Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 00:25
Static task
static1
General
-
Target
9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe
-
Size
7.1MB
-
MD5
0c9a696429594b3cb9a9ced6bfc25ffc
-
SHA1
f6de5ebe7ce7626911ed3cf52eeeaac7a240c603
-
SHA256
9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33
-
SHA512
6242b8026c4764fbdf0e44e5d5ad65aee93c59aa4a01adfc14e6781cc7287e5bf073bba01333103fa6ae4fbec27fa996491fe1994d33bf90eee80dbede3c92f2
-
SSDEEP
196608:lpldMjDLPBU3Fi8AhDflcNfbuM2NGQsg7FIg3:lTO75iFTADflyfb7deFZ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4v761W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4v761W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4v761W.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4v761W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4v761W.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF afd465cffc.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ afd465cffc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1feb121f52.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e93fa218c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a720e55c5d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f68p9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2y0194.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3D63H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5ef582bc0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4v761W.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3136 chrome.exe 5080 chrome.exe 6384 msedge.exe 6876 msedge.exe 6868 msedge.exe 3620 chrome.exe 4056 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2y0194.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion afd465cffc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e93fa218c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4v761W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1feb121f52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3D63H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5ef582bc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a720e55c5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4v761W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1feb121f52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3D63H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5ef582bc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f68p9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2y0194.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion afd465cffc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f68p9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e93fa218c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a720e55c5d.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1f68p9.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 4740 m6f43.exe 4728 k9S39.exe 5084 1f68p9.exe 4956 skotes.exe 3084 2y0194.exe 2692 afd465cffc.exe 1924 1feb121f52.exe 2480 3D63H.exe 3580 e5ef582bc0.exe 2524 bdf1223090.exe 6088 2e93fa218c.exe 5640 a720e55c5d.exe 1924 4v761W.exe 6744 skotes.exe 812 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4v761W.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2y0194.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine afd465cffc.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1feb121f52.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2e93fa218c.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1f68p9.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3D63H.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine e5ef582bc0.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine a720e55c5d.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 2480 3D63H.exe 2480 3D63H.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4v761W.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2e93fa218c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2e93fa218c.