Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 16:31
Static task
static1
General
-
Target
aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe
-
Size
7.0MB
-
MD5
3a41c8a33484f96bc90e2cb48e991b2a
-
SHA1
b54959b4847473baa24620ab2e0dbdc2f0062118
-
SHA256
aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa
-
SHA512
6474a44b0025fdda52c188a8d24b04fcf057356a8551a79aa282807f446e0f97761ea3b87f4654ee6b33ebc58bdbe7190656091593755ecafd0e318be5b5093b
-
SSDEEP
196608:/jofebKHGP/rZGuIWy1hs2RF+4EL4l3Qee:/jofeZP/rZQIY1E8lAZ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/372-2054-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
4c900k.exe3fef8a3c59.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4c900k.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4c900k.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4c900k.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
da7bbf6237.exe3fef8a3c59.exeskotes.exeskotes.exe2l6357.exe3h52S.exe8256c6462f.exeskotes.exeb5fc58b365.exe4c900k.exe1U32L7.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da7bbf6237.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3fef8a3c59.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2l6357.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h52S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8256c6462f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5fc58b365.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c900k.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1U32L7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exemsedge.exemsedge.exechrome.exechrome.exemsedge.exechrome.exechrome.exechrome.exepid Process 3256 chrome.exe 5072 chrome.exe 5104 chrome.exe 4400 msedge.exe 3864 msedge.exe 4396 chrome.exe 4052 chrome.exe 744 msedge.exe 5584 chrome.exe 3104 chrome.exe 6088 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe4c900k.exeskotes.exe1U32L7.exeskotes.exe2l6357.exeda7bbf6237.exeb5fc58b365.exe3fef8a3c59.exeskotes.exe3h52S.exe8256c6462f.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c900k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1U32L7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1U32L7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2l6357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da7bbf6237.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5fc58b365.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3fef8a3c59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2l6357.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h52S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h52S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8256c6462f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c900k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da7bbf6237.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5fc58b365.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3fef8a3c59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8256c6462f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1U32L7.exeskotes.exe8256c6462f.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1U32L7.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 8256c6462f.exe -
Executes dropped EXE 17 IoCs
Processes:
x2C66.exed4L83.exe1U32L7.exeskotes.exe2l6357.exe3h52S.exe8256c6462f.exeskotes.exeda7bbf6237.exeb5fc58b365.exe909a6c5cc4.exe3fef8a3c59.exe4c900k.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 4548 x2C66.exe 3208 d4L83.exe 2428 1U32L7.exe 528 skotes.exe 220 2l6357.exe 2448 3h52S.exe 372 8256c6462f.exe 2016 skotes.exe 2428 da7bbf6237.exe 532 b5fc58b365.exe 1192 909a6c5cc4.exe 4964 3fef8a3c59.exe 5592 4c900k.exe 3364 skotes.exe 1888 service123.exe 6444 skotes.exe 6556 service123.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe2l6357.exeskotes.exeda7bbf6237.exe3fef8a3c59.exe4c900k.exeskotes.exe1U32L7.exeskotes.exe3h52S.exe8256c6462f.exeb5fc58b365.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2l6357.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine da7bbf6237.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3fef8a3c59.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4c900k.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1U32L7.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3h52S.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 8256c6462f.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine b5fc58b365.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 1888 service123.exe 6556 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
