Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe
Resource
win10v2004-20241007-en
General
-
Target
4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe
-
Size
1.8MB
-
MD5
907bd76d432cc1bf958507adcd270054
-
SHA1
131bd682061b92bbed95087770bfaf0ecc18442f
-
SHA256
4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7
-
SHA512
7e0e3b0a6a52de006886a17d12a300e149a7fc1fcb311fca6cbb89b1108af3ccf2e36f0fecc68de9909b3daefeba7d169915e6503f4efba3c8f08930365345d0
-
SSDEEP
49152:ekQ7+hs6IQ63Mtp/WP6i79B/oGNT5ymAo0Nj:ex+l8m46iHl5Vcj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
11.8
93e4f2dec1428009f8bc755e83a21d1b
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb7-46.dat family_vidar_v7 behavioral2/memory/1584-60-0x0000000000860000-0x0000000000AB9000-memory.dmp family_vidar_v7 behavioral2/memory/1584-667-0x0000000000860000-0x0000000000AB9000-memory.dmp family_vidar_v7 -
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/3612-1249-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 16f4b3c884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 16f4b3c884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 16f4b3c884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 16f4b3c884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 16f4b3c884.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 16f4b3c884.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d615fed30.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 16f4b3c884.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eDPQZkT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ea781ee0ea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 575b50b3a7.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 13 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4292 msedge.exe 5776 msedge.exe 1056 msedge.exe 5896 chrome.exe 1356 chrome.exe 4328 chrome.exe 4912 msedge.exe 5368 chrome.exe 5948 chrome.exe 3980 chrome.exe 3188 chrome.exe 3644 chrome.exe 3224 msedge.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 16f4b3c884.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 16f4b3c884.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 575b50b3a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eDPQZkT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eDPQZkT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d615fed30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 575b50b3a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ea781ee0ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ea781ee0ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d615fed30.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation l0k3fsu.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ea781ee0ea.exe -
Executes dropped EXE 12 IoCs
pid Process 4592 skotes.exe 2444 eDPQZkT.exe 1584 l0k3fsu.exe 3612 ea781ee0ea.exe 4552 2d615fed30.exe 2064 575b50b3a7.exe 4232 1fc9859770.exe 5304 16f4b3c884.exe 5980 skotes.exe 3512 service123.exe 5016 skotes.exe 6048 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine eDPQZkT.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ea781ee0ea.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2d615fed30.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 16f4b3c884.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 575b50b3a7.exe -
Loads dropped DLL 4 IoCs