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2e93fa218c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011106001\\2e93fa218c.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" m6f43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" k9S39.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1feb121f52.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011103001\\1feb121f52.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e5ef582bc0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011104001\\e5ef582bc0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bdf1223090.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011105001\\bdf1223090.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023c92-117.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 5084 1f68p9.exe 3084 2y0194.exe 4956 skotes.exe 2692 afd465cffc.exe 1924 1feb121f52.exe 2480 3D63H.exe 3580 e5ef582bc0.exe 6088 2e93fa218c.exe 5640 a720e55c5d.exe 1924 4v761W.exe 6744 skotes.exe 812 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1f68p9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3848 3084 WerFault.exe 89 1504 1924 WerFault.exe 101 816 1924 WerFault.exe 101 3332 2480 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k9S39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afd465cffc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5ef582bc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e93fa218c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a720e55c5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4v761W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m6f43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f68p9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1feb121f52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2y0194.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3D63H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdf1223090.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3D63H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3D63H.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 3404 taskkill.exe 2020 taskkill.exe 3128 taskkill.exe 3284 taskkill.exe 4044 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5084 1f68p9.exe 5084 1f68p9.exe 3084 2y0194.exe 3084 2y0194.exe 4956 skotes.exe 4956 skotes.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 2692 afd465cffc.exe 1924 1feb121f52.exe 1924 1feb121f52.exe 2480 3D63H.exe 2480 3D63H.exe 3580 e5ef582bc0.exe 3580 e5ef582bc0.exe 2480 3D63H.exe 2480 3D63H.exe 2480 3D63H.exe 2480 3D63H.exe 3620 chrome.exe 3620 chrome.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 6088 2e93fa218c.exe 6088 2e93fa218c.exe 2480 3D63H.exe 2480 3D63H.exe 6640 msedge.exe 6640 msedge.exe 6384 msedge.exe 6384 msedge.exe 6404 msedge.exe 6404 msedge.exe 6404 msedge.exe 6404 msedge.exe 6404 msedge.exe 6088 2e93fa218c.exe 6088 2e93fa218c.exe 6088 2e93fa218c.exe 5640 a720e55c5d.exe 5640 a720e55c5d.exe 6404 msedge.exe 6404 msedge.exe 6404 msedge.exe 6404 msedge.exe 2480 3D63H.exe 2480 3D63H.exe 1924 4v761W.exe 1924 4v761W.exe 1924 4v761W.exe 1924 4v761W.exe 1924 4v761W.exe 6744 skotes.exe 6744 skotes.exe 812 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 6384 msedge.exe 6384 msedge.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3128 taskkill.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeDebugPrivilege 3284 taskkill.exe Token: SeDebugPrivilege 4044 taskkill.exe Token: SeDebugPrivilege 3404 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 1996 firefox.exe Token: SeDebugPrivilege 1996 firefox.exe Token: SeDebugPrivilege 6088 2e93fa218c.exe Token: SeDebugPrivilege 1924 4v761W.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5084 1f68p9.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 6384 msedge.exe 6384 msedge.exe 6384 msedge.exe 6384 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 1996 firefox.