3fef8a3c59.exe4c900k.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3fef8a3c59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4c900k.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3fef8a3c59.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
skotes.exeaa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exex2C66.exed4L83.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b5fc58b365.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009071001\\b5fc58b365.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\909a6c5cc4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009072001\\909a6c5cc4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3fef8a3c59.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009073001\\3fef8a3c59.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2C66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" d4L83.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\da7bbf6237.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009070001\\da7bbf6237.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0007000000023ce3-160.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
1U32L7.exeskotes.exe2l6357.exe3h52S.exe8256c6462f.exeskotes.exeda7bbf6237.exeb5fc58b365.exe3fef8a3c59.exe4c900k.exeskotes.exeskotes.exepid Process 2428 1U32L7.exe 528 skotes.exe 220 2l6357.exe 2448 3h52S.exe 372 8256c6462f.exe 2016 skotes.exe 2428 da7bbf6237.exe 532 b5fc58b365.exe 4964 3fef8a3c59.exe 5592 4c900k.exe 3364 skotes.exe 6444 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1U32L7.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1U32L7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 5552 2448 WerFault.exe 93 4756 372 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2l6357.exetaskkill.exeservice123.exeskotes.exex2C66.exeb5fc58b365.exeschtasks.exeaa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exeda7bbf6237.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exe3fef8a3c59.exe4c900k.exe1U32L7.exe3h52S.exe8256c6462f.exe909a6c5cc4.exed4L83.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2l6357.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2C66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5fc58b365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da7bbf6237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fef8a3c59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c900k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1U32L7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h52S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8256c6462f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 909a6c5cc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4L83.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exemsedge.exe8256c6462f.exe3h52S.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8256c6462f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3h52S.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3h52S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8256c6462f.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
Processes:
chrome.exechrome.exemsedge.exemsedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 4264 taskkill.exe 5056 taskkill.exe 5028 taskkill.exe 3112 taskkill.exe 3492 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133770259228457125" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
1U32L7.exeskotes.exe2l6357.exe3h52S.exe8256c6462f.exechrome.exeskotes.exeda7bbf6237.exeb5fc58b365.exemsedge.exemsedge.exemsedge.exe909a6c5cc4.exe3fef8a3c59.exe4c900k.exechrome.exeskotes.exeskotes.exepid Process 2428 1U32L7.exe 2428 1U32L7.exe 528 skotes.exe 528 skotes.exe 220 2l6357.exe 220 2l6357.exe 2448 3h52S.exe 2448 3h52S.exe 2448 3h52S.exe 2448 3h52S.exe 372 8256c6462f.exe 372 8256c6462f.exe 2448 3h52S.exe 2448 3h52S.exe 4052 chrome.exe 4052 chrome.exe 2016 skotes.exe 2016 skotes.exe 2428 da7bbf6237.exe 2428 da7bbf6237.exe 532 b5fc58b365.exe 532 b5fc58b365.exe 2448 3h52S.exe 2448 3h52S.exe 2448 3h52S.exe 2448 3h52S.exe 4192 msedge.exe 4192 msedge.exe 744 msedge.exe 744 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 4964 3fef8a3c59.exe 4964 3fef8a3c59.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 4964 3fef8a3c59.exe 4964 3fef8a3c59.exe 4964 3fef8a3c59.exe 5592 4c900k.exe 5592 4c900k.exe 5592 4c900k.exe 5592 4c900k.exe 5592 4c900k.exe 5584 chrome.exe 5584 chrome.exe 3364 skotes.exe 3364 skotes.exe 6444 skotes.exe 6444 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exemsedge.exechrome.exepid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 744 msedge.exe 744 msedge.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
chrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe3fef8a3c59.exe4c900k.exechrome.exedescription pid Process Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeDebugPrivilege 4264 taskkill.exe Token: SeDebugPrivilege 5056 taskkill.exe Token: SeDebugPrivilege 5028 taskkill.exe Token: SeDebugPrivilege 3112 taskkill.exe Token: SeDebugPrivilege 3492 taskkill.exe Token: SeDebugPrivilege 2872 firefox.exe Token: SeDebugPrivilege 2872 firefox.exe Token: SeDebugPrivilege 4964 3fef8a3c59.exe Token: SeDebugPrivilege 5592 4c900k.exe Token: SeShutdownPrivilege 5584 chrome.exe Token: SeCreatePagefilePrivilege 5584 chrome.exe Token: SeShutdownPrivilege 5584 chrome.exe Token: SeCreatePagefilePrivilege 5584 chrome.exe Token: SeDebugPrivilege 2872 firefox.exe Token: SeDebugPrivilege 2872 firefox.exe Token: SeDebugPrivilege 2872 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exe909a6c5cc4.exemsedge.exefirefox.exepid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 1192 909a6c5cc4.exe 2872 firefox.exe 2872 firefox.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
909a6c5cc4.exefirefox.exepid Process 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 1192 909a6c5cc4.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe 1192 909a6c5cc4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 2872 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exex2C66.exed4L83.exe1U32L7.exeskotes.exe3h52S.exechrome.exedescription pid Process procid_target PID 2076 wrote to memory of 4548 2076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 84 PID 2076 wrote to memory of 4548 2076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 84 PID 2076 wrote to memory of 4548 2076 aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe 84 PID 4548 wrote to memory of 3208 4548 x2C66.exe 85 PID 4548 wrote to memory of 3208 4548 x2C66.exe 85 PID 4548 wrote to memory of 3208 4548 x2C66.exe 85 PID 3208 wrote to memory of 2428 3208 d4L83.exe 86 PID 3208 wrote to memory of 2428 3208 d4L83.exe 86 PID 3208 wrote to memory of 2428 3208 d4L83.exe 86 PID 2428 wrote to memory of 528 2428 1U32L7.exe 87 PID 2428 wrote to memory of 528 2428 1U32L7.exe 87 PID 2428 wrote to memory of 528 2428 1U32L7.exe 87 PID 3208 wrote to memory of 220 3208 d4L83.exe 88 PID 3208 wrote to memory of 220 3208 d4L83.exe 88 PID 3208 wrote to memory of 220 3208 d4L83.exe 88 PID 4548 wrote to memory of 2448 4548 x2C66.exe 93 PID 4548 wrote to memory of 2448 4548 x2C66.exe 93 PID 4548 wrote to memory of 2448 4548 x2C66.exe 93 PID 528 wrote to memory of 372 528 skotes.exe 95 PID 528 wrote to memory of 372 528 skotes.exe 95 PID 528 wrote to memory of 372 528 skotes.exe 95 PID 2448 wrote to memory of 4052 2448 3h52S.exe 96 PID 2448 wrote to memory of 4052 2448 3h52S.exe 96 PID 4052 wrote to memory of 3984 4052 chrome.exe 97 PID 4052 wrote to memory of 3984 4052 chrome.exe 97 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 3864 4052 chrome.exe 98 PID 4052 wrote to memory of 2312 4052 chrome.exe 99 PID 4052 wrote to memory of 2312 4052 chrome.exe 99 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 PID 4052 wrote to memory of 4564 4052 chrome.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe"C:\Users\Admin\AppData\Local\Temp\aa4753390d564107863357e270663385174e66c1d75c24aa211fedfef4ef06fa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2C66.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d4L83.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1U32L7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\1009065001\8256c6462f.exe"C:\Users\Admin\AppData\Local\Temp\1009065001\8256c6462f.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffe5912cc40,0x7ffe5912cc4c,0x7ffe5912cc588⤵PID:5556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2060,i,7634540336452431480,11816571755639626612,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2052 /prefetch:28⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1824,i,7634540336452431480,11816571755639626612,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:38⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,7634540336452431480,11816571755639626612,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2292 /prefetch:88⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,7634540336452431480,11816571755639626612,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:18⤵