pid Process 1584 l0k3fsu.exe 1584 l0k3fsu.exe 3512 service123.exe 6048 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 16f4b3c884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 16f4b3c884.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16f4b3c884.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009013001\\16f4b3c884.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2d615fed30.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009010001\\2d615fed30.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\575b50b3a7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009011001\\575b50b3a7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1fc9859770.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009012001\\1fc9859770.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023ce1-175.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 4592 skotes.exe 2444 eDPQZkT.exe 3612 ea781ee0ea.exe 4552 2d615fed30.exe 2064 575b50b3a7.exe 5304 16f4b3c884.exe 5980 skotes.exe 5016 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3948 3612 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea781ee0ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fc9859770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 575b50b3a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eDPQZkT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0k3fsu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16f4b3c884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d615fed30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ea781ee0ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 l0k3fsu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString l0k3fsu.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ea781ee0ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5580 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1880 taskkill.exe 680 taskkill.exe 800 taskkill.exe 2204 taskkill.exe 1760 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133770049433726936" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 4592 skotes.exe 4592 skotes.exe 2444 eDPQZkT.exe 2444 eDPQZkT.exe 3612 ea781ee0ea.exe 3612 ea781ee0ea.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 1356 chrome.exe 1356 chrome.exe 4552 2d615fed30.exe 4552 2d615fed30.exe 2064 575b50b3a7.exe 2064 575b50b3a7.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 3252 msedge.exe 3252 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 4912 msedge.exe 4912 msedge.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 5304 16f4b3c884.exe 5304 16f4b3c884.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 5304 16f4b3c884.exe 5304 16f4b3c884.exe 5304 16f4b3c884.exe 1584 l0k3fsu.exe 1584 l0k3fsu.exe 5980 skotes.exe 5980 skotes.exe 5368 chrome.exe 5368 chrome.exe 5016 skotes.exe 5016 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 5368 chrome.exe 5368 chrome.exe 5368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeShutdownPrivilege 1356 chrome.exe Token: SeCreatePagefilePrivilege 1356 chrome.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 680 taskkill.exe Token: SeDebugPrivilege 800 taskkill.exe Token: SeDebugPrivilege 2204 taskkill.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 2884 firefox.exe Token: SeDebugPrivilege 2884 firefox.exe Token: SeDebugPrivilege 5304 16f4b3c884.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe Token: SeShutdownPrivilege 5368 chrome.exe Token: SeCreatePagefilePrivilege 5368 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 1356 chrome.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 4232 1fc9859770.exe 2884 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 4232 1fc9859770.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 2884 firefox.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe 4232 1fc9859770.