Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
ca0ad971e610676ade1d3af832c47135
-
SHA1
ee9ed8a2f7c83cc8106f13c949b5ad134d16b0a5
-
SHA256
9b5e3da919a3b72949ab9fbfa36b987144e04cf5dab0c275d1afb2b843b4bca9
-
SHA512
c73aac179f75faaea20e8445b1a021fe8f11b11dc212b4863acafa1c5317c8ee4cd4e53bfa4f6a7467c2f0fe6c60313583a3a4d2b57613390609ae45435f4bb5
-
SSDEEP
49152:IKbUgwbYuzG+kmHOM1LA6JKvFSk52gzZZ:IlgwbYj+dbLA6cvFLnZZ
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c6adb9e885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c6adb9e885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c6adb9e885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c6adb9e885.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c6adb9e885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c6adb9e885.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 419ce7d55d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b99315288a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b99315288a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6adb9e885.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 419ce7d55d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsAEHIJDAFBK.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d44a521567.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7090e1c286.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 59819216b2.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4964 chrome.exe 616 msedge.exe 3828 msedge.exe 4400 msedge.exe 4464 chrome.exe 2500 chrome.exe 2588 chrome.exe 4752 chrome.exe 3416 msedge.exe 4480 msedge.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d44a521567.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b99315288a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7090e1c286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 59819216b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsAEHIJDAFBK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 419ce7d55d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b99315288a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7090e1c286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d44a521567.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 419ce7d55d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 59819216b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6adb9e885.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6adb9e885.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsAEHIJDAFBK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation DocumentsAEHIJDAFBK.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 13 IoCs
pid Process 4352 DocumentsAEHIJDAFBK.exe 544 skotes.exe 4160 TaskbarMonitorInstaller.exe 2252 nbea1t8.exe 4584 skotes.exe 1476 d44a521567.exe 3976 419ce7d55d.exe 4008 b99315288a.exe 5064 7090e1c286.exe 4832 59819216b2.exe 4964 f60607129a.exe 5860 c6adb9e885.exe 5180 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine DocumentsAEHIJDAFBK.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine b99315288a.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 7090e1c286.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine d44a521567.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 419ce7d55d.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 59819216b2.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine c6adb9e885.exe -
Loads dropped DLL 6 IoCs
