Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
7ee283f3588e385e0eb6c39a0a32ef38
-
SHA1
b5c51ee8ad56ea23acdfd03be4ba100261682134
-
SHA256
4a12b63197b69950e470f43b75d0df47eab18bb6c1a869c886b9b39f0b61b93a
-
SHA512
2c66020e9153446ef4bd9a03a788197136663af84c01352c706350053e6cbc748fb5eadacafeac969eb40d61c6e0485b63bccbd818500056fb5467b3bb0a5974
-
SSDEEP
24576:mNdd6AmJw0J/DcUKpPvt/fh60bDiw3rQsEVByKl5pAPxJHE+eHQGodJMJJP1TFR:uWJ7ApPVfhlbmaQsXKl8Pxu+ewrJkP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
Processes:
243a8bed45.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 243a8bed45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 243a8bed45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 243a8bed45.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 243a8bed45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 243a8bed45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 243a8bed45.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
xZNk1YZ.exedescription pid Process procid_target PID 2716 created 3376 2716 xZNk1YZ.exe 56 -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
Processes:
091178f56b.exed73571e920.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 091178f56b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF d73571e920.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
skotes.exeebd5310e46.exe248215dc55.exed73571e920.exe091178f56b.exea4116f51c5.exe243a8bed45.exeskotes.exeDBGIJEHIID.exefile.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebd5310e46.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 248215dc55.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d73571e920.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 091178f56b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a4116f51c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 243a8bed45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DBGIJEHIID.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exemsedge.exemsedge.exemsedge.exemsedge.exechrome.exechrome.exechrome.exemsedge.exepid Process 4384 chrome.exe 5404 msedge.exe 5196 msedge.exe 5212 msedge.exe 6464 msedge.exe 1224 chrome.exe 4756 chrome.exe 1276 chrome.exe 6472 msedge.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exea4116f51c5.exe243a8bed45.exeskotes.exeebd5310e46.exeskotes.exed73571e920.exe248215dc55.exeDBGIJEHIID.exeskotes.exe091178f56b.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a4116f51c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 243a8bed45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebd5310e46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d73571e920.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebd5310e46.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 248215dc55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 248215dc55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 243a8bed45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DBGIJEHIID.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DBGIJEHIID.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d73571e920.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 091178f56b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 091178f56b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4116f51c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exexZNk1YZ.exe248215dc55.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation xZNk1YZ.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 248215dc55.exe -
Executes dropped EXE 14 IoCs
Processes:
skotes.exexZNk1YZ.exed73571e920.exeebd5310e46.exe091178f56b.exeXsFuJt6.exea4116f51c5.exe248215dc55.exe61ee47c638.exe243a8bed45.exeskotes.exeDBGIJEHIID.exeskotes.exexZNk1YZ.exepid Process 1172 skotes.exe 2716 xZNk1YZ.exe 2352 d73571e920.exe 1544 ebd5310e46.exe 3908 091178f56b.exe 1440 XsFuJt6.exe 2248 a4116f51c5.exe 4608 248215dc55.exe 3876 61ee47c638.exe 4496 243a8bed45.exe 6272 skotes.exe 6568 DBGIJEHIID.exe 5156 skotes.exe 1588 xZNk1YZ.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
a4116f51c5.exe248215dc55.exe243a8bed45.exeskotes.exeDBGIJEHIID.exeskotes.exefile.exed73571e920.exe091178f56b.exeskotes.exeebd5310e46.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine a4116f51c5.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 248215dc55.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 243a8bed45.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine DBGIJEHIID.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine d73571e920.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 091178f56b.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine ebd5310e46.exe -
Loads dropped DLL 3 IoCs
Processes:
XsFuJt6.exe248215dc55.exepid Process 1440 XsFuJt6.exe 4608 248215dc55.exe 4608 248215dc55.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
243a8bed45.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 243a8bed45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 243a8bed45.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
skotes.exexZNk1YZ.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a4116f51c5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010280001\\a4116f51c5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\248215dc55.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010281001\\248215dc55.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\61ee47c638.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010282001\\61ee47c638.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\243a8bed45.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010283001\\243a8bed45.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1010264001\\xZNk1YZ.exe'\"" xZNk1YZ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cfb-1380.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
file.exeskotes.exed73571e920.exeebd5310e46.exe091178f56b.exea4116f51c5.exe248215dc55.exe243a8bed45.exeskotes.exeDBGIJEHIID.exeskotes.exepid Process 4720 file.exe 1172 skotes.exe 2352 d73571e920.exe 1544 ebd5310e46.exe 3908 091178f56b.exe 2248 a4116f51c5.exe 4608 248215dc55.exe 4496 243a8bed45.exe 6272 skotes.exe 6568 DBGIJEHIID.exe 5156 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
XsFuJt6.exexZNk1YZ.exedescription pid Process procid_target PID 1440 set thread context of 1588 1440 XsFuJt6.exe 101 PID 2716 set thread context of 1588 2716 xZNk1YZ.exe 163 -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1916 1440 WerFault.exe 99 6580 1544 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exefile.exe091178f56b.exea4116f51c5.exetaskkill.exeaspnet_regiis.exe61ee47c638.exetaskkill.exetaskkill.exeskotes.exexZNk1YZ.execmd.exeipconfig.execmd.exeipconfig.exe248215dc55.exe243a8bed45.execmd.exeDBGIJEHIID.exepowershell.exed73571e920.exeebd5310e46.exeXsFuJt6.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 091178f56b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4116f51c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61ee47c638.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xZNk1YZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 248215dc55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 243a8bed45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DBGIJEHIID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d73571e920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd5310e46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XsFuJt6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exemsedge.exe248215dc55.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 248215dc55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 248215dc55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