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2884 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4592 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 82 PID 4960 wrote to memory of 4592 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 82 PID 4960 wrote to memory of 4592 4960 4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe 82 PID 4592 wrote to memory of 2444 4592 skotes.exe 87 PID 4592 wrote to memory of 2444 4592 skotes.exe 87 PID 4592 wrote to memory of 2444 4592 skotes.exe 87 PID 4592 wrote to memory of 1584 4592 skotes.exe 89 PID 4592 wrote to memory of 1584 4592 skotes.exe 89 PID 4592 wrote to memory of 1584 4592 skotes.exe 89 PID 4592 wrote to memory of 3612 4592 skotes.exe 92 PID 4592 wrote to memory of 3612 4592 skotes.exe 92 PID 4592 wrote to memory of 3612 4592 skotes.exe 92 PID 1584 wrote to memory of 1356 1584 l0k3fsu.exe 93 PID 1584 wrote to memory of 1356 1584 l0k3fsu.exe 93 PID 1356 wrote to memory of 4440 1356 chrome.exe 94 PID 1356 wrote to memory of 4440 1356 chrome.exe 94 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1648 1356 chrome.exe 95 PID 1356 wrote to memory of 1944 1356 chrome.exe 96 PID 1356 wrote to memory of 1944 1356 chrome.exe 96 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 PID 1356 wrote to memory of 1784 1356 chrome.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe"C:\Users\Admin\AppData\Local\Temp\4cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe"C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\1009007001\l0k3fsu.exe"C:\Users\Admin\AppData\Local\Temp\1009007001\l0k3fsu.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91592cc40,0x7ff91592cc4c,0x7ff91592cc585⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:25⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:35⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:85⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:15⤵
- Uses browser remote debugging
PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3756,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4628 /prefetch:15⤵
- Uses browser remote debugging
PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3876,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:85⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,10148137376173295626,17476760960056875134,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:85⤵PID:1520
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9159346f8,0x7ff915934708,0x7ff9159347185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:85⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:15⤵
- Uses browser remote debugging
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵
- Uses browser remote debugging
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:15⤵
- Uses browser remote debugging
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,10534363041792975240,8457702453322111514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:15⤵
- Uses browser remote debugging
PID:5776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBGDGIDBAAE" & exit4⤵
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009009001\ea781ee0ea.exe"C:\Users\Admin\AppData\Local\Temp\1009009001\ea781ee0ea.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff92552cc40,0x7ff92552cc4c,0x7ff92552cc585⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2020,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2012 /prefetch:25⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2084 /prefetch:35⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:85⤵PID:5828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3268,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:15⤵
- Uses browser remote debugging
PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3704,i,1182620172863502872,16376407130923787906,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4308 /prefetch:15⤵
- Uses browser remote debugging
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 13044⤵
- Program crash
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009010001\2d615fed30.exe"C:\Users\Admin\AppData\Local\Temp\1009010001\2d615fed30.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\1009011001\575b50b3a7.exe"C:\Users\Admin\AppData\Local\Temp\1009011001\575b50b3a7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Users\Admin\AppData\Local\Temp\1009012001\1fc9859770.exe"C:\Users\Admin\AppData\Local\Temp\1009012001\1fc9859770.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4232 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4428