pid Process 444 file.exe 444 file.exe 4332 regasm.exe 4332 regasm.exe 4332 regasm.exe 4332 regasm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c6adb9e885.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c6adb9e885.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c6adb9e885.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009916001\\c6adb9e885.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1009905001\\nbea1t8.exe'\"" nbea1t8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7090e1c286.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009913001\\7090e1c286.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\59819216b2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009914001\\59819216b2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f60607129a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009915001\\f60607129a.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d0f-707.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 444 file.exe 4352 DocumentsAEHIJDAFBK.exe 544 skotes.exe 4584 skotes.exe 1476 d44a521567.exe 3976 419ce7d55d.exe 4008 b99315288a.exe 5064 7090e1c286.exe 4832 59819216b2.exe 5860 c6adb9e885.exe 5180 skotes.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\Newtonsoft.Json.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorWindows11.exe TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorInstaller.exe TaskbarMonitorInstaller.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job DocumentsAEHIJDAFBK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5428 1476 WerFault.exe 145 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6adb9e885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d44a521567.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 419ce7d55d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b99315288a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsAEHIJDAFBK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59819216b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbea1t8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7090e1c286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f60607129a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3780 taskkill.exe 3868 taskkill.exe 3544 taskkill.exe 4352 taskkill.exe 5044 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133772769744507966" chrome.exe -
Modifies registry class 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId regasm.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId\ = "TaskbarMonitor.Deskband" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID\ = "{13790826-15FA-46D0-9814-C2A5C6C11F32}" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29}\0 = ".NET Category" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{00021492-0000-0000-c000-000000000046} regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\ = "TaskbarMonitor.Deskband" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "taskbar-monitor" regasm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 444 file.exe 444 file.exe 444 file.exe 444 file.exe 444 file.exe 444 file.exe 4964 chrome.exe 4964 chrome.exe 444 file.exe 444 file.exe 444 file.exe 444 file.exe 3340 msedge.exe 3340 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 616 msedge.exe 616 msedge.exe 444 file.exe 444 file.exe 444 file.exe 444 file.exe 4352 DocumentsAEHIJDAFBK.exe 4352 DocumentsAEHIJDAFBK.exe 544 skotes.exe 544 skotes.exe 2252 nbea1t8.exe 2252 nbea1t8.exe 2252 nbea1t8.exe 2252 nbea1t8.exe 2252 nbea1t8.exe 2252 nbea1t8.exe 4584 skotes.exe 4584 skotes.exe 1476 d44a521567.exe 1476 d44a521567.exe 2252 nbea1t8.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 3976 419ce7d55d.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 4008 b99315288a.exe 5064 7090e1c286.exe 5064 7090e1c286.exe 4832 59819216b2.exe 4832 59819216b2.exe 4964 f60607129a.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeDebugPrivilege 3780 taskkill.exe Token: SeDebugPrivilege 3868 taskkill.exe Token: SeDebugPrivilege 3544 taskkill.exe Token: SeDebugPrivilege 4352 taskkill.exe Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 3428 firefox.exe Token: SeDebugPrivilege 3428 firefox.exe Token: SeDebugPrivilege 5860 c6adb9e885.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 3428 firefox.