb0c349b327437fa2c20b5261d36d9815c9b8d93ee0797d7c71fa55ce286e8a72a827b2e81e0b
-
Filesize
4.2MB
MD53b098936d2ba04149e255a50f61b5415
SHA1271d4427a66a5169e0928535dc93b230fafdd916
SHA256b67cb8c91c159ad18db1de834b32e3d17c42f6b595762905c015eba800b93a3b
SHA512810e6b83732f7c3426768348390cde9c5b3ffecf958edc832982475c91bfd5747960477270c7594dd01d310c436ec1da51f277dff5bf6b58d1c13b28d8042d7f
-
Filesize
1.8MB
MD530ac2811f15dd4a4d830235681c124f6
SHA12ed722e15cd0d8c29bd024d486db4662c859a38a
SHA2566f41c9632c76b5e8dd707ec555d72b71b3d1c0527d66992466a515a62240e06e
SHA512cac78ac03b179f2800cb7e6663a353a012944ce910162547679c0d26cf7c9e8d27b504dd2a3bcb1cfe0dac9f522f24324aeb8c4ffae11dbe159b98567e4c4314
-
Filesize
1.7MB
MD5a701ff816a94c1e54f8b2175d9fcfd19
SHA110d6f38310770edf01970e9572a111377c21d829
SHA2569d52d6333a4b985ec7d0baece9f1c0c99c1cf4ea503f7b8bbce0fe38694d0a32
SHA512ee1aa73fad205b7af497d8b6e9635b741ad3b487ae57d7572218c4f571515529a380f443d7cf80658e89f56ab41c91d7ab0eba25c2f2212b72d11e5bf9a7f070
-
Filesize
900KB
MD5587faaf19f7fa53b96b91b9e6032e993
SHA13c6d63966fd31e0cba33aefaad3d67cfb34091b3
SHA25608bf0d1c8f6edfc2bc55fbb23660a542e68fac2808c0ea9563730a7cbef25d2f
SHA512404d5d56d0fb82a43299687758641f0f5be9f2fb95c8dc4396070eb8fd89b7d2b8e74c013ac24224f34c2d70a8f16473aa7b116afb6dc3100580e47be7f217d5
-
Filesize
2.7MB
MD5fe168eb5d702f0ea1e25ccfbce08b723
SHA1c20abcb826c1e995ee1df414c4850148e83d4b61
SHA256e839bd20efafea7d0f975479f0913e41ae34d0b3525d3b876493b0d4e4036820
SHA512cbe692862d282af94d71a51807ec30ecfc0997e99dc5b4623b7d3494edb5de61a43e0ae6c2d67dee4afe436c77a9ab1ac62a1c8e43f5e201ba6b698d1f3d1168
-
Filesize
307KB
MD553507455bbb8e1f5183464a47d8890d7
SHA1b83af2fad512986dc91bb2099a227e058697dabb
SHA256b9644de579b105d38748c88d27e75600c9f3f07076e7bde4bc13ae32ded2db86
SHA51207f8e5171812a02eea2315424595ab374784d92ab995763ede720b577255dfb7c80e64a3fadaf9a281c72fe330fbbbacd8e06d2db87a21b5a2336a87a7d2e506
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5e7adb0e90825d2a5eb4ed3754c088047
SHA14899be66f2f0270042ac733b7c389cdbba2dc27e
SHA256df4623f186f9258571eb0ffea69d10a1ed0b785c35e2e1adec70eeb6e4889e8c
SHA512cc688357e4678c5569562544253e70c4bd14bc2ecb289ea37b0d6755cedd4b8672abcfc31a7c19e66fe8e107f6fa9347d3c482904ace71196392b04e00731e7e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD599ee6f67c70dba6f6b849476a11f4bd0
SHA17fa88953b71e6f55a9e783c51ef33aaea15c9982
SHA256713d197b6022848d6fdead0bb1e5b83eb2d27667b6b3ea80c1d15546f76651fe
SHA512803a2732fe262f6c30a15686bc4433ec6510c76a6cd9d8e3f0dc4a55d452de59c53d8de6a130400e6f7d4d01fd68e5d3767ee8e8f368acd98fb24579fb95f3dd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD591fe850c8f88e602dec8a4c27fac4902