chrome.exemsedge.exemsedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid Process 3952 ipconfig.exe 812 ipconfig.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1632 taskkill.exe 1416 taskkill.exe 2128 taskkill.exe 4768 taskkill.exe 3464 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
file.exeskotes.exed73571e920.exeebd5310e46.exe091178f56b.exea4116f51c5.exe248215dc55.exechrome.exe61ee47c638.exe243a8bed45.exemsedge.exemsedge.exemsedge.exeskotes.exepid Process 4720 file.exe 4720 file.exe 1172 skotes.exe 1172 skotes.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 2352 d73571e920.exe 1544 ebd5310e46.exe 1544 ebd5310e46.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 3908 091178f56b.exe 2248 a4116f51c5.exe 2248 a4116f51c5.exe 4608 248215dc55.exe 4608 248215dc55.exe 4608 248215dc55.exe 4608 248215dc55.exe 4608 248215dc55.exe 4608 248215dc55.exe 1224 chrome.exe 1224 chrome.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 4496 243a8bed45.exe 4496 243a8bed45.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 4496 243a8bed45.exe 4496 243a8bed45.exe 4496 243a8bed45.exe 4608 248215dc55.exe 4608 248215dc55.exe 5924 msedge.exe 5924 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5404 msedge.exe 5404 msedge.exe 6272 skotes.exe 6272 skotes.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe 5420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exemsedge.exepid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
xZNk1YZ.exetaskkill.exechrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe243a8bed45.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2716 xZNk1YZ.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeDebugPrivilege 1416 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 4768 taskkill.exe Token: SeDebugPrivilege 3464 taskkill.exe Token: SeDebugPrivilege 4780 firefox.exe Token: SeDebugPrivilege 4780 firefox.exe Token: SeDebugPrivilege 4496 243a8bed45.exe Token: SeDebugPrivilege 3284 powershell.exe Token: SeDebugPrivilege 2716 xZNk1YZ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
file.exechrome.exe61ee47c638.exefirefox.exemsedge.exepid Process 4720 file.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 3876 61ee47c638.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
61ee47c638.exefirefox.exepid Process 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 3876 61ee47c638.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 4780 firefox.exe 3876 61ee47c638.exe 3876 61ee47c638.exe 3876 61ee47c638.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 4780 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exexZNk1YZ.execmd.exeXsFuJt6.exe248215dc55.exechrome.exedescription pid Process procid_target PID 4720 wrote to memory of 1172 4720 file.exe 84 PID 4720 wrote to memory of 1172 4720 file.exe 84 PID 4720 wrote to memory of 1172 4720 file.exe 84 PID 1172 wrote to memory of 2716 1172 skotes.exe 89 PID 1172 wrote to memory of 2716 1172 skotes.exe 89 PID 1172 wrote to memory of 2716 1172 skotes.exe 89 PID 2716 wrote to memory of 1312 2716 xZNk1YZ.exe 93 PID 2716 wrote to memory of 1312 2716 xZNk1YZ.exe 93 PID 2716 wrote to memory of 1312 2716 xZNk1YZ.exe 93 PID 1312 wrote to memory of 3952 1312 cmd.exe 95 PID 1312 wrote to memory of 3952 1312 