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b48dec2-4ef1-4e16-896b-59d75f45a02a} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" gpu6⤵PID:3852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ac82af2-da7d-4c76-8db6-a312a09cabf4} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" socket6⤵PID:4260
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2804 -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 3344 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e84f4728-4b03-4cd9-8ebe-f04aa35efd2c} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab6⤵PID:5380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2976 -childID 2 -isForBrowser -prefsHandle 3764 -prefMapHandle 3760 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f0a258f-9978-45d6-8cfb-291158a5fdb4} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab6⤵PID:5572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4212 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4240 -prefMapHandle 4236 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e8838e97-bea0-4740-a12e-017ca458a911} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" utility6⤵
- Checks processor information in registry
PID:5904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 3 -isForBrowser -prefsHandle 5412 -prefMapHandle 5408 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bfdf291-1fa5-4e3c-9428-03a3000425c0} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab6⤵PID:6064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5556 -prefMapHandle 5560 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {130c73b3-0c81-4ad9-8f8d-9768603418db} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab6⤵PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5840 -childID 5 -isForBrowser -prefsHandle 5832 -prefMapHandle 5828 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 952 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7b43072-59e2-4f80-a31c-e3ef17f13d33} 2884 "\\.\pipe\gecko-crash-server-pipe.2884" tab6⤵PID:6084
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009013001\16f4b3c884.exe"C:\Users\Admin\AppData\Local\Temp\1009013001\16f4b3c884.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3612 -ip 36121⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
40B
MD5db9149f34c6cfa44d2668a52f26b5b7f
SHA1f8cd86ce3eed8a75ff72c1e96e815a9031856ae7
SHA256632789cdfa972eec9efe17d8e2981c0298cf6bd5a7e5dad3cbdcf7bb30f2e47f
SHA512169b56304747417e0afe6263dd16415d3a64fff1b5318cd4a919005abe49ca213537e85a2f2d2291ea9dc9a48ea31c001e8e09e24f25304ae3c2cfefad715ce9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\224caf17-4bfa-482a-8913-65b2627df4f3.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5c9b4af931c748370084a25752d8a99bf
SHA13f29e19b8459d0ed9439f720d57eda54fb4459e3
SHA25692c64e41a27db115fce07d53835e6682303643b12162a93643170bca7649e60a
SHA512081b73c419a1ea52de167176a35425ecc529f72b6f21a5d996a7cb7abac05ab99cda37e3dbfe745e2ed19e994e4d4fdc4a1327ab4a2b278f21987eee285fd1c0
-
Filesize
44KB
MD51a2ad795606e75517c37984fac17d9e9
SHA149dfb8266e6e355c4855f0c89b2e8a6a8f801c7d
SHA2567670f522827d25213d2ba795e44ef7e0a4ba9d858adb8d63107da128f297c09a
SHA512cec898b1b2419833a92038577b2de31b9e43ffa74eaea646a568b86a1a353d29f9f665483f924d81623320da6f9be9b6100dff4372a0498983f6c095c4921605
-
Filesize
264KB
MD56d6eee248802b2d8e2161775a9413b9f
SHA14d9cfb449a545332a06b77932ad4c0a6e1ad2e72
SHA2567e0320c6dc8fbb646d752da4ea9806bcc5b4a17e28e13a4e2052d38956510ae6
SHA512354de6df5d243a8306a3272d670ecd474f4a988a0511a3a8a1a2bf4f524e639200d1c4c8bb3c284ec20cc146d9567428cab6595249e8f55f6328ea6d4fa85dce
