Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 12:56
Static task
static1
General
-
Target
9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe
-
Size
7.1MB
-
MD5
633492e2f891f632fe7140c9cd415d39
-
SHA1
51200c742cdcdc1a1cb2ebe67074d5e2b5166b0d
-
SHA256
9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4
-
SHA512
6ee6c41a48e5ef530e59d5cbd5d064a298c97e28c91dc35d143fb18f0fd51a9de43b9e0a02db886fd8c75fb5949527187a908801345f5b0aa88be95ce4d32bb4
-
SSDEEP
196608:8PicWWRd9vgVIQAYhwDR124vIIJKUwHuSmiutKb:F0fvgVIQArX2bRH/v/b
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/3116-308-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
4D901o.exe2bb9e1fa65.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2bb9e1fa65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2bb9e1fa65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2bb9e1fa65.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2bb9e1fa65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2bb9e1fa65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4D901o.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
2d1607.exe3I79h.exe40174d73cd.exe4D901o.exeskotes.exeskotes.exe1J13R5.exeskotes.exeeDPQZkT.exea3291e9272.exe5cdaa458ff.exe2bb9e1fa65.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d1607.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3I79h.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40174d73cd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4D901o.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J13R5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eDPQZkT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a3291e9272.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5cdaa458ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2bb9e1fa65.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exemsedge.exemsedge.exechrome.exemsedge.exechrome.exechrome.exepid Process 5168 chrome.exe 1148 chrome.exe 5040 chrome.exe 1880 chrome.exe 1004 chrome.exe 4900 msedge.exe 3700 msedge.exe 6784 chrome.exe 3252 msedge.exe 1820 chrome.exe 6796 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2d1607.exeeDPQZkT.exe4D901o.exe2bb9e1fa65.exeskotes.exe1J13R5.exe3I79h.exea3291e9272.exe5cdaa458ff.exeskotes.exeskotes.exe40174d73cd.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d1607.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eDPQZkT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eDPQZkT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4D901o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2bb9e1fa65.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J13R5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3I79h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a3291e9272.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5cdaa458ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4D901o.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2bb9e1fa65.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J13R5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d1607.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a3291e9272.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5cdaa458ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3I79h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40174d73cd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40174d73cd.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1J13R5.exeskotes.exea3291e9272.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1J13R5.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation a3291e9272.exe -
Executes dropped EXE 17 IoCs
Processes:
u0A10.exeo0w31.exe1J13R5.exeskotes.exe2d1607.exe3I79h.exeeDPQZkT.exea3291e9272.exe5cdaa458ff.exe40174d73cd.exe4D901o.exef1477bbb58.exe2bb9e1fa65.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 5072 u0A10.exe 1652 o0w31.exe 1060 1J13R5.exe 1396 skotes.exe 4536 2d1607.exe 1500 3I79h.exe 3224 eDPQZkT.exe 3116 a3291e9272.exe 4312 5cdaa458ff.exe 3496 40174d73cd.exe 4532 4D901o.exe 4888 f1477bbb58.exe 3604 2bb9e1fa65.exe 6240 skotes.exe 2496 service123.exe 5428 skotes.exe 852 service123.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1J13R5.exeskotes.exeeDPQZkT.exeskotes.exe2d1607.exe3I79h.exea3291e9272.exe5cdaa458ff.exe40174d73cd.exe4D901o.exe2bb9e1fa65.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1J13R5.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine eDPQZkT.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2d1607.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3I79h.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine a3291e9272.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 5cdaa458ff.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 40174d73cd.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4D901o.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2bb9e1fa65.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 2496 service123.exe 852 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