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe 2524 bdf1223090.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4740 4688 9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe 85 PID 4688 wrote to memory of 4740 4688 9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe 85 PID 4688 wrote to memory of 4740 4688 9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe 85 PID 4740 wrote to memory of 4728 4740 m6f43.exe 86 PID 4740 wrote to memory of 4728 4740 m6f43.exe 86 PID 4740 wrote to memory of 4728 4740 m6f43.exe 86 PID 4728 wrote to memory of 5084 4728 k9S39.exe 87 PID 4728 wrote to memory of 5084 4728 k9S39.exe 87 PID 4728 wrote to memory of 5084 4728 k9S39.exe 87 PID 5084 wrote to memory of 4956 5084 1f68p9.exe 88 PID 5084 wrote to memory of 4956 5084 1f68p9.exe 88 PID 5084 wrote to memory of 4956 5084 1f68p9.exe 88 PID 4728 wrote to memory of 3084 4728 k9S39.exe 89 PID 4728 wrote to memory of 3084 4728 k9S39.exe 89 PID 4728 wrote to memory of 3084 4728 k9S39.exe 89 PID 4956 wrote to memory of 2692 4956 skotes.exe 95 PID 4956 wrote to memory of 2692 4956 skotes.exe 95 PID 4956 wrote to memory of 2692 4956 skotes.exe 95 PID 4956 wrote to memory of 1924 4956 skotes.exe 101 PID 4956 wrote to memory of 1924 4956 skotes.exe 101 PID 4956 wrote to memory of 1924 4956 skotes.exe 101 PID 4740 wrote to memory of 2480 4740 m6f43.exe 105 PID 4740 wrote to memory of 2480 4740 m6f43.exe 105 PID 4740 wrote to memory of 2480 4740 m6f43.exe 105 PID 4956 wrote to memory of 3580 4956 skotes.exe 106 PID 4956 wrote to memory of 3580 4956 skotes.exe 106 PID 4956 wrote to memory of 3580 4956 skotes.exe 106 PID 2480 wrote to memory of 3620 2480 3D63H.exe 111 PID 2480 wrote to memory of 3620 2480 3D63H.exe 111 PID 3620 wrote to memory of 1712 3620 chrome.exe 112 PID 3620 wrote to memory of 1712 3620 chrome.exe 112 PID 4956 wrote to memory of 2524 4956 skotes.exe 113 PID 4956 wrote to memory of 2524 4956 skotes.exe 113 PID 4956 wrote to memory of 2524 4956 skotes.exe 113 PID 2524 wrote to memory of 3128 2524 bdf1223090.exe 114 PID 2524 wrote to memory of 3128 2524 bdf1223090.exe 114 PID 2524 wrote to memory of 3128 2524 bdf1223090.exe 114 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 PID 3620 wrote to memory of 4380 3620 chrome.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe"C:\Users\Admin\AppData\Local\Temp\9f0f1bc4cda689d5382b6b279003e3d92d24539e9d5f5ec08cf21cb0d5785d33.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6f43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6f43.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9S39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9S39.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1f68p9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1f68p9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\1011102001\afd465cffc.exe"C:\Users\Admin\AppData\Local\Temp\1011102001\afd465cffc.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\1011103001\1feb121f52.exe"C:\Users\Admin\AppData\Local\Temp\1011103001\1feb121f52.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 15287⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 17247⤵
- Program crash
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011104001\e5ef582bc0.exe"C:\Users\Admin\AppData\Local\Temp\1011104001\e5ef582bc0.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\1011105001\bdf1223090.exe"C:\Users\Admin\AppData\Local\Temp\1011105001\bdf1223090.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:3532