- Uses browser remote debugging
PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3260,i,7634540336452431480,11816571755639626612,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:18⤵
- Uses browser remote debugging
PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4296,i,7634540336452431480,11816571755639626612,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:18⤵
- Uses browser remote debugging
PID:6088
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 13647⤵
- Program crash
PID:4756
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009070001\da7bbf6237.exe"C:\Users\Admin\AppData\Local\Temp\1009070001\da7bbf6237.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\1009071001\b5fc58b365.exe"C:\Users\Admin\AppData\Local\Temp\1009071001\b5fc58b365.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\1009072001\909a6c5cc4.exe"C:\Users\Admin\AppData\Local\Temp\1009072001\909a6c5cc4.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1192 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:2040
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2056 -parentBuildID 20240401114208 -prefsHandle 1980 -prefMapHandle 1972 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {19633351-2b1c-4e48-b853-e55f3071ace6} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" gpu9⤵PID:3584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2488 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7203273e-4fb2-466b-8ae2-e47c180c30d0} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" socket9⤵PID:732
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3268 -childID 1 -isForBrowser -prefsHandle 2708 -prefMapHandle 2896 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a85fb93a-3cf5-4519-b221-634a7641e994} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab9⤵PID:2320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3944 -childID 2 -isForBrowser -prefsHandle 3956 -prefMapHandle 3952 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7da54745-1cae-44dd-bd26-0f1664c7907b} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab9⤵PID:1112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4468 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4448 -prefMapHandle 4484 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {443b440a-63d6-41d1-a2e3-f291c8c862bf} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" utility9⤵
- Checks processor information in registry
PID:7124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 3 -isForBrowser -prefsHandle 5776 -prefMapHandle 5772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa7a70e4-aee0-4944-bb55-a276fb2cdb45} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab9⤵PID:8144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5996 -childID 4 -isForBrowser -prefsHandle 5916 -prefMapHandle 5920 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aede1cc8-cc29-4574-b93f-4902701dc4f5} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab9⤵PID:8164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6124 -childID 5 -isForBrowser -prefsHandle 6132 -prefMapHandle 6136 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c8f5fb3-2eb8-497e-89d3-90184f05a3aa} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab9⤵PID:8176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009073001\3fef8a3c59.exe"C:\Users\Admin\AppData\Local\Temp\1009073001\3fef8a3c59.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2l6357.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h52S.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x164,0x168,0x16c,0x160,0x170,0x7ffe587dcc40,0x7ffe587dcc4c,0x7ffe587dcc585⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1820 /prefetch:25⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:35⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2292 /prefetch:85⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:15⤵
- Uses browser remote debugging
PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3404,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3508 /prefetch:15⤵
- Uses browser remote debugging
PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4332,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:15⤵
- Uses browser remote debugging
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4684,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:85⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,11660364765095718445,967006352205755702,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4956 /prefetch:85⤵PID:3584
