Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 19:34
Static task
static1
General
-
Target
cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe
-
Size
1.9MB
-
MD5
ee9c5875f526c3f44381beb36b6eaa62
-
SHA1
423ea51703796def5f3449b68c8bc62298187766
-
SHA256
cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690
-
SHA512
516a491737a3983832e22659f2df44f88d2dd172fa142bf41282c2b56d12b7ac90147b6786491a0dbb77d18c71d1ae6b24bd0236530671e866b9a9fbdd12ee86
-
SSDEEP
49152:A1t85yCgjs/XJlrig6LfarKLYoorkGNlaK1C4:1Ajsv/rigDrKxorpna3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
5.0
backto54.duckdns.org:8989
helldog24.duckdns.org:8989
7Fvn9wsSHJeXUB5q
-
install_file
USB.exe
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/5740-1793-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ebbb22282c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ebbb22282c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ebbb22282c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ebbb22282c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ebbb22282c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ebbb22282c.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 5848 created 3536 5848 For.pif 56 PID 5848 created 3536 5848 For.pif 56 -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9346052029.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f1ac5583e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebbb22282c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3252 chrome.exe 5708 msedge.exe 3052 msedge.exe 4056 chrome.exe 4300 chrome.exe 4996 chrome.exe 3156 msedge.exe 5896 msedge.exe 4112 msedge.exe 4448 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebbb22282c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebbb22282c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9346052029.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9346052029.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f1ac5583e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f1ac5583e7.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation parduo.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation VBVEd6f.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url cmd.exe -
Executes dropped EXE 10 IoCs
pid Process 2012 skotes.exe 4948 VBVEd6f.exe 4616 9346052029.exe 5600 f1ac5583e7.exe 3200 c4ab395678.exe 5056 parduo.exe 5728 ebbb22282c.exe 5848 For.pif 764 skotes.exe 4232 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 9346052029.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f1ac5583e7.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine ebbb22282c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ebbb22282c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ebbb22282c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c4ab395678.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009362001\\c4ab395678.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ebbb22282c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009363001\\ebbb22282c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9346052029.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009360001\\9346052029.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f1ac5583e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009361001\\f1ac5583e7.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023d21-1867.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 6060 tasklist.exe 4504 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2012 skotes.exe 4616 9346052029.exe 5600 f1ac5583e7.exe 5728 ebbb22282c.exe 764 skotes.exe 4232 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 440 set thread context of 5740 440 powershell.exe 122 -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\IsolatedRespond parduo.exe File opened for modification C:\Windows\InspectionsDom parduo.exe File opened for modification C:\Windows\StrikeSite parduo.exe File created C:\Windows\Tasks\skotes.job cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe File opened for modification C:\Windows\BirthAllowed parduo.exe File opened for modification C:\Windows\AmendedKai parduo.exe File opened for modification C:\Windows\ReadersExamples parduo.exe File opened for modification C:\Windows\PeoplesSupplier parduo.exe File opened for modification C:\Windows\CrucialAustralia parduo.exe File opened for modification C:\Windows\ReformsOrigins parduo.exe -
