Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe
Resource
win7-20240903-en
General
-
Target
5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe
-
Size
1.9MB
-
MD5
c801c7a0284db76d7e8774811061ec52
-
SHA1
856a65d648fa4f89ec16f4e68703314445b601a9
-
SHA256
5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3
-
SHA512
0c2197f830aa8fc57cd0904a17847ec4d956d0aeefd76da7d594c7320cc5bdd251474df06ced72b42241c9e097395abe9374ffff317009d2d422b2ebc5835282
-
SSDEEP
49152:DAPad9zzlGb1kW6gLzW1qngDOg0ZPzh2qQM2VBj:DMa/lGv6GzW2gDOggPZQM2V
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection fc16cc7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fc16cc7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fc16cc7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fc16cc7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fc16cc7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fc16cc7184.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b192ca353c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc16cc7184.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ acb6b2c62f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d281bdfc2b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IECBGIDAEH.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4664 msedge.exe 5628 msedge.exe 2036 chrome.exe 5668 msedge.exe 1580 chrome.exe 3944 msedge.exe 5296 msedge.exe 516 chrome.exe 2680 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion acb6b2c62f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc16cc7184.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IECBGIDAEH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b192ca353c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d281bdfc2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d281bdfc2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion acb6b2c62f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc16cc7184.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b192ca353c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IECBGIDAEH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation acb6b2c62f.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe -
Executes dropped EXE 10 IoCs
pid Process 2788 skotes.exe 3404 b192ca353c.exe 4924 acb6b2c62f.exe 4440 f60d057e38.exe 6112 fc16cc7184.exe 5268 skotes.exe 5644 d281bdfc2b.exe 5292 IECBGIDAEH.exe 6204 skotes.exe 6868 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine b192ca353c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine acb6b2c62f.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine fc16cc7184.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine d281bdfc2b.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine IECBGIDAEH.exe -
Loads dropped DLL 2 IoCs
pid Process 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features fc16cc7184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fc16cc7184.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b192ca353c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011132001\\b192ca353c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\acb6b2c62f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011133001\\acb6b2c62f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f60d057e38.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011134001\\f60d057e38.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc16cc7184.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011135001\\fc16cc7184.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca1-86.