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1924 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b73c26c7-3504-47b0-9cd9-c130ebbe8215} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" gpu9⤵PID:4952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2444 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca99752f-f172-4851-895f-0b4ca977b989} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" socket9⤵PID:2128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3096 -childID 1 -isForBrowser -prefsHandle 3088 -prefMapHandle 3084 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {629ce474-0402-4d88-a302-74a6a715a5d9} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" tab9⤵PID:4864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1136 -childID 2 -isForBrowser -prefsHandle 3948 -prefMapHandle 3944 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74ad8dc0-68aa-4d3a-b87e-0b34df5062c6} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" tab9⤵PID:4044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4716 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4296 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43c58039-5a1b-40d4-a418-76ec93fac529} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" utility9⤵
- Checks processor information in registry
PID:6756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 3 -isForBrowser -prefsHandle 5196 -prefMapHandle 5192 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e604e6fc-f12f-439c-85a6-4b1dd2170e29} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" tab9⤵PID:4420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 4 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b35073f1-af89-4927-895e-66c726154396} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" tab9⤵PID:388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 5 -isForBrowser -prefsHandle 5556 -prefMapHandle 5540 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eccf4e06-a3ba-468b-bc28-ad93698157c3} 1996 "\\.\pipe\gecko-crash-server-pipe.1996" tab9⤵PID:5292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011106001\2e93fa218c.exe"C:\Users\Admin\AppData\Local\Temp\1011106001\2e93fa218c.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
C:\Users\Admin\AppData\Local\Temp\1011107001\a720e55c5d.exe"C:\Users\Admin\AppData\Local\Temp\1011107001\a720e55c5d.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y0194.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2y0194.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 17245⤵
- Program crash
PID:3848
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D63H.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D63H.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffa07d7cc40,0x7ffa07d7cc4c,0x7ffa07d7cc585⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1852,i,11965444153259807992,5322456114698411921,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1848 /prefetch:25⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,11965444153259807992,5322456114698411921,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2060 /prefetch:35⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,11965444153259807992,5322456114698411921,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2300 /prefetch:85⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,11965444153259807992,5322456114698411921,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:15⤵
- Uses browser remote debugging
PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3244,i,11965444153259807992,5322456114698411921,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Uses browser remote debugging
PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,11965444153259807992,5322456114698411921,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:15⤵
- Uses browser remote debugging
PID:5080
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:6384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffa067046f8,0x7ffa06704708,0x7ffa067047185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:25⤵PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:6640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3008 /prefetch:85⤵PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:25⤵PID:6784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:15⤵
- Uses browser remote debugging
