Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
3ca635061fa9685d799784f665850565
-
SHA1
549bb2808560d826b7be8ea502b46e3cdc101ce3
-
SHA256
373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb
-
SHA512
7812edb799fc4ac60c856c61ecd793fb5499ffe433c9bf60e251d4e3e9d5bb4df8d8f2873bb643036ccbb5bc611cc339ad8e8789feec3b3c5834bb72ed887792
-
SSDEEP
24576:9w/gXXZLf9FpuSVA83ZIaoOD8BR98BpLOKKxsGaC3x5MY0s9r3k7in9tFvGH:9kKpVu8pIO+D8rLOKHRQ5MYR3mV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://tail-cease.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f7eff8301d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f7eff8301d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f7eff8301d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f7eff8301d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f7eff8301d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f7eff8301d.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 49a2ea99af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 7b11cb1e7b.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49a2ea99af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb07949195.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c63a0bb0f9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b2d53c4f3a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7eff8301d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7b11cb1e7b.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4608 msedge.exe 3476 msedge.exe 1920 msedge.exe 2796 chrome.exe 2308 chrome.exe 5068 chrome.exe 3612 msedge.exe 3596 msedge.exe 2608 chrome.exe 4308 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7eff8301d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7b11cb1e7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49a2ea99af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c63a0bb0f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b2d53c4f3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb07949195.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c63a0bb0f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7b11cb1e7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b2d53c4f3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7eff8301d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49a2ea99af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb07949195.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation XXM5y4g.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation rWmzULI.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation xZNk1YZ.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 18 IoCs
pid Process 2120 skotes.exe 4316 TaskbarMonitorInstaller.exe 4296 uxN4wDZ.exe 2856 uxN4wDZ.exe 2492 skotes.exe 2684 rWmzULI.exe 1924 SKOblik.exe 4356 xZNk1YZ.exe 1176 Continuous.com 552 XXM5y4g.exe 1308 49a2ea99af.exe 1704 eb07949195.exe 1324 c63a0bb0f9.exe 964 skotes.exe 1200 b2d53c4f3a.exe 4276 38568bbe5b.exe 2444 f7eff8301d.exe 5512 7b11cb1e7b.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine eb07949195.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine c63a0bb0f9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine f7eff8301d.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 49a2ea99af.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine b2d53c4f3a.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 7b11cb1e7b.exe -
Loads dropped DLL 4 IoCs