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 2788 skotes.exe 3404 b192ca353c.exe 4924 acb6b2c62f.exe 6112 fc16cc7184.exe 5268 skotes.exe 5644 d281bdfc2b.exe 5292 IECBGIDAEH.exe 6204 skotes.exe 6868 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1308 3404 WerFault.exe 88 2564 3404 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IECBGIDAEH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc16cc7184.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d281bdfc2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acb6b2c62f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f60d057e38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b192ca353c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f60d057e38.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f60d057e38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString acb6b2c62f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 acb6b2c62f.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3960 taskkill.exe 4600 taskkill.exe 1132 taskkill.exe 3900 taskkill.exe 1980 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 2788 skotes.exe 2788 skotes.exe 3404 b192ca353c.exe 3404 b192ca353c.exe 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe 516 chrome.exe 516 chrome.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 6112 fc16cc7184.exe 6112 fc16cc7184.exe 5268 skotes.exe 5268 skotes.exe 4924 acb6b2c62f.exe 4924 acb6b2c62f.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5996 msedge.exe 5996 msedge.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe 6112 fc16cc7184.exe 6112 fc16cc7184.exe 5644 d281bdfc2b.exe 5644 d281bdfc2b.exe 6112 fc16cc7184.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe 5684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 516 chrome.exe 516 chrome.exe 516 chrome.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeDebugPrivilege 3960 taskkill.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeShutdownPrivilege 516 chrome.exe Token: SeCreatePagefilePrivilege 516 chrome.exe Token: SeDebugPrivilege 4600 taskkill.exe Token: SeDebugPrivilege 1132 taskkill.exe Token: SeDebugPrivilege 3900 taskkill.exe Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 1596 firefox.exe Token: SeDebugPrivilege 1596 firefox.exe Token: SeDebugPrivilege 6112 fc16cc7184.exe Token: SeDebugPrivilege 1596 firefox.exe Token: SeDebugPrivilege 1596 firefox.exe Token: SeDebugPrivilege 1596 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 516 chrome.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe 5668 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 1596 firefox.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe 4440 f60d057e38.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1596 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2788 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 82 PID 2216 wrote to memory of 2788 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 82 PID 2216 wrote to memory of 2788 2216 5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe 82 PID 2788 wrote to memory of 3404 2788 skotes.exe 88 PID 2788 wrote to memory of 3404 2788 skotes.exe 88 PID 2788 wrote to memory of 3404 2788 skotes.exe 88 PID 2788 wrote to memory of 4924 2788 skotes.exe 91 PID 2788 wrote to memory of 4924 2788 skotes.exe 91 PID 2788 wrote to memory of 4924 2788 skotes.exe 91 PID 4924 wrote to memory of 516 4924 acb6b2c62f.exe 97 PID 4924 wrote to memory of 516 4924 acb6b2c62f.exe 97 PID 516 wrote to memory of 3484 516 chrome.exe 98 PID 516 wrote to memory of 3484 516 chrome.exe 98 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 4824 516 chrome.exe 99 PID 516 wrote to memory of 464 516 chrome.exe 100 PID 516 wrote to memory of 464 516 chrome.exe 100 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 PID 516 wrote to memory of 4980 516 chrome.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe"C:\Users\Admin\AppData\Local\Temp\5d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\1011132001\b192ca353c.exe"C:\Users\Admin\AppData\Local\Temp\1011132001\b192ca353c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 15564⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 15404⤵