-
Filesize
4.0MB
MD59f74cab1e78b94e096a8f9ccf03e55a6
SHA10fea33d17bb9363f983794a89474d54d92247c53
SHA256b1d0a32e0ec8d7ab06238072e8ac3cda5b5b2b247024dd4559ac2bd640b37cd0
SHA51201cc4386bed93133e15a312311539a1a4f1e814d4ee28e24331e5d755ef8bdcf1a616d0504fbb2ee9a749bcdaf0524ba7b36993ea16f929f1d4c5c57d62cc183
-
Filesize
317B
MD5b8fb9ce89972cd1a412cc0b15ed7fed3
SHA19390a33d33ed1a2e6ccfab6b4f020da84e065f3e
SHA256f43aea8cba8a1cef6360c5ffeddac6d4514bf3af6ccbe2416c162871a8c2cdae
SHA512bb07afc0e0bd6bb2853b1453a08ac0faff96f865b3155bfdb38b4c76689369f256edc6f7cf7e59abdef4f264802384c16cd9c6753ed297c9859ad1c17956b627
-
Filesize
44KB
MD522e60e6cb9a8d237a575399fd969f3a9
SHA1ae9fc836492fb6ca0d9a9633a080f6d0161ed349
SHA2566df281284ae8bcdd9601c5db5298d83a51ec738f7925b15a46871eb60c4abcbf
SHA5120ef8f4024f7c4a3f126ac626728b5bf7f027e1f52e452950069bc19ec3559aa519a525dc750eed063eac198ca61751776cae53a287186a81a2e32197bf94572b
-
Filesize
264KB
MD508f2e2f3f94b8b9c6ea509258488ceda
SHA130adb3c8e99b78bfaee946ff096ae6813a885b2f
SHA2562aa5d93253e55980523ff4340daf785dd73a0448989d5ada25a3877ec17696f0
SHA512f3ec3481fc9ccd032933e36366e134bfc0dc2551992fd52e1ca35141f68d66e62ff7189c8330ee72ee40e0280a0447130322f02c6cc06e853a5b5b87d5e774b8
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD53c816bc32780ef8b7083152c1bf01265
SHA14e9f41f2e7669cca34c8a30a5d484d22d7c2372f
SHA25665276acd8d69519765c82f299f053658a99499c182a32eb51cb4bbe8e196fede
SHA5123110fa19f65b8a7f279f7dcdb6b13ef40b80e2950f9f468bf0c1af46ac3c709f0dd32fcd0c8b70636ef067ccdba465a3c0082d3d5b20a2c2c999d2ca5cc5c942
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
336B
MD58729730464fccd3d4e7dd30b83eceac4
SHA18584a6f76190078cb96c974b58242d46ad57344f
SHA256dba0302dbe3b168151c0143d500d2429ab25f6352dca8207b5a64e46f2bbacf2
SHA51267ffafb0a4948e4cbe933ff8fd12fec0a224c77671750fbc56a4cb80bbd66d7a6d1fb5c2c4a9a93bfcd93a1549bbd0f06a6b8b45e0be35691d699f74a2c1004e
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
317B
MD55b19c224e6882c9f5d676c68d1667c94
SHA1a643a32da3cc6a5ead3739b6c4518ffa494144c3
SHA2563245144c7266daac1fe80faba6cae5214ab1ed165a7969ac0a014852de436b95
SHA512f857947d3fbaba7cb3e5f98f040a47d2238535f8e81ca10158fe5837f51504fb3eaae1dfd1e78ec74b3db17c77c94746e9418ae9914be4311dac19710000035b
-
Filesize
345B
MD54f1204fc9ba163537ba4c326bfb53038
SHA1aabcb2ae7c80bc64eefdea3b207f69f220722497
SHA2561f6e3f47b842ed793c453384030b93da11c8f6a06682e1968048d633d6cde61f
SHA512322b0a2c97a03df070fd85a03c5abb4463e3c8dbc337e2c4e26180c35fb87f707540f6426d78554ae8e0a7d9ad9fa8aeece7ddc06c8c1833424ded5c53ac648c
-
Filesize
321B
MD53c439969572cdbcf9a4a4f41cdeee78a
SHA1bc81e4a5835c8c042c672f90515bd20b94b7a20d
SHA256c60957ec83394b182bbec07b088c6e4ede22e79cb41733dbde217f92a9786610
SHA512b97033ac1d55592a8bbe0dec5b9aae5d940fa8d0f5b5dee7e7dab68a2718d8d6e92e9472e8d4a6a9157913b414cc960b05e4241b4c6b0fd16cd42182f449e5fd
-
Filesize
8KB
MD56473fd6024c0db0da72a3815237a3c04
SHA1974038dc420c6da64d7ae73af1cd5c8bb2d7f83d
SHA256aa531a59cc4cd5631e71431d8ac04eb0be224ce22265f9e18ecd9b088eba963e
SHA512f7f14f970d93b43339a0a13220d6c74f8e305f8385d7cb511b821ece2a95c2236217731b549c259164cc30eb2d5c797b30eae11d2707f5930d241ca1d016fd0f
-
Filesize
18KB
MD5406af67c21d4b39a55c552eb44d376fe
SHA1588a60131c9758c89e2a8cdd3d210f060a65f615
SHA256d9f0855dec71c16b3fcdb37c95358350d545a9f62181509dad68b3485146bb6f
SHA5120c962fbeb0668fd2f55496d307e9199a3e6ac0b907f4ed9b57d48c631376f55d784d5efcb4779584cdc21db0cc1207bb7c6d3187277c9f26af6c9b1e73ed2767
-
Filesize
320B
MD5096a3ed771fccfac6c5b6803de30f1fb
SHA10b39b430657cc8a76df8fc6645466998de9640a0
SHA2569186ed75f756ee2340d47698116fe0e11f44b8f04629a2f99e3c473fcee3ce4f
SHA512174cdf1d6908e3994201e9a6fbe3f2dc5dfa23baffec01cf6a3a50e248bb75f4ab5db341c79001560adfbe607af43e6474595c1c003bc43f2b3867f1ee3297aa
-
Filesize
1KB