4D901o.exe2bb9e1fa65.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4D901o.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2bb9e1fa65.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
o0w31.exeskotes.exe9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exeu0A10.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" o0w31.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5cdaa458ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009033001\\5cdaa458ff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\40174d73cd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009034001\\40174d73cd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1477bbb58.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009035001\\f1477bbb58.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2bb9e1fa65.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009036001\\2bb9e1fa65.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" u0A10.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0007000000023cc5-280.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
1J13R5.exeskotes.exe2d1607.exe3I79h.exeeDPQZkT.exea3291e9272.exe5cdaa458ff.exe40174d73cd.exe4D901o.exe2bb9e1fa65.exeskotes.exeskotes.exepid Process 1060 1J13R5.exe 1396 skotes.exe 4536 2d1607.exe 1500 3I79h.exe 3224 eDPQZkT.exe 3116 a3291e9272.exe 4312 5cdaa458ff.exe 3496 40174d73cd.exe 4532 4D901o.exe 3604 2bb9e1fa65.exe 6240 skotes.exe 5428 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1J13R5.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1J13R5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 216 1500 WerFault.exe 91 5248 3116 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f1477bbb58.exetaskkill.exetaskkill.exe4D901o.exetaskkill.exe9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe2d1607.exeeDPQZkT.exea3291e9272.exetaskkill.exe2bb9e1fa65.exeschtasks.exeo0w31.exe1J13R5.exeskotes.exe40174d73cd.exetaskkill.exeservice123.exeu0A10.exe3I79h.exe5cdaa458ff.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1477bbb58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4D901o.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d1607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eDPQZkT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3291e9272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bb9e1fa65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o0w31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J13R5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40174d73cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u0A10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3I79h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cdaa458ff.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
3I79h.exemsedge.exefirefox.exea3291e9272.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3I79h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a3291e9272.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3I79h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a3291e9272.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
Processes:
msedge.exechrome.exechrome.exemsedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1988 taskkill.exe 3716 taskkill.exe 4684 taskkill.exe 4032 taskkill.exe 4764 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133770130414441037" chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