cmd.exe 95 PID 1312 wrote to memory of 3952 1312 cmd.exe 95 PID 1172 wrote to memory of 2352 1172 skotes.exe 96 PID 1172 wrote to memory of 2352 1172 skotes.exe 96 PID 1172 wrote to memory of 2352 1172 skotes.exe 96 PID 1172 wrote to memory of 1544 1172 skotes.exe 97 PID 1172 wrote to memory of 1544 1172 skotes.exe 97 PID 1172 wrote to memory of 1544 1172 skotes.exe 97 PID 1172 wrote to memory of 3908 1172 skotes.exe 98 PID 1172 wrote to memory of 3908 1172 skotes.exe 98 PID 1172 wrote to memory of 3908 1172 skotes.exe 98 PID 1172 wrote to memory of 1440 1172 skotes.exe 99 PID 1172 wrote to memory of 1440 1172 skotes.exe 99 PID 1172 wrote to memory of 1440 1172 skotes.exe 99 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1440 wrote to memory of 1588 1440 XsFuJt6.exe 101 PID 1172 wrote to memory of 2248 1172 skotes.exe 107 PID 1172 wrote to memory of 2248 1172 skotes.exe 107 PID 1172 wrote to memory of 2248 1172 skotes.exe 107 PID 1172 wrote to memory of 4608 1172 skotes.exe 108 PID 1172 wrote to memory of 4608 1172 skotes.exe 108 PID 1172 wrote to memory of 4608 1172 skotes.exe 108 PID 4608 wrote to memory of 1224 4608 248215dc55.exe 109 PID 4608 wrote to memory of 1224 4608 248215dc55.exe 109 PID 1224 wrote to memory of 3520 1224 chrome.exe 110 PID 1224 wrote to memory of 3520 1224 chrome.exe 110 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 PID 1224 wrote to memory of 4244 1224 chrome.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3952
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAMQAwADEAMAAyADYANAAwADAAMQBcAHgAWgBOAGsAMQBZAFoALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAMQAwADEAMAAyADYANAAwADAAMQBcAHgAWgBOAGsAMQBZAFoALgBlAHgAZQA7AA==5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew5⤵
- System Location Discovery: System Language Discovery
PID:924 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010276001\d73571e920.exe"C:\Users\Admin\AppData\Local\Temp\1010276001\d73571e920.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\1010277001\ebd5310e46.exe"C:\Users\Admin\AppData\Local\Temp\1010277001\ebd5310e46.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 11405⤵
- Program crash
PID:6580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010278001\091178f56b.exe"C:\Users\Admin\AppData\Local\Temp\1010278001\091178f56b.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\1010279001\XsFuJt6.exe"C:\Users\Admin\AppData\Local\Temp\1010279001\XsFuJt6.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 10125⤵
- Program crash
PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010280001\a4116f51c5.exe"C:\Users\Admin\AppData\Local\Temp\1010280001\a4116f51c5.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\1010281001\248215dc55.exe"C:\Users\Admin\AppData\Local\Temp\1010281001\248215dc55.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbc46ecc40,0x7ffbc46ecc4c,0x7ffbc46ecc586⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,9794999532028013430,9130340920261150307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:26⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2000,i,9794999532028013430,9130340920261150307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:36⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,9794999532028013430,9130340920261150307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:86⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3232,i,9794999532028013430,9130340920261150307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:16⤵
- Uses browser remote debugging
PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,9794999532028013430,9130340920261150307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:16⤵
