Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
a62bffb1a78766dd18aaa1cb856f9c21
-
SHA1
d146e08616599e4a2024045d5319b66cf7af883e
-
SHA256
b8a2bb778644dd41401f31fa15dfe75332502811d5bff1003d4595c04ce9e544
-
SHA512
d2d7ca6f6e28a9c3c17631bf9c2f1ace1d2dcd338071e1b200b9c2e7acdfa413bf6e12801b7e07571bfdfd4d4c7124a3914132c5e035cad82a844c70600dc36d
-
SSDEEP
49152:7iz+8OencRA3qkCGJPuwhK3I5KCjQrCF+Yriy:K+aGn0JPuwhK67r
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3156-194-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
da71d1dc7b.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection da71d1dc7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" da71d1dc7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" da71d1dc7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" da71d1dc7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" da71d1dc7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" da71d1dc7b.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
file.exeDocumentsGHJEGCAEGI.exeskotes.exec4c75c2722.exe0faaf08952.execfd435e93e.exeda71d1dc7b.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsGHJEGCAEGI.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4c75c2722.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0faaf08952.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfd435e93e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da71d1dc7b.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 12 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
msedge.exechrome.exechrome.exemsedge.exemsedge.exemsedge.exechrome.exechrome.exechrome.exechrome.exechrome.exemsedge.exepid Process 4028 msedge.exe 4472 chrome.exe 3608 chrome.exe 2300 msedge.exe 2432 msedge.exe 2940 msedge.exe 2896 chrome.exe 5856 chrome.exe 5844 chrome.exe 4724 chrome.exe 2056 chrome.exe 2376 msedge.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exec4c75c2722.exe0faaf08952.execfd435e93e.exeda71d1dc7b.exeDocumentsGHJEGCAEGI.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4c75c2722.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0faaf08952.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfd435e93e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da71d1dc7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da71d1dc7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsGHJEGCAEGI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4c75c2722.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0faaf08952.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsGHJEGCAEGI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfd435e93e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DocumentsGHJEGCAEGI.exeskotes.exec4c75c2722.exefile.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation DocumentsGHJEGCAEGI.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation c4c75c2722.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 9 IoCs
Processes:
DocumentsGHJEGCAEGI.exeskotes.exec4c75c2722.exe0faaf08952.execfd435e93e.exed87b23084c.exeda71d1dc7b.exeservice123.exeservice123.exepid Process 776 DocumentsGHJEGCAEGI.exe 4148 skotes.exe 3156 c4c75c2722.exe 2108 0faaf08952.exe 4448 cfd435e93e.exe 1496 d87b23084c.exe 2640 da71d1dc7b.exe 4640 service123.exe 5780 service123.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
file.exeDocumentsGHJEGCAEGI.exeskotes.exec4c75c2722.exe0faaf08952.execfd435e93e.exeda71d1dc7b.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine DocumentsGHJEGCAEGI.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine c4c75c2722.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 0faaf08952.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine cfd435e93e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine da71d1dc7b.exe -