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x124,0x170,0x7ffe587e46f8,0x7ffe587e4708,0x7ffe587e47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2392 /prefetch:25⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 /prefetch:85⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:25⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3208 /prefetch:25⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:15⤵
- Uses browser remote debugging
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:15⤵
- Uses browser remote debugging
PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3204 /prefetch:25⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3092 /prefetch:25⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2760 /prefetch:25⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3836 /prefetch:25⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16390889439986596128,957844168307109067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4036 /prefetch:25⤵PID:540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 21164⤵
- Program crash
PID:5552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4c900k.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2448 -ip 24481⤵PID:5528
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 372 -ip 3721⤵PID:5680
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6444
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5db9149f34c6cfa44d2668a52f26b5b7f
SHA1f8cd86ce3eed8a75ff72c1e96e815a9031856ae7
SHA256632789cdfa972eec9efe17d8e2981c0298cf6bd5a7e5dad3cbdcf7bb30f2e47f
SHA512169b56304747417e0afe6263dd16415d3a64fff1b5318cd4a919005abe49ca213537e85a2f2d2291ea9dc9a48ea31c001e8e09e24f25304ae3c2cfefad715ce9
-
Filesize
649B
MD57032ffff12fe9dabbbabbad95e8d7f14
SHA106c5aaefc137d8dfce53c9bea17e4e6b6ddd85d5
SHA256563f0f99f6aab6e63015e690736980bcce4f0fa18f123b152da8787d6608a0a1
SHA512e89fb94e3dea730d4fe9f37614d370e1f3a8c7c2c478800d58c7e1c39a2d7409db2079f296f1090f7a044b7e59a31fb785af8601641ac3926630385a932af3b2
-
Filesize
44KB
MD521529a6a98d7d49bcca69727a7a998be
SHA14a16181d7296a25ea8ecfee32e93face2699dc6a
SHA256b99d46495ff0efbd338fc264db53bc316714430e24b2e01af75ba469c9bd6d99
SHA512d6436c259a9d6fbfe1281fdc4cf0a13ca6f72e95dc54999c975f1e65b0138d0329a279dd3ab0c6229054ed878e75f4f041701ee36ecdd896649af851cedf2a4e
-
Filesize
264KB
MD5d3e86f75dc73fb04d7c4688113e22457
SHA1fbddd2d1f6595eaa6f399a31442be4d1bcac190a
SHA256df26b9284e876723a47e356594631aa4785ac0477885316394ccc34010ee9017
SHA51209e7c200bea7abfa421513129bfe5140de15f9bd8392b584c3ad47cd31c1d367eb5218f8c1880ba9d4a88d3bdd12719bc4e3b3a35584aa21c5b921bf45395a80
-
Filesize
4.0MB
MD54c1a81fb070ce4e9342496a3ea77e282
SHA1e93caaf2791aefc5be78d286eec4e352c0682167
SHA2568a3701b6830e9683be2947b696e4da1e4738383d1ffe014aee727345d8efc625
SHA512e05e045fe4cd2557759b0b1dce2505cf728117de3633bb9c96a79a6ff6045320b84bb30fedc7ec54c1f222ba07f7f60c526c7a1f0162c4c90c3b7ea9e9721b6d
-
Filesize
317B
MD5ff44b68607ba4cbb8bfc7cad5e0216c4
SHA19ac09a2d0d89a9f350b5b18dd44361f14d2d9c54
SHA256266747c99bad502abdd84ee12070cf0419c72e009eb51d9f266e6046201a9317
SHA512642d9790b4c21b3e8e89c201c9b51d7ed0749f6719964f7b3f393f1ad12a0cb726976012f052b66de11bc7373a87c78266a31631f372a91812c6b8bc6e43a75f
-
Filesize
44KB
MD579ff20f71de525b05c69997bcb2da4e4
SHA1aaa9cb2c9f3df529f3f285be2f82937bcc13b858
SHA256824a689d358dd039d27c11f96508d59edf54c9f427eae2fd415d46c40858871f
SHA512a895cb33e5286793211baf2706708f63f1d1413b5c05f08ae4fb113f9728acb56ceed4eb48db23bdfa36cde8e4532411bdfc9e2468fbed75ab78e3a74df6eaeb
-
Filesize
264KB
MD5cc92b3d9407e78a50245b1a1d50fe016
SHA19555e219d01d7852d344808a8418c05090ffe555
SHA256b93ba16366c2420c01476ab06fc05d76f32fafe913e37c8d5e24326ce1c7075a
SHA512a7b65b37c52521d6fa2c4324b94806e455833e2a5263ac3adf094fd1223eeae5c58dc6c590b350964f4921eb7bcdfd88b2c06518f372afdbd6bde2a9d72a62c5
-
Filesize
1.0MB
MD5fe993339a25710ebec86c051941d462c
SHA11a7a578b7a32bbe2102a789c2321090d406838d1
SHA25659ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443
SHA512b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2
-
Filesize
4.0MB
MD5d6b0609c4b6edb45553ff9afbfc95e33
SHA12697657b75906d3653f48080ec1f3993c07bd8bf
SHA256eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e
SHA512db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca
-
Filesize
329B
MD5652bfd0babeeb4b523227fd24668e3d2
SHA1d605a593ec61688b2d6ff0e3be28b223a4a52ec4