PID:6868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵
- Uses browser remote debugging
PID:6876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:25⤵PID:6908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2492 /prefetch:25⤵PID:7036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2516 /prefetch:25⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2508 /prefetch:25⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2572 /prefetch:25⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4112 /prefetch:25⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6788987267931680011,2616140393100748605,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4176 /prefetch:25⤵PID:5272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 25204⤵
- Program crash
PID:3332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4v761W.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4v761W.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3084 -ip 30841⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1924 -ip 19241⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1924 -ip 19241⤵PID:4732
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2480 -ip 24801⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6744
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\856b054b-647b-42d3-882b-e212c6415851.dmp
Filesize10.5MB
MD59b926ce23f7598c130f61d5794146569
SHA18ac68bc655bcfc17a7ac57cef5e9e67dc1ee2ccc
SHA256b6215d20b1f0cdcad3ebae4a78a0b80741140bf714529dc9a52f3bc9c061d52e
SHA512728fdeb4fb79fd3a7688dc435fa2f295e6ad3417446b5d5236bf2711c4352f3f4c4916e8551243960a4e744319862d57c7658dcaa46fcab731700571317fe4a0
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
5KB
MD54234f5d6484f05ca807f4d8811dc6d14
SHA1b6ea7d6e68e8f4ea1204611dd8705de01ff0dd3c
SHA256166b37a308a7dbbdfbdf0e32356eb411c5515ee585f950cb6d36dfe38841f721
SHA512d5640480f5aada685eb10d3fabfb2417d77518ea2c5dc1a77ed68171e28b5082d897dd6fbd3ceb85572b5afe75da421301d4d811e752df147f04cc75b27883e1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD558067a45b3a12b5c5fb5e0dde53541c2
SHA11186eb7557f2378eef74aeef49409cb2605e5ab9
SHA2563a39aeb233401eb4d3e6d3b85ae638c6f5500faf0b570277be6bc1da20bd0281
SHA512003ad55457fdbc5c4383bf667bf2f7f7720cb6cb2a264490ebbd2ba023da0be99b86d70573fb393a2468faa2deebc8d6feec300d5236b975388fbf7d0bee5bd1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD55e217a04fe20e88cc3492d2e0a59ed36
SHA12dabb08200b81d080712b30b677b8f0377dbac90
SHA256b602749c9c2590f2c143d70163ed303804d83434b42e866d1629ecc2806c0366
SHA51278cb694084231e52cba4b9929e2e8c495c3b1863dcc63680303ef7fbc5f2d3a3056f098d578400c62bb2a8e3e6e0aaa1074fc13e2eae8d530057af171a6ad20d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b473af1d9c7962f41c02910ab891961d
SHA1ac67154f63492ccdb8e645702206724045e922f1
SHA256e1e16f179bd31d8b5aa604b5ebdb7b6a1d68476692dc1aa4c7683d361f4a9bf1
SHA512ddfa20b6f840bf3992582cac228aca4e5e66286d13fbb8793c2222bc470e2bfbd25909385ce726079755b99bd0483e43fe1927855a60a394cb963d72f42cca03
-
Filesize
4.2MB
MD5bd6d6662b11f947d8480c6e9815c3ef3
SHA1b5ecc2be2f54b7849b8c948bbd91cef25028ce41
SHA2567191093754402a6cc5ee460bafef859de07ac2bbf91ce56c6b56a91d3020c2e2
SHA512242a995d3c3a123401d7776b1b5b373d7d117566a897e3e8ed2fe07faaff3dfda01daca76cc60012a6480412f6118b5185926677bb61678bdb3cca336a36e8fa
-
Filesize
900KB
MD59c8ad56dbcf96c7a218527052dbcc1ac
SHA1436d49c9bfc1792e7a4104fd78f4351c52e4bfa7
SHA256369cd63963a9d00128d8c89e99521c8a7c47296a10f8779c9b0f22af9b3e1c78
SHA5123d005ee5248106bc9ea1c629225d3eca0ff4189666976b63db184e498f03b9a8e15e8bc7a701e49cdcdc7d67c36a0ece5ffc7cd6c9e96b9ad65aa51175135465
-
Filesize
2.7MB
MD58645cc60ea0d7f3f64d87a95c9059377
SHA19ef12d226d49bfb6daae661bb41e83ec7a5df672
SHA256889ef406ae4e3e9db8e605eedfda2f42174580353d6886044d7d61354bd03cd0
SHA51207c5eaa6869a1123f7479416a47d404fce95a41a5551c8586c098745f0e4dd0a28ea5da1bcfd7fab3444564e57cf228bd904e02810d481f2462bf4644af83f11