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe 4964 f60607129a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3428 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 444 wrote to memory of 4964 444 file.exe 84 PID 444 wrote to memory of 4964 444 file.exe 84 PID 4964 wrote to memory of 1964 4964 chrome.exe 85 PID 4964 wrote to memory of 1964 4964 chrome.exe 85 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4944 4964 chrome.exe 86 PID 4964 wrote to memory of 4920 4964 chrome.exe 87 PID 4964 wrote to memory of 4920 4964 chrome.exe 87 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 PID 4964 wrote to memory of 3608 4964 chrome.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8df6bcc40,0x7ff8df6bcc4c,0x7ff8df6bcc583⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:23⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:33⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:83⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:13⤵
- Uses browser remote debugging
PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:13⤵
- Uses browser remote debugging
PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3664,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:13⤵
- Uses browser remote debugging
PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:83⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4520,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:83⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:83⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5004 /prefetch:83⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5240 /prefetch:83⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4856,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:83⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4288,i,5556426786715025212,3903784079039951640,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:23⤵
- Uses browser remote debugging
PID:4752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8df6c46f8,0x7ff8df6c4708,0x7ff8df6c47183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:23⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:13⤵
- Uses browser remote debugging
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵
- Uses browser remote debugging
PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:13⤵
- Uses browser remote debugging
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2040,8322969173630838569,2307939236529227231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:13⤵
- Uses browser remote debugging
PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsAEHIJDAFBK.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Users\Admin\DocumentsAEHIJDAFBK.exe"C:\Users\Admin\DocumentsAEHIJDAFBK.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4160 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /nologo /codebase "C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll"6⤵
- Loads dropped DLL
- Modifies registry class
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\1009906001\d44a521567.exe"C:\Users\Admin\AppData\Local\Temp\1009906001\d44a521567.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 14246⤵
- Program crash
PID:5428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009911001\419ce7d55d.exe"C:\Users\Admin\AppData\Local\Temp\1009911001\419ce7d55d.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\1009912001\b99315288a.exe"C:\Users\Admin\AppData\Local\Temp\1009912001\b99315288a.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\1009913001\7090e1c286.exe"C:\Users\Admin\AppData\Local\Temp\1009913001\7090e1c286.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\1009914001\59819216b2.exe"C:\Users\Admin\AppData\Local\Temp\1009914001\59819216b2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\1009915001\f60607129a.exe"C:\Users\Admin\AppData\Local\Temp\1009915001\f60607129a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4964 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2460