- Uses browser remote debugging
PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4472,i,9794999532028013430,9130340920261150307,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:16⤵
- Uses browser remote debugging
PID:1276
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffbc1ce46f8,0x7ffbc1ce4708,0x7ffbc1ce47186⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:26⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:86⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:16⤵
- Uses browser remote debugging
PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:16⤵
- Uses browser remote debugging
PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:16⤵
- Uses browser remote debugging
PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:16⤵
- Uses browser remote debugging
PID:6472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:26⤵PID:6964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,4249444486735333626,10303639025836713802,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:26⤵PID:7096
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\DBGIJEHIID.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Users\Admin\Documents\DBGIJEHIID.exe"C:\Users\Admin\Documents\DBGIJEHIID.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010282001\61ee47c638.exe"C:\Users\Admin\AppData\Local\Temp\1010282001\61ee47c638.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:3116
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {51cf0d4b-2bed-46b2-9661-318e317e3908} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" gpu7⤵PID:3140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {048187ee-2401-48a0-b1aa-a9c9224c8ed2} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" socket7⤵PID:3044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3480 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fb63c6d-06af-4bff-be88-59daf92a5a02} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab7⤵PID:2688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2940 -childID 2 -isForBrowser -prefsHandle 3060 -prefMapHandle 3724 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {52a4835f-8f5f-420a-8844-7d54a550d0dd} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab7⤵PID:1632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4584 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4580 -prefMapHandle 4576 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {710c2361-9dad-4dad-b435-2fdb9449ca98} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" utility7⤵
- Checks processor information in registry
PID:5956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 3 -isForBrowser -prefsHandle 5244 -prefMapHandle 5260 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {773d7d6e-79e5-403f-99f6-2437833d56cb} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab7⤵PID:5248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 4280 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5e98a37-8fc2-4986-8014-d44aa3c4bee1} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab7⤵PID:5280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5592 -prefMapHandle 5224 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4620c2ab-e431-4837-9aa5-4bad7c2a8481} 4780 "\\.\pipe\gecko-crash-server-pipe.4780" tab7⤵PID:5300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010283001\243a8bed45.exe"C:\Users\Admin\AppData\Local\Temp\1010283001\243a8bed45.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1440 -ip 14401⤵PID:2836
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1544 -ip 15441⤵PID:6556