- Program crash
PID:2564
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011133001\acb6b2c62f.exe"C:\Users\Admin\AppData\Local\Temp\1011133001\acb6b2c62f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbfd21cc40,0x7ffbfd21cc4c,0x7ffbfd21cc585⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:25⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:35⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:85⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3372 /prefetch:15⤵
- Uses browser remote debugging
PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4476,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4556 /prefetch:15⤵
- Uses browser remote debugging
PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:85⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,13922143776457510473,10406446398803736648,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:85⤵PID:1540
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfa7446f8,0x7ffbfa744708,0x7ffbfa7447185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:25⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:85⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:15⤵
- Uses browser remote debugging
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:15⤵
- Uses browser remote debugging
PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:15⤵
- Uses browser remote debugging
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:15⤵
- Uses browser remote debugging
PID:5628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:25⤵PID:6404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:25⤵PID:6544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2864 /prefetch:25⤵PID:6680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2556 /prefetch:25⤵PID:6896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2228 /prefetch:25⤵PID:7072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2544 /prefetch:25⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3488 /prefetch:25⤵PID:6412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17218088505498668312,10389820739119745469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5268 /prefetch:25⤵PID:6660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IECBGIDAEH.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5200 -
C:\Users\Admin\Documents\IECBGIDAEH.exe"C:\Users\Admin\Documents\IECBGIDAEH.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011134001\f60d057e38.exe"C:\Users\Admin\AppData\Local\Temp\1011134001\f60d057e38.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4440 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4372
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0d7a52c-8c8f-4669-b5ae-a1293b72c206} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" gpu6⤵PID:2960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fdfbddf2-2db0-4c9c-856f-c039c0ef35fe} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" socket6⤵PID:4656
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3056 -childID 1 -isForBrowser -prefsHandle 2744 -prefMapHandle 3032 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1000 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e2729e0-36b2-4dd2-8042-2dcaa6216200} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" tab6⤵PID:2204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3872 -childID 2 -isForBrowser -prefsHandle 3864 -prefMapHandle 3036 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1000 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2d8de8f-b91f-49ff-867b-03f2aa715299} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" tab6⤵PID:3828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4396 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4356 -prefMapHandle 4468 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07812924-82f4-41bd-b1af-e8253c16b2c9} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" utility6⤵