1J13R5.exeskotes.exe2d1607.exe3I79h.exeeDPQZkT.exechrome.exea3291e9272.exemsedge.exemsedge.exemsedge.exe5cdaa458ff.exe40174d73cd.exe4D901o.exef1477bbb58.exe2bb9e1fa65.exeskotes.exechrome.exeskotes.exepid Process 1060 1J13R5.exe 1060 1J13R5.exe 1396 skotes.exe 1396 skotes.exe 4536 2d1607.exe 4536 2d1607.exe 1500 3I79h.exe 1500 3I79h.exe 1500 3I79h.exe 1500 3I79h.exe 3224 eDPQZkT.exe 3224 eDPQZkT.exe 1500 3I79h.exe 1500 3I79h.exe 1148 chrome.exe 1148 chrome.exe 1500 3I79h.exe 1500 3I79h.exe 1500 3I79h.exe 1500 3I79h.exe 3116 a3291e9272.exe 3116 a3291e9272.exe 3500 msedge.exe 3500 msedge.exe 4900 msedge.exe 4900 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 4312 5cdaa458ff.exe 4312 5cdaa458ff.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3496 40174d73cd.exe 3496 40174d73cd.exe 4532 4D901o.exe 4532 4D901o.exe 4532 4D901o.exe 4532 4D901o.exe 4532 4D901o.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 3604 2bb9e1fa65.exe 3604 2bb9e1fa65.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 3604 2bb9e1fa65.exe 3604 2bb9e1fa65.exe 3604 2bb9e1fa65.exe 6240 skotes.exe 6240 skotes.exe 1820 chrome.exe 1820 chrome.exe 5428 skotes.exe 5428 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exemsedge.exechrome.exepid Process 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 4900 msedge.exe 4900 msedge.exe 1820 chrome.exe 1820 chrome.exe 1820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
chrome.exetaskkill.exe4D901o.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe2bb9e1fa65.exechrome.exedescription pid Process Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeDebugPrivilege 3716 taskkill.exe Token: SeDebugPrivilege 4532 4D901o.exe Token: SeDebugPrivilege 4684 taskkill.exe Token: SeDebugPrivilege 4032 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 3380 firefox.exe Token: SeDebugPrivilege 3380 firefox.exe Token: SeDebugPrivilege 3604 2bb9e1fa65.exe Token: SeShutdownPrivilege 1820 chrome.exe Token: SeCreatePagefilePrivilege 1820 chrome.exe Token: SeShutdownPrivilege 1820 chrome.exe Token: SeCreatePagefilePrivilege 1820 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
1J13R5.exechrome.exemsedge.exef1477bbb58.exefirefox.exepid Process 1060 1J13R5.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
f1477bbb58.exefirefox.exepid Process 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 3380 firefox.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe 4888 f1477bbb58.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3380 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exeu0A10.exeo0w31.exe1J13R5.exeskotes.exe3I79h.exechrome.exedescription pid Process procid_target PID 3232 wrote to memory of 5072 3232 9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe 82 PID 3232 wrote to memory of 5072 3232 9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe 82 PID 3232 wrote to memory of 5072 3232 9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe 82 PID 5072 wrote to memory of 1652 5072 u0A10.exe 83 PID 5072 wrote to memory of 1652 5072 u0A10.exe 83 PID 5072 wrote to memory of 1652 5072 u0A10.exe 83 PID 1652 wrote to memory of 1060 1652 o0w31.exe 84 PID 1652 wrote to memory of 1060 1652 o0w31.exe 84 PID 1652 wrote to memory of 1060 1652 o0w31.exe 84 PID 1060 wrote to memory of 1396 1060 1J13R5.exe 85 PID 1060 wrote to memory of 1396 1060 1J13R5.exe 85 PID 1060 wrote to memory of 1396 1060 1J13R5.exe 85 PID 1652 wrote to memory of 4536 1652 o0w31.exe 86 PID 1652 wrote to memory of 4536 1652 o0w31.exe 86 PID 1652 wrote to memory of 4536 1652 o0w31.exe 86 PID 5072 wrote to memory of 1500 5072 u0A10.exe 91 PID 5072 wrote to memory of 1500 5072 u0A10.exe 91 PID 5072 wrote to memory of 1500 5072 u0A10.exe 91 PID 1396 wrote to memory of 3224 1396 skotes.exe 93 PID 1396 wrote to memory of 3224 1396 skotes.exe 93 PID 1396 wrote to memory of 3224 1396 skotes.exe 93 PID 1500 wrote to memory of 1148 1500 3I79h.exe 94 PID 1500 wrote to memory of 1148 1500 3I79h.exe 94 PID 1148 wrote to memory of 2600 1148 chrome.exe 95 PID 1148 wrote to memory of 2600 1148 chrome.exe 95 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4240 1148 chrome.exe 96 PID 1148 wrote to memory of 4748 1148 chrome.exe 97 PID 1148 wrote to memory of 4748 1148 chrome.exe 97 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 PID 1148 wrote to memory of 4800 1148 chrome.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe"C:\Users\Admin\AppData\Local\Temp\9774d2eff3d73b1b0e300494b2b055ae69590d614b53f29d026b3e9ee66370e4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0A10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\u0A10.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0w31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0w31.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J13R5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1J13R5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe"C:\Users\Admin\AppData\Local\Temp\1009006001\eDPQZkT.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Users\Admin\AppData\Local\Temp\1009032001\a3291e9272.exe"C:\Users\Admin\AppData\Local\Temp\1009032001\a3291e9272.