Loads dropped DLL 4 IoCs
Processes:
file.exeservice123.exeservice123.exepid Process 5084 file.exe 5084 file.exe 4640 service123.exe 5780 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
da71d1dc7b.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features da71d1dc7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" da71d1dc7b.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0faaf08952.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008983001\\0faaf08952.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cfd435e93e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008984001\\cfd435e93e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d87b23084c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008985001\\d87b23084c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\da71d1dc7b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008986001\\da71d1dc7b.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cdc-228.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
file.exeDocumentsGHJEGCAEGI.exeskotes.exec4c75c2722.exe0faaf08952.execfd435e93e.exeda71d1dc7b.exepid Process 5084 file.exe 776 DocumentsGHJEGCAEGI.exe 4148 skotes.exe 3156 c4c75c2722.exe 2108 0faaf08952.exe 4448 cfd435e93e.exe 2640 da71d1dc7b.exe -
Drops file in Windows directory 1 IoCs
Processes:
DocumentsGHJEGCAEGI.exedescription ioc Process File created C:\Windows\Tasks\skotes.job DocumentsGHJEGCAEGI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1732 3156 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0faaf08952.execfd435e93e.exed87b23084c.exeda71d1dc7b.exeschtasks.execmd.exetaskkill.exefile.exeDocumentsGHJEGCAEGI.exetaskkill.exetaskkill.exeservice123.exeskotes.exec4c75c2722.exetaskkill.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0faaf08952.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfd435e93e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d87b23084c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da71d1dc7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsGHJEGCAEGI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4c75c2722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
file.exemsedge.exefirefox.exec4c75c2722.exefirefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c4c75c2722.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c4c75c2722.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
Processes:
chrome.exemsedge.exemsedge.exechrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 5072 taskkill.exe 4220 taskkill.exe 1960 taskkill.exe 1460 taskkill.exe 4920 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133769987547356867" chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
file.exechrome.exemsedge.exemsedge.exemsedge.exeDocumentsGHJEGCAEGI.exeskotes.exec4c75c2722.exe0faaf08952.execfd435e93e.exed87b23084c.exeda71d1dc7b.exechrome.exepid Process 5084 file.exe 5084 file.exe 5084 file.exe 5084 file.exe 5084 file.exe 5084 file.exe 4472 chrome.exe 4472 chrome.exe 5084 file.exe 5084 file.exe 5084 file.exe 5084 file.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 3328 msedge.exe 3328 msedge.exe 2376 msedge.exe 2376 msedge.exe 5084 file.exe 5084 file.exe 5084 file.exe 5084 file.exe 776 DocumentsGHJEGCAEGI.exe 776 DocumentsGHJEGCAEGI.exe 4148 skotes.exe 4148 skotes.exe 3156 c4c75c2722.exe 3156 c4c75c2722.exe 2108 0faaf08952.exe 2108 0faaf08952.exe 4448 cfd435e93e.exe 4448 cfd435e93e.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 2640 da71d1dc7b.exe 2640 da71d1dc7b.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2640 da71d1dc7b.exe 2640 da71d1dc7b.exe 2640 da71d1dc7b.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exemsedge.exechrome.exepid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2896 chrome.exe 2896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
chrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exechrome.exeda71d1dc7b.exedescription pid Process Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeShutdownPrivilege 4472 chrome.exe Token: SeCreatePagefilePrivilege 4472 chrome.exe Token: SeDebugPrivilege 4920 taskkill.exe Token: SeDebugPrivilege 5072 taskkill.exe Token: SeDebugPrivilege 4220 taskkill.exe Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 1460 taskkill.exe Token: SeDebugPrivilege 4488 firefox.exe Token: SeDebugPrivilege 4488 firefox.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeDebugPrivilege 2640 da71d1dc7b.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exemsedge.exeDocumentsGHJEGCAEGI.exed87b23084c.exefirefox.exepid Process 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 4472 chrome.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 776 DocumentsGHJEGCAEGI.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1496 d87b23084c.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
d87b23084c.exefirefox.exepid Process 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1496 d87b23084c.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 4488 firefox.exe 1496 d87b23084c.exe 1496 d87b23084c.exe 1496 d87b23084c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 4488 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exechrome.exedescription pid Process procid_target PID 5084 wrote to memory of 4472 5084 file.exe 84 PID 5084 wrote to memory of 4472 5084 file.exe 84 PID 4472 wrote to memory of 3784 4472 chrome.exe 85 PID 4472 wrote to memory of 3784 4472 chrome.exe 85 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 2776 4472 chrome.exe 86 PID 4472 wrote to memory of 4984 4472 chrome.exe 87 PID 4472 wrote to memory of 4984 4472 chrome.exe 87 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 PID 4472 wrote to memory of 2304 4472 chrome.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc1cbccc40,0x7ffc1cbccc4c,0x7ffc1cbccc583⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2040,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2036 /prefetch:23⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1852,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2052 /prefetch:33⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:83⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:13⤵
- Uses browser remote debugging
PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:13⤵
- Uses browser remote debugging
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4412,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:13⤵
- Uses browser remote debugging
PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4712,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4716 /prefetch:83⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,18103716917158355095,14379618035847462023,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:83⤵PID:4016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1cbd46f8,0x7ffc1cbd4708,0x7ffc1cbd47183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:83⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:13⤵
- Uses browser remote debugging
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:13⤵
- Uses browser remote debugging
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:13⤵
- Uses browser remote debugging