-
Filesize
1.9MB
MD57d9e81071dca4ffd98fdaa3a59f3d4c2
SHA17d717efa51114a837b32435a11744536e086b324
SHA256a8f6e1f06ce798c9a24a7406366b8abed6f82097e593a8390c48b612f9e4d69b
SHA512b641f3aafc38851503f3e9f1883c809fb3c73a7042c953b8c7416c133fd7e1770f427598204dd8411b68fcdba05ce21981090792cc5d74b7fb4c7b30c8947be8
-
Filesize
5.5MB
MD51a498aa419f8b6b2b8b55edc0b5a0717
SHA17d55f6eacdd7d19bfceae2980cf3e91bb4312761
SHA256429ac5ae76da86205992697e6fcda3de63cd479a0aa2ff4692f3ac58d671ee78
SHA5126c7c76a154001371f9eb780ac28274139d2e53a38eef6fb184c4cc13c6ccbd122f12181c6355eb68022f6bce473eb4048cc890ae5f20f5b77141cb23c6d8df75
-
Filesize
1.7MB
MD567a3f36d09e43df0dc573740f80c383d
SHA11e46691a92586a72111174070f8e6772fd045478
SHA256f5bc3eb3ce1e72dc332853f436784bb44f53324463514b78356cc711fc8653bb
SHA5120200be8eabda8949549ae45cf0a55ac43449c84af8707d26f13a1806ce9afd1556fc7371be933cb196d1bed69d2a80ce43ae7c0f7bb354d7d5d498d37c91e5a9
-
Filesize
3.7MB
MD5d2efeedacf1cba7e7d0f62346e0b7c3e
SHA14e09098a6d604fbe9d73047073f663ba510e12c7
SHA25626699c43c93d8b2983a1eb69f5f4f5f35054bb8027d5f5a9f122b680ad2b02cd
SHA512ea6a64a2d30264061ef6017bbecb84f69dfb36dec64cc479d31c5f580f5976d0e26938a483986bdb240327127be1364cf8698cd9b4c719828cea1c10b2316255
-
Filesize
1.8MB
MD56168d17233fabf78c99b2332ef567ee8
SHA1fc01ec2e16bb741ddacf14c25eca3d7e2c502b95
SHA2565aaa108b8e6e927fe2cf2ae6280d54bbc78b779d2bb31f171846f216ebeeb0e7
SHA5124398c14274e147ece5faa6d707b837615724e1b410a42eee95fcb099ba405d71b998be230fa4c20cb1f42d36f5fa65bf9356226ada7f8d7a34cac62b4d1a29f1
-
Filesize
1.8MB
MD5b670ae6d2db43ba12d14b7e29d02eb3b
SHA135cd2df71bb0acf5a161b4d4d60ffcf220822490
SHA25623ec194caafa831e65e924bd7513771b81a44c8447232f80ba23a7a571c6aa98
SHA51239daa37162b922c1b0592e1585ca185940e1c94ce7210f487b821aab7ee48b2ba1498e5843cffa0d0cc96277cbad037760f5a3f11673c0c5ae8af91cb5d7f2a9
-
Filesize
513KB
MD5b915a62629ddc756520597edb1944df9
SHA1e1ecb983b3ab6fdc58cd7a08b11b32f603c843fc
SHA256618f5770a6559cb4ca51b8f54c02751039802bf2dbabca0bc95111315ca47023
SHA512fa8d800caa3ecca0033bc2816faaecab3d8fa839b392cb0b91a1bec5c9ac2efccf1e45d87542d73f9360a65636f9af4fc863447615bef9b268ca3b1bba67a856
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize18KB
MD59df1d983eccbbddbe718ed4474439e4b
SHA1510a3fb711536c063659d99f579705fd227a6bdb
SHA25601bed26c9799ee38b5a28d076d374084a454d8c86d2d9c5ff5ac29a7d9c78bc6
SHA5128505d46992dac19308c0751710b1d7ca5c024d7e3b0eb19d7b3299a4ec0d6ea552cf2c9e129fb78af1e8a0e23c0c2b3129a83a1a8b60a49855dc26d7f99a63c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD598cfe0708c7c704b500fcbe6eede0ca5
SHA1d17cd16702d623defc6e8afc006bb6f47ff1ec06
SHA256bc7ad1a1272db5a9a91ad52fabc7183a3a5efc4d214a80419c56d79f9ef34c45
SHA5121346fa4ae3b8d83ed03112038a61d67be31c475540d1d5b9194bd3f810dfb7582fb390328b4d0ce8b1beaab0eaaef786c57709232919194666300f09b67153ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize12KB
MD58133098ec1cd780479e37b31a85f5a39
SHA1c97f1c48834c4fd928c666b71e49d6c01912d875
SHA2560014b8fb059d59ca78446581024b5fc966dd513f9368ae4617819c3c370d58d9
SHA512d6a04304954c194898d28e03597af719912384fa702ce708e0005074b6d831fa4214e1b53b4eeb384c57c133e5d31ec1e6673f7046ddae5b2496b9193a17e913
-
Filesize
256KB
MD55335fce10f380162b66b80a30305654c
SHA1d35df069c59b6f5ac229c9fc8d3cd992a16acce5
SHA2565252b24ee4100bc60a0b4e17fc6b7b0dea16b5f7ad6e441adb24dcf42cbfd163
SHA512cfaf3f41a586e93ae8db61eca27ea7d0d88884b7365a52b8574fc2842a074f7d139eb300b6ba575c2458aa03b7b7fd41f9eea6f553c224c309405fdf42943e9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD59717fcc1eafd5770fdee92f06c56429e
SHA1108ce5380d1dbccff5ed68a9c56c8326d69d3533
SHA2562035aa24927b494df01886367b1aa1eb3443a8da8ccf8cf8310fa6cfd44c7dc4
SHA5128ff4caad14feacabfeaf88bd4050a495b77e1fd3fe8963d123f68f552016dd24ce952f0174d2258ce3f3f6609f25ab56872e412da50ddcdf043f3ad5cc5e57c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD545b0c281bfae8341e50cc90a1d164a29