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x140,0x16c,0x7ff8004acc40,0x7ff8004acc4c,0x7ff8004acc588⤵PID:6224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2152,i,7409056096366109872,6595110045858516456,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:28⤵PID:6480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1884,i,7409056096366109872,6595110045858516456,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:38⤵PID:6496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,7409056096366109872,6595110045858516456,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2384 /prefetch:88⤵PID:6516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,7409056096366109872,6595110045858516456,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:18⤵
- Uses browser remote debugging
PID:6784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,7409056096366109872,6595110045858516456,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:18⤵
- Uses browser remote debugging
PID:6796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,7409056096366109872,6595110045858516456,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:18⤵
- Uses browser remote debugging
PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 13727⤵
- Program crash
PID:5248
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009033001\5cdaa458ff.exe"C:\Users\Admin\AppData\Local\Temp\1009033001\5cdaa458ff.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\1009034001\40174d73cd.exe"C:\Users\Admin\AppData\Local\Temp\1009034001\40174d73cd.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\1009035001\f1477bbb58.exe"C:\Users\Admin\AppData\Local\Temp\1009035001\f1477bbb58.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4888 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:464
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3380 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {94bf0d6c-1a8b-4f8c-9967-c2b0ac01dff2} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" gpu9⤵PID:1888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99bebc44-0cc2-41a5-a5dd-36d57c2eea7b} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" socket9⤵PID:3184
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2752 -childID 1 -isForBrowser -prefsHandle 2860 -prefMapHandle 3044 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b621eed8-ea6a-4268-b325-30851522ced3} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" tab9⤵PID:4240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3964 -childID 2 -isForBrowser -prefsHandle 3828 -prefMapHandle 2992 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {328de363-5efa-42f1-b331-d12b8d2ccb96} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" tab9⤵PID:2536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4968 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4948 -prefMapHandle 4956 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f2d3974-b20d-4e82-a439-4d78ac64adb1} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" utility9⤵
- Checks processor information in registry
PID:6816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5252 -childID 3 -isForBrowser -prefsHandle 5244 -prefMapHandle 5240 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dee976a3-31b2-41ef-be7a-5fc0f8e29b95} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" tab9⤵PID:1464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5300 -childID 4 -isForBrowser -prefsHandle 5484 -prefMapHandle 5480 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {166d7a32-6b58-4102-a527-066e006f4923} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" tab9⤵PID:1100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5252 -childID 5 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29937de1-9af2-40fc-8e9f-8f245adc266f} 3380 "\\.\pipe\gecko-crash-server-pipe.3380" tab9⤵PID:3888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009036001\2bb9e1fa65.exe"C:\Users\Admin\AppData\Local\Temp\1009036001\2bb9e1fa65.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2d1607.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2d1607.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3I79h.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3I79h.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff80cb5cc40,0x7ff80cb5cc4c,0x7ff80cb5cc585⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1840 /prefetch:25⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1856,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:35⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2312 /prefetch:85⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3340 /prefetch:15⤵