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3428 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {571810df-5e7a-461f-a0e9-18a4d1551e45} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" gpu8⤵PID:4596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {307ac2bf-50f7-494e-826e-78977480913c} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" socket8⤵PID:896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1720 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3328 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87fbca40-9aad-480c-8cbd-d4e3455c275b} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab8⤵PID:1400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3656 -childID 2 -isForBrowser -prefsHandle 3648 -prefMapHandle 3644 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef08ed8b-2a44-4a47-87e7-87fb181f9766} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab8⤵PID:444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4236 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2816 -prefMapHandle 2812 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d2a5533-8862-4499-a7c6-a122d41d7d09} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" utility8⤵
- Checks processor information in registry
PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 3 -isForBrowser -prefsHandle 5436 -prefMapHandle 5476 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ff29caa-f530-43ce-80ae-edf29381d8ce} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab8⤵PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 4 -isForBrowser -prefsHandle 5600 -prefMapHandle 5604 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2ff2167-5f01-4ed9-839e-dd0af232c155} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab8⤵PID:1964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5864 -childID 5 -isForBrowser -prefsHandle 5896 -prefMapHandle 5600 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dff75238-e1d7-487b-bcc9-018e5cf7f3da} 3428 "\\.\pipe\gecko-crash-server-pipe.3428" tab8⤵PID:5280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009916001\c6adb9e885.exe"C:\Users\Admin\AppData\Local\Temp\1009916001\c6adb9e885.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1476 -ip 14761⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55dd45593985c6b40d1d2dea0ce9a2fcf
SHA1700fb24d4f4e302ed94f755fa6f7caf9d6fb594e
SHA256237e715b292e3ebfdf7038d42290f9a6457f0375ee965e1236bd763bce413391
SHA512ca4e7df463b3d5643decfda936e4d7db1e3247c8f27a25ace150886a0c3ec2e79f1d82d2c4cbd5b89f42deaf4cd5709a7ca47d24a18ed1e1804b0c1e016966a3
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5bcaad424a579913580868b35842fb793
SHA18025b58dfd8db61048592db845099e0c093c04c0
SHA2562ed0c6011b6c9a465f66900a31717a7f27370a1e125337f7652606d2d38efaf8
SHA5125474e2a20cb1b0c7d5e56470c2d024031f0dd8cf67e385306d617ab5b3eb55034ad608c87f8581bfb489bc87c89433dd606a95f61ad574a5269a1095d2df5feb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bb7d11bd-097a-44c6-a904-c0ebb6913438.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f00a238d-e1df-4345-a26f-c153a34f6522.tmp
Filesize5KB
MD5ca3d078e8e95f49b3f16b97453967bea
SHA18045d709bd2c2229fdb872d6055f10579d4c70ff
SHA2566414976252bb7cdbc2756b2ce9aa5a0fda245ab2dd507065c98bdda03053d02d
SHA512a739c7902b3b712b12f04768d7b9401a66ae6010b74165a89d77f0e20372469277944b1782a9f5497a54a65ec41c2f6c4f27f11b0635fcd2dec772483e137e87
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5fb2b9c3c07ac0fe823df9dad7a6e0013
SHA18fb68a95a00cb99887c9c77c30f9d363318aa845
SHA256462d0193b940b48835af1c151c4650911f5695302ed8509a172b53821d72444a
SHA512223de2893614941be53c35d1788fe484fe5d30eda2e32459ee65df77b638bd0ce605dedf46608c68213584ab004d6192fdb41dd732b4837f06103a678f8274b8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5f209475a1eae0f628c8a720a0b7e571c
SHA1b4f442503ebcfea79b809871820d50711e2437c8
SHA256400e8fcb7f4b767e0abf3841de76b56c2c395cb554a41cb6780ee11a51a6b7b5
SHA512306b546d9e9c0ded459ef31d48be0f062d2d72d1a01b597a08a351d8a046073a915cce64f66f96a7b5f58fbbce6f007c3dc285967c4af60d8dee6c4f63c960ea
-
Filesize
2.9MB
MD52ec142b97cf35b8089846aa53bb3bf63
SHA1cdfbc2b54c132e32be48b41660ede419c586ba9b