SHA256b6bcfe7be3db20646c547220954dc58469ff9148fe0db2114f1443c627e8fc09
SHA5129c3df5fcdc3d6709901ae0dce3f2a4021ff9462cc053db1bba6f4c93a95a93bb87f54b7a9c70d392bf3788a84d87e25009904179f82a3b338b43f9c88ba5b4d2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD5653bdf07c641147f0835bb94e92302bb
SHA163840c362e21dd45fdf5706cd3105f75a2337b23
SHA25642d12a0ec61cfff9e599d9d47bbd2aa533a32b6c833f3aa2d1a993afa928505e
SHA512ad94c2adf7f75e5e4d176f227a3b75f02f5856caa7b80fcc71debff5dee443657da00d33ba0aa3c5f534409fc40f83103d0b1e8b8b923dbe30d0f791d2515bee
-
Filesize
289B
MD5541c42f1c98b3e1b011d22eba854e707
SHA1db30188de1f22e3077e7044be1386a5d0ecaed9d
SHA2560768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b
SHA51247828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604
-
Filesize
317B
MD5a76496762eead283c376f5c49aebcaa0
SHA1474b8cb3d681f74bfad827f7ad81d58a01fc621f
SHA256d470c00f50991b8d80443644ededd4c8932cff0911f1993bec4ac2104f8a5462
SHA51205bf21fc39cba17a655250ce54b2a544f0435170625181a7e2d749542e33509bfca836f8bf6f5515f35e88b08edb75bc4c237d658e085900a45a35ad737ad24e
-
Filesize
345B
MD57d92cdf7a4c863e6c169ba42a8803fe1
SHA1f650f206b3d3f81fb83dd3fa4d4ee6aa9430377f
SHA2560313d063cee032de1791bdf449255265ba9e43e1b9f294f854329504c8ccc5bd
SHA5121003a4b2d7f88ac24c21430aa3223302fae4cb033bf81d80d7fd257f507b3136ed534a10c97f58b8f083f3dc98b83c59bba7260a38eda55181af24f27a927e35
-
Filesize
324B
MD504ef261c76e5d9136c6f6cce7c1fdc50
SHA16906e4ec05c67d4cb797c28757a49ddc7a1ee133
SHA2568d716cf2ad759c877d302dab8daaf9585f12c14dfd936ccf17b79a2f451cbbd1
SHA512344f1ccda3c7deb547527dc60d114f886f33a65aaf970cd962d555fe1aefddc6afda28020e8e834fd959881bcd309a8f3807803fd86e0bbcefea3690fc524ebd
-
Filesize
8KB
MD5189cba0624c5ffdccd9fa054fe7d5589
SHA1820c67f8c978f88c943e6ce4830e5efebbc1fda5
SHA2565e4d9d03026dc09928561bbee453a6438172ed3a49c546e2159a64d286f0f171
SHA512a7d1bb20342346b7e4601a9a3ffcde430d070e0d7c8ff19f1aeb01a422d3b1403aa09324285ae9c0ee016fc8bf6fd5a03b15768579d95407aa4fc65089987b44
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a7d786b4-80d4-4df1-ab51-5f9523e41983.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
18KB
MD58f7b03529dba3ce86ef4d2a2b848b8e5
SHA1cbf8e67f03dac803fd67feb14e19d0babc1bd2e1
SHA25691eb6251b04458eb5c6ec93db0f5c2bde843d8003b634ce5a53d29a23360e344
SHA512be630c6e40b83302c2ac963d409ac41a87b24eb4aa37daca2666fbb15a155c1f79abec7429f90f1d1b7ee38f830883b1687049e665ee45c9f72e9d4f4f89a943
-
Filesize
317B
MD5014d99685ac40bd5516570cfdf5661b6
SHA1853577239d2d266a8958bcc512dc69139613d42d
SHA256224761f370a4a7d34fc90811d4bf1adae72301b9a63b806bcd4bbae3d0953fae
SHA512de243cec4a94c7b0098ad4d4e99d48c1301d163b652832656ff1bdd59e36f69aa28c6997f6680986e4349857a6246f59bcafd505cf804f5dd55aad35ab9d9f79
-
Filesize
1KB
MD528dff999a2420fd76a20d4c07e2ebeed
SHA12005e4d76587f1c6c1b98ac62687a616564532b0
SHA2569f998c2de9744ee258b1b34a59ebede01ce742ccdeb1c980576900303062027f
SHA51275ebffd7085b883a5e1f0dabc379b6d7ae6d75098826d7002b558785da1e81b0842b505de18918d12d57837f76fbf078875f4b8bcfb8e0ecc962cfb7da28be1c
-
Filesize
335B
MD51dfd4c5b954844e73b231e1e5fb75ad4
SHA17ce827e14260ac0665775b61dc88331226313ce8
SHA256ee1eba5af87b54165918fc4ac1411993a9f7dca1564338ea6c65bc10c2fa8a6f
SHA5126acc4f43ca4f9bd004a6760c2f989c56d81c446d7b0df73ffbb555959333d784276b14eaf0e7dcc46857178e56caffe4f650f475bfa8e7a938807e1ce6a380cd
-
Filesize
44KB
MD5ada39099f09720181a5bb3694c80b576
SHA177517833873bc2b181d449ee0424d782a13f41f7
SHA25611db49e3deefbec7f288da12aee187f6efebcfe2232a72ac3516142072e65add
SHA512397b02d0b41cf0e0304aec7f83fdc01fc254914a5360cc4de361a84ecafdbd262bfc8f831fd78af5554dd20c5632b168c68d285f20be66bb228a28decb749e5a
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD52582ca533870af686d731622e3216ed5
SHA18ec3b24d857423322f64574bebb1d5c9e73ae65d
SHA256d854e610ba0e728bd1ad948f450eb4f5b8c7b3866693eecb48ac3d0f3722f698
SHA51252c26d444b147aefa9ef5e436448d7f436b9e7f644a3c3b036f9d525da1b78de97201b4ff5e6d336292201ba960a5eb34a8f81a46cabb31f756d6849122b16ef
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b21043324cdc727092e06a2025ccc5cc
SHA1664b843f350293be5b3b6c73e9c707aa55841c4d
SHA256e067cb44aa397450a226015b316f564ab619d77b8176c8d9f8ef632d17341697
SHA51275cad8c24a21e455b912a75999d90e4ee9db31bb6869c7e3ae123a1caab725f335d552e1bdb61b67284ffec9dd80513005c81c1680d5daae5d80ad48a4f2f0e0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5909aaa8ee63bef23f536966deec5ee7b
SHA180834c3bf057967b2fb4cd4fd0139372432d9833
SHA25644d49cf61851a0ce402cf66f924fff785b2b9925aaaea0c110676fb382874ad4