pid Process 440 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebbb22282c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1ac5583e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language For.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9346052029.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4ab395678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language parduo.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VBVEd6f.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VBVEd6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6000 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4528 taskkill.exe 4856 taskkill.exe 3128 taskkill.exe 5304 taskkill.exe 312 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771233231280374" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 2012 skotes.exe 2012 skotes.exe 4948 VBVEd6f.exe 4948 VBVEd6f.exe 4948 VBVEd6f.exe 4948 VBVEd6f.exe 4056 chrome.exe 4056 chrome.exe 440 powershell.exe 440 powershell.exe 440 powershell.exe 4616 9346052029.exe 4616 9346052029.exe 4948 VBVEd6f.exe 4948 VBVEd6f.exe 5600 f1ac5583e7.exe 5600 f1ac5583e7.exe 5740 RegAsm.exe 5740 RegAsm.exe 4948 VBVEd6f.exe 4948 VBVEd6f.exe 5752 msedge.exe 5752 msedge.exe 6128 msedge.exe 6128 msedge.exe 6128 msedge.exe 6128 msedge.exe 3156 msedge.exe 3156 msedge.exe 4948 VBVEd6f.exe 4948 VBVEd6f.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 5728 ebbb22282c.exe 5728 ebbb22282c.exe 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif 5848 For.pif -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeDebugPrivilege 440 powershell.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeShutdownPrivilege 4056 chrome.exe Token: SeCreatePagefilePrivilege 4056 chrome.exe Token: SeDebugPrivilege 5740 RegAsm.exe Token: SeDebugPrivilege 4856 taskkill.exe Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 5304 taskkill.exe Token: SeDebugPrivilege 312 taskkill.exe Token: SeDebugPrivilege 4528 taskkill.exe Token: SeDebugPrivilege 5940 firefox.exe Token: SeDebugPrivilege 5940 firefox.exe Token: SeDebugPrivilege 6060 tasklist.exe Token: SeDebugPrivilege 4504 tasklist.exe Token: SeDebugPrivilege 5728 ebbb22282c.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 4056 chrome.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 3200 c4ab395678.exe 5940 firefox.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 3200 c4ab395678.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 5940 firefox.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 3200 c4ab395678.exe 5848 For.pif 5848 For.pif 5848 For.pif -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5740 RegAsm.exe 5940 firefox.exe 5848 For.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2012 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 83 PID 3964 wrote to memory of 2012 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 83 PID 3964 wrote to memory of 2012 3964 cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe 83 PID 2012 wrote to memory of 4948 2012 skotes.exe 93 PID 2012 wrote to memory of 4948 2012 skotes.exe 93 PID 2012 wrote to memory of 4948 2012 skotes.exe 93 PID 4948 wrote to memory of 4056 4948 VBVEd6f.exe 99 PID 4948 wrote to memory of 4056 4948 VBVEd6f.exe 99 PID 4056 wrote to memory of 1608 4056 chrome.exe 100 PID 4056 wrote to memory of 1608 4056 chrome.exe 100 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 836 4056 chrome.exe 101 PID 4056 wrote to memory of 2368 4056 chrome.exe 102 PID 4056 wrote to memory of 2368 4056 chrome.exe 102 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 PID 4056 wrote to memory of 3128 4056 chrome.