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\4b7b8ac6-c260-40cb-b3d3-cd6f2f09ea04.dmp
Filesize826KB
MD5c0142b1eb41746d3c44b800cc304c562
SHA13e3b7094b049cfb01b34c7954a6f2466cd09e1e1
SHA2560745336d19298c5b161d78f43b405692c042ab48d1c64463ef9ea5501fb0df6e
SHA5124bbc2a814334435ab87c38aabc585437426ddf8733a751423bfdc794a1622326f7da73d7ffae796412ed9f663016cc17e9fdf7df0040703131cbc141bce9495f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\fa1fc6ef-84b7-4df4-a203-6baffba7bbf7.dmp
Filesize826KB
MD5939dd899a60c19af4480a4c9004a767c
SHA16ffec41ea658fff9a6ce383e92de0d4bfbdc868d
SHA25665a567c9f5214ef2bb7f5cefdda81557a6f388ada3edb20d4df837be2206283d
SHA512d9f48c8287e4fc356ec4233cc4d58d2dcb790dfc9c56824b7f80d99b664a545cc1271a48e0ac6a8fadb34edb6523b13c38f28b377bcc61fb6e0df29cf2b7fa19
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD548b3c046159bfbe96bf37c12b8ed7ae2
SHA179ef649eb680119015513137ab55cd909989023f
SHA256b05407b98d4c4671bdc68fde1e9fa07df1d720da30e6ccea88032a8443ee2681
SHA512ff8bcd5b7c6e00efc43f834c0ca037fb632adb67537b3d60c479390e374efccfcd889ae663f70417a56f5f1b779bffcc3d89b3e4079517c011a1a9eb4afb5995
-
Filesize
152B
MD5521c59ec90d33000e789c172aecae236
SHA1f8a1d08a092d55eb5b77c3ddd0a0d6a8efb3e904
SHA2563e5f684321ddbd62483af980ce8415f9f581f1c67d66b9a9d43391978c3d6946
SHA5120012baac482891c34117fa00ed0a404b50ee794b8d39bd75de8c467e0246c0cf785c05efc94d2375eff942d1bb2aae6428d63800ad3e384620423c804d6a7062
-
Filesize
5KB
MD5ba049571d4ed5d6e3f1ceb83bf5eb319
SHA1c55e577e176e4ba424f484f0988ca9c8ce03f796
SHA256619ac678a901423feb0071a72189bc424ffe3dc3f22fd18abae9ee8d489bd434
SHA51254fe303f13ecb92ec684921808bc00a6dc27b2360c062ca1eda4d2a14079da030d587cf90bfe61ea755b4b75c7583f54b4b67307690a846bd46ba3ff361e06af
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json.tmp
Filesize20KB
MD5ed1389831cc907148bd7727526723977
SHA1a15fc97a7c6e7b2a849f4640bf649270ad071ed8
SHA2565c5d544a72361100cd05f6b24d673d8dd5389f22687b084f44f3a1630f13fcc5
SHA5123442e591fee32d2e001cfecd2bb09f706f1b69d1f3373236185c8f1cf4e52f643b177a2908ccdfbed025e315f2f738cc4ef49c00983022809233928677c1e90c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5285465a48613c1748ca8962f0cc10b05
SHA12abf02ef87be5141c4c4d6e3a62fdfd0ba4e726e
SHA2565877544ba7b8f6d73ffc3b7f713fb943ede048d9c26d560a48fcb90548f6f675
SHA512b7da0d9897aed28565bf34b99ea3a8cd95cda00c22a91ba3ec0e5fa2623fc7de0189074d3c39becfdd62a85a006a6256a06eddf3b63e1a60332fc3f3ef65437c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD55cee55ec0f578c33ca4f847f6b71ad77
SHA17897800f4d4b20f26dd48ba8d25ce3beecfb63fa
SHA256a6a438e275159876dbc0eafe41ec75efdba002e97e858b9a9cf08b13c8e9cee4
SHA512d95c1d2cbcc2f043002fb2019bd6d247771e31ae8c3c04399253aa2c40e2dcf8419fda7fbe06f5474c80cf9a004e9f83a68f859ef3ffc03316ef08854d31f57c
-
Filesize
4.9MB
MD5f98fb3f06debf7144bee7c2ff7b4c456
SHA1854b9f051af8fe2ebdd2878411e9fb9032594229
SHA2568abb86b3dd80c4d37387eb28a3c96efc7c0ef1675337aeb8e5599e8e3140ee66
SHA512d7fca0fc58d14066fbddb19f36d5b1ff17d51a5aa85f8829cba212d1aa3fd7f5551ff3c673bc6e5e64888951f9066e536f91d6671f7ef45765a815a677eedcb1
-
Filesize
4.2MB
MD524733346a5bbfd60cd2afd7915b0ac44
SHA196b697c75295f2d5049c2d399d740c478c40c459
SHA256f3b0734a5bf6ec2a77a02657e770842456f510980314765bef61ed367f4afc4d
SHA512e0ad7c18eff4ee66c7857caea5091f6fefb5a7cd3c5bbaf6d47d54a73e4467700c232301e828f325ec76ed36fc1628d532fab9dceaae1704e444623a8bf69d35
-
Filesize
1.9MB
MD59b37c373d075d185b0979498d9ac7c7c
SHA14d4c3862ba6f1e3a35195ca2d9b23c80a7632eda
SHA256d52ec59339c5ed5f8b09550f85368f07e6652471f564118d1b9995cdf834c76c
SHA512d30077e2e087b114f75b0b9083ff4b6ea252b4ec5f5aa2f5674d5799c1c94e7dbb2637e1de8b0b0af238d285e089973b2bb18cb5be9cba6eaee519fdc5bf1495