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2176,14137477284497328224,2033687249931051918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:13⤵
- Uses browser remote debugging
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsGHJEGCAEGI.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Users\Admin\DocumentsGHJEGCAEGI.exe"C:\Users\Admin\DocumentsGHJEGCAEGI.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:776 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\1008982001\c4c75c2722.exe"C:\Users\Admin\AppData\Local\Temp\1008982001\c4c75c2722.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0bcdcc40,0x7ffc0bcdcc4c,0x7ffc0bcdcc587⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2348,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:27⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1748,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:37⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2016,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2484 /prefetch:87⤵PID:5156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:17⤵
- Uses browser remote debugging
PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,15962877516169607281,16905105222487449750,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:17⤵
- Uses browser remote debugging
PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 12966⤵
- Program crash
PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008983001\0faaf08952.exe"C:\Users\Admin\AppData\Local\Temp\1008983001\0faaf08952.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\1008984001\cfd435e93e.exe"C:\Users\Admin\AppData\Local\Temp\1008984001\cfd435e93e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\1008985001\d87b23084c.exe"C:\Users\Admin\AppData\Local\Temp\1008985001\d87b23084c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1496 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:1772
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2044 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {338fa9ac-fb8d-496c-a4ae-f4479d2b9360} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" gpu8⤵PID:1984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8725f1ca-1cf9-4b1c-823f-6252f1ce74fc} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" socket8⤵PID:3964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3084 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3136 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4a9578e-a02b-4905-8d63-3bbb732d477c} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab8⤵PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3968 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 3908 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7160ee5d-de7c-4ab3-a7a4-1e44182395f3} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab8⤵PID:852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4592 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4584 -prefMapHandle 4580 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e16e904a-9357-4d7f-98b2-70ee1a56f3a4} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" utility8⤵
- Checks processor information in registry
PID:5532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5240 -childID 3 -isForBrowser -prefsHandle 5200 -prefMapHandle 5164 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3026e57-befc-40ad-a71a-a896e69c7ea5} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab8⤵PID:5176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5460 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb46a969-3a3c-4795-bce3-d81390802b8b} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab8⤵PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5616 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1272 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5935e69-5982-4a11-8174-216521fe27b1} 4488 "\\.\pipe\gecko-crash-server-pipe.4488" tab8⤵PID:5220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008986001\da71d1dc7b.exe"C:\Users\Admin\AppData\Local\Temp\1008986001\da71d1dc7b.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1936