SHA18fb2748346ef5af8446a5204eef5bb0988af2176
SHA256984c53fe06ba10dd2bd324d8ff887fdbca5711457540c4aecb07a95485f32825
SHA512f31a86b888096e1f87141f1233ce77dfb5c973b84936f2f67482cbda2dd952de3d79fcac1e5955f9d955d4028e9ffb4cf2790dc164e303c523e9aca1e25fb90e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD580b00b285c71f68c7a3caf5766ac0d9a
SHA10aec2c849bc63459c81d0afa31cfb7aa6ab796a0
SHA2564d4a4238b6a270322050974f3f82e716e270fc8f6282d4b56934c08d0d5536a6
SHA512ae08b051dc79ccdb765aa27e1187a9c38dfedd29d8343df9b9fd88624ea7655c2a0f34ad96a5130a294e5a5e1d6abac8f998d4b6c986fc02019b9e7878cbf772
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD541f175432f066c65dccad0ed0aef89d2
SHA1b6369d35d77f96c3993a22ac8be245f231390a2b
SHA2566bc2538162aca29ac039fbaccd83c9b48b9b4702cd380f45301d8b012301a79d
SHA512a1d7de46b203b7986be6807ff240643511670379e1a629527e824809af60078202680da91b1d51754f9a55aceee3f673524c40385865b26e6478b7011cb45ce9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c06830ec70b3028cb57933f7ac91ea52
SHA17c21293bc67573c59ad82ca27f06c4f10c726781
SHA2564f850e4ee4250d40671e614b7d8cffedea894f9d24a07920244841eb283c0ce5
SHA5128f4ceeb227fb79332767acc8cf7e165ac76d8f495470ab0795346d09b7d1fe5758a917f2d55b7413ac91008de4315081e6fa63aa1ce444de20d938db190f38e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59e97d82a92bce86189634745640aa857
SHA12cc222e23fff1325ba5de0e9dfb1c784a3293c1e
SHA256b3143a4bdfa9c456543d469ee8e18b23286f8d18e9205de2221c75b99aa950bb
SHA512b3bcee76d8956a32c7441ebec359d93fcd27eab767e5b2f3811412e0bfaaec90faadefa97bd734e7257c52458d4599d1ae78938c4f3d6749cda0ef33b0ae0f66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\2309598c-0eaa-45ef-9d07-f897801d46cb
Filesize671B
MD5551324fd5ae0f5ca73ac7ec8b29e9bc4
SHA1b72527668f5d343b3c4cea767c1706f3f5695f64
SHA256792505f471223b1ad651d6ddf08161e7afd7041c25e5ab530744b8fc9c0be1e8
SHA512a7c8f4c12c685649cd515edda73ee5eb56a5c10617ad996b2aa3ea1f1d5e1c6c1235b7ca446682038f122ba25162be5bc4b092c9449fcf531045787781e4a693
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\4af6e9f8-8442-4473-88a4-37b133f50eee
Filesize982B
MD5d05367db0442aa3f799456a28ba3a2f6
SHA169ca87780a86671d4ffbb0d27e70b1cc1d76c720
SHA256860b3706d89cb0fa50afcba5df62c07ed9bb759052d5592203c9b94e1351c41b
SHA5120b4cea32ddbf64d119efb11d48af96d57c34079aa1bd624dc40d1b723fc80011edf48ab19b20583b0376482d4f57140b079e064a845510c3db1260b1f9f3ccc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\58e8e9c7-61e3-41db-9f80-3aae2b0e5056
Filesize25KB
MD54435e988acb95e78ec773a5d4f6c9e97
SHA179b49357b8b5d271d71ac3ba3d99335d17910494
SHA2564f697a6525d420e8d7de215e2e036a3091e131ee66da26b3851a60fd1945a7fa