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe"C:\Users\Admin\AppData\Local\Temp\cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83c8bcc40,0x7ff83c8bcc4c,0x7ff83c8bcc586⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:26⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:36⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:86⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:16⤵
- Uses browser remote debugging
PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:16⤵
- Uses browser remote debugging
PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4140,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4448 /prefetch:16⤵
- Uses browser remote debugging
PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4812 /prefetch:86⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:86⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:86⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4908,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4588 /prefetch:86⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5268,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5280 /prefetch:86⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5260,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5256 /prefetch:86⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5172,i,8273913682933259273,4942523073068898985,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5224 /prefetch:26⤵
- Uses browser remote debugging
PID:3252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83c8c46f8,0x7ff83c8c4708,0x7ff83c8c47186⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:26⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:86⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:16⤵
- Uses browser remote debugging
PID:5896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:16⤵
- Uses browser remote debugging
PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:16⤵
- Uses browser remote debugging
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,10911658273188435667,13248133430823103771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:16⤵
- Uses browser remote debugging
PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\GCGCBAECFCAK" & exit5⤵
- System Location Discovery: System Language Discovery
PID:5156 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6000
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"4⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5740 -
C:\Users\Admin\AppData\Local\Temp\parduo.exe"C:\Users\Admin\AppData\Local\Temp\parduo.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Accordingly Accordingly.bat & Accordingly.bat7⤵
- System Location Discovery: System Language Discovery
PID:5804 -
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"8⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"8⤵
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7147738⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "WOMENSVERLINEDLL" Replacement8⤵
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Within + ..\Print + ..\Albums + ..\Coated + ..\Modern + ..\Lincoln + ..\Nearest + ..\Wider + ..\Cancel + ..\Adoption y8⤵
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\714773\For.pifFor.pif y8⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5848
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 58⤵
- System Location Discovery: System Language Discovery
PID:5128
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009360001\9346052029.exe"C:\Users\Admin\AppData\Local\Temp\1009360001\9346052029.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\1009361001\f1ac5583e7.exe"C:\Users\Admin\AppData\Local\Temp\1009361001\f1ac5583e7.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5600