SHA512656f0cb317ba6450c8728741a60bbff260ac9d933ec6484a2dc136840dbd6f7bb81419a2ad8d9f4e3cf9a7fc6217fe6ba03a676c6c57ac4849352cd316f8e53c
-
Filesize
4.2MB
MD55b934bbc39deb3ef6318e983cf938096
SHA175980026dbe1c5451299557d2e4af366bedadb3c
SHA256bf0c204108b2e0095591eed02b027fe7f9892060f6d4d260be250bb110879f98
SHA512d1fcb264ba933e4aa6efec17c70eb91f7d6f59e284c424639bc652440cbb4176038ea81c38ac1d9216802068d68b6ec1b537b6825d7a591bfec76b4a155f5bab
-
Filesize
901KB
MD57708ca287b5703fd3e733e3abb32c5f5
SHA1bf349adc93f015eae3053e5cb6f69ae287334931
SHA25619ce538d200b7d328f4615475ffa78d2ebb9c5fa8d7f49bc5f5b1a605cf28f45
SHA512e62ae32a27b2e60e3b391f98a4fc1c4bd63b891d42ff64ea16ac3abdd883c88154ed42f4adad5bc1fae1b6f9b84b2713b31cd5eb9fa955eea642e5ee0de638aa
-
Filesize
2.7MB
MD5004ab6e9671359a4b40cefac032cb778
SHA1493eb400d94aae837fcf4a29d76d388d0411e007
SHA25651a6dc406c24cccdcff7f8ed9d38940007bfab29560198805350142b9945cb6d
SHA512e99be2fd72c751a3e990ba52f172f99f3ef83d455f4e93d2a5f8f6720414c606ba032f2b4221ddf121bcfdbe2e46ebe9f53aad7f8d9c1b3afd7659dce9cb6d2c
-
Filesize
5.4MB
MD5a5cfb2c12218b3e50f3f673de458cce1
SHA15131f99518cdf42160a3f564d3902e93b1cf2b1d
SHA2560cf41e5242876a90a8abf49497e591ce7e5bc17308509cfd5faba0bc42b4344a
SHA51213754494bfe1820c39e29fbf87658fcf853f5b3de1569ea8c5e49a6a0f5f18583144cef527e26820973be90bb87ae9cac77053f15b7c4d66bdaf5f7680eb7067
-
Filesize
1.7MB
MD53456608218e19c82196acb63550eac9f
SHA18aac0299aba455e064b65b2ea03e7b7709e26afd
SHA256198e241277eeabe643ccbe84f7c384b5a4f4e276fac38340dc29618ed1dd012a
SHA512307cd22f54ab49ee078a12f290dd32c7260f7abd6cfcf0385c086423ea8e4f71b56712de26850c53e8c721eb033a8b54198322e0f1b5db2191315858d6db0d72
-
Filesize
3.6MB
MD5d6f949b8d4fb0708ac1ddeef0a4bfd6f
SHA1451193e2abaf095834e36adeb46e39548399adee
SHA256e3f69f318470eda80a02d28d3099147a5f537341afadc1a5720288c7c5519028
SHA512d6e818d94d0f3dff6cf3f99c0a46ee6cbe42c8bbfff869d758a3c5a713134682de5f468a43d03e1528e5c90be731c7775f76e60953d1945cd9e9cbd3b855b65b
-
Filesize
1.8MB
MD545ad1540f6f9792ba5bb88e00358ce0c
SHA1317409f6f729e31e9f74633c78526d908f2b8760
SHA2568c0b95971d30bd0f553ef53c17b6e1569a7959c6ae4c00fdbdcf37146506890a
SHA512c025e5b6e9f97f90d6e29a863fff761bc17d44ccdae4c54f7eb7ff6a22fec135de427228b70ad2f80f80e7efe66537e1eb09fd6c9854f4361d166e6d2af8aadd
-
Filesize
1.7MB
MD5ad8c2e682a2304872d34b870c7838533
SHA1270385c022377e941abc235009da0e6e4e9dfb7b
SHA25681bf308c76d66c3c8d93f5202ff2211f2aad1442b9c64b1eb40aef60685b78ba
SHA512078df8229a19289b782e715531812dceb83a4515c644849fc6e5efbb5aa2e0d34569065646ebc14ed847a52ce1b12f7e2d5a061dec39bf03d8fab346a4a5fb02
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD5e38a22c2bc6823ee689e768ff24aa6f5
SHA14b1e9f5612b6a6f62f1585be01c869f2371b362d
SHA256e2d73e2cee08f518e0ba6e8f4b3f328152e306c31c799819e50dad5f9aa51726
SHA5125d1724efcfbcf09c6ce79818d96414173bbf61a9b56c0fade2c09b6831d519db66d6a740a53940ef4198ae781c096771776df635df46282faef32a43ca866dd9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD5e8db2a2f37cf9eb4b6472e9cf90defeb
SHA1b7402b63453336baee57ce1ba746825fa6450f7b
SHA256467cff93061438cf9dc67854833251a3a1366fb79fa0ba0c912e119ec07a3f73
SHA51254ba5a2fdf1ff4005c6d5db69f2962e02edc88d5e20498c9e845c692522490ba75c26b588e60982eed6c28cf03afabac343d22ce47d85f0c295af5e8a8195abc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5990d9bd560bb17d23e0278776a01ec70
SHA1865283878a4604a6f8296a2fe6aade290bfbb908
SHA2561842a43998abda19edafe0bd9379b358429a1ec268e002cccb1a5d57c03b7833
SHA5128f9499480ea30690e5d77fb94ca81ce45d81f3e9ff875e7294f89e57a659d6e966d4004ccc68c64d13ca20962f036798fe39302b7d24b549717017c46f0b883e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD5899610306c52b51cc4e8a60b5eaca297
SHA109bfbf1ee359a4d21e532354ad5f9bfbd8b6bbec
SHA256f6fb058c808ea741c5eb2e812ff949b294d714fb74383b0e9890fe44bde2cf1f
SHA512aac305d2ef4691a030e3e9b6ab7fe1073ab4c2a477eeac24f0792c728de3bd76fae2c3558a876971548182f790509d7d054efa0c6e64eb3905e06e6338dd7240
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD54da32921ea623d39f620a3424b9bcc8d
SHA1354cc3cc69117c6683b9794183a4202e7c81f727
SHA2563e620900ff14bbcf1e3293c16e13224df08d068ece7394f782359f5cc1028a55
SHA512bb8d10e3052a6dbc171685a325fd647eb12c88d7e00433bb5d82360e9588995e03a16f77f408a5d928604b5cc47ca72ec01fb5a256f1d2acb6df51bf6b77a60b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5399c504332be1ddcedcaf86c1209cae5
SHA1546de1815a45aa596c02e19a30d16bc888922c94
SHA256caabaf8ea0d2374a946fe53d0736aa452d363522f1699fb4f0a962e1c499ca8f