-
Filesize
4.3MB
MD55b893b6b754f3f28e703ffedd654f6b7
SHA19ac4666663f290ff010c787f6c26b6c80254fd35
SHA256bc959fde662ca2876e219ef21cb9e5280054fd83c54b366dfba33a7a7ed88285
SHA512e2c99a579402a9c070bcdc90af3b4394278d3481be40fe278fa6629132cd35547cd95d37a9ca5bba9f6dae35b5e1a83de8945b499eb876fd47011f3627f6d807
-
Filesize
689KB
MD5c599f242f50ba9963752f3f31e2e1f94
SHA1f7f8cb1c748390dd731e039739d63749b27c9d4b
SHA2560156be519792dcc5f7c2f3f69c5a7aa79f0c5e479d210dddc77a0a35749c9b2d
SHA5120cf5d6e712d274c592447081486ce5375a38d11747897a141f603073544669fd630b29e81f7e0048f8202ca7801e01b34b9b8e93b0fbfc74e05aa27866584999
-
Filesize
1.8MB
MD53956fb8d6e7d4415e6db6e1017968553
SHA1b5649a18471cae04b254300a6661b9d72de3a247
SHA256bac60c389a78658476edda33546a0127bb58593cc584f0ef5866de6085e63c7c
SHA5128464f26dc3b80519d6e6a985953831e22000799715b5a2747b44a7fe0683d85d7601f0407865940757afa80eb260c05c855861fb01168b168579635b2f6a0a10
-
Filesize
1.7MB
MD5b65136f4c830127bc5acf711ca4cc846
SHA18aaa79a4bd70c2d0b0cff1de9f907bd8c0e516d5
SHA256cf3ed6778e5518ea1b8aed29de098cf5d9b919ed4e5de555f1c906f65677766b
SHA512e0c46b912593e0e9c2501be21c70fa402a23c8f77e727089758804c19d1bc0f5bed18eb6e49170a44ad42b83254d524ed3766df9362579ef0ee8dacda20e7628
-
Filesize
900KB
MD58d1cebab0f792541d9f5d520efa671b1
SHA124a8eea5c5b71b50386e4a8406561463835fcf42
SHA256b78673d9b3e5ac6f7bb33d9f5d3386cb72e550df93feafbb99fd3ab9b8236c1a
SHA5122cc7bf95c6616d39a52c74def88fd2a9b2f1e65a77556ed504e774e957f61f775eaec8075858a96b7afdbc8ea1ef98800f532bc96f5ff0b1f963a6c8cbff5cd0
-
Filesize
2.7MB
MD5f63f6461c513303dbd4fdcedd1772a74
SHA11a9c084f9ba3ee4e039b65e02bbb0ddc574b4539
SHA2562ddb9dc529f8bd218efd18048ea721e0e169ea34c1e4bd5a2dba9fe38a516f1f
SHA5129721d9dd9874fee05ff16a774ceb2131ce144ff33c3717abe48a849b76f8a686122bb3f69bdd3217a4fbf80c1c079b3211284ba0c02457aaee6c9e65ad3cd5b5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD57ee283f3588e385e0eb6c39a0a32ef38
SHA1b5c51ee8ad56ea23acdfd03be4ba100261682134
SHA2564a12b63197b69950e470f43b75d0df47eab18bb6c1a869c886b9b39f0b61b93a
SHA5122c66020e9153446ef4bd9a03a788197136663af84c01352c706350053e6cbc748fb5eadacafeac969eb40d61c6e0485b63bccbd818500056fb5467b3bb0a5974
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD5a89d73dc1597b3970405d4f681ed1e70
SHA15446929c9a14ac152ceacc62d4f1fc868d8a5d12
SHA256615544ab4acbf54676307e34591e0d27fff95e63fd4e0ca8b7b0998fa1d03f58
SHA5129eac05a9e6b3f4c9dd443e71eb754ccf6a4183b5704c33f7eaf34b2b1da7f51037bad5bd3725ef25f07efdef49bff324d1004e4b7a270bbe2aa4b0e5948f434d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize12KB
MD5cff0a3ae218c9be806a1b9771b98ce35
SHA137a3a82c6afb33f1f38bd10e5ce4e2996d3a4384
SHA256dae367c687b3a3f4d18b764ba739f1dc1ac2df01d6fbdb6ec8885d217c0d7e4b
SHA5127875c0fbe644df6e296c9912e762ccb9cf2d41abde296575b83e077a9ec654be7c11059478dc87fc6ec273bcf4e449baab0037ac8602b1749c7b767fcbaa4f73
-
Filesize
256KB
MD5828e205125e98657b5a4565f5143ecaf
SHA107f98373e7d8a65a3f209c91d2e5b7ec12b191a3
SHA256012571b2aabbdc3d742aba7b6d549ee8f3a83836e2361eab7bec2928c1b00b6b
SHA5126743c208a0872bdd3d2fa8c2f498d161eb5aa0d5a1720f78b06d3fe636d4f45dc370f2b2fc989dbc553f812d79add502c9b368a3b136ba5e5e2fbef0e4c1548c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD53c529f454f6d40256ce34482a586198f
SHA16f8c352efa19378cd0dedad15c905ee09feb2793
SHA2568e841bf7d59d980d5dfc328810b8dc6e7994c8fb80f4f277b6bd26c4418c6f2f
SHA51273bd05e74945800be05e4478551552c4e33af5c2b9425b7eb8fa8c0bffa6ce2d5c7d4eef23230fb4a61c6fe53d1328d3d1f99a54a5382ee88182c555422d7a63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5940f0aa93c79798338e8c38baf33f2e9
SHA102515232bd029a0a39b20f17b8d8ad55fc99f00b