-
-
C:\Users\Admin\AppData\Local\Temp\1009362001\c4ab395678.exe"C:\Users\Admin\AppData\Local\Temp\1009362001\c4ab395678.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3200 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:5656
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7781faa8-8d99-4cbc-a8ba-5474a3e24a5b} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" gpu7⤵PID:6080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65dd4f9d-33f8-4071-9b3e-f2c6f6bf35fb} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" socket7⤵PID:5600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3204 -childID 1 -isForBrowser -prefsHandle 3208 -prefMapHandle 3224 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b00b27fe-5093-4d6a-a982-a90bcbee8db2} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab7⤵PID:4328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3884 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 2776 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04bf0954-f3f6-4bcd-8ef3-8a513819b953} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab7⤵PID:3576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4764 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {30918991-3904-48a2-bc64-8e3a950e300e} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" utility7⤵
- Checks processor information in registry
PID:2752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 5308 -prefMapHandle 5304 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b389f219-72ec-4ab2-8b06-8cc044a8c754} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab7⤵PID:4500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 4 -isForBrowser -prefsHandle 5464 -prefMapHandle 5468 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddd7ed6b-26ef-4033-b1fa-625c0f2a09ed} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab7⤵PID:5748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 5 -isForBrowser -prefsHandle 5740 -prefMapHandle 5736 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec86843d-ed32-4f24-982a-681195ed2c0a} 5940 "\\.\pipe\gecko-crash-server-pipe.5940" tab7⤵PID:5632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009363001\ebbb22282c.exe"C:\Users\Admin\AppData\Local\Temp\1009363001\ebbb22282c.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5728
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Double" /tr "wscript //B 'C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Double" /tr "wscript //B 'C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url" & echo URL="C:\Users\Admin\AppData\Local\HealthSync Innovations\MediConnect.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MediConnect.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:6124
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:764
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4232
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD56e263df53282363f35b1145c72b4fd04
SHA12f11ba739555d65e986a82baac9870c622bd10b0
SHA25613724325b2185180b8710b60d0d5ea788857aee966862a74377fa4a6a56d0136
SHA512b4aada90fedd47a37c86cb1e0c660bd5554f895c5cae0dfb1ab0aa1a77fa76d5eca81bb7f41e2d9f932d153954d8bcce710a4c832432b2f305dd49b581d1d5cd
-
Filesize
649B
MD58af69161970d6bda32abf15f644e7eeb
SHA12c600124ffaaabbda69ac4dc34a313cbdc0dd9d3
SHA2562f46d4d12500d865709f6c21b01700c5c3e2f4187a3222c8992487cbffd72eb2
SHA512361900de36f7398a7beebe8c3cad6228e7096275c3d8c145b07c4000b1b947ba93ef5236a71218037586ddcd64ca2c1b689477882fc26c312e8e175796b292d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
5KB
MD5155e64a4a3ae4edb88a59d9d16948b69
SHA1ab8497462faad2b90ed91030034f22472b1d3dc5
SHA2565f00a6156db097261ccd6b2116e49be0540cab5be7cdfb8d7ca97a178a52f452
SHA5121fd555bef1ba76efe5c9a38b724c93da7fb4aeaa80d5e39b0493ac77bc540fa739bec9772094c15a925ed02aecac3b7c63c82dbe7d845855db467aa52a81a002