MD528dff999a2420fd76a20d4c07e2ebeed
SHA12005e4d76587f1c6c1b98ac62687a616564532b0
SHA2569f998c2de9744ee258b1b34a59ebede01ce742ccdeb1c980576900303062027f
SHA51275ebffd7085b883a5e1f0dabc379b6d7ae6d75098826d7002b558785da1e81b0842b505de18918d12d57837f76fbf078875f4b8bcfb8e0ecc962cfb7da28be1c
-
Filesize
338B
MD5788da6f70fd6576b5c933e6dfaefd0b5
SHA1ba80ab6b1800b2bf92e69b74f710f3fbd8e98543
SHA256041504ab3b5934cf2c2f5987401e151c32f352ecde3f5f09a0ccb8cef0252440
SHA51211df73f91f1039d8a0fcfc51a478d79c7881e60e1c0735768db5cca380da6f1199ddfa9e968efa1fd0c51a23e95a1a9af5163383ba0c3841117659c753872312
-
Filesize
44KB
MD5f159d12b94eb7da3e4906416d95f4b21
SHA1d438e148328ffb18c9e3b3ec759540309c03a18b
SHA256a28da1baf6b97b07c4ead68b38156f850b68f565a9e1df6fc4027c0f77dd8db3
SHA5129c04b052f6499a4684d830c7960b2e3c200d81b7206a331eee7ce8c3f6ac8c5267b0f3d77b602eef4c870100ff04fd14dd231ab86bb6a8dfc30883df4c33e8ad
-
Filesize
264KB
MD5c0584d5c00c3b2d4dff539d7e5e9548d
SHA11ae9eb6421915115d6ecd46dc970ea1116a44a9c
SHA25676b754b7be1fce29d178eced1fcd93047b06e2836e69a293d548139ac3de0656
SHA51216805bd3a649879f408550a36dc6262a722c7690d2081b50bc547c1ccbd03df75c5b2bd050f2bf38499886a8ecb74d91eae917626dd4e36cd9183b6bd05440fb
-
Filesize
4.0MB
MD5e39f95ae48a87705c07abeae9503e503
SHA17780349ff35b9620ac9cfbcf777e193c57b12802
SHA256509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75
SHA5129e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD5456f8e227dbfde8717df1ca40f7569e2
SHA132234609c9b973eb3ea71bdf9185aeb8edb4c26c
SHA256cc87fdea3f90de3921c47cbc7c8415a81d6b2369fd5129a5aa0a31ba83bda631
SHA5128d9ca8451e5e5394c4ea36bb41d06bde80cd7bd2f3c8f45660033e408c812a56781ea9e7c006b9d2f3264231343b8caccdd5f26a512c2aa8cfefc84459f8392a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD540894c784f10cc2e4e76e9b8c56d8a56
SHA1f8db3ffc4823bf4b54167fc7ca3e7fc799fbd65b
SHA256fc3063c564d2c4cda16908fcd7e45c44cf7e60fddb77498d394b0f84c51b1f5b
SHA512b51f79b7fdbb8dab7205ad95e9348630c7c5afad33747d27d83343362069fbad37c61af354ec0e95cc69b216f65594f6a6dc915cc822e0aba817131f966e37ef
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD54fffa3770978298f03b8a73538572384
SHA1e47c8c6255a53751e2d2e2d05a6e1a0d15cf26f8
SHA256448240169b84df317e99c23278aea6421ffbbcb70bc64d35a4601a2e38bab5a0
SHA5123dc12125346c43372d46a8c65f0e5f39712cfc247b705a936319a50b7bc4a18f01cb873efb457896818eec8c06811d0a9c2a255f077286270f9c53abec233917
-
Filesize
1.8MB
MD5a63cadce90e5a2236df20feaf391a8a5
SHA1f28a33957756a509324debaf69561557d09951e0
SHA2568b30a280ca29471088ea3858b9f3e1788239dfe5d6e71a503c7916ac36f74fe9
SHA512cd757a61e39c6b59d8971631f4c7041ab323be8250b57f12c2375eb46c22b0cee965df35f17794b9fe1b2da8c5caf6e38a41a8c9908092adffd35b4c76809e1c
-
Filesize
275KB
MD5df96c3d0bb84474f4ed6c4206d1bacea
SHA13e846e3a979cfad2df3eadc821fccf48f2cda4fd
SHA256dab9fee612125503146e28407ec8631232d6b48d567c902b6743bf2e984048b8
SHA51217ab06107bfcbbd4cc5503996d544d5d48e6ae4f49f76be841455885b77e5c7a5128ab74903a1825dd3a809aed12b414f7dc97c2ae7f5750ad67abba22bd1055
-
Filesize
4.2MB
MD52b0c7447e2568d3a7de91ecd14787204
SHA1658b8b86bd1f906cf2e30675f8fe7de8b350fb79
SHA25615132d20fdd894d09f23b8e7bdaf49736a0191a230a24141c63000d4b43ca72a
SHA512b24c2337c69573c9d772b75512f40fa7baece45ad3de2cbdb9bcf2649056de583bc4245f1b06baf6e8ae7be1cc024a9578fe11874b52f352b9db5ad7803cb73d
-
Filesize
1.8MB
MD59ffd11dacd9e499a8a7b86e408997489
SHA12f19287e2a190db2e604f790f9388b7216ae27b0
SHA25687c3e97ca98903b7569d1ed39239c06f73ed311bdd13ceb3768acadbccb7616d
SHA512bfa425ac138466140934c46b46af04746ee959c48a95e2b87cc8c6c2a492edeee4d2829797514e335865e9ee532c04c83df02aa7b5ca1386f9671c1e31692da7
-
Filesize
1.7MB
MD5dbcb2bb33cc623898e5f5e93af43366f
SHA1cf579373ffcec785e9fe2070c9a1fea1fe2cf62f
SHA2564e9e5f4322649ec1edbf95ced7863a6df6413c933a780c6bee147c11eee28a56