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3156 -ip 31561⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
40B
MD573d076263128b1602fe145cd548942d0
SHA169fe6ab6529c2d81d21f8c664da47c16c2e663ae
SHA256f2dd7199b48e34d54ee1a221f654ad9c04d8b606c02bdbe77b33b82fb2df6b29
SHA512e371083407ee6a1e3436a3d1ea4e6a84f211c6ad7c501f7a09916a9ada5b50a39dcb9e8be7a4dee664ea88ec33be8c6197c2f0ac2eabe3c0691bc9d0ed4e415d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7ed1264f-06b9-4523-8de7-726b4ffe96d2.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5f9357274de57fe816730d53331b53ee5
SHA18ff73c30f3fe2edcefddf00648273b996d405902
SHA256dd15264aa637fce648ab52250c65ffb3b4fc80a618aea6f38844362a7ec75082
SHA512311721a5f60b6f66980205443a4b90f4b777f018a12de0a842b3aec03a7276680b16beb8f994556b1a4291505ec04b6a54dcda5fabb93f00b2f2a840c398c4f1
-
Filesize
44KB
MD513b5f0f938bcf94b53abce5b44474ba0
SHA1989cac03aca51744090ae523d8b1a56110591af0
SHA256d923fbc2ad1c7255c0e107e9d68e5c20a09acdafe30feb5514deb6362edc2417
SHA5129c88f958f01835aff384462effaac67f0252641040d44579f5c366916e702cf78f4c4e55e8c40a98ff542e68afb45e6dbea0f56534fb0c1d7b4066a3be2b95b9
-
Filesize
264KB
MD5a8c87d1e3fdd581629e1191cdeec7278
SHA1cbf6c156a0d3e93da0854f001dd99a59e2b8dac2
SHA256295ac087d3eefaf0f3c1d90b94b99adbe63cfcd363f7074a1a6096383115261f
SHA512ef8dfbc271888e65cee3b6456a2fc2627306806f951fdb87dc49117ac4bfd1dbae9d7909b0c71ec7a9e66ece9bc124b9f11b8ca15b29dc72bd55dba2070353f7
-
Filesize
4.0MB
MD5c64b8a11096e49ce2cf0bc03fdb2ba99
SHA15606affd665fc9bbd209ee5f1228fc8eef8e3285
SHA256d96408fdf6822bacf35116ad7cfb12d6bfaf473e8e95742f22c2e4d99b5e7a42
SHA512bf4da10cc5d41a22f83b34bbf5fb5546f7def8c05e4c68ec00bcfed8e8230a6d0e7700606ea8137e20384a2f0602cb2308b3134f1b11cd0f83e60faff7430d27
-
Filesize
317B
MD57b7f7c317081357070a522ad9beaf698
SHA1e0e3ef308f406836383d288e23417c098aa8b23c
SHA25616f721a80bfe97e0b1d78c2f13a8c19e6f466cb2c1edf060c270eeac86cfd060
SHA512c7fd9f8eb4c5544e62cd12c9255d1b1074a4f2337b138862f5695448890ce8213e9877581774471f85d354586a4ac36a53dfb5221d577ff848fd4857727c7a6c
-
Filesize
44KB
MD56d07ef441352aaa0f44b7aec7d0b35a1
SHA1f2d5a1d8a335014fb3b605824ea1e7b21de91f55
SHA256c3af3559c03a30ea6f22c6fe47d6885601d15d813a5c7e4161288a4c21fd8fe0
SHA512b1b0339d7d5ebd450bd537ca3a8b5eb2768a17c25e4fcb9d0c11ded0609e9cc4118fdce11360b70d191f190ba4a38acaf4be4be62f30d72db6087bd1e3f738bd
-
Filesize
264KB
MD557499b466412a440c07fec0f47022d51
SHA1d9226875ae2dfd2bfe8e25423d52649393277dba
SHA256453eba4a12157982526c0afcef2c9dd4d93e5d162b51c802257d90348a803680
SHA5123ed2bbccacee7337e33a0ecb627646c5de75f1cf8728c83079e6403ae798c65ce79af1d45c35925fd498d4f906bca08af67d24c057d9b304d96f459ddd62b1a5
-
Filesize
1.0MB
MD54e2e997da0ae227057e074c67afdb7fa
SHA10a0b4db63b5a84f0bbbd8b0d472e665be69697cb
SHA256e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4
SHA512cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f
-
Filesize
4.0MB
MD5c73ceb946a84dd65c7571e065361ff89
SHA10188249b60156917726cece1be3ed2c5157841c4
SHA2565ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483
SHA512f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4
-
Filesize
332B
MD5ceb46e5159eeb938e8965244d57b9a8c
SHA13bf5d94e1f39bbb56030f03851d5862e4ef99fd0
SHA2561fe1dfeb57771e1249f3170841cab8eaff8361fd2d0e56559bb7506032bb6b0f