SHA25691aed4763f13b9fe40ac2ef9c5508a35aa689419f65a1d43ddb33b2c07e0e74b
SHA512b11642f4f0a83aabb67603aedff479d0d714e4e5341ff159d5ee312dc437b5da94f5eaccc8dff6b63750ec60457148576b215f958db1c6cf2a06be3095e19fa4
-
Filesize
1.4MB
MD5307ec3d2ef84340f318743d34a04b4bb
SHA1abc5628413d938e1f67d3099b794b99ea63cc7ea
SHA256c90090afba766ce459ba5b11acae8138202d0882c5834207397bef8cc439dd02
SHA512cbb844bdb3243009182f0dae32dc2336c291ec13cfc3d0c4232751021a04b8afecfd3048229b01fd4c91c6b170768947c5a7cf78045b387efde7d7362194711b
-
Filesize
1.9MB
MD571a0cb7b78f8fdfdf06de91776172b7a
SHA16b64e53d145e20aaf71e5e06a4612437aafc82aa
SHA25630bfa77da2dd89468e0af222c2cbfdea864e98af82f67f5d4a5d728c60233091
SHA51272875438cc3c7fff9b12c734ffce304e7cc49887e0f9d85630574837ee047e084d2f597933311ac92fcf83876cf9ddbb49660e90375d58651e69f1e3ff4c3eea
-
Filesize
4.3MB
MD52ba6fe9428da32103bb44c955939208d
SHA1145b071306f5ad32a9385ff9f89bae6a1ec968e9
SHA2561d64908fcbd9560615576da2b9b41ce76fafb939a0f04f559301a1946db4e936
SHA512044e8a36a5e03c9c406a4b3f2fdcd3057412875e1ebd4456aeb257bf622570826c665206d0ac5468ee6bf5b5642910a3c41a08cfdd7fc9c711561d31322854f0
-
Filesize
4.2MB
MD50b55af827f58acea8620d659bd36e403
SHA1b4003822554e2fe1692c70015008117e568fee63
SHA2562079c5692d574fe0be41b7493a7dd3b455d2ab439ea7f0becc49c6584261e396
SHA512580b484dd3828a932966668d797c5931c2b7cee6695008e853cdd657f43da867ba25ee2ac43b1193750a3028c09c875e75cbb8c1b6866994ebb8a06508d7ac95
-
Filesize
1.8MB
MD551ea9eba3a6b53b198dfa7a147c47cd9
SHA19b22b5e80434eaf5bdf287146f08033c9542a861
SHA256cb8f34a0b29aa6c12f13a9dc9c3e4739c15716d002da7f74e6331c23358ec9d0
SHA512308ba41ad69a0477a0cd44324efe69542119369252e485b19d1d2a28724bf801f3b58a723411c814a3deff72214e456c8649b8804f81512d159604ee13e9ce70
-
Filesize
1.7MB
MD5ca0ad971e610676ade1d3af832c47135
SHA1ee9ed8a2f7c83cc8106f13c949b5ad134d16b0a5
SHA2569b5e3da919a3b72949ab9fbfa36b987144e04cf5dab0c275d1afb2b843b4bca9
SHA512c73aac179f75faaea20e8445b1a021fe8f11b11dc212b4863acafa1c5317c8ee4cd4e53bfa4f6a7467c2f0fe6c60313583a3a4d2b57613390609ae45435f4bb5
-
Filesize
900KB
MD5bf8d269035b4167dafb5dc98484d0a95
SHA15f1882a7292e257f64153292f57e7cda130b0981
SHA256f29e94e7b7619ff3ef22b6853a4236f8d0d31a06c6fd65d09af5364d90284db6
SHA512d29e465f4a8849ede157c5d1afb4e0bfebc3fd718ab9f0818eba96119b58864887966493225d411ab6eb6455aca2f473f3abba7e9bce32d78831f4cbdb38278e
-
Filesize
2.7MB
MD500bed03140157c9cc1841c96a3d8cafd
SHA161758cac266f3682950b7712e5fdc618c1d4f88f
SHA2561c89b25cdf12909417360f709e5d06f7b80c7a2dbf6fc8cfcb4e5fd1ba1e295f
SHA5123f6f0dcfe00de0bda6cd08739fc50b3e1290635f28c122edcaa3c6c5bb5553a7c24311ec40c6275b6dee88ab98fd89af6c8a0535fa89fc352df33850ef8359b3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4964_1610339226\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4964_1610339226\bc6ce642-c48f-4017-bd43-3382fbba60ad.tmp
Filesize135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD5bca78b81d027a72cbbd98368f0deedfd
SHA19921675fdb62f800ca90c0f228dab2ab6b03fe8e
SHA2563f3c51f977121f1e41ec826ede8c3f4818d1bae36e5a373d039c30b4303c2a56
SHA5120e66dbe9335bf20a12c980d75471801628df5cc6ec9b2207140ab29aa926b9b45c8913babab1362a2bc7465b6a2ab1e44314280503fde3488c1c1adeb8c07db9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD5cc635872cae6c77b73a0b147b7653234
SHA13c9c68ef2acc044a232d8c4814d3f75ab4d60a56
SHA2562dde97952b206de7036d81fb7b64dda6446ef547171ca69be2331dde90d35d25
SHA5128528f35070469d4d6ff86e039c78203b8686930bff989dfc427a14a8db31f83b8bf49bec758eee9a316cfa4f223c898458f3cd4bcba52382f9c65ab54f6193d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD5c9b64e06a64bd1dd9d1f8dae3c0cde6c
SHA19c80e53dfca10198f848b887d09c9199d587e92f
SHA2566b6b446c99a5b1fce58d4bf573554960906e40bca78df8799648c9879b1cf8f1
SHA5121e2f0ea7c66fd1b7a9dcc91367fa3cac21f42a936c0015647ae4e5d0e0a526cd99dbfd7911b5d00ca4f7fb3ba8b6392612ddc57a74a627618aae21fde7acc11f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50c35f45b1883b1d3a94ac3ca8da32876