SHA512f16ab536854f021c952adfc5f3d1948a8cd3afe2265902dc70350b8c821303b4426f958c788c6a73f56f2639fc99e9003330b19b50123bf86d801ce99ab643cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD589881686b39de0cbd030ca8b02eaf414
SHA1773e2ed6d1c4974a7d3114943484037e340c8743
SHA256df85c054261059b5fa699b420d6071d44b472073797328c6a8f0e500e8daf395
SHA5125a628e475a6410dabfbabb61679c27afe7525e8ff2a10717a5ce976cf4923811a659e607cc81c7173d148ac63c730ad1b0bef3a1a47911263f3d474c18c67a30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD5ced03597141bef84ea3b894a1989c32b
SHA17de8626a69276e42444586bd68f11d0625425c24
SHA256946468f76f0ad57bb41261f0632c2c6b875cfe56196d0de653fdb418421e23b7
SHA5126afefe425e0569b85f0e2aa087ef5363017f098ce8b5fccfb97adf25c9c1e8af58911d0a29755631ca9f2a581921fc9b5f4ebd0ef8f5db44076259a2f4695804
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55a4aa3811a696837b6a9bd70154c01a0
SHA105375125e7cdbfcb360783894d5cef402a2d8d87
SHA2561717d24e68b67c85b520d4231c76217eb512554d6f572b30f70afd10b94c21e4
SHA512c2c23a895a0430b32c5b25df1d0a3f35dabf5cc6c6790235190c64cec4af076a9614566f33573e443e9d6f7c8b0439e762c2ee258aba49358f4696747bfe9bcd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e9f286165dda7c0aa00cb307296f517f
SHA1b5e347a82c87c8bb9fbbf78265b15b98dfa1f583
SHA256a0c84b46eb1ddd8e1ffebe4706413b222cbdb21d21de7fef59c733b96555c120
SHA512d9fcac7c35bb0d617cb215d8bacfb77aaa2c8d3fe94a49ed839b2990aae3d5cca82ff3dd143de676c3dcecfb6115699b8747c29a19a4d0af642bc2f9a32112c0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53fe855295be522df3bf88c0473dc2921
SHA160feb3db65a1319c6fc925865d398824b610e68b
SHA25675c8d94a27b9c9c1d2182bd5df986deaf6e48bb0cf8c115453819b981ec54e62
SHA51219869e3ea5ed4db07efcd1306bdae1d7f9937cc2ce392a61bd9b3ecb94e4dcdbcf65dfd54f3d09de0db71ba4ee6d297319b5ca762dd30df004182905bb264615
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d10e613a4697ceb336ca85c92bc09392
SHA14182004be912b075a267454f2057145f85384183
SHA2562fc6b331fdb3fdfa84c226b70b76d0fc7e1f7d3d0bdf6716dc7aa4a79a5f3a9d
SHA5128bbe965b583252ec1b67b31a3d40ff33c49de2530d06a7e2cfab1915f0f94ca60f8706486e5a96fdc3d1c969270c5d29c2a217561e8534d29f5b909747f77fdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\0279b75c-f6f8-4d57-8883-c729b740be2d
Filesize671B
MD580d06ffece1f1cc66da84d03891ca972
SHA138e347cd0d2e1078b0c8ef46729446bd5b5abd26
SHA256d4914abb820cd1a08d756dd4a68d0766d8b6d3fb9f78b5edbb4c83a8f094664a
SHA5126cbdce8158501be783cedc9fe6b753acd2cd84c5c7c914526d0b170b32a605c39be3d21e4e1e109874b68186eade560ab4218ed7d9266ccb43235007ce0c8593
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\4bf59dcd-900e-4340-9a3d-84e6b9d2d1b1
Filesize982B
MD50a2000b0ec51a22fecf974a622cceaef
SHA11162de872757c38c256278736574022e58ee8e48
SHA25607477acac48c5269a875c01a38c0df8222a9198853188f9f716e91f90fd02ee0
SHA51246e3f44644ecfa5f7e0a5b4468e14356c123175a74f554dada037f399a51b32b62d3591644a1cc4f514752b6f3bc101fdb983af226c36cca1ad85ea7c60def8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5e7eae0c2a986cc7f3a0d2aa6fba8da24
SHA179b428ccde1f76a2cd1f37d517af4cadf4c5a56c
SHA25680a159ed883f4f739c2ea30b9ef1e24aa3345e99ae65b40dc78876fb85cba409
SHA5128bea6e03a3182e9c42d46b555990f1a2a82baa01ef123587473e42c0ab10070200b9461dc42508a62f14fc5195e98caf3cb3ee4d841bc34df157d8b1f92e700c
-
Filesize
11KB
MD55ce57f53d9a7c771e2a7226b7a01bd8d
SHA1cf323281c9df38348cd6afd17d4416ab4df14bde
SHA256e5bc1105c55c111233cce7d798ffd2169b58a4929156a36336183326df8008b0
SHA512e31b4ba909edbd99ec67a8e84d627d9eab1b0e07c359b55b8b1c1c4e4d4d98b6f90b56a303c0b32551427c8d5bd5bbdf1084756aeb3d13ded32c32ed01fa9477
-
Filesize
15KB
MD5c365caf1411168fb514ba2c45ba97c6e
SHA193d701ed5a619518cd261de34a07fc050287980d
SHA256730206ca88733ec03e9d82ba6fc88b8cf04039ffeaebd722b34c50c89c972350
SHA512c86f8a429686d964064f157772141f22ae02473be1ba4ad39c30a3a426ca3eb9b0df826bc361b3cdc0cfe20c2d551d5c04bbae04cb0f333af09123371dd54788
-
Filesize
10KB
MD524d17de96ca19551cf93ac067d723674
SHA1d7dc7bc050803cae5ddc533ba04758fcbc125a3c
SHA2568f9144192305c77d44cd2f06b01471b90a8c56c165b90770b89b279eb7d4e301
SHA51293288b1404bb596220791e972a3f28a6edff0da609382178a08f9d2b41cbd2562cc34a1b2d78728d3baecd4fed7f4d976a61200b1fa818d049766977aba725e6
-
Filesize
10KB
MD55ab3bcaf840a583045290ab81c420a33
SHA1771492e1073afb91b1d585d53dd4da8f798f3ddc
SHA2560370d317e33eefae617913756e09b741242b47d9ff4b867de031bcc16d5b35e9
SHA512b1be63acc19393fa22bea305595d087fa441877a39d2d1c37f96f281e52b5785d3d7be3e2c7058a2c70f9e16043d7dede4cc4adb7b052b1312e2f0e5f9a95dbe
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e