- Checks processor information in registry
PID:1400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 3 -isForBrowser -prefsHandle 4596 -prefMapHandle 5284 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1000 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {266ef7c5-481b-4db1-b080-6104503e886f} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" tab6⤵PID:6016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5616 -childID 4 -isForBrowser -prefsHandle 5528 -prefMapHandle 5504 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1000 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a8ccfe2-ef19-40a1-a909-3d4bd4eb15d0} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" tab6⤵PID:6032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5820 -childID 5 -isForBrowser -prefsHandle 5740 -prefMapHandle 5748 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1000 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3df94b33-de2a-43a8-a637-ad33dfde1fe4} 1596 "\\.\pipe\gecko-crash-server-pipe.1596" tab6⤵PID:6068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011135001\fc16cc7184.exe"C:\Users\Admin\AppData\Local\Temp\1011135001\fc16cc7184.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6112
-
-
C:\Users\Admin\AppData\Local\Temp\1011136001\d281bdfc2b.exe"C:\Users\Admin\AppData\Local\Temp\1011136001\d281bdfc2b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3404 -ip 34041⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3404 -ip 34041⤵PID:4296
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5268
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6204
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
284B
MD5b53c8cc8efe6d9e7f6857e5ce0bbc405
SHA113fb247d26c277a31f56cf1b2c25f15f7788824a
SHA256c59fc3313fea00e3bc464125b88ac3d8d67f217dc68082d1295e40c65d734adc
SHA512dad1a6188cd593cafb05b578f49d757f09dd4340cc2733d85ca9e7091c2ca3692c2f6cfb3da93db03412d738bf21d26af697156fa2aaadb7ffbc120ffce2ff9b
-
Filesize
552B
MD520ad3e042491104f2a90e6b944d9354a
SHA1612645ffbe824466a92ce68322e2c47d199f8fa3
SHA256f6fc4a7f7eaae6abcea402ef8b0042a5097ca797a346334c9272f39a0fc4fa26
SHA51263d122c7ba13fe77a7700398eea7a50ff73fd2290adcfab69a2ad9c26c6bbb82b23a08126e21bc5eb1891e72e774e86990b7323cba0aa94d188a0ec72ed06033
-
Filesize
954B
MD59d2f2745c1a6a8a2b07c13860a8ec4fe
SHA1d0b651849cf96e7e3a1b6218f1b71a8f65105e4a
SHA25684b4128636bd005ba34d6b5ee324dcf85e09faddf749f3612cdd9242564a0300
SHA512f59a3810b796100a7cd05a0c3cb2c5c08d7d19ae0fb0a26df8b731250c062394424288eaa2b0b7123bea72b4903ff4e58b5abfeb742ef0049c43e3ecc5bf3035
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\12db9ccd-7f8e-4787-aa6b-9664dac1b574.dmp
Filesize829KB
MD5d856d000951bf5498e72f544edb5fea9
SHA1a26e4b4fe0a6978e665a0448d0bfe796e7c6ac75
SHA25609a513589bd23e6e60e59b34516997818d7c49f3385036f1282ac699bff35ba6
SHA512e441cde46e3b5158d55062cb31f2e2feffb1d4957472698b2ae80c23506b6a41c97d76b65918d38e51a66e2203f0757b7954ff8648e050e2f8e610d04fef786a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1e504750-1b40-4aef-8ed9-ec8e1b81b338.dmp
Filesize838KB
MD5114b90730ee192a67236e5db15965697
SHA156447456df2285ff0d1e7bfae3e1b3a19423ab64
SHA256b76b1af6017ce42e0f586521d31d6cb81e2427c9fe95165d70e6f5f498419609