SHA51205b57e474f79a2c129192c6e954d1632098df6b8798d34e5e85b39998beafc6c37a47ab776f7a32058e8f366496486a96a07212775cd11aa85561e308d09ef99
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\defde679-cb5e-412b-b8a3-d89e6d37e65e.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD5f903ca5e90af3cbbb598f7c34c01cba5
SHA144514eaf30ce0a8f6bb608a08011c1fb2b47b6f8
SHA256b0dc30736a6dbc504cd1d527c5fce496b1f9850db9c6bd53551aefa39f32b424
SHA5122f16610792c3c65d2407333ba6f91de7ee3c6cdc06cb2de100a52363290ddf04fb46da8c980ee4d83324aae65f8b046e66d1e5760ff26c80e0c1a1117063204b
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
320B
MD518ffac425e1e62be43d54ecd614a63d3
SHA1755fe6b73d469da36a4401a892adc7048963145a
SHA256b4a55172e676e5532b9e2b4753fb6633cda009901062554ffb212c23aa958fd7
SHA512889d903e4e36b85cfe96d71c99bbf6360a3fd3967efbde7f0ddcb043cf3856180cc3ae38d5f505bd7f7cb85d517c5c0bea4d5cdc3d81879293623b24a5227fb7
-
Filesize
345B
MD5d4a913e198bb8b0407fccb70dd0ea0da
SHA127b15872f17fe3d2ae6bf35e304bba3ac915e5ba
SHA25692c754426a0db241d53cb036c03726a0739978a623bc80ff4ae92e5d94cb95f8
SHA512b1cb24028a4d72e7b99b49efcb3b114492b1f722dbfb96d490c3089bb5dcc674dc63da1c1b9c9c211e2f3d32540f760ac135337454d7498cf611d019ccd1de7f
-
Filesize
324B
MD5af19c2b084d171316e3396efe1bfec9a
SHA1a6aa548fb782414d92d72983fa6854149358b8dc
SHA25646f954705a3e2a74c238fabe179e1ce9fedc22ea001c671845b3b0b8533d0ae8
SHA512b59f5a2c6cd18b6acaf4b02b40a209aadda17535589c42247527d58fbd35a87b6dc5007b9dd882d010f6c901b93bc6dd1c7eed015968e003b7bb2b49c6aafddd
-
Filesize
8KB
MD56b2e805240f93a5d0e8a69de480fdd38
SHA1aecb854e51bc24883183db880e4d35429fd6bc56
SHA2560b81ac0922c7e5ef5a603e6f096b89a9fac82e61a006ff10a52fcdc0df21c2e7
SHA512518280949c83ada7332ca840fc8cb3d6414bc91c653af930338f403b96b0956fd127201c476f9504405cbeacbf18451c2f0c7da1c0086c43f12081c407579e6d
-
Filesize
18KB
MD50d69fa7321cc646fc344c383f7faac33
SHA13d97fc5586c9c1b58db2b215f3d56aaf05d94e6d
SHA256f36bfc714567a82d02b9ca86a392f314211a9aa1bdae36f0bde749106c5a6f02
SHA512a54e60446f0b3be6989a823c2b3fbdd061500f028d2f994155cad9839c81687f6632eddaeefda7cb4178ad1d4b0aef60fb054558b0b0a36fcf856e65d9172dda
-
Filesize
317B
MD54ae2f855017c29520e1976c8065c83ef
SHA114afb8b5951ae9c2631486a2625dde7c41963aec
SHA256303c1a20b41cb0e08ba06ca94fb01bcea7e037be6e6a9dd23eb66b0d75f1ad28
SHA5129096acc7084359e5e8f0d68cc7346e230b8ca0a3a80f2e253020209080af68f4cb03ad1eed404993d5acf63ddd8be3fb34b460abed51aa789644af0fa907b925
-
Filesize
1KB
MD5e99c26c4c0cca685c6b0ff4709b57cd7
SHA1437d67e170863eb0f926a467d89e4ad88d7e065d
SHA256427e6466401f0f2a14669fe96fa57333fe381faa1708db4734cf409039a83bab
SHA512cb8daf5284df7b25391b4dc4cd7df296facc99db399fc76194ff34e47b2f737dfe71aaf62ede0458ded03152a7c4a2fac5c01ae626af7dabfc6001218f7ccb56
-
Filesize
335B
MD5363f9edeb255ee8ba3d719efcb182f36
SHA1c77cad57ea94c8bda849a034cbe874433028eeeb
SHA25608519886fb243da5c2115c6daa5627bca8d82ebb95c9fab0ce4db6a7a4ece481
SHA51213be651274c82629b3636dc319ab2e4fa72afe8609a309a4de7de3953ff71abe6fd872d03f4401cc61fbab843ddf5137e529cef345f13dfcf887f66d95fbb88d
-
Filesize
44KB
MD59882f3ae9ec7e091fbb38b583ccee14c
SHA10d2754f3f4b587799b6e8ce3c820cede3fc2bd15
SHA2564513608ecce453dabbf49105712ba4f58e02fd3be11b3b15a9b4eb227a5008e2
SHA51253f06ab4bf6fb098894f74b23c4cd66967ab4994885171c74963d6c0b583d12bfb60f773c484b9457d88d8b1515a8c50a51a02713e0fabf313361f2305057ed6
-
Filesize
264KB
MD5256140206824490d123d4769a1b7d6db
SHA1049223a8b10523ad1bcc0e29467cbd783bf94ceb
SHA2569df2dcc0968401a00035c9d3f17b3f6386f777651c3c938683787c5c656aeea4
SHA512f2b3dd6c9ff30a5088b5ef955c82cf32680b5d251efae2f02cba9962f756c5818d39da2e5dc08698efbafec672a6f1ffb767ba9974b5ac06676be9c7237f7c65