pid Process 3840 regasm.exe 3840 regasm.exe 3840 regasm.exe 3840 regasm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f7eff8301d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f7eff8301d.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c63a0bb0f9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010309001\\c63a0bb0f9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b2d53c4f3a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010310001\\b2d53c4f3a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\38568bbe5b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010311001\\38568bbe5b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f7eff8301d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010312001\\f7eff8301d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 118 raw.githubusercontent.com 120 raw.githubusercontent.com 121 raw.githubusercontent.com 122 raw.githubusercontent.com 123 raw.githubusercontent.com 124 raw.githubusercontent.com 125 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000600000001daac-947.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 552 tasklist.exe 3016 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3492 file.exe 2120 skotes.exe 2492 skotes.exe 1308 49a2ea99af.exe 1704 eb07949195.exe 1324 c63a0bb0f9.exe 964 skotes.exe 1200 b2d53c4f3a.exe 2444 f7eff8301d.exe 5512 7b11cb1e7b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4296 set thread context of 2856 4296 uxN4wDZ.exe 109 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\Newtonsoft.Json.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorWindows11.exe TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorInstaller.exe TaskbarMonitorInstaller.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe File opened for modification C:\Windows\BeliefQuick xZNk1YZ.exe File opened for modification C:\Windows\WantedOffset xZNk1YZ.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x000a000000023bab-536.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5904 1704 WerFault.exe 166 -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49a2ea99af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c63a0bb0f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38568bbe5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKOblik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Continuous.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7eff8301d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b11cb1e7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rWmzULI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb07949195.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2d53c4f3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xZNk1YZ.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rWmzULI.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rWmzULI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1976 timeout.exe 3596 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 6 IoCs
pid Process 2596 taskkill.exe 1360 taskkill.exe 2852 taskkill.exe 668 taskkill.exe 3812 taskkill.exe 860 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133773698630349823" chrome.exe -
Modifies registry class 26 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0 regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29}\0 = ".NET Category" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{00021492-0000-0000-c000-000000000046} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ = "mscoree.dll" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "taskbar-monitor" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId\ = "TaskbarMonitor.Deskband" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID\ = "{13790826-15FA-46D0-9814-C2A5C6C11F32}" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Class = "TaskbarMonitor.Deskband" regasm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3492 file.exe 3492 file.exe 2120 skotes.exe 2120 skotes.exe 2492 skotes.exe 2492 skotes.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2608 chrome.exe 2608 chrome.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 3772 msedge.exe 3772 msedge.exe 3612 msedge.exe 3612 msedge.exe 1176 Continuous.com 1176 Continuous.com 1176 Continuous.com 1176 Continuous.com 1176 Continuous.com 1176 Continuous.com 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 2684 rWmzULI.