SHA5124ffd6dd624831c845a0b04deb0b3ceed51318bcc46d3d51b265e7e5fc0a1239d642844458a702d41c82dc385c7842ad6d3a8d551297c71779ca76964ae921a98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1f7649d4-3a32-4d78-969a-d394e2c5ca78.dmp
Filesize825KB
MD5c0868c489a99a689496b489c2a4268e0
SHA1d53f002697f776bb1ae10d08d90696215d7e1434
SHA256b6c6beb5b01244c9c83a0103bd17e61b646cdc400979b8160a61ebdcb4b2b18b
SHA5124a42caa35d2f401207ed177b23560154ea441a8556ac4a2982ac1045dc27b6dbe725624461378ccec1c24902ecda2858661ecf919d6cf0124b4af19892a13190
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\51ecc146-b2b9-4ad3-9753-0626d0367865.dmp
Filesize833KB
MD5cf23227daba2715855c2bbfc87be48b1
SHA1a640304f78b302ccdf8d7b4b6c7bb007a45f306f
SHA256eb2db64f00778d8fa2ee167d63aa571d49bc7ac6744a6f2ea1fc5ffeebf4c4cf
SHA5122c495496344c0a84e9931706b568b8ed9673a55f25b5c4528fccad0b98ba11d048a820a1f7f634961f7e277e12a7218ac9d53f7bcee872f4f00569cca7c46984
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\8945e16f-e3a5-47c1-90e3-b4afe4698eba.dmp
Filesize829KB
MD572f816708c0a867e7fe8213003bb45c8
SHA17231b18f037b92245a669527e18654801a6db9c6
SHA2567b0194009e690622a4f34591b413da9a4345095719f4606fe21d8721d998fcd3
SHA512a1e25b886fc0fb3e783b3259edc2176111c4c2df6746ebf39e81b22a722d0afcb4c201d7d05b8f79ddd7e726ba1fe258f1a8272313d0ad9a4ac46e206afa1949
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b01186f3-7b51-4be6-92af-56ba93644541.dmp
Filesize825KB
MD5042247b783efc57dd2b83f1e1b2876d8
SHA11fc7b731824cebb559d380c01b30d07f150d14be
SHA2563eec57f514cccee9888884674c5ce352bdac4dcef2d2ae4f75b46892931b40f5
SHA512dee636e78f45ed1e0df312fefcc2b7c0817549029c20936ec17b1ba3d5915251953b14ee8cac97e283fce03625632c65e187a981012464c35746232a805b671f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bc40f9ba-6a86-4c27-bdb3-d20335502f6d.dmp
Filesize838KB
MD59827cb8256bdd2481cb7a12488f4da79
SHA1c89bbaf1d8dba2fed839aba0d216d914251f3b0c
SHA25687bc1b19087cfceae8cd437cea23f951adce1da755d78015d970b6742d5bcedf
SHA512507a18edf379ba0192470788ad467d0bf817b3fe20870c49b656a318aa0135d8b75e1649b31661ac7a5bce68906c6eaf60d1d0ef10eae9ee85ddfe26abfd0572
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c72238c5-064a-4510-9594-e788d3c99e09.dmp
Filesize826KB
MD59b932bf999df538a02b66ac0865a90a2
SHA140e10206369cd746da64c6216c0e1a2815a4a8d7
SHA256caf65ec12f5bba73a04aee84fe600279154e28c61a71dcabe84ecaf06f429af7
SHA512eda10b034bf17ae4918cc431af9908b67183145513902b2873625e4b8f5c047d151c2140dea593fd475af79c58ea4b5a9f6b28a64a7ab38c7d73b11a53ba7375
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\f86ebb75-3ff2-40a9-a76e-7efcff127b29.dmp
Filesize838KB
MD5d38f4646f6f39a704ed28c1d62a5c006
SHA1c36ffe6e2eede8879c6c5742b225bfbf5d8f9d23
SHA25662e56ae0eeb81c1e5b9d2a651f09e0634a4f6906d537c5d416e3482ff12f6911
SHA51290f01355c55536187690a868693fd71d0030221879a6aaae17b16259ba36fe7ec2bf07277c0555bc28b9999e5f69c06e8552e6baa51978f7c825ea74c4616536
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD5ef8cba47b7a4fc0a8ff85a8a6f05bbce
SHA1739d940ab43e2e631f3a303e99bfd6f5c5611cd0
SHA256684fb83844bdb259c7eec8d9ad76d46218183f2d246fcb865eb856c21d57c89d
SHA512ea5593fc5b74820bbec9d648b05a56c718986fe8af3891cfc74e60751f4d840562f77f114733a7ff7fbbfa574513e393aee0abd078eab749b2ff6a90c4de78b0
-
Filesize
152B
MD592c3500010ca89253bff285832f79e45
SHA15abbcbe15ac7e00239d9d039320643ffc40e12ae
SHA2568118c48f6ba8f07d00a93f5766e3c1064013ee134f67eb62c5d2f02a59d88e37
SHA512495a0093a6b486afb4f1e9108326df489aa784db5fc9e3edd4602a7dd7420226fc9fd613ab5f80d379a5ce5e28d426b658d6a3ad117d0b95ab09ea646b2f0eaf
-
Filesize
152B
MD5d1f621e32215908bad9bfd56810e3ae1
SHA1783cb427c0f0faf59522c41abce0f074f419e835
SHA256d137f25d419fb4898c97873db9f051ff49d690ad10a0b493be8cf5112fba1f24
SHA512f8f719e6cc50731cbaefd51196c21980cf5bb16fc378fc51a728d032274602fc98172c0a5b5a2a6131d0b4925c73950f5859e1208168132310c799398c4ffed1