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c64ff869-b3fd-4d89-96d2-1004b908ef09.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5b7f05ae4d2d7ecbaf9290c0a6910c952
SHA16113c82ed3dde679b3a5ef7f90966cb9b7565e85
SHA2566fe13a21cbcf2ee8f1c405c83342bcd54e3d2268f6d3daac648e1396230b3323
SHA5125f750de0bd30535c9233f76b5ec4af40c633c2c8c9ee31c18f9d57e1f08107531ca70d9e9c1f7c77c0099d6eb10563e9eab05b42711d0fca084b55f2b07e0be2
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
3.0MB
MD52b918bf4566595e88a664111ce48b161
SHA1e32fbdf64bb71dc870bfad9bbd571f11c6a723f4
SHA25648492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26
SHA512e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a
-
Filesize
1.8MB
MD5a8e9a412b9680f5a669fc267b2e699a9
SHA1a9da906593df158e178a5fc69f4054e1b9d74d6f
SHA2568c57cf7312440ff96cc26011bf2d5ecf6c89acbb7f086e90b4af99dc9da7c719
SHA51249d46ed63554079d3e1fe12f2fd99e7a40151cec87a7d17d391d37b02586e0bcb6bb10dfbbff7f122fe8d3d46e04f28912cbd9fa98f5c19da08fb625ead2aa76
-
Filesize
1.7MB
MD59db1d2d5cacb20cc6ff48e135ae00541
SHA14c0000c8c9bb9f3cf3eff91f573648a89f2bc5e8
SHA2564121db764f1ef59ccca1f43acedd27e0e6a086ef49359d75cd41d9c063857ebe
SHA512fee1aec4dc791ffe349ffb95daba48b6f7e198aa3fe1c69c5be1d68c43faa9cfac6f8f79a18ec4be3b1162903036779188ea2c20bac0e75827752601adc0f937
-
Filesize
900KB
MD519fcdf56ae709a03be8137ad630d1c9b
SHA1e3f487ed3ab79fc05b892db548da9aa14cd69171
SHA25673f94f70d57668c306dc97607d38353817bee05d8c220db436ed3c610cfa6ca2
SHA512da5645416691df32c29851f1f933e60082874145b99d62dd92294fe893e1bf4a67b1926c5b73a69ab10c976a59e019dd6787fe75973c72e464f083bec1522c13
-
Filesize
2.7MB
MD534c86fde97a82e80250312333150a710
SHA1636a5d3d2623c35e2b3fa4462d105cfdc3f3f4f5
SHA25697e5fa31a1a59c88b9fc3b2790bbb3068359b8e09ec9edc1635b8a2efe968aaf
SHA51263ec0114ea8cceb1f89cec992afe7fb343ff8fb610e5f973c966f0493945d39809c31e4653d5e36c361969ef733f2d5e1dd22c4ffba649cf34a9ffe3aa868e7c
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
697KB
MD596c47dc37e1d58ad8b3d39ec2636ad68
SHA165743f382dfd6b2aab4368e599f68ccccbf457ad
SHA2569dd46dd37f298b683c039d59458edb4502bd22cdfcf687da9c51cc5c5a22f823
SHA5121ec95f6db4a541b8c68ef29df6a2dec844e20b27a7c489121a6a07e4b1c943ae74fe3fee27a6c5fa034e3276743891139f23e1572ad81a74bfb7398008f6c3c6
-
Filesize
14KB
MD53308b4ac40164525bb3be5512f731cbf
SHA1fd0cf2b34957e6c891cb46af29cbc6ba98544e8d
SHA2563e26ccd9ab5ec7b5b850bf32207ff2f7d030435bc07c0c7d81e55f8501979dc0
SHA5123277c89b6a3128910f3de9a74783905ab179c971fb88e188eed0931cd6a049a5faa60eeaec43484b76a073f6cf50fb80f3b3989fc96d3df00f2679c00c6e2b4a
-
Filesize
6KB
MD58c792e91c999ef3f86d146ec4357dfe1
SHA1fb5cf5b21b94b64e7761c8b955bf307f9f2871b1
SHA256cef488cd90549e45e91207f2f703642a8fc5f5ec39a2b87391a5dc3dbbc060ea
SHA5125d182ffa6f0573b8607ed3039cce8120d8a6637aac0443316a0777b7ad384d9bd644d8787ce24b8af7bcd66399e763b591a47dcb0691753fa13a954d12fa122e
-
Filesize
78KB
MD5c921a93d3d8768393d6fd288ef7d3626
SHA1826cd8ded83329a124c834d8644d164e656f5830
SHA256bfd39fe90080c4ad2484061dde6521ab38aaa3a5c4189365c549fd586680c5d3
SHA512f3f4ef74425844485e237cccca48677fbd391c78e062351e91921e6834269fc12b2f314b1ca5d2df4d53c2ba8f4323b723ba052b9b7b49ca875add8e8acb95c9
-
Filesize
80KB
MD594252e7ea5928c3384fad7a7345ee48c
SHA1d4c94d10bce143056811ab47a9e64bc3e13d9e0e
SHA256c28fb31ae80d35e5fe4a72ea0951a8f716b29b006465e7ae09455a92d77b61fc
SHA512b892d496078d099b17d92401756c6f43ead013eaecef412b09d6ff32a0f32750ece8ab91fee0ac35683ef6758b8c28f7d924c5d55fa7dff1f39edb62f2f10d97
-
Filesize
58KB
MD56653fbd98cfcf87d8f39a0107d49ba70
SHA14d4ead6802154ba90fa517093205552c156f6408
SHA2562d1c705a2197d1f37e1ae3591e06370f89bf2c6e35c18d9020559f7fff5a6007
SHA512c83b7bef5242c31afce44a04f55efc87e1bf1fdac4653cd85fc20733a054dfea93d34d3216808c0e29decff8032f8f3adab72d497922b8c4155d4dc104c61fd1
-
Filesize
90KB
MD5c5bb73e77ced7f6ab691bc6048afc56e
SHA1abc3c84bc42e70b385b1a19790c5e4a8f05817fb