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1308 49a2ea99af.exe 1704 eb07949195.exe 1704 eb07949195.exe 1324 c63a0bb0f9.exe 1324 c63a0bb0f9.exe 964 skotes.exe 964 skotes.exe 1200 b2d53c4f3a.exe 1200 b2d53c4f3a.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 2444 f7eff8301d.exe 2444 f7eff8301d.exe 2444 f7eff8301d.exe 2444 f7eff8301d.exe 2444 f7eff8301d.exe 5512 7b11cb1e7b.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeDebugPrivilege 552 tasklist.exe Token: SeDebugPrivilege 3016 tasklist.exe Token: SeDebugPrivilege 552 XXM5y4g.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 1360 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 668 taskkill.exe Token: SeDebugPrivilege 3812 taskkill.exe Token: SeDebugPrivilege 860 taskkill.exe Token: SeDebugPrivilege 1532 firefox.exe Token: SeDebugPrivilege 1532 firefox.exe Token: SeDebugPrivilege 2444 f7eff8301d.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3492 file.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 3612 msedge.exe 1176 Continuous.com 1176 Continuous.com 1176 Continuous.com 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 1532 firefox.exe 1532 firefox.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 1176 Continuous.com 1176 Continuous.com 1176 Continuous.com 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 1532 firefox.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe 4276 38568bbe5b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1532 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 2120 3492 file.exe 83 PID 3492 wrote to memory of 2120 3492 file.exe 83 PID 3492 wrote to memory of 2120 3492 file.exe 83 PID 2120 wrote to memory of 4316 2120 skotes.exe 102 PID 2120 wrote to memory of 4316 2120 skotes.exe 102 PID 4316 wrote to memory of 3840 4316 TaskbarMonitorInstaller.exe 104 PID 4316 wrote to memory of 3840 4316 TaskbarMonitorInstaller.exe 104 PID 2120 wrote to memory of 4296 2120 skotes.exe 107 PID 2120 wrote to memory of 4296 2120 skotes.exe 107 PID 2120 wrote to memory of 4296 2120 skotes.exe 107 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 4296 wrote to memory of 2856 4296 uxN4wDZ.exe 109 PID 2120 wrote to memory of 2684 2120 skotes.exe 112 PID 2120 wrote to memory of 2684 2120 skotes.exe 112 PID 2120 wrote to memory of 2684 2120 skotes.exe 112 PID 2684 wrote to memory of 2608 2684 rWmzULI.exe 114 PID 2684 wrote to memory of 2608 2684 rWmzULI.exe 114 PID 2608 wrote to memory of 2708 2608 chrome.exe 115 PID 2608 wrote to memory of 2708 2608 chrome.exe 115 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 5088 2608 chrome.exe 116 PID 2608 wrote to memory of 1140 2608 chrome.exe 117 PID 2608 wrote to memory of 1140 2608 chrome.exe 117 PID 2608 wrote to memory of 1104 2608 chrome.exe 118 PID 2608 wrote to memory of 1104 2608 chrome.exe 118 PID 2608 wrote to memory of 1104 2608 chrome.exe 118 PID 2608 wrote to memory of 1104 2608 chrome.exe 118 PID 2608 wrote to memory of 1104 2608 chrome.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /nologo /codebase "C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:3840
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffcb833cc40,0x7ffcb833cc4c,0x7ffcb833cc585⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:25⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2036,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2056 /prefetch:35⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2436 /prefetch:85⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3340 /prefetch:15⤵
- Uses browser remote debugging
PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:15⤵
- Uses browser remote debugging
PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4532,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:85⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:85⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:85⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5152,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5160 /prefetch:85⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5104 /prefetch:85⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4908,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5180 /prefetch:85⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5320,i,689649314086804063,16104571908973384755,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5384 /prefetch:25⤵
- Uses browser remote debugging
PID:5068
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbdac46f8,0x7ffcbdac4708,0x7ffcbdac47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:25⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:85⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:15⤵
- Uses browser remote debugging
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:15⤵
- Uses browser remote debugging
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:15⤵
- Uses browser remote debugging
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2036,4287208429393232564,8532594577695235391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:15⤵
- Uses browser remote debugging
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KJJECGHJDBFI" & exit4⤵
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"4⤵PID:680
-
C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe"C:\Users\Admin\AppData\Local\Programs\Advanced Sync Tools\PureSync.exe" restart5⤵PID:5628
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ver6⤵PID:5664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Scout Scout.cmd && Scout.cmd4⤵
- System Location Discovery: System Language Discovery
PID:456 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5500465⤵
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Diagnosis R5⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\550046\Continuous.comContinuous.com R5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1176
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010306001\XXM5y4g.exe"C:\Users\Admin\AppData\Local\Temp\1010306001\XXM5y4g.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8495504c-787e-463c-9459-ce24d428eba4.bat"4⤵PID:2444
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:3464
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 5525⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:1976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010307001\49a2ea99af.exe"C:\Users\Admin\AppData\Local\Temp\1010307001\49a2ea99af.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\1010308001\eb07949195.exe"C:\Users\Admin\AppData\Local\Temp\1010308001\eb07949195.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 16964⤵
- Program crash
PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010309001\c63a0bb0f9.exe"C:\Users\Admin\AppData\Local\Temp\1010309001\c63a0bb0f9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\1010310001\b2d53c4f3a.exe"C:\Users\Admin\AppData\Local\Temp\1010310001\b2d53c4f3a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Users\Admin\AppData\Local\Temp\1010311001\38568bbe5b.exe"C:\Users\Admin\AppData\Local\Temp\1010311001\38568bbe5b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4276 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:388
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e649d70e-5682-4367-a1c2-b48931b96d3c} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" gpu6⤵PID:1940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8260e350-00fe-4397-9a65-f22b0302e97c} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" socket6⤵PID:4092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3180 -childID 1 -isForBrowser -prefsHandle 2968 -prefMapHandle 3088 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ee4c9a9-6369-4be2-912e-85c3a77ecd6d} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" tab6⤵PID:1500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3784 -childID 2 -isForBrowser -prefsHandle 3636 -prefMapHandle 3632 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10c8a646-d382-4ddb-8d79-675f107abe5f} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" tab6⤵PID:3704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4684 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4632 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d0cedf1-c6a0-4588-97fb-032497e3ed81} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" utility6⤵