-
Filesize
5KB
MD5db1271a58a59680f1ed6f94f0427da58
SHA1fd3d5a0064d5c7f98d5a97a6530ec81d58318017
SHA256f239f0c961eb0119916cab60f472f16617083712510f13fc994d69561b30a9e2
SHA512c47069478429b44eff6967e3a3f543cf302e5b1877093d39264bad7f53f5d75f069294240d35f7db98fccfa55f5fd77386eeb34281c1073f44f4dd3a52066e41
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD51a03df7a5f7b14d51164bdd573724462
SHA1758c8f40ebc7021d1413802dda957e81f667a228
SHA256dec70f829174b77ab1c5c68a7f7362ce63b791cb3ff1679cba6145cd213cec09
SHA512b0e68bd116f31df42da98703f0bc8f58d107280ddf242f00bca18c33a5adc367fafaa5addbe7081b3f9450e24d0c44f853c6b2126f28e1408b797cde203e72e5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD550eb753aaf4dc985c21d2040e7ba8a77
SHA114e20b261146084483fa0cd27e940285f532b730
SHA256ef86ec3153a6f5b866090e8d81331a95f1e12c3c85940e765e7a41ac7d3a5d4f
SHA51254a787753342e546d64178eb339df438d51218965e7cd202a82824c4bebb4bf330cae604d086a8d49a405a82380f9f68d1c76be8c2709f27b72246ac9c84428c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD57aa79579ef7d0ff810576153a99f90ad
SHA17a2dbbf2ae995fd119bad57af61a323d7aaea9b8
SHA256c45564011df87cb0bea975edc8b472af55aed094b5c773f11f8e3cfdedfcf2d2
SHA512eaaddbaa6eb32d6576e4158dd6b9055545bbc712807e20d15aa618cb299ddcd243c3ea08dea3a0f1f1998076f0cbee9cc0dfe70725a20a857c20f07e30104969
-
Filesize
1.8MB
MD52426e5ac8ee0bbb03e63d7467cba1df2
SHA16cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3
SHA2564b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5
SHA5125697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c
-
Filesize
1.7MB
MD566bcb6e17b5fb8da5c8791b5fd6cadec
SHA1a7ef8cd29018bce43618425c1f211ab4d7d3c88e
SHA256cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd
SHA51276708812f23247c7ab921adb69f1fe3c79e3bef5f2fd374021ab120644a7c4e9768b202c3283edcfb9b7b42647e86f880021eb340594b0cbc0b07938408a8aed
-
Filesize
947KB
MD54932e7c10bb027cec9de8696ecf6901d
SHA1aef2197b802633e3453dd7c221bbd889b99a5b90
SHA2566bbbe9d1fa289f9bcdfa962f16c09f8035064becce76871a60c9db490bc6df9c
SHA5129253a415c4f826b09ab01f2afb7f0b2c35534aa093209e72223ab23392822b50d3edc1949c66d1f39aa59198e9275a1b7729df6a9fb39008e9bb28c6f245c8b3
-
Filesize
2.7MB
MD53834ead0f530e99a0d9810e6866e893a
SHA1a051a6bc8dcd18dcc71af7861c8031f0bfade6c1
SHA256c7c57fb214ae177ef2cf143775c2131cbdcd8965bf55540a3422ebd03494d436
SHA512e2e0b2907f28016ec5a22976dd211a73d0ee9aeee1859740e31ca073a17a79f4624415a216939f80b4746e731b98c1066c5e854307950d8c73c4dfc67854b24c
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
1.9MB
MD5c801c7a0284db76d7e8774811061ec52
SHA1856a65d648fa4f89ec16f4e68703314445b601a9
SHA2565d6ad40672e983babdcec63f661fe3090b5b419f61b537223496a24225f07dc3
SHA5120c2197f830aa8fc57cd0904a17847ec4d956d0aeefd76da7d594c7320cc5bdd251474df06ced72b42241c9e097395abe9374ffff317009d2d422b2ebc5835282
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD52eeacc3f90b6fa26725bb3f3dea2f715
SHA1e563b03067d0e838fc1404041fb60c7f320c020b
SHA256beca9bb363fb0fd890d0e9502c91b0d8abaa99d4aedbfe276b407c36dd703972
SHA512968cc046599495ea283a3b3fe8ac83db57f6f21046c65e8c76c7f2ef48a9cad416f7b65286ef5387760110e6e2bef03487c5bdd2eb3bc00c4293ac797329c41b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD5a9484f22902f811fe567de15bfd5d80f
SHA1bf6ea4cafdd9b981dfff1ab6f93683ae18c7d724
SHA256ba1ee5d93afbd7c514ed6a65b1771aa82fc5659a91cdefd8e171cab23c4a2c13
SHA51222d9031c9af68671c346e7efc841854f0cb989e2809e18dc074fcb2dc73dbefa57d52e3fd38ee3b22a7715b7c823d540fc20c9241ed53809e1de77ff3b70f628
-
Filesize
256KB
MD5a809718c684a2596a1135e1fb12384de
SHA10dfba66b8a29bbbf4eae2c0be30cc13b197fa317
SHA256c3540a8cdb8e0bac62a079ef8466dbd687f4daa717146f9bbc317bc31cb7c3da