SHA256493da51541861815d62a13dc10d81a97b1446bd3805d93652a869ea963a83993
SHA512870d0413a9f89dc1f5f31dbe007ea2cd10b453963af65fe0e4c32d938aeaf445c6c4c50452a57e52960270dc0732aacceee2e56cb1d90aa96f11d39693e62b5b
-
Filesize
94KB
MD5a25ea81dd7c11e371df8a950f65f3376
SHA1536c8dc73cdca582414f62ce0dce642c2af7a266
SHA256e55aaea71afea173fe27f33913ab858f643708d407dd9952898bc0f25e2d900e
SHA512f49342a4643b211da25492e99ad396f1a3898217d3d43bd1c47989d81d0537f24c9337e9cfe1cc01b3a3271fb4d308e529fad059b9bad5c14de702c3bf80ea80
-
Filesize
69KB
MD5fe1f720ce3a97cfa239177af5075260d
SHA12b7146d0203557c8dddf3d0d2a88a51f6cb5fd1e
SHA256dc09313c346e77488b917f0c71532a8d4575f95379c9f8160473bbcb3175317e
SHA512a333983b4b3bdfb611b67f87d5be636c9cc0563fc454ee784cbd542042210fbc9d194900631e9dbac871515e49fabe3521cfbc2caeeb57da0a896fb5d1e64efb
-
Filesize
90KB
MD5b54857f700feec0ac4bf74912ec624ce
SHA175ebbd85b0fa5e60d42956f2e016a7e25500a57c
SHA256bf34e48b8be5cf77c4f23803d86a424aae876d8e2d4c1cf86588992b1ae53736
SHA5125613a86aed053a1241e0164714cd117db83ce48b8d2069de1380558085c48e8c5c90c11c7627d36ae3f61602791fd27264f5cdd838dfc5b76682206320e04b28
-
Filesize
7KB
MD5f173d5c8c8846b0a6c530649346ce39b
SHA1c929ac894dce5a462d9b3d82a701f5f730dd8b27
SHA256fa4414d47c19a25899eb590a4eeb632cab620e880252cc5acc93661a6f686561
SHA5127b78f69a32f6d6bcb5b0e6696fcce2e38849b120cba4eabb77895ae8b9f756ff6d34b68a9943cd13f9496d64b7d955f6f3d4b2e91d43171c0c49423aaf441cac
-
Filesize
865KB
MD5e8d598224c95801dec480c70543df88e
SHA19ab515652e41ee027272af911eb6a54a1de0aa75
SHA2565474c4b28e94710f60e82ce08033f32dcab71dda811538851a7f9c3604fd95f4
SHA512a2cd491ea6e63c770f8033dccfdfa2bedfaeb052a520016fd9417a72749c8e88b28b5440aaea19f4313b162b88fcd5d5339496faf6135b1c1e3eb68c35320b1f
-
Filesize
66KB
MD506f3bb08e567b1b629a959f85a3aa6eb
SHA1f2413f66c91b3733f5a32e1afc7e595c1b1056fd
SHA2567769b5c3388facff4c70dfb60bb5af9060fb11a260825284a192a5537b06946f
SHA512e19d8d6f4b0f140c7f853f6707febb204c5ca243022796eef927be402b52d8a3e678d81281a468fdf3723ac59f17c66c4a5c2f2affac8eef96df2e6f9eddd9b7
-
Filesize
66KB
MD56bfa1135bd266eb7f92ce9cf2979179c
SHA171655f8fc9a55a70c087d3b5a6063dd12330ccb0
SHA25602c7089cbe35fa9354c10ab76e399cb0e614163facb9fe254b8e20278eb6057d
SHA512dde9e0b53be8bd18c838e1ac645c6ca6fe25e2659a254bda5002686f872192ca8ac5b2c6eee3ac613a755d35c6deb677190f8c27049ccacc3811ec3a13ca8899
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.9MB
MD5ee9c5875f526c3f44381beb36b6eaa62
SHA1423ea51703796def5f3449b68c8bc62298187766
SHA256cd0973917f80520e71b932aa1c2ac651794b4da6ba5cb85de4e8910783d35690
SHA512516a491737a3983832e22659f2df44f88d2dd172fa142bf41282c2b56d12b7ac90147b6786491a0dbb77d18c71d1ae6b24bd0236530671e866b9a9fbdd12ee86
-
Filesize
2.0MB
MD5272878833f720819effc3ed1eed0f773
SHA1e17e4d822165997c463aa21c6efd102185af319d
SHA256508729820be5115513aea17ba818986181ae0d8b842ef492c2040edab383526a
SHA512c6904e869e861a9d4c009d23adc153047f210a2dc40b58a91d08c10210913d79fb6efd12c36ddedfdf695d1337d54f85519606eb5f33ddce655444793243b6d4
-
Filesize
135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD5edc1e50b98f2a90d539aa2a243794989
SHA14fb8947c8d71a7099a19c70aabb5e939db00940d
SHA2561b97b831ed2de108dd160de7bf219c114090bde23eef430b2d0cd2e1abe213d8
SHA51266bece07421bb7d86deb7d1ebd5f9edeb3210a26b83b36f89ff92e25c734b4ca61fcbdea9edc77b16db116f3c61e2f09cd6da88b28519ce10c76b6cfe61b6d6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5b2dae7deb3e2e21c8bc8c720a623f1f1
SHA104dd46606c5d46e1548e53010364c77e1331e6cf
SHA25650d864127c6b804521c13a3f36a270a60744e559608b568c5e7311a5d6f5eb78
SHA51253885e75ba9775b9d1382b3ea52346a95a6006df29c9e6c184014891093d9f02fbd79672e65a6716cfd348280d7eab42bb5275eb6ba8e994a8eef5f13004e829
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize17KB
MD5448de192425fb352bb2ce132fdae0e25
SHA11b9722df1e139ffc73a6352ea6aa739b0e7010c7
SHA256962d88e2915aab7c9da213d4c12d622d5d81bacf8b68d6092962bec7408fece3