- Checks processor information in registry
PID:5360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5208 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5200 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f106e2ea-2d16-44a2-89bb-0d7355dea3f7} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" tab6⤵PID:6008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 4 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60bf7799-120e-45de-b197-145abddad34b} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" tab6⤵PID:6020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 5 -isForBrowser -prefsHandle 5624 -prefMapHandle 5620 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {38281de7-56a5-4a0c-8cb6-1a3e62195ac6} 1532 "\\.\pipe\gecko-crash-server-pipe.1532" tab6⤵PID:6048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010312001\f7eff8301d.exe"C:\Users\Admin\AppData\Local\Temp\1010312001\f7eff8301d.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\1010313001\7b11cb1e7b.exe"C:\Users\Admin\AppData\Local\Temp\1010313001\7b11cb1e7b.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5512
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5068
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1704 -ip 17041⤵PID:5868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55dd45593985c6b40d1d2dea0ce9a2fcf
SHA1700fb24d4f4e302ed94f755fa6f7caf9d6fb594e
SHA256237e715b292e3ebfdf7038d42290f9a6457f0375ee965e1236bd763bce413391
SHA512ca4e7df463b3d5643decfda936e4d7db1e3247c8f27a25ace150886a0c3ec2e79f1d82d2c4cbd5b89f42deaf4cd5709a7ca47d24a18ed1e1804b0c1e016966a3
-
Filesize
649B
MD5041cc098bbf2511f8380b07fd0c5c24c
SHA1db8d93c980ae156e0ac5e12941f4a1b135488f6b
SHA25675b871d8148f6a182ed93061bf3847674ddc9c78fc5563954d1094f0761b74cb
SHA512de03a19e5077bfb392fc75554f9c8562056546382feb01cf72d538ff1bebb8da9f618b43eb89202dfabd06171a573fa2f8287042232f3c76b4be7f82702811b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
5KB
MD5adc8855e2ce9c5539fda49d24f138e24
SHA1430f6431028bdf44b6208ff5ad567c50615473da
SHA256ab6b0d136ace450fa42a9fc3741468436a131294b3c8f9137416d3b6c262f8a9
SHA5127212a3f77e49e4f98528d5fd4b617e26f0b1b38791e6c8ec3100d5dfc2d5ca76cd1163a4e3aba99ede5f020f9efdf4a0b29da2ff3b9f1a7c20a561a344785e9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a9e9b5b3-0beb-4ad8-a81c-ffa6a29537bc.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5a8342bc7b947a5aeb6bff6bd530e0d05
SHA1d5643940bed56005268132a826fe53bba50c89ad
SHA256f902df85925c12d7b3cbd2f7350025e0e2f4821d13d5fe6e8d56b8e95f7e0493
SHA512c8cee4bb15bd82587f7126ac0cee48bcb5a3216ada70441cb2e79f71dc87d867277f167afb96bae72fd6af2a76778239171b5bd2dc71b46c421bffcc4c4a4927
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD51da5964ecb9e3132fee7a9049687ba44
SHA18ca4dd040462a201c0d825262d7a82dc1f8fe5a7
SHA256621fac3dcf1ea52788d86009a5a2f64ddd65cf1195048fcf712f128a36ad177c
SHA5125e6e3963f496c38c8ad0824ef63710e593a334f4c4768bddd90a9a549552ec3bb4277c0374bb51427d303508cf573d2730d762f15290e30ac6d7ecc6c9399839
-
Filesize
5.9MB
MD5c9830ce0c4d76baf49c82e8d714eeb29
SHA13fe5404efde6f14d8385deedfcef0429e356abd5
SHA25644e09c144120cc5681c7424b5f7d59281274e0070f59b514486c0b7c387f966c
SHA512034702df196c71fd6fdd17deb0ca134a0b1c8197a677e06408482c7eb68029a2765ad46873fa7b8dd104031875feaf9180ecc36adef9c8ffcaa545b991e65631
-
Filesize
5.8MB
MD5bc283d4d30d172cb3ac9491bd198279f