-
Filesize
4.0MB
MD5755aebd35ed6d7b087ffffa978f6c677
SHA1b6cca1dd22034b59defef639c74783efcc530cef
SHA256db631dbaba233658ef2cc73aa12fb624781310f8f006dac23b51c3cdfd58988d
SHA5122b9e0d98e5af0daf29c92c58be48896e96e3dc2e63def553ae75108646c41458068ca2b91b463bcf7bdbef6163f58e5899c0e80d95891a7a24a8a19e0aff1ed7
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
5KB
MD5a844c52e8ce3d5ec72a004d1cd33b45d
SHA1a2b06e52f684138452ffed28b81579dcb6cbb0aa
SHA256145481420e90a65634911548178f85e587e34cd06130ae95696559692bb09ed2
SHA512cb0b403b3a9379ef8b009b4bc9678baab449fbcc9c5c6cbe7eec2fa1f3cb2fc890cc4eafa3dc7aef78760b36e9388aae6598d6437881b3bfdeac7548d2a4c632
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD54a5f77bcbbc2ee5279d1ab7ffbc401b3
SHA1340a61df22cd06ce9ad615f4d0dd744fd4a47a28
SHA256594dc0e8e93192fbbaf9438ef4ce5639275c77915625d513aea78517166cdb36
SHA512cffe19a992095e61ed76239c12cbf18cb6138a5d6a86dcd93042773479dc7ed65d1fdb1da4f67b80a8592bca4b940ea62c6bbfa5912610cc123f7437ecaedb20
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52a8d26505368dee6d85a8ce501880267
SHA1ceeedeaf821df1cf7f869561eb69d8c30576bf8c
SHA2566fbec65bc95f890904e14cfffc2974b05307937e448797793e61648a3feeea7a
SHA512e699f46a49a38ce774566b36b82a3e92b4afd09e877ade4234b53fcb12bd403e8501721c76f65fe60341331a84d43a7cc61915f05fb8022b20f097fac8e1ae7f
-
Filesize
4.2MB
MD588d3b1255894e7039c67b2272b3386df
SHA184fd4519dbb0270ca681451ca7092b8e803677bf
SHA256ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265
SHA512c6f51d6ca7e9002a4a7806d347f91b3a17d70926a9d34971a07a40fe2121593469ae8388c47f0c2abbc9f3e29329f39b01ca7a07fd5b55c2d86260d4f4d514ac
-
Filesize
1.8MB
MD523adcd6f93e0c2a939cfab75ca300a6c
SHA1f95e1c0f9f637dd74eba23d3eea6f4946f31d89d
SHA2565c56c5ceabda5482517297ba465922395e14ac785a8c5580f011383114988a0f
SHA5127489853089841297805721b354b4fa322a392ad07aa90f80582b1bdecc68fddb5552622e87bbae2fc57966cd9c5fcabb34648aee627bde8b9ce9ea0cda12ab63
-
Filesize
1.7MB
MD5a62bffb1a78766dd18aaa1cb856f9c21
SHA1d146e08616599e4a2024045d5319b66cf7af883e
SHA256b8a2bb778644dd41401f31fa15dfe75332502811d5bff1003d4595c04ce9e544
SHA512d2d7ca6f6e28a9c3c17631bf9c2f1ace1d2dcd338071e1b200b9c2e7acdfa413bf6e12801b7e07571bfdfd4d4c7124a3914132c5e035cad82a844c70600dc36d
-
Filesize
900KB
MD5868731dd0f8cf02ef9d137ac61017e94
SHA121b42b2f1296720dda515c1055d3bcf7aa7cda51
SHA256d77cba60c77c83093f4c3e1f7f563c95aa0eba7d55755051120792a4fb98565b
SHA512c674f18c59842756763934bcf4f809797d7119e8aaea9c5426622d692805fea02d3513ba505ab414b88fe6737ec2cb188c5afe29d64485856c540087f1b86455
-
Filesize
2.7MB
MD58458bdd71b8280bfa42081fc46fe8c8f
SHA1824a05f220e8f4684855d3c960388ebbf9b3ecff
SHA256d9289b9fb61365b83901f5ac635ff5754e3389b5c49d46d12d73f7969fafe3e8
SHA512669fb61e5f1e0425c98ae296776b59392fcc654785f9d6ca61dec17850a10477b636a7b3dab942e2db59d4e1cb2232f9073bdfd43b5102c771f17ce8a628ed78
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize7KB
MD56ef25b8c1a7c80f51ef3a2e73f4112c5
SHA16e54b372ba9aee80b2294afc71af8eaa6993ed8b
SHA256bc44776b2fa917a0606892205848400540ef73b55c1020e77cf62ba89167f546
SHA51266fba6e63e8dfbe1f6690234e1f4d54376e2169f9273725a580527e0db6ec7d1508ae2d78891fe2d3774b35f8df6ea1523578654233f3d4367154c20a9f0def0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD5bf9d936f718384eb6fd4fe6737b845fe
SHA17f9bb01752a07cdf2849c00d9623cbf43eb1f544
SHA25669ab160900c2a17dab9f7c1a64625e1911226152199a215238a12108ad758918
SHA5128efe5a7c2d53e0a9831d4256ca71ebbaf7406d7028bad9abe882d64e8dcc887453bd81f271f96adb7986403cde6a1276d615339e83e24052df6976533fe34171
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51961b310b2ba22e8d40b717e5ceed205