SHA256ab120a4682ce9f437dd6ae8c3ea982f13fd41c53865ae075d58640cd486abdd5
SHA51233bb08435b170b856ab3a4cbcd72d94e211f265aceae0b610b4fe0f720c03d372ad4b9e22c92dc5e6fe30cfcdead66f15ac675c56dcc4e1ff5a0713f6e6c5f65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d76b194f2c3114374a9470f67a84ac89
SHA1f7ac5a726feba2cadef0c9d3e92a57f0696afcf6
SHA2569ef8f98a02b605328487153c75f8a020a6bd6bca345796a6e1d21bbb1b80c537
SHA51281d7735a89c4aa5c59bc6d67ee83126afaffd91ffbb313f5990f537b0dc7abaf25ab47fd90e6fba7d97a02f8a27af501bfca8e6f17d55d272289bee130766aa4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\21f55c84-7c30-4f22-88e4-f94fa9591395
Filesize24KB
MD5869a232669e9fa4601b30cd6f992f3b2
SHA121f77115302289e35dead4b1f9e5e986774e2154
SHA2562eec56e41df14c19c92da0b7d0a4ecd29212fbf879dfa71f1348884774c1cde5
SHA5122ec76ceff67cab69f07f37d2adb1ccbd81668d1427852fccbacf484bcec1f07f6868327d72edaae246eb3c7d907d756fff09afa97d8845a73ea26592536bd015
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\7eb48a10-0315-48c1-a76a-d43055bb9de6
Filesize671B
MD582ea100e52c075edbbb8ab67c32a3859
SHA14f202dc43ea94f9ee9c10cdfffade6c16eef943d
SHA2560eee1295ab8dcf630531edf02c1fabc2b4a45a383a17aef17290d078fd725a2b
SHA51236465c047f876e21023e3f8522805daffd0a5193ba0c496331fe3a1fa1121b29faaa5519952fc64f7fc001a40ee00b9015d6ea26161cb0eb194c44a5e5dec4e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\92b72552-ace6-40d4-9e5b-5900d4ab9552
Filesize982B
MD57b6c5c87632777308761912692984e95
SHA1a7cecafec06e28f58e12d8af5111ff2a59dbd7c3
SHA256cf0c63cc94b8ad16a2331e51df395d20fed99da329fc73c0aec406a627b1401e
SHA51227019c10b5324549d40078feb12e97cc498174e50dc53cc28d616004e5d967cbb3aec56d530275fe1b6c9898af2f55da61bd145497bc2316b310876eca84f65f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5d7996ae8d2e575dd3e0572d49dea1f26
SHA14bc806a0fb7f0e37d44c12f761578f6b1ad312c2
SHA256dd6c33cd7b560d22e6e2d2da16d490adba27ad97e40ef983bd860604d4fab4b1
SHA51257ca2f06b2a2b4060b1f29e02dee3d29f38d821aa42cc7732605004b029422eed159975d534726fde009f1d6766c23704c12cac5bae1ac29c313b253a0e9c0e1
-
Filesize
10KB
MD56c8cb337087bf65bae2b8339dd3086f1
SHA17be335ffd8b23cff3cba1a332f03f37481d9e9ce
SHA256503f9ad75727d0c848dadd019264cecad524aaf8f72304f97bdcf76e6131e183
SHA512a18ebbc0646a8110d2e1c17809c12c13e5a44b330d05aaba3deaf14a097733950980c3235bc8f29871a11e9507ed2f4887a9e6cfa3835b31231389d0f15e8e01
-
Filesize
11KB
MD55446b5a509f962661eb53b76a42bc4bd
SHA1b96e763f93ad0f96f503c56c65ff369760525b8f
SHA25624247bd1f20793e43a351bc22c02e541427b1e6f8841b7c758615aad1c6e820b
SHA51233a0d445086b983b7ebae4ca24c2995ef59043fd16a1ea01afc6fdcf47fc825caa1e29c8aafd0f7fb9e0592771ddeced2f29b44ff860e5683f841b2ea822235a
-
Filesize
15KB
MD524d1c3a6f4f61f7f0c31fbcea3ca1a28
SHA1f5573e35e62b123655809cdec1ba98a2bd2c84b5
SHA256315e86cf3c0d5798d3e071ffa16300c0f9cebc3908b25e554a10537e29634be7
SHA512da370cf68a1a60c379898f4c7b386cd70bc55eb52ec7c8c6529e397800da4b41a5225144254610a7a74296010b8b496de640ddb9a5d0ac4d472f68320f67b7a2
-
Filesize
11KB
MD5be7bdb1524b36cb021d99eb573bfc8d1
SHA197cbe3a09f64adfa2f93a0c432831bb9341fa093
SHA256c10850f6adf8153218bacd44e22d975fb47f53aaa92e1dc7f29c5b898d34d7f1
SHA51263c78e3a917922a087c92e9a34f90ecc27a7dec88c31d1a2132d071c07100b162956317515262207e456324bf6536ba70782eabc1678b88025f14e31fff5c4f6
-
Filesize
440KB
MD5b8a69fcd2a37e7b7bd1be816e3727f6e
SHA1bf9fbbeefdb15167e00e1b23d1dc04d0f410baea
SHA256aa7594e60fe4f662bdd4d3213d97a3170193a42607d96d9de43717982eaa663b
SHA51276aabcc435ea8c7d6f00d0685097fe5cf68f0a1645403be8e9314a0755574c63b24a820f60870aa20920e03134670b58dbdb420085a348c42cc2de5c0deba9ea
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e