SHA1d481db7c9ed338f74363688bfd3447e25c3852ac
SHA25688c08f675038f97ec0a490e4f6f60e80f3cf500c7407919de3e6e60a9b82876f
SHA51272113b2ecf7c5f43b4e6f255f848634bc105838f171ab3e754bf7cd370c8af9ba25eab50a47e0d5d4c6111b5025be04165169b294a26c376d8fabad21f0315c6
-
Filesize
1.5MB
MD59a994d678fb05bf73d7b61c76788f7eb
SHA13eb3769906efb6ff161555ebf04c78cb10d60501
SHA25684ca892ab2410acef28721d58067fcba71f0de54ede62ef2fca9aeb845b5227f
SHA512c7c846d6d8d2e43871c1c4471d26c6cfcee29a5b563eca69fef2f4e394767ef3e61a231626a1ff64aaf6a907d66a0cbe9db1c965128e3bab373e406ea891e6ce
-
Filesize
2.9MB
MD5efd35e14043220e2ec5e545be98a442c
SHA1a868cf35dcd96d7e5350a881c0334c77dc5ccb3d
SHA256226e462db2af7de92709a62fd69daf887c48d3d166616c8ede3c56ac16de3cce
SHA51292894619a9ebadef30365054c4deec0d229e3acfe7ad142a65686b24416d4080e2064be073ab6cd7a001741a8a3d1b0729444fcf8e3b11633d190578cfa8970a
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
16.7MB
MD5ef4b5e4dbb0c0cd9c261b1ca7a90e1f1
SHA1916f9b604f06c0879624e5b0da50c845f8881e34
SHA256b84004b60d9ee0ef798bcc43f8344f06bc775198e04b707eb98f79d6260895f2
SHA512af86b1e0eebcfc246d80be6882b55dfcb1f1594e846a584faa49ef7cf7f9f8f1c58e4607805bb474ff5ec8bf5265eb1d8e8ca490bd444196970794b9a632930d
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
658KB
MD50139b5f2565b3c046f2785ef43b48cfe
SHA1b31aab8bbc6548abe2b17e1d8e9a787bc15e1ae8
SHA25674c70a9e45a5dba1040fa34981286f2927b1fbb6b8f5d9740dd51752516eff33
SHA512ce671c3b48c8c553696652648dffc118dad234ed628be3ac6cb27e2b2992e8a5694fa268c57534dc3f0825e4006a68546c05729030832023455e8145c142c7ca
-
Filesize
3.6MB
MD57b8a48c37ff6d0911e1f4ae874405540
SHA1bbce9cc8aed4b3d804dbc992cd6935e74163317d
SHA2563624350ee0f49ab853223107d7dc088862271e239a99b9e19839766d33f148e7
SHA5125d8c67bb04edf8c2b83c3dc1cdf5fe868f2d08cdf58c4a41f7347d13e2128886269a3fe8058e03d80279fad4ee887835c8a383fb40fa237c5b9011e0ff7e1653
-
Filesize
4.2MB
MD5cf2b03d9d058611c11c10dbab952331e
SHA192e2fa1bc0296a6030023b83ba49bfe2c0e2e37f
SHA2564113c14899c6d4986d9536ec4b625cce4aa4c9dca589d0d4f18145cc2106e28c
SHA512410fbeaed6022d150611c37e02af8045764e6bc0c43280184d9e94e4766ea7033004b674f6672189ed3bea95091ea58fe8f289ac181679e48af88a280dbc7ee9
-
Filesize
1.9MB
MD59b37c373d075d185b0979498d9ac7c7c
SHA14d4c3862ba6f1e3a35195ca2d9b23c80a7632eda
SHA256d52ec59339c5ed5f8b09550f85368f07e6652471f564118d1b9995cdf834c76c
SHA512d30077e2e087b114f75b0b9083ff4b6ea252b4ec5f5aa2f5674d5799c1c94e7dbb2637e1de8b0b0af238d285e089973b2bb18cb5be9cba6eaee519fdc5bf1495
-
Filesize
1.8MB
MD5eec43d7407193d2e5cc641dd32cf5eb7
SHA1546d03bd7a176beccfa474cb2f0758765b4dfce7
SHA256dcf5be24c55ebaf35b01b8abc0758ee6ca44f26cb08c93aa259b278c0899345c
SHA512c157e40ea7eaf237090a2ae0ebefd840603825e3bfc4b4ab92be619aa08e59eefdb4d53acbcfb4d8b92d2d0756bb208acfba91a4b148a14b85cbde99bd3ca031
-
Filesize
1.7MB
MD51c1fef9811d5dab911b37eb66caef378
SHA1417655ce3709d01ee796ca4c5cdf5bec71677132
SHA2569185fb673aed0090ef135314924a4f574b909c8767da237c4969910867228db9
SHA512b968ccf7e92a20e1eb8297b8ca79af9d4e2d63e62d3624acd1e369bf9fa83f1f4d3d9147fa1a1a7b7d776959891238ab7e071dbe2aa33fce5e6fc9e9db8246f9
-
Filesize
901KB
MD5a631ed139c1ebcd680664e00f6f7dec6
SHA1d77724604c27d83d98ed1470bf57efaa8a76ada1
SHA2565c2d31720f7847b6580233c642994018ebfce77a8d5ac246b2ff3cfe7a589193
SHA512a5370c99081b2e30540334703f7d241934abf6ef6d66ce3cfd443dc198989891f996da9404db61e6b801df178d2f40444ef6d1a40e0267808dc4f83a5d113978
-
Filesize
2.7MB
MD5170089ee11d2992e666809690cb94607
SHA18e8c7e1fe5a151d61718265892da906d99c7acec
SHA256a3fbe9d79057af6d933560552dc87745d49e243de064fd151a617a40ffe72b75
SHA5124d36600b148b7b26d019571ee7a4667bfb070c7c03a6aa82eeb5a36a0d92cbb27319b47fb2bf9ccb64f299df8c585b0bc79eeba39dabdf4bda4835e17b9d75c1
-
Filesize
4.3MB
MD55b893b6b754f3f28e703ffedd654f6b7
SHA19ac4666663f290ff010c787f6c26b6c80254fd35
SHA256bc959fde662ca2876e219ef21cb9e5280054fd83c54b366dfba33a7a7ed88285