- Uses browser remote debugging
PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4308,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3640 /prefetch:15⤵
- Uses browser remote debugging
PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:85⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4892,i,17024302314507107391,11156914639579588411,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:85⤵PID:2944
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ff80cb646f8,0x7ff80cb64708,0x7ff80cb647185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:25⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 /prefetch:25⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:85⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2692 /prefetch:25⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3288 /prefetch:25⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2584 /prefetch:25⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2680 /prefetch:25⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3188 /prefetch:25⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4016 /prefetch:25⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14421388850988613966,5952502084472526012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3240 /prefetch:25⤵PID:4184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 21404⤵
- Program crash
PID:216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4D901o.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4D901o.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1500 -ip 15001⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6240
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3116 -ip 31161⤵PID:6840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD51fd2bcf7be677e004a5421b78e261340
SHA14e5abd04329ee1ffaebe9c04b67deef17f89ff84
SHA256f539c848f584add20b43d5daefd614526b67adbf22b0c89eaa7802a8a653cd31
SHA512929499946e38281bd808b37b362c4a86f3b6382eb1ecd5fc094410d3688906d14a114ca930a2cf38b6241ab734bc5959e6fe541270d47ca9538e82a68c99cc77
-
Filesize
649B
MD5ef97e0db642e141661a978ee6b4b4495
SHA15d9fe271f234ce41c387180f9b033121fb6d6952
SHA2567bfd2f3fc07cfdd35eb645bf6a2441c4a89156675f7bec60b65d54b50904e914
SHA5129b84e3284c4ca8ada76ea8d4d8bd8e0ee832193d27d8a960772f9eea87a657730999819291f672a239c667ea99235761e3e45cce2b5b8974f18154d050fec9bf
-
Filesize
44KB
MD52972fb4f13f301d7f0dd6c5563698ff6
SHA169558e8078a5e857a62fc2750946d720f5d322ff
SHA256a99e23cb356e33fe88291d2c2833d120202ff43973ab6509429c4bec81e5b701
SHA512f7c24baa95a129eb5fbdf872c83786f90f04661273b4f5a1b78b650c018f10922f195ac304fffc8bb43eba640d664fcf074b866e296cffb0f5fa4f568c91f3ea
-
Filesize
264KB
MD507b149bb54046cad68360477f2de3899
SHA1c16314fc44896d1c4287e3b77ca86e0f749418f8
SHA256c64d85c7bcf66d45571a866aed0fa1aaefb1dc0f6630535ca82f8b40b17b0b8f
SHA512ad6bdd7c0f9adc39ee98692db7be1aa33292ea98bf39597a92fb88576e7d32636a76f031ba17b0d092005f59924dc082c94d71cbe466019895d4a51988a459b6
-
Filesize
4.0MB
MD51cf862933e3a7d6eb9d931fafded1404
SHA19add9fb094ce63c6c98fbaf3ba059d17eabc696a
SHA256fa0873b510887500e5213b68768f9305128aa13c14b9fe7fe31346ccbca0a771
SHA512146db96485e621089171d5d59e92f955a9d217e48b222f7a599453027e15fb136f3c85fe3bfd726e5f8903950a1fbd2f1944790c59fc8f27328ba2291f5f3686
-
Filesize
44KB
MD5c1d01cb8d950a69f3a6e6c7ef87469eb
SHA1999fb696a1980538a384e205a9b24a1255ec93e8
SHA256695ed45fbcfc166cb3a040e2dd67d42c0052b65efc9193e1484dc6edf9df55cc
SHA512f844104211b7b339bf68266d881ee8154b42640b240a41199ffe8674b6dbc007f860eb60d9ccae94c88d35105dc63fbf97f235970453fc43fb794ebe6ce75a0b
-
Filesize
264KB
MD56d771f78550194f955a2c35af53b3235
SHA11291019a837b241354e31c9736cb3b38ddf0d92b
SHA256ee4947b53f10c640591c0e111b794fe423cf98fef1b0b060439d915e375f008d
SHA512e53857c1b86854bfb10be63a0a7e3091a65f7990be812e5c3b4a86185148260e1c1e3dd4801d327b112b5592c69728af6b2104d6e6a694f6386608a5f6382138
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
332B
MD5f0d11e4e003448bada468338d9772ee7
SHA17a2ed5625238019133b345ded09c497004eed959
SHA2561ea1308e1ff55824e0941e6f9d47d0551872243a2f52c1420a4af20be9b58f89
SHA512562abd1239980611ecd1c1402b385f7ce71d63084ecaa4afe19eebd177899c25bf19aa2800374a984126ecabc6a4754acd7c43b8c2a2c2f4b29c2843eea6c963
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD53b4830b9dbadd72a0f6b80eb057354da