SHA512debe6c66d439fc026a0d71b2971e439f288abc477c3c626a6848c3d217d7891c0366534bd7005f0c0a9eb614fac4e326c1827990fd80cdda2a410ee6b3024368
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD517a93cf41c9284935022bc14aa714c41
SHA146a5b71bb05be26ae679425e37261b37783c038d
SHA2568ce5fd9d5c2eca8a5cace03f188263758a6de81e0d0fbeaff3cdf83b2a1420ec
SHA5120bf6c8c2adf73d826fd076317fd79a5ce6d856e79b28a051e69ac1912752ba043c100ed66572f607e20c75d405b4610a0ea9eeeacf503ec1289eea864132c349
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59d44031f5bc216873a0b30799cd55ea2
SHA12c9f542f85ecd2959b8d26d72f286ef925c9d1b8
SHA25660c94417209dd288230b89c719fb5f9c6fc5b024821b883429dd4f512e36da3c
SHA512f2df2ae3f4a9de7e4218168906c37222cac308a1c2a451a54b35279a2b30b556a92ec90bac33a1f4bc7a9bfd881a948be5378e8c4fddf8fb772d6b8d00be2748
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize28KB
MD5117e0a2ea064f91526f47d5e423ab7ba
SHA13e3b1511179c6a952909aa8ceaedf1cb228a8eec
SHA25620c5bdbccda7b98c4bbdbe1e558b8bff331386370ac58c6073bf5de9858dda6c
SHA512a333a73fed74dd93df3de85af4abf800642bbaf970c211af0a08c1cd21b915890b791f279e913d396b6706079c7245224b6b43cfdc3e0c37016436f5ab252dde
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\b4da9c67-ab6e-4b2d-bd8a-5e81355c25d0
Filesize982B
MD5ef7ef927751ae4274a65946d462d30ad
SHA1506201b3024e5a17de71b5759334d35d0ab65243
SHA256d271f6e59fbbc92b6afaea2d1aa95297e82a7ae78a1c834259e8fb3a437ed59d
SHA5127eba1a7c0bf3545e76a47c6d25b7b86f90bc8a19d12e85a69e73d0655ec7208d7c7d1b17c53aa046e4edc31bc0a77602eeb927247a1f61cf8a19f9b0ee38a568
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\cf3ed3a8-613e-4d2d-bdee-403a076532ac
Filesize671B
MD534f9d57fd042cf20d40678902729ac1c
SHA10e71d29ea6eb1ba233d4dff047574296415b0014
SHA256cfefe6b50b304fea0ac40eef1eaee22723e9cc075ac7db02882929889044d36d
SHA512587d822df0b41232ad2d66fb0f0ede7fd63e8f3c7379ae06143672ffb156ba6a1b27b24d2f8fda8807878f8591f5ef3c116590f49f13c320356d47b1dc1e2c60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\d098e477-0610-45aa-be26-d36581e29cb7
Filesize28KB
MD560e4c701b0ac625f53ddb37844c24208
SHA127e08fc21314ec5757fb3864eb52babe1cb9fe01
SHA256ec4b4363b88e98021de68c89aef09163678132267bb830a999bd50d284724578
SHA512e1d2f0886b22f6b51e3f94044e6cc310deac4cef4b901fe3c14ae2c9f6ad19bc8dc100476d8dd22476c09c8c89fe216ba32456528d0e7e35a657c946bba658b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.lib.tmp
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll.sig.tmp
Filesize1KB
MD536e5ee071a6f2f03c5d3889de80b0f0d
SHA1cf6e8ddb87660ef1ef84ae36f97548a2351ac604
SHA2566be809d16e0944386e45cf605eae0cd2cf46f111d1a6fe999fec813d2c378683
SHA51299b61896659e558a79f0e9be95286ebf01d31d13b71df6db4923406e88b3ba72584ef2b62e073b2f5e06901af2c7d1b92d3d12187fe5b4b29c9dd2678444f34e
-
Filesize
10KB
MD5a0235725036f1d085972e7623cc38d93
SHA1e9908b73de457d78ad4430664f59bd4c2a43a70e
SHA2568cac35d34b76dffab14610fbd94a8907d6f4ef1b46d2390cae514de5165a1ff4
SHA512393934ff89ecdd788c8e481f98f736641cf6445ecae8cd69066d824d77ec35a387c0bc9b12c55480c1c8b29472fc26838c3b86d0f00bf9d655b2523022a89d40
-
Filesize
11KB
MD5a22a5d99c7023fca3ab7782483d609e1
SHA117bcd86e071103cc54844d286a0552f9072b156d
SHA256abff525cef8711fa41449afcb923411274220cb7c0bc905c27c801ffca6d1538
SHA51275c3be05f0389dcb2ee95e4e97d86e6b5048f9c055c960f5e13ce49ce0a3518f2b402fa8239eb5a724ac7134a3100a531c686fa8cf4f33e2edd3a0d2e411a8eb
-
Filesize
12KB
MD530cc7dd52a9f6485e7c5ae7d7609aa10
SHA143ba2fc972bbbdfe3c745688a3797c34b6c1d90d
SHA2562c1743b774c36bad06e5e11511f6ca753ca2ae43c9dc7db30f84611083d678a9
SHA51262d123577d712e9c326f6f4307029cdd9f769eaba3e6b0993e7bb5ce647b85930c4aea55071b934c9215030b102901e7cc44dea69c1aadb6f8e2966bd8ef809a
-
Filesize
11KB
MD513613b173377446d8bb0200d37f7e435
SHA1763717191b3c77a2de98abb560bff9c98e9346ba
SHA2561bacddd66f5d875573da46fcdec22f52f2895553aac1ff1fbb80af06bce1753d
SHA512a5c8a8d60347902e88f979b1d5fa87fa3ee35c745b247c4c1674a1e5b857fafcc6865b665b50c7d044f81f33494c1dfd216ddb0f533e583d4e021b3d6406e88c