SHA14ec53a125736eef3d7b610ed67f556e77e2f8a6f
SHA25664a4346b0ea894ff546f181eea294e93723193ac49d026c9798d591934271373
SHA5121d6718fe721a7c64008f6fd0cf64c21edef7865d3fb1259fca79b7b20b8f5e4e5c9aae2764c1e43f7077f8f37e7da1d3cc9008c7f6c13d783eaf57f7a0ac49e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54e599cad05ccf1765fccf3eff3a58cf4
SHA1b51e5a21cb17a3ad514df82049dd425ce20a9727
SHA256c94eee6a53f41afde346c2714c8700bd2576b79dbc83d216d2ca8be2e6b83158
SHA5127a1662f748d5f6a7f69f090d37b3ea33575994f60a09e41455a87fc8c378f239bc26a0358fbb86ecc9cd608c8569993475f69036c6ab21bc6d901725ac3a9482
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54448d58d3aac96078157f216a7bdae56
SHA187624de4230766576baa089f71daab12427b75f8
SHA256a0d8c2577c649fd7453d03da50b92b058831124ed33f7cb5c4063e72d3a36eaa
SHA512e4bc701e9a4d9f7df300c89e62ad3c050ef662249adc7e65a82d48ed23ea0212fefc9b304392ce34010af394e4021b66b0e977318bb5de4b3e1afc1eebf6dfd6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\b7510b81-0fd4-47c7-b8c0-fd718f292199
Filesize671B
MD5b5bb1cbdc4697cb1b9d6e0c58ea5e185
SHA180b17fce598fc7cb8aa28f8dc12fcaab7c956166
SHA25625bfbb9a57cf695839c63601534ff47f48ac59174a9421c357e31b4a0cc0f1f4
SHA5122c31670c569fbb9b901efcb3fc4ecdfbd05e5c1e52dec2877df5f005192db3498cb73908041160fd841ee7e51941fb2f702d2e494f95300955bb2a4a8cbbd972
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\f03035e8-0a5e-4df5-8d2d-a34632afd6c4
Filesize27KB
MD52960ea9dbf1c882fb00f32810eafbc76
SHA1cd39fa98579b6183f13819a5d10061418dd76554
SHA25629f5f4796cc96208de125948b1d593af65d916199287cd812dcf49d111c5039c
SHA512469779ef7d92156584a0e9594313512a41b1bfccbf94e514a9a1c8cf35d098ca610b8ba4a3efa48d7a09ee14d96609763e2a4f287127fbdd3d7c856629769798
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\f14bde23-0ca1-4660-9b7f-f12363dc8c83
Filesize982B
MD5f7fba2b39c85e1b0dd39bee741c930aa
SHA1970eb771818d91208bf80dc1d5c18df38846e55a
SHA256972d79568351940096e6b95519bd05e73c9cf81b1f88134b95e073910503f8ad
SHA5123a9bb3c0aa8e6a7bda4e25aecd9b9e7b0dde60670aea8901e0d80b46a9f3bd3d89990749fdd0f886844684edb20f2acd917a7abeefbb5b455761a19b07979ced
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5cc5dd4305b03285186232ffc78eed7dc
SHA1fafc832a7ac0081a8f1f3c3be4c544836a60aa2f
SHA25666f5c017efc4e100dae68392b0be91a08d7b804f434074d76b8d6ca735c01324
SHA512652aad47034f8704627b2a572b8b1dd75dc21fb20d5102fa78477b11e18265adabcc010ba6c2bcc8d81e5dab5e29d1b2949cdecd89756129b0eb01a9010c1fd7
-
Filesize
15KB
MD571a9c5629ab5f29ac884afa73378734b
SHA1232a250a47c6d946c76bae8252f2ae67c2e86936
SHA256d1afda1afb0353e286e0054a1174b624acc36b3de4b73f6012f7ad263bcfc75c
SHA51212a5b84222736a7c7ec2f33eb6cdc44ea5abcfa80e23b5a1e0f8c5df086d7b16e56ecdc09ab384b3edeb48becefa5cf26b6271bde1021f155b0678223350f3ce
-
Filesize
10KB
MD5c8d1f1e29167681227000e87fac2aa4f
SHA19b064a3f10583eccba38d9b6a080a1febe37d126
SHA256032fba4a9bf2ceb4eb16ed18c7dae17ab04a9ed8e37c499447a7fd4d269977ca
SHA51226d13463572b9a2e27a497be351480c5fb4fffec0404b42c50001750381cde4ad006e4c7d0821caea7f4e3bb44d1232cf25845044b4094acfa453f258ce6686a
-
Filesize
10KB
MD56ac347e62aa720e18ff4546d700a5e66
SHA1e9f181d9546bcd670285640274994aa2c48e1c02
SHA25683d909cfb88f65484b84b30657a68109c9f04f70e6e48336aa5b30747cedc21b
SHA5121650ea99628708f61d324cc5c8b98c45d2e8873460620e40b46461843b207e17bb449ea52dca3b363be86ff736c1ff93228c496b2199e06fd2c69cd152f62c0d
-
Filesize
10KB
MD5eab160030802cb04711b0f56487ad6cd
SHA14b17bd3ec65e4e8aae4f9bab9f340aec54e19db0
SHA256f54ff30f4ac00eed059c6293d15b3999419efdbf633cd58559acc5d02babeef4
SHA512e96467163020ade4640f694a9b0dbd6cbe666d0e71e37634c0c248aae6bb9b0c0f6be37d3c21e41385fa173ade26e29fc77f3a96602a5d91036966ffc8040921
-
Filesize
1.8MB
MD59dea0e097a9267eec56e1d08e9f37554
SHA17e7f36a9c20b52830bc11b77b48814efbe7276e9
SHA256ecdbc4f125db74bc0d489f0c3c4feb805225af49b02762f70c69f2dcb95e2751
SHA51261a5284f0afc6637ef794dfcd761529aba1e72f46428e2363fe5f372e16ce34902edd97fe5b41e98ece99ef18a92aa9458e97e21454b904d92f1a7c345c236e7