SHA187fa8faf2c0b11cc514bd95db5bad817bfc92115
SHA256791c6850908c3754158d65b5a9c19e48287368101581b7d70a48b99b529620ce
SHA5121c3193f4739a23c4736726a2b56fe3d6de453984ef10d67aa200964d7d71fd7a34dd371bbc00b04ba574b892a032d10c5cede13c6433c27fdf2f7549d682c246
-
Filesize
345B
MD519f43db3232c1cb89eda2b81dc2ba35a
SHA1e08e67f81fae8f9904a7236acca38a940636ecbd
SHA256fcaf3f44db7916aa2c4821757e4f0ff4e181960dc2fc19bec62d884ba9f329fe
SHA512cf336a06c03e098f530c0f03b441050b623f4458f8c74048c1521cac423976d232a2ade13fe7f574534fb90c69b17eb682064a7c1c1c8ad047720ca130610a39
-
Filesize
321B
MD5a2c51080f95efb42878f815fa1a43796
SHA143f93da4d7f4cf7eaf56e3f089c69ea73321a76a
SHA256b27a80cc32ed6a018557813d3138a94fa4f482f1ab94b9fe3fc7c8f01c937ae4
SHA5126f57bdefcddc270206fbb8a865d389e5d421c43b6fe8c2e4a27b2060055b64457f2fde9f53a4ad8c1a7db27a7d7ed363a7e6a838e73f288ece0a9b2b1f244971
-
Filesize
8KB
MD5dd0be11e4adcc8ed24a7e18580c8e195
SHA1153208fed1cc02760e4dc4b33ac58efbcf7a4c89
SHA256cff2ee3c5aab4f149509199b249e9b1dc5677ec51a19cfd9a37f2d566fdcad0a
SHA512ad88a35653d60cf1334a0dba831ce57d2de2709f47032e6112935e33daf38ecf3c333af7a5fd8a74b7d3609ba4c4bff851814d2c8dcfeb64ebee679412fd7960
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e35942df-555b-4cd2-a9a4-2434b95a1232.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
18KB
MD5262dd7ceabdbfeb0b342ad5f09ef4460
SHA167cc2176f85b38bec7d2be34b2597c703a5b3ff6
SHA2565eb724dbcaf0c9de5e3d293c7764cdd0b758e4fecee3df36489f4a9b1c00331e
SHA512bdd04e1ab6f36cbea7df02e3298393f361542a835cd0d0f22314f1ffb07567a21adf1c817a65a2f1028438594cc2d046f32fd851d0ea439c072aa4802a29436e
-
Filesize
317B
MD5da4f7ffe21d8026c4425b5df6a9beccb
SHA11a508ba5a924b2b2b179fdf831710c2dfc96c084
SHA2568de6a098375fe7f4df9e99bafdecb6e2f7c99dd2e20577019877ff94e34a9408
SHA51213055f2270b7660877e8012c3f06410cd299825a834b673ba42d5dc956f2f139401187e4cda9addedcda8a377f248fa01b3a5fea680bff60c51d5933e757a513
-
Filesize
1KB
MD516d75804077e67742c7f4a4c3f4f7eba
SHA1f0d8c8dacf1d85cb540ebd465029ffa6a3b08448
SHA256fa61d98babe9585043c7979d299170447a3b2aae739c218512db01c010196b90
SHA51281f15559e3ebd042bc6f441c0503176cb3f07462e302424f7bc98ecf514a5a2dd4a73c9a07adbafc33026d9d623da4faa714006eb2fe178d1c41d069f57b1a38
-
Filesize
335B
MD5d75fa15cd2e40efdbc85d29ca724bb39
SHA1d05f63b48542ab2d309921bbbc6ce98434e55d8b
SHA25658ba9a2b81dd6b4086b77297ccea2fd544161620cc7d2eb968a13c0fa6665015
SHA5126a0b8fbe57096980ed16191e2338acb9324148475acb61c6ca210ac5a9f2325313a05d2bd89ab333143d7b1b950ce97b0c4d69590ffd0c1655ca4a7b999e5264
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
150B
MD51e8051cc4284486bfd0f2ad3509f1a09
SHA1c4ece33586bd65f252f25704fa04473e345dbf53
SHA256027ee49c6ca295a174ac58bfd3d394112a72a86dbb85cee24f6d404a8fdb7a31
SHA5128a94074b6e6e89b9706fc66874e1903247fad8753f9da8314037eecfc470484a40f4d6444a04c4654c24d5474f47e8ceb25322bf6f169da9908aa8ff6dec0571
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\954cde1b-4d3e-477c-85b9-34492bce3a62.dmp
Filesize10.4MB
MD532135ef3662d246ad99cb9e9350aae2b
SHA16b653037ca17fe464d2c331bea2415a468f25598
SHA256858193b7e6c4cbf793f11c8527eac73213e443b97c14aaec2185825add0fd778
SHA5123a2411bbaea6f44210a83961f8672955e7e02af6f8d7096884f82d5cd2ef3bd9b51c1c6d2b3b7df1db2d08b104204a64bd533fd47b6f4f5cb4f608d88a291fb4
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
5KB
MD55f675e1fa35e1fc84acea6416dc6fc1e
SHA166e4ea7c5e3a11dcecfca2c24b0d6ad29d31ece5
SHA25664b9e04cbc1a42d5ffb1a20b16c81f3fc97509c0041a44a926eb3ad8eb9661fb
SHA51217cf3afe060a88c8215ff3ec7abd292748e5c021f176b1b00bde3c1ab4dd215cc525f2e69109508eeefe8300d8eb7d7e2bba8860145bccef06abfa7ec07a2ace
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD59c139b522221f62a465c60af15899589
SHA1167682cfdc6d4c4e451a28909992029672da59df
SHA256d91ba6511a59050de40247c33f22070e5b60913b5965be365a16d5458ed1e76e
SHA5122d20222fa785d93d6be6ebad42ff44b41aef7f1d7ea0c94874d9d610cd25c155249a3250e1064214304131dc31dba0f8245731a1bf1cf25f14e364c652446ab1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD51a6f30bf9822c3b7ce637f2709434204
SHA1d2b8908cc0411e6aabbecd54e2c437ad1dc30c5b
SHA256de594d27cceb391f7a9742eca5a0063004bb372400124fa1fd5cb276b9560107
SHA51203daa651cb7bf86460e660be7f54dab0871f0d8651d73cb96e03f7b8d0ba5ed186bbf35482541a8c56cd0d6f66c6e7bd73688829c197e0c38c2ad545294978b8
-
Filesize
1.8MB
MD5a63cadce90e5a2236df20feaf391a8a5
SHA1f28a33957756a509324debaf69561557d09951e0
SHA2568b30a280ca29471088ea3858b9f3e1788239dfe5d6e71a503c7916ac36f74fe9