SHA512e2c99a579402a9c070bcdc90af3b4394278d3481be40fe278fa6629132cd35547cd95d37a9ca5bba9f6dae35b5e1a83de8945b499eb876fd47011f3627f6d807
-
Filesize
872KB
MD56ee7ddebff0a2b78c7ac30f6e00d1d11
SHA1f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2
SHA256865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4
SHA51257d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0
-
Filesize
151B
MD508b284ce7c140c99ee73331004fe71c6
SHA1cc31113097f7f318c01f4f3ffc064fabaa03d9c3
SHA256025a55e7b8816db825090150c44f09f86abff997d1707b35f3401177c0876e48
SHA5127bc8c94b08b58c5fa00b98fbc22a23b786afd25c2d9b22bf4d43dcf64cd1109c8752e2621dd80a5020364da77106c7fca64557eec1c84ff654b495bfc8357b3e
-
Filesize
128KB
MD51ed187567d2753bb83ca63ce55c3f4a0
SHA186ded8a1077f793ace059334a35978d3617f7868
SHA25656595ef1a7047b970d9aa072ee402c0ec66319acec589f31f6b4b89648106743
SHA5124df0b61d22e9ae6cc6a80e7a8ef46d8b5ec97b61e05f89b43f311e2af0664aed9e8baecc96012081033e94d99a81c325c43b75a42f797948d199b85b661ad810
-
Filesize
872KB
MD5508dd472a89794e64ad5eeb315f9939d
SHA1fcc1c958d5624bc06aa741d7ddbbcb519521d2e3
SHA256ef279e2eef2f3f56ebac738d3eac31ca1ee46a201998bfe941ccb940b947c221
SHA512884019d1fa05c22f8056ba0cfce3505102dca9a3e97982aa1219070b3a900cdaa8c20805c42679c904bac5bd2994471af8c863a1c76597406c66f50cb569b48d
-
Filesize
7KB
MD5b03d9921e1d7aacaaf23e52c78c1b79e
SHA151a43670848242b683469b5ffd589fb743355828
SHA256337a38b724f6601c3c7b864316642c044a415acbe840ed13b2d62d220ff3fe29
SHA512dfa05516422fe8c2d686a4c3c87c714fabd6596064fb6f3fa739ae747420f7fd1adf464f40e1754bcddf8db67ec0bcb7830a6ef9ef73ac93f28c65ab53617ee7
-
Filesize
1.8MB
MD53ca635061fa9685d799784f665850565
SHA1549bb2808560d826b7be8ea502b46e3cdc101ce3
SHA256373ffb138b7376264a307837ef5bd51bd02380376f9fdd27350cf1b65a28bcbb
SHA5127812edb799fc4ac60c856c61ecd793fb5499ffe433c9bf60e251d4e3e9d5bb4df8d8f2873bb643036ccbb5bc611cc339ad8e8789feec3b3c5834bb72ed887792
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2608_1629953353\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2608_1629953353\a0179ff7-997b-4221-a564-f5f1da67d398.tmp
Filesize135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
4.0MB
MD5fe74fe0adf36e9c6efe8d90cd468596c
SHA132bd69f23e8b58ed031d06d2b9bc971bc866542f
SHA256383c484485eb4a44ff971f0989903da4825528d7cc9a707f39f0a5e44b1ccf18
SHA5128c69566162478feb5a5d58687f02f9278cbec679ba3b045538fefbd70c0a23ad58696a9b7e1d5938f85c648310528afb821540417ab9f800ded4b779e7e7a099
-
Filesize
228B
MD5719c2d69f90c30d6b39366c42153b8a6
SHA1cfb51de58a60a339e87c81a7a70e051d7120c990
SHA256b8f4c5654f7dacb031df816e4c42f5a9d3194bf892e82fd695939faeb856f4de
SHA512535a6bce469d6fb633389c0bba1e50351328eae9122c3b9b09c98ddd8608d6fd15f3a66a5d192bf3fd5580acf26c17d198350b1b21dabeb4dd77afee40685708
-
Filesize
364B
MD5c88e8818dde0a85db3df98d3809fd615
SHA1d13dd2ade4666b20b20f557e8849c5367d40b455
SHA25678cf40f38c501bec247cae219f76cbc458ef966040fafe42940bab4d27e6869b
SHA5125d6f855bc1a32592b68cab680b8855be51efebb8712c9e73ceaba794e39f59166ab8826f8f44ce7e1fea20a1525f93c8491a959166254796883a5b6a54482104
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize7KB
MD58de31463c917a9855b28c77879f382f7
SHA18f9930659478fe0b0a465d267570daa0bb1b084a
SHA256ffb0858fb5b21909c8304fc64dc67042617f019b0963f612217a8f48a04a2698
SHA51221a0cb162bf31b19a99cf6664aee8b96549d911b5a0ee0d5980a308d61f4405f0d0ae7066d80b47acc74fcc89730afe499749817411be4ded376b97fdaad92d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD5ce54c91af52905702d9293e1b03764f8
SHA112bb2ceaf4ade9129743e4d3db14a6a6fcf46869
SHA256373b12d6b4cf7750b1ecddd8ce4ee6faa10989a13dd51c1428117d8ff373134e
SHA51289466cd3aac99bfcd97e62183ac4e0b8b045c18f036b39c1bee4f38f84aea918ed20b19719855089d0e16eed65ae564cbc25f08f41c179d359888c3f0a59dde2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b0a1ed1a6a117cbf18a8b985461e224c
SHA1b3daf8b1af016906fac9d283d4fa37ac07d904d8
SHA2566c2149f24e406495dbd2e6e8fd0e05cafe976efb09287a07601cd0774e74f070