SHA512cebe946cdc4cd62fccd0e39a0a0bc64ac34da1de7515743c1db3ca7b3af2dab5ab914141794b43b8a42a2dccf1cde2d41434372faecad19de3fdd9b972e4c5aa
-
Filesize
900KB
MD5088bf96f7f07f9d38d2deeb897b64873
SHA112f050450140a99f0b834c6dd9070e73116877f7
SHA2563fc67f9ae859f3da233203e40d88f00aff6f0c2c9c58d9d562ee8fe7cbf20c7a
SHA5122e98491e4a3169c52d1acdfeceb18d01ffaa9229993dc97c2f36042157069244c28f0047c35a29d7579a5e4ecbb5320d333f7d82ec77724cf6ccb016cf6acc96
-
Filesize
2.6MB
MD513bcf53f60197abc7a0f147b7ed2567a
SHA18686ab285507d1f1efd50dc159f0e78de2f55f88
SHA25662642a0982651ce48cbfecd78b1ce42361605ab391b21a09ad53c1b273e51321
SHA512ec3555a12bae3f6a0774b53df0e7d06efdf04f3e5181fcd7297b7c1dc4ef0089ac3d9951e892b3133b104142893b16df12291f901f1627ba57c7d2b76156d7ea
-
Filesize
1.8MB
MD5907bd76d432cc1bf958507adcd270054
SHA1131bd682061b92bbed95087770bfaf0ecc18442f
SHA2564cb7762c2f265d8967d2e42e014b5872db83dc3f78365b805d6e666ddb7124c7
SHA5127e0e3b0a6a52de006886a17d12a300e149a7fc1fcb311fca6cbb89b1108af3ccf2e36f0fecc68de9909b3daefeba7d169915e6503f4efba3c8f08930365345d0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD5a37479a831952206566c95a31c65d4c8
SHA1a5e6c5bca8e6cd8610884df98b01d233a0b38193
SHA2566a1355288d72e35bab1b7be29e4812dfa274e38f09861318b6b2af333326ec04
SHA5121c4bc299234952e56018b7f9b34a1223db45cacce84b5b728b71ec68f68dd567d93d0fa3af05950f627ac7e3d3adaa8ce1bba972f62402b2dca24871b789602b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53766cfb8155f4366acdb4c5e96042eb0
SHA176321620230662ab02604bbdcf482d89483f5f06
SHA256009f035ba35676fbea1c8768c87b2866c3943a49de50b8c16d9b913329bc0255
SHA5129c26ec829e1e16b2babd1369e76de5d692e030d4ee504db2013759097d06975b3a59d3ea955cffb56275a0a18b278a158ad9fc338fc358077ae9a86a3f203332
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53adef5ce38c1eeab522d72bbecb720bf
SHA19c8e837700df24eda109076b2ecb47df1f0fd0f7
SHA256ca1ad24def7a26ed62eddd4b8c23f5bb322063251256a84b6c81eb47b666c924
SHA51283c76ba65474e01674d915ba9788dad7920ca055c51d89e01431cdabea44d09ec47b1cfc72e30491514d1035fa52e54a4be64207a6c6c886ccf1dfb040b41d16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\65f6dc1e-5358-4646-8c26-cd1d1fcb4330
Filesize671B
MD5df92016b4a0e64c165640f1a0b9b64d9
SHA161dad69ce323e2f171ee30c6032377b8a82bb1d3
SHA256c9aaf34fc1021c30aae83cda69ccaef23cc9f3e8a0dceafa80dafff914cc7e17
SHA51291c6d7cec97e06aa5dcba0a61d4da009fc9cc35e89e758651ae8cd0be4febaaef02de264d57d199b22bf2bb10fcc37ffc902d9cdf7bc871f9b78cc9191b290cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\b102ee6e-4f8e-443e-9823-4e1090ecec02
Filesize982B
MD5ab4fb6b2642264b8a5228c4442f49a04
SHA1ffddffc981aa6033da15cad8a6396091221d4b51
SHA256dc50fde111ab85175b6807ab2f45b6bd8941488806808cff71e82fb1332a6f37
SHA512b1d91277aa87559fc04b05c8b35fcebedc0571ec3c4a387511b67dad9c2f69d07eb5448f28d08812764be1b1068ab4f52c23c382d25ae99d1192c4827eb1e514
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\c5ed4d69-6566-46e2-bffc-1d99b32eea4d
Filesize26KB
MD54aa6a49640258332ab91013271989ec5
SHA1645c3878e3f2aba06e828241238d71cf2780333f
SHA2560a36d3adae0e6cc2835ea2e3a3243e29473b371fa078988e533e05bbc279b674
SHA512a8336bdd2a72591f7bf51ed59a7b4602689bd2493136680f526437bffc5f8cd9ae99179713ffc4f4c58920384b3ff2d587405c9b17460882812fe38d966b202a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD59ec2c334b12d758d7e087b6338538b82
SHA134eec66dc948554ec57ba133d01d3ecef808f5ee
SHA2564e14b3baeec435e06bf54779bd2b11e3b668a96cbef223b29eb14e1cf0f8f70c
SHA5122e63b4184ee5d47ebbc9c1a6ba282fabcfeefe55c46652da41fb0ad251bb1b435285fb41de8f0d15b0766fc574b61890ff79bba04078a466ab9251f21e343d46
-
Filesize
10KB
MD506cbad32de66daeecbf549b05265f1bc
SHA16be5c098d9462bf1a2cc769d6a3e1c22a9cd9925
SHA25666b12e3235b4ba72abf084544b4096f1f76ae4c2e828253b694157345e776d67
SHA5127fc3fc3e5951e5262828cf627ed076d06c04c5c695771e0beeb825b0559d725f183332cb1c7c4fc53099c412adc95225bcc15ad299a9955fa66d292987c5721a