SHA512cd757a61e39c6b59d8971631f4c7041ab323be8250b57f12c2375eb46c22b0cee965df35f17794b9fe1b2da8c5caf6e38a41a8c9908092adffd35b4c76809e1c
-
Filesize
4.2MB
MD502bb15adea48221f6c39e50f1c4d902c
SHA17ca16530831f2388c7cf367e3e782533a764bf10
SHA256af2552f7d0586a5c95bbbf16460571b82e18aa651a440fa94136b0258c640c14
SHA51231c547da420e474dbc2e729b05f33c2022e24743ed673ca125ff5345a1e1e00c5b6579338bd6fa2c7c1fd316a49266d4ae4b14c35b3cb9f40842dd9c8bcef774
-
Filesize
1.8MB
MD56180812dca1859f8831c138cdeaf34c3
SHA1f7bc78cfa4037407f014818f2cf02f93b6903ae3
SHA2569a576b4a397bcc22e6521b0c49ac28dd5aee9f3f5a8d8e7f5a0f6b1bc890466e
SHA512e4f8f85324533ab2ba503004753343c51a12ed5b36ecbcc72c30dd4ee5026ef4e15444701853d49b0212f66866e30d7ce518d0a3d9d435cd8c839e543e9f4bde
-
Filesize
1.8MB
MD5989618b54cbe6d89c30aa67fe52fc62b
SHA1fb55e89cdd398d44eaf8ce549eff424a7cf47141
SHA256bee0fe71acfca971ebaf60e73f2026c1612cf89bc26d18e609891dfdaf4ad423
SHA5127e21675d2ce2f33d5ea3e9219733132cf403be18fd810912da03ac53a32c1e12c7821ff81f26874e2cd61452e5e734263be43f8985fdb7f581ce2d0194cdfba8
-
Filesize
900KB
MD5b732e89c499b07ea29c725416d62ff73
SHA15403902e4bc07eda12d6b26b552324d687dc6298
SHA256cb4df1de28626672c35c0a46077bc463061cac3ce8621f4751b3df8758e11519
SHA512f1f90fa17be3d00b6e299bc9132a59d2b0585972043b7791ee60806c21996216aa8c4668c7ba04ea77494a610fc8edc4525c40150aea5ba2f23799cfde39f23e
-
Filesize
2.7MB
MD55615bd983846db760a368756014c7279
SHA1f175ccae1f5c0d364cc1c4b0f156e99c264463a7
SHA2560650b9365c8df2f76101605bec1c7854dbad9543a7c34c25e50d0a8a919506e5
SHA512202158751411457283a5cd8b747051b4ecc95e80a0c8fdaa85ab6b6de7c53de65d60c7652a65d42fc82eebbbab45e6583bc5540458104ec7e92da7de66740404
-
Filesize
2.7MB
MD5d30bd6bc4ce8e63cd599e4d1b604c815
SHA1c79f06015669a06f56c7f3ce81e4b5f18c91d867
SHA25653705aeb862870ba7f20fcbe388077b9b47f049a6132ae4b3fe9a23208f5897f
SHA512847adf10aea75d02d7cfb45331946270f97624dc918ced6349c5c4b181fed23508fb67e64384c5d971a38fe4f318fd6ab985982f97a6b7fe483b6de426f612cd
-
Filesize
5.5MB
MD5c24c2430fa1597f49bb5fce55257c524
SHA1b31c962c2dd84c89ac16c7c603cc67ba7ef3d817
SHA256ec73aad3978aaab7fea208d04f1762df544dbc13335853adcee098451c80cacf
SHA51295061ac4a11280b38173e981963351dd78f10b6d08a5558f3233f93ab8d461658219473633485e47ea63319f6933975bf84ef6e6ad16c505cdb5cc1e6e1bb474
-
Filesize
1.7MB
MD591b37d2cd25d901080a13743131a5229
SHA10b77ba7424bf660b1bd8f4f6c01208cb8eaaef9e
SHA256d84a99942feba00f43b585deed2d7b44caa59488c61ec4d8b118b407d4f4c6f9
SHA512e6006d818362a4d5713fb2d41a8bde6db8d8a6961e7314741dd8719583a601b18775ef6ec7835c3db6ad6f6e8f7aedba67a3edc98d8e8faca7a825fbc0483323
-
Filesize
3.7MB
MD53bdac88a484cf1e0a17dd1ace87588a7
SHA1d37004f85cfcfdbcaaa8b0ccee419c4d0dbf3a67
SHA256869ed6d92afeacfac5323d367ac3caf728133a2d04eab662f7acc90e2e36cba5
SHA512c59fe2f0ced0dc8abc68758fe49617b2ffffe0b7796d173c0c0cc404fcb0d4b0f3e4e2962a10d650fe0c9af892b68c90ca2b76ba89dd494d0b7f7353f0a0eb8a
-
Filesize
1.8MB
MD59e17612d265863581fc761e5b94622d3
SHA183c605db6e0df8c9547f4ad9db9b46d1255a1e07
SHA2565c2df4701f0c81874096596ac9026c09edc28d8bb95f6388cc41700391ccf6a9
SHA512205454ce308fe6f6a39e3ff4bdff1d0dfddb12dfcf23d0a88a6d4cbf06b91e0ebec9b4b2896f18893017acd79d8e162c355c5a41cdaf96618cfb9cd02dc2ff84
-
Filesize
1.8MB
MD591ed86397a1d20fc8c1057985c13abc5
SHA131402c55aa6e6295383e405d9d12ff4bc84e980a
SHA256c1b9a83f47c5b38c215aff0cce585477e084a5af8630726d960f699971a3852e
SHA5124a3f739f61910575923801477a45373286612c131e1277c21b658fe8f227641f2f97bb323481f3a8f9f2c1508ed5dfce309d304f05b6d314eb3f5fa83d25fd1d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize6KB
MD5a4b97a81150f1687927afe0c334e8418
SHA1fc3ab00360faa25663ac6bb3c12f4acd4ccba9ab
SHA2565bd43d64cb087f44181f96c21ad596ae73828cb91102c51097c36ba0bfea2c03
SHA51296797b5645191ac557965fcb392d0915af9653ce5ce880f33b2f21d28c15542bef022eb40376b3bc7648900b5afb6544aba52ec418c66b7a10a1ac677aff33ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize8KB
MD59188ca5b82e21bced676506826a586f4
SHA1816c8922775825b85cf725d11dfe553b73cb1ead
SHA25600af526a4beceb02fa9aaa9bafca7405bc29ec138a958067b3fc3dacf670b6fa
SHA51292863e3531e2d422e54dc92334bc2362115b550bb68f282087609e8aa25c96c0b7c916f2a23e30e0311d5d007bb87b0f6efccb569ddf6d13cd5e29c74502635b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD52daeb1d3b2a2dc6f02d1ff3d0c482473
SHA1f017c9a5a0da9de75a53f3fb5a2140ef34edfcda
SHA2568574dfebc42c1a301996a682bd37e7383a538cf2192b876cf44c3c25a760c8fd
SHA5123c088a5a9b13ace90b5dd76eb6d30942a1a1cb47dbded823d5dee6a4677f1b75ab3f71e5122f0a049d9aa7caa5d147a6c07ee3995aa3a3be3349471633482f0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD55e3d9a57d442dfc5979d6731c73c03a3