SHA16a552cacc7eb23900d9b64109c22b65230d62c9e
SHA256194da076ef7cfeb7649b30531ddef6300eb59c40b26de2a5c137bbf169671a58
SHA512363b0a15d017b597a2010e8f8ca70d402930b69154e9836752e7559d586633fe0f71467c81b677d3525dba2c92d806862673da90c19c3e26ba3f152874445c4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5fecc6ba08bcef78b8fb2a3065c1fab1b
SHA13463f973be1f8772ad89b6aef34466eee9e637c7
SHA25601a54e6af04efcd50008743f0509aa7c1b03668aada88c1d8d426831a4ba1783
SHA512d743fc45b29bbd753fe7f4e8cb4bb5a97ddac272ef8775c3bf52e76a6b27883627f6f710262d77021badae7da84260069b008277470e956a42ddc7eccbd42457
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5d3cb2e3a0e6f8cbabcc5627378727cf2
SHA100abba037c0b6891459dfcd30683c03e0aa98c8c
SHA25632ead3d4ba6e4bd003ea429895e3790e2f9a1c1d1da2ad8b4d6f43cc5e899a18
SHA512c0963470dc8d4b07f9acd47c35b82b74508935187c00b3772d7410e25456f85942093aa122f524db2f3129243b0a87152fbf20d0cea659c4782560f07da8bca1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5ffbca5cc3351839c6d6cf06226a63a67
SHA1390d52df003247c06f90fe9362e17855c087dee7
SHA256844636382e07638f4ed2e11824c425c9291672a6f13443c52df663762c46ed17
SHA51257f8f31c723d66acc408611db9bd0b99e19f3ee19e070c4b962ec72ba322c8fddfc27993a008516c49d91b1c214a177729ecf10b9dd00db9120c9a39aaf1e5a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5768dd118cc3aa8e22c2594c4ca9a2438
SHA1000651e97f4c2d9929bb2be6feeb1b5fd223945b
SHA256ba1ff14c9c74a85f664486328f32a236dea4ee667e80bf71646514c0b445f072
SHA5123a2c773c29e945a80e716c4bca10b037f10c43658c626a07e260211e3b1d00475aa7bec74d670c9768587748e8771db113ef41721cddb8de64f10e7ddcc8be2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\c5382acd-ed0f-4c4c-b40d-01da7d21b3c7
Filesize982B
MD5fdfe69b3ff5748cd5fd01f330693cb77
SHA17dbc87ba2a558e6e0c0e20b1bedb4ff46b96e370
SHA256beaa024ba8b167d5dfecd2448f7ed455c2578ea36491b4d68582aed74db66e51
SHA512e1baca29971e08699a31846311867eb9534d27a35dbc5dd23b5244807273977ec2900706740f7adaee6826cacdd3fdce2f06bab85e4bec70695a92f3b3a9e065
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\fd0a04d4-b963-40f5-a07d-c3824d3669ca
Filesize659B
MD528ffcd60398d8181ad5bf7dfc0667c78
SHA19d66d5ab9bfde6534b39e695776c9c0317cec439
SHA2568618ab08453ed10556cb1265b7f98265047601abf4540bb3b35796b1fe06f53a
SHA5121a42ae4078152773721fc928581ead3efbdd5ac3f1b46e90a9d5a0a2a0a6394555e8d3b209738a6024a52708f462e0a1554fadfce0651123bbf34f4fa14a9419
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD59d7949b4641bc0944df7d47ee730c49d
SHA1e39a3637c9669c82f30d1281dd3327f8278d3c45
SHA25634c06ef281993fabc4394aa4873efa1ebd351c7745b90f7761a346374769955b
SHA51295752ffbfe7588c36ee338b1d27b92224fca3fc80a85889af47a853879fcf0205f0781ada93057c97156d68da5179bf94a50af2bbe51ca270163ace5fafd317d
-
Filesize
10KB
MD52297b63e65d62f479498eb510f244252
SHA1593e3e154c7a0f246e07533605cdf46fdb4768e4
SHA2561a8be5bddad06f7ac1a0925ff786583bf66466ad17608703743062cecb8b0859
SHA5126c8269d3a5f42117db5dbca380a420766b47f1d8b4cbe1731ac6f10ed61e23f54f998745775541b4a30db9183a9cd1e4b2e08cb031803a6527120a13df8d1c7b
-
Filesize
10KB
MD582e660f9e98db4e1dc8e9cc57537ea95
SHA1f8f11ed515ed24cc477fe24e4080842718057b87
SHA2568d7919e42aed1ee7bf091c8970d02a64d872df1ffc21946e36018d7449390d76
SHA5127c5a5be9f9663ae459d30bbb6fac74494ca371b1d925943b0be9ed1d20816dd2e1c6d62861678a222e0c97c38b370f1974d4d6ff44fe7360daa98dd62966d776
-
Filesize
15KB
MD5a59adb175efe758a6c0c56dc07e17737
SHA1ee0da9dc6e187dd1d550d536e9abb156ae8db69b
SHA25687bcda13c2b84c8885d558085b1b313740d36be8abdd6fc44db71cea417e81bf
SHA51270c19089886a75623f236bc9a002fa6e27df2deb3d5937c1a89912cf1bcc9dcbe5f892a7d60423840c36cadc96f3711345bdf66843da1a1cdb2f95569455d2d9
-
Filesize
11KB
MD5f4ac186d6161d7a0b12def036366f807
SHA14b346b7216e670f6dfd838e4edd7d6ebab4f8fc0
SHA256369b95a72413e5c853d55c8d726073c5258e435cb753ab712481af8f5805499f
SHA512737c3455322de0d4b4240b06e8e6023294cf4c323ce2a3ee69a31294331a4154ae6d6972e204881334ffac22d95cd87701b5459214a900f2160a31084c90d6f4