SHA17a71dbc3d919d7e46176f748fe852cc148b00a96
SHA256f0bbc8a15cae4b95466f8d9e018c8e09f3d03753a6059a034e94b40bf6003eb6
SHA5120e04f48bd03a877d31b889847b64312875765219d24856574594ba2a3799e251f698335d42e5e5096a43bc67668149ae29f729faee5a2e5d80d13ce016e7b27f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD582e748b1fc98364d164eeb8868cc6c43
SHA1afb4d81382e116d7d1021bb0603c17c5594687ed
SHA256056ce2575c8cbf437b5ce956491d7ebe158a4e956d0c845191bf5f95c368baac
SHA5127681b8f36295ca6cb01a2e6d1e862116d14bb97e0de6b51724200c986298b939f38f5338cb77e53ffc019543a208023eb6e7766bfb375a20adfd2f81a4c61f82
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\20fa047d-b190-44a0-816e-eb2495cffad2
Filesize982B
MD55dfa5e3c03f33e9e1e0bdd0f60eb0f59
SHA13be98b2420b5974919c576ff805afa7f1949f1aa
SHA256484c47b0c36fd9cd9478d953264a72e2dea31df12de77b610be1980d02bf9e3d
SHA51213b1fb612f04e092ddc1de07bf08d7c179fb798262c582beb3aba5599674052554710fe7ea9d37562830253c4e0159db7b4c2cfbe231f0f213ab4ddc33c6a350
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\de3e77fb-e588-4e12-b6c4-e3523971280d
Filesize671B
MD558702f0d43cc360ff306a45ca2c91734
SHA19c58ce7c9da453c6d6bc108a9b1ec3e19baad5d2
SHA256996f8fc0c7b6188a752979fffe0fab9351595f4bd496ac68fab3736f6072a436
SHA512998776f3695735161621c0064f8b18515aaaea6e585ad29aeb5b1779f2352c0f0eb37f670aefd54d3b1b358035f200cea119ee5594b9fad4324e1a7fb9c9f148
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\e90cf296-f8d9-4eca-b089-2abc5117f49a
Filesize27KB
MD5ea98f97a08c1bc44c30e3edbc5aec7b7
SHA11ace8d45ea1fd3862571bdd106cffb7d75418efc
SHA25609a242e957a3b3cd02878db9c6e98e26baa8058f9fef58d54383f0595fee4a0c
SHA5123bb8bfa839158394137f25de74bd5b17bdd878b73d97a4e0f06d6ae2465c2dd9a844941d28d52dff9db26ee6c3e2508593bb44b534c0b667a51c4a106d5e2e2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5128550f6e3dcae1fec020ae45363fe21
SHA12ea690080650bce775df6497f07996866815f50e
SHA25670cee412f84e4435242ac743914a016ac406aa7363c81170efe4cd6dcd6c6862
SHA512f8647c12a6f769cb14e5729d9d001cda7a29035ce28818ddbf99d5f897259b8a514a9acaa61ddd7746c37f091893bf2356c0a90b8cc37c30acf72f98241e6be0
-
Filesize
15KB
MD5ca88678ee616870683f8fb76474b00c1
SHA13d76fcd5d53fadc3cc9decbe40f745da8d096604
SHA2566bc3c6f0a6a0f4ffdddbcef673d1ef70236a584f8d284a06c31f2ba6aaae4231
SHA512e208946b1e791a3f6eac1044db77394e21cf3b69c5bbc6555e435ee29bc136faedd864e061a20aaeff5b6d419709bc032e36d9219a3cab2371d780dfc004f381
-
Filesize
10KB
MD574c3dcbbe2cf72a6b05f66afd0d40efc
SHA11b028c5d1ed7ac5f5f7c7030e78147f1e6d7f251
SHA256597e63aa86a653753f362dfda40e0605a4087636f20e726977d2f55295cd4fdc
SHA5121154714b14745925a8b6d04af27a9fc955da1298bb7b7edcb49e3a32b0f9a8f33384225929b26e37ac8a16a6b2162219751b1caf7a2dfe2fd106423889d207f7
-
Filesize
10KB
MD509bdc4035000b143210617950d9d1577
SHA170dd5e613acd18bdc5e52830ae80fe49d35cce76
SHA2567125ea068087297bf9bc9663c58526161732666ee97044f41536d57623211fea
SHA5126fb68a333ed65525344f7232093bd374025892eac1eb4e3652f498507de65e9b12dabc416bba9f292cde56eadaded263c2a817b81b41c5d0f9267a3d7978aa31
-
Filesize
10KB
MD5f5b4a55186d98856d323b400572ac094
SHA1e9506e34eae8e67445cba52b2c73859b33008ed1
SHA256bc67a419a447282664ca93867df76c5672bb503a1a59f4ce14f73b4f2a48635c
SHA512f93e281f03200c0f6f79701521cd526c650e35bbaabe3be8ac5c2be80e56224d594dc7b6933b1512764a6a755f4ed8e4a209b122df2dd335586e6d73e64b2bc1
-
Filesize
1.8MB
MD59ec3d5ed65bf8dc11d766f25c0860001
SHA1dc7c8af390895418dc67e9fbd9cce4010b71478d
SHA256c5bac7238f730c212ee80e3c8e0a4b789908b1cdf3004a43330f8780460d3d0b
SHA512d4f87ff7eeb3eeaf96247ebaa70a5e774d23664c3226bc5fd49fc2523eceac433dd9d0d2121247128c2e59cb4d9ee24747ca26a2bc35db09252087dc8427827c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e