SHA158e5f998820c0ccb511ce7c812f5b21f5dfc1fa8
SHA256d8d0819fdaa17f7b95d2af3a4a4ffa02eb20b2aae2b0d451a41b8938586bb3a8
SHA512d627de16563d817c8db918614177f8f4a0d3c9223fdc5300d037526d0817c4d328f73b4767341a93cd5d4ad89187644b8a3eab47054444e55d93b7710b77d561
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD58bb6dfb9a727260a6b0df7c80cf773fe
SHA1994fe0b131ef1be79e9b0e603a87c0d22ba4ad44
SHA2563495899912a65bae85b413fc83bb40fb27c2a1c46fddebba5a929c2f9100beaa
SHA512a581e5304f18b14ebd889ac3eed91fdc1048bb3fbb2c939f480ce64dde0c462a535b59eb572e452f665b6bc7dbfee14fe249acfad1fb86c94494ae3b38afb71b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b8beeafd0835b2c9180349e62ffb33d3
SHA1880ab7be45baf8cbbb1832f1d45e5011b7b6e361
SHA256d35dc9649875395f0f3b5036910fe91ef51477f36e9c9b77a43de85552392009
SHA5122380637a5362661c08fc680735ecfff60a0cc12d76d047feb2665005f006b0c7b6f6447c76f42545a7a681812813b32a1f2c70398b7bd281d3c5a523ad48e80f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD526631244d9b602137fb7c4adfc3d2afa
SHA1161dc92455cff176038520f85ca869e2322968cc
SHA25631975011e417ee481be44323ecee9bc09e8b3ff7083a2bc6d714f31864ae87d0
SHA512ace452072e2247e10d263c59e80ad67c219314ff847d328a94ff5352a646c48f1d5038ea3260dae4fb130a441cb40a08a0064ece5804af1a6fc593806c20b1a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD590cdc47e4e810016c35f6b1808f718e4
SHA151bb15151d5d86c330d6ffc35c2e5cd11d18186e
SHA2562bcb8eb154af9b834b0b93287480203c033d79bb09147342fee6fa82192d4433
SHA5127f21a4212c087ade546146a6982d49b08c75960bf5d12df503bc76ef1f217e5753b454244faae68fd4081afdd7e57c1ca997833d2c802325d16b1bb6a238c553
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD521fd616aef96c8403ac6176c4af63890
SHA1689003076c53e97dd33ec4f598ed9b5d85933e02
SHA256d966103ed0f07f175fdc3bce84d2ae5d1b117672a6fb51feb560b7db34327029
SHA51211c4af2e2b9c65e7d63d027ff71afa1985ac5d347d047feb6ef8a5e27bd8fd975642a75e1722bb3839a65fa1c150ed845d028426796687023ab2484d51dd098f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\5fa593d9-3eeb-4a41-90bd-a68af04be13d
Filesize982B
MD5c6ff00122264f4f0c954d5b6a5a898f5
SHA18037d1192bc1efc49aa3b65f3ba3ef63e5df0e16
SHA25613bef704ea68ffc1ecfbdd60fa72860e556cb003f893d7e1780f6e70615d4c8f
SHA512921ee01b4d7ac0976a3380d569a97c5cc2f64d388aa372f001003340ef8936007fba39667d698d6194ff5c80f573299d65e24f90d1948968bf7ffbdc210ff760
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\c9c04d56-1086-4367-86cb-66b3dbbdf629
Filesize30KB
MD53b90a55007c94574f05b7530d32ac355
SHA124391000e71ae73c94248a54f7ec41c26e658166
SHA256e10ece4373ef27b9633e6831d22c6e974409f0e443896b7d233e18f347718ee1
SHA5123a9c8403110f7d94e27aaddfd03b9308997765f6213a78698ff4a4412dc7c698dd01c886ad2c0d521e41201e2c39aa47d68f62c3a9c36188339c518f36417304
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\f69a1526-e73f-4f79-a205-6659e08ee38f
Filesize671B
MD5a629716eff2bb6e8e23443bf6b7b417b
SHA1192c0f6de426b204c5150d406151e952b969bf1a
SHA256d82d2fb7a9602b904d7b0193a7d8db0348e19444351cfd6bfa121bf7bdd3d0db
SHA5120fc6369b1aa2adc035a7f81d7b1168665ceaaaafc632c4866ab96cbd393edaa8653963a0dfeb76f0775f4f2e57619fc21ac44295815512e135678752eb6ceda3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD54d8fb36d7e0761a896365e7e2d10b59a
SHA16e1acfea513d9d030a77cd19425863e56f942ee4
SHA2564660c8ebf5fd8fe093cc510060c5d75392508a6c59048f03a820d7a600bb43d3
SHA5123808aab5f7fac5e29e9625310f0f855e681e8180de9b9fa3aa652dd7afb2586ffb93c4faf23bd66035fb4b509b69028e0f60e0370ad59a335b03b162d2d24803
-
Filesize
10KB
MD51d4f949e79748704ae856475358a6c76
SHA1aa59804de10dbeb1070e71c827197b1754cb065a
SHA256eb6bc902d8be29178f3d7f2f59370de0b76b6937b4418708af30f3dbe28690d0
SHA512b518e8f9b74c5d6dc52d8cabe259e56f978d66b9f059c678116892a5c2dba3abe1343f041bcacbd108e9fb202a1b3d69e4298f88c338826071360f2ceab7e91c
-
Filesize
15KB
MD57c09cf5848362ef6ac27363df3dfa77d
SHA1e59f7a605cda153ff6e82ceb29c0cf48d6ea8f07
SHA2560535b3ab95bfd916612e208219126668d5dda1abd1b98f5cc4d8332ece558c63
SHA51229deedd946b42c73e6100eada8175e356af9ee3b0157faed1f30a5f7b1d38fd3ac7111a47590e8a9d1d8edffde944545c96541966085497121988dbee7cc34e0
-
Filesize
10KB
MD50d9bd8ec6d39a47f9feb14e75418e9ce
SHA1bd7bbde5f99a7d04e4e161f2e3f5e69aabeaa0f5
SHA2566e43e7f3f0c69e09186b81f4f4b1d27a44d4c027e36f66edc713c82362d5ef63
SHA512b6cf4d7a25d36df59d872ee391abc34403213cfa3e69124fe3c8b09d64e20c071f1f05c7b9faddd0250a62baade7bda0bfe1eeaa8a9e491a9313f753f616fb78
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e