SHA512a69a476375c4bf44ab4db4774435d377bf920f5da8a210a053cc72694aeb0fd95e21f8f2d076927ad2f4abd6de7522118cea87af5158483bb110a3e9e855d790
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5fa42088b1d80b37d523da8ce378ff707
SHA1feb858f0ac3fd73c00fcff113d15f50f54b0b6fd
SHA25685e91879f0761ea3777887016240776e5e23698e9c3fef97413990503ab57383
SHA512d0e5c432d2763db1ce9a3d05975366233332526f2fb2b070ae6e36716fa711933766d328d46da8e23e774ca666a06e8a2a95221fed02bbe48b3fa81048bf4386
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5f4363b45ef4b5a2f46c54fec5dfa9534
SHA16c730fa956ed63d612a87e610ee2471d7bb4c5b4
SHA2565fad6baec9635f6c12c3bdc34740a021a60486107361a2933caad4c2d611e8bc
SHA512f6a66e4771480df55ffaf94df2984a603dffbf550024076f170c6959f24ba9402affd2bda9e56029685eb8cea60ada055e2feb8571116fa311849161b2573101
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD55050536a3e8c801ca9640d17b544913f
SHA1f99b0a03ad8aeca7ce0334ba261199f0c9a93af3
SHA256417243641f34e27b80bc3ac0249352408d08ed08da44308c0e16767dc1fe2393
SHA512d7192701a9e86cb66d5ecc455629f0fab9754afe58a86765573ddab4315129d42d1790bf81b7fc6516ad18c8d929ba9e82e45cfefc9fa475f60f85a161b79d72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\6b5cf464-27f7-49fa-b021-228f86a27c41
Filesize671B
MD59a414a900bf9338ac647d4a8ce62278c
SHA12107594e0853a4b3569bb3750e88eeddd279f55a
SHA2561db9c6b3e6cc3d40db7300e2173bbc967e9a7cf63f9c7aec430c9b87d7461c66
SHA512366586eadf38011fa67219bc3a6ee6a73cb94210f33dae88798ecd2512321bbb73d4cd3f2d062abaa65d9bcd2c274be8ff69ee64430bc522ade36d44318a86ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\74b0cf77-820e-448f-aa11-041c3773e189
Filesize25KB
MD5a2482363f9fc1385b3480c11afcee4a8
SHA14b5e1b4b9d52cefb21c8092ba0c74b7d163d2c07
SHA25627d91a645556453cc995c28dae80d1419af38891a01c169f8bf7774df7f663fe
SHA51276b7be6d236f289fd30eb9b8d8a0e3a48f51826a825d1c7c155a6529d182e6160001bcdc767f30856b796871bed6549077b6da080589db991611e8e244ad1573
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\ab833fb8-03b1-4d6e-9157-be22c3fab641
Filesize982B
MD57bee62bcef4228a4995298f2cef2b2d2
SHA1739ae26c6d0d8b988513691d294227cc816f0c98
SHA2563029aa61a5110349e84c9a8a60812ef48de03328682b3b4d7cd3ec00e540b3a8
SHA5129624ec075737663ad5767b7f57ba2cb9fd9faa32dc9804614cc7c6058b4d8796c4d1ffc1cf6c658118d8da49dc95f42d7c8724b6c73f21b54052435fa631576e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize4.1MB
MD51561fa43c015a43854f6a38de57f1f51
SHA1e37e89077c5cf72d781bb24ced530bee275c0b32
SHA256eb5b662bd608e68f6e5087c8be6aa1da5afd08f5a69f2cd7f9bc84e6963fb15d
SHA512e0606c4fb0b0672133e62916987e52f0d3fb6e6dc628b18c4fd955749f1c710a4e58c7b25b3ef2213856b3eecf5cd4cf86f762c65a67146e628af4f04664f603
-
Filesize
12KB
MD5fa7b411bcc8c2a2d1cd69fdb66fe6deb
SHA148765773484e49eab0b0fc1ea3b6b89f4461687a
SHA2563ab33e6187761f4ee2b9b41bd32498ab9428926e6b6938f2b4613b21f098a4da
SHA51236e8a87ae6d184d25013f0cefec1d8e134d9ff62925c1b959cc5b6b19f76aacffb3c7a851483ff99633d65cf4326a9a7fe1160b2a9283d524f7f11733789a722
-
Filesize
11KB
MD5af146513edc0848d49ab92c5b7ea4058
SHA18eb61ac8ffef462f9314eea21923f76709fff444
SHA2564395dfb8d3336c9e2eeb3073a1bb286ec39ac0aa9eb0dd5bf77bff929b67eb7b
SHA512e7978488c7badab823b4e24c017c4ef243c4944aef9b85cc6de8f06199c2d557958f29ff8cc1bcd1ed681cacc5bd56722845b03bdacf7c60bcaa7d3116cdab9c
-
Filesize
10KB
MD5f8ec86a7b4c6b01cd6ffd91d4727aad8
SHA1529f32b4b7260f2bc4c7d3a15a4b0ba3adaacf67
SHA256c342b3beac7c76e81bc39666437f503ff52d86120342559d54068a0deb77c0e6
SHA512e7d17caf5caec6de009005ecb7e656982cc5f4eb1d8adc2777b48cf9acf64e97810c972176f81c94546598208426df004f1a26b3edb58c6b1be832ef0d624efb
-
Filesize
10KB
MD5cdcbe0c633a2f05df438b28e1488c9b4
SHA16c50f7cbe908fb94f17743b4b5e07b923b2c698c
SHA256e2d3757b3e29a8c0a89e75f1bf1ac9d6c99a213f4799aba64b0970e1a29c602a
SHA51273e6210ea7459e2ce25acb41ec8ed787ed41c71514a0d9ace95af8c2c8d74572461456dc77ef725b6d879c7afe9dbc04957eef21de1d2c21a8877001363321fa