SHA512577dc2b5e21738b3826c3181beb14082f56d8760ed67ac1353e774110c2dc1fc715692575f44bc90d58217269e4ac8a23497ceff160ee531b2933536ff44d4a1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5a2195b52ebb002eb096f46688725e93d
SHA1dfbbcb16e475f165c1fb9ad1147d71bb8139dcb1
SHA2564a351e004e9a7d400c105809d8342ad6bbd1c5ef2c294b0fa1394b4d9ede7743
SHA512dcd741dbcf2261179fc717722e00f48b59940d689d80797e2c61c8cf00ac90a945dcd158c35f33b5bcdfee68d0a0070607e062496c5a0da209b604ec5bb0995b
-
Filesize
10KB
MD59b6bd18bf6015692bb11ac4ad7ccb83d
SHA1416fb53fde42f2e0c6e736a37e991f31362e2579
SHA256c39b7c94629360c907c232c64dde09cfb3e94d4dbcdb1dacbef903fdb0ab21b9
SHA5125e1563bf22e9b5cdade567f316fcd6fb3c468ae54f12434a228342c59f920f715695aba3fa9806fda11770e6787eb2d9c35966747f0b7e76aaa307c5fe52d2d3
-
Filesize
15KB
MD53234c7bc757815846a1e6d83775df7dc
SHA171e7a441f121891bb3fa9886a4e1da9f5bd0a9b1
SHA25654d2f0ebf15d9efb9740b143a3c8d87d567e6d91103df2a92a2c0bf45cd3a67a
SHA512f20d77a793bc8b2733dd92a8d022bb65a1e570beadf2ba667d3eeac1287734892fa69a5829a98f0dacd290d204b9b09f63e1e6437977881eb443ca05cc65749c
-
Filesize
10KB
MD529809f330e19421c04d08a319e329ffa
SHA1e33fceee40b40895c3af6c7d9c44698bd58972f5
SHA256ea0cb2c28287f7cb6c8d713de12d52fcc67e3ed4cb2aef19ace1e9c7b009da52
SHA512263273914fd5c7e6737bbd5e4643d116ec6e03572dd4fa897df305c7fc51b52569383d9303d524ac47640f939379ba6430d52e93938177a53aea59d16d7190cd
-
Filesize
10KB
MD5dd89f55c9d1733e5793525c12e882082
SHA10666848994d7671c43d19849ab12c8d71aecf9f0
SHA25695737a5c0578759f75c75936f7a2d0a8000f8176605a1d3eba13daceaee4e976
SHA5128dbe9e585c5b29d01437a2dd510ba717cb5c1e52641b9f425a4c629bc14247d8fdecc2cffa7e2a8f6bf0088bbb3454216f48ac7d5644a503fd058cd032632e04
-
Filesize
14KB
MD50f63e151f675f306135f4e80cfad0c77
SHA1d897fbf5d49e6c5c083bc6937d6e5a7d89a65def
SHA2560364341d42f2f63d88b5074acd32b7afd8e9bea8407b9134fe524d470946f9f3
SHA5121177b09de165b5d5354131f31a5b8e1d60d1c98743c0ec953ef3162881f19bfdfcd3b5222006dc8eb168022ee2eb02308b1a8f5e45084e0bb4d44b9272d01e86
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD566def7f63792023f161f490f4f655eaa
SHA1cda6eb5916b7d1f94cd518912a511383fa98595d
SHA2566933890f52ffa18e1b767d7c5dfe78595acbe391f9dcecd9c3c5c81d56228c48
SHA512eaaa21665a300c663fd82599f68ee633f998358cfa4b0aa845f993b8cc5c24b190b3a7562fed2f2c05cc5a5176fe24d6fb39a12916490f8baefaa3ceb35c1eda
-
Filesize
1.8MB
MD5a497ac328ebe667e4502871394265720
SHA1c9cc92bfec36d6608b79c062f3fd69c86800fc06
SHA2567a3739af1f97eeb953e104354d454b85f6c395b19817b59f014f86520e2501c3
SHA51237956d11c549da390e3b78de2a28688389e06f34525770ce6b709422d086d021c3cd64c31ed5c28a7c02f8080feadf87bd857207d69ac898a7405cd864ffe030