SHA51269682874ddc67ac48c40653f9ffe1331ebad6421b2268f4e96917883d3ddbb8f0ac8d6462f4f0e53ef51d814f0de204763e4657a48a883553a05ee0fe1462291
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5202446bd3d4de4094bf6c88e299fc380
SHA17b923606f35b473f657558d6cab087f9e2f70794
SHA25696f3677745e6e19e1944394f092172fba7e7fe61d4eeaec503a4cf6f78f32c09
SHA5126f8e9c6f6d988528fa3191ff1162b119ef0b1b6b05bf5afddda7082391d284e7687adfdd4a2c04eb4c2b4826f59a41bc2d0c9ef11443713836cfb232774dcb5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5ac7a5eef7cb47373974959f027fd0493
SHA101058ba910a50695d84327df2b5bb3bd3a394f4c
SHA256aa6717de2447d4e4cbb3f34261fb8fba8eb96a7c1ac821c9aa2f340c018aa16b
SHA51286a4fbf664d18fa24cd54ba61ae735969f65f2d85a254d20422f4676fd1dd60f4db94e5292bd46b8e5861130ed20c0d424f36456790ae45d21efe3c08d6b8ac1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5d7abe02d3f49a51f5e02271afef66c37
SHA1f986d69ca6c65432280e55e631d7b53bcbbe766a
SHA2567570c50bfd5374209f7dd6630fe1f3c548d0418a302b9d547333bd0bedf5c2c9
SHA512e22b7d2fb1b53c6780e7a380c29db625eabf4159009a0e2989c56c47ac8fc841117bbc07ef4f8bec8be283053c248124a14f2e358f952c4b041930db75038bf0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD58c27b2d473337344e4a8cf56c58e83a0
SHA1755f81edd7734b159d3e1ac4212594ee33a0038f
SHA25626f9254669f7ea97958f8c18b247b50cf909379db0dbbbaae1068189ffa261c3
SHA5129177658247d3ac7903b03a4bf2c929da32dda39f7ddbe6963a937fadba47cf8b4c2b65204e0fdebc294aa3cceb7881cd0adc8a223db812ad709747fe2ffe3ef4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\02ff87b9-7f7b-4d69-b11d-c78c3c95d634
Filesize982B
MD5e671a6819bc0fc25f1fe0e1d7fe2997d
SHA18cb57d7df11bcf21ecafb50342e5c7f04a865932
SHA25650ed9719087158f94745618e7ef4438a29b7e84af9a9894efc50b5d875c79560
SHA5126db2a5957123f7447e17cf6c566a232e71c15e6f1fe8983743b545f85d47b73d4f3cf3aefe6203f76f50e2347dc88f5b481b8bc6c37b7d7ee8045b1b189f0f78
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\6e84209b-c6a6-4113-a83e-a58d694f53c9
Filesize659B
MD5a94a3022174ddcb6abe231950477bb7c
SHA150ba4c593e42e19f8c3ff917081f06dd0f176287
SHA256486b57badc5298157a7f38001643e393b61b61734408a4862ec9e06b06e9398a
SHA512334fe154689a5d5b6e52f5f88b983e75efc4743ffa5f20309f5e6aef5aa4953b2572810557e2f66ee565291909bd3da44965ee29004b06d442b539b58bfdbcf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5e44257ca386ac33c4c7ea1d138c16da7
SHA1cbd5bf792ed97892313bd1f519911fbd3fd06407
SHA25611b892e7854813acdc6adc5c051fbab814950db42e03655204fe3edfda46bf22
SHA512f0b5051a9480c0ca149755ea605781055b992dad7d5578c4e8cfe4dc83ad4c1c613437ba2d30ad64c8fd791123f9dcbdb9e36d7e2722cc766e795a48492f6522
-
Filesize
10KB
MD5dd1ec99cfd290c5a1d1778510aabc5fe
SHA1e515d1c3f1ac291d93fdf6337c9235219d97a681
SHA25618358b1ffce2c00caa8a01c679584792764bdf32e31b725bee2ffd7f4ad20216
SHA512dfd9d06bc6198321b3410f5fa82e9cc643b627550a3d782400a90b4dbd63a72b8f418e58b88d0d6b500958ddba01d100f5572634105d78c66ddbad1b7a29a9cc
-
Filesize
12KB
MD51233ecba9fa6b056749367f31e537cba
SHA166d7e0475780d6ffe923282cfa05a7e764f19903
SHA256013d0024c88a31766a1e6a6468bb3e6e82177bcaf5792f8e5d76279b5aab0c20
SHA512a0eda88757d1ff3809defb1ce630ae9860fb8e9dccd54acee9a822f99912d76bf54a7af207e45611e9d7c47bc04fb8c21bb486f29de8b3e4fd107fdfa966b647
-
Filesize
15KB
MD5fc587a460afa2b618a47246cfe601864
SHA1c48139c304a26e738cb50611a6a4e57b2ece50b4
SHA256cebf10c78e24c21ce28625640a9b95b4aaf1f134ace6698f271b6b850e678c47
SHA5127650597c8baa6261791bd1eec3826fdec47e8cc5dba121c7393c5f6de6dc267295755682a276f1ef67f851422fe8bc108ee6cf12717213b40589dda93734e04d
-
Filesize
10KB
MD566c32b7888d488b1fd73034534c8588d
SHA1f02b3707b7680c8c5e8c1105e76d5ff42a614953
SHA256ba811eb4795c7cd811ee38cbc602e57f9e73dd36b1c6f59a79ff82c9781d7468
SHA51262c7354ab29f8e83eb95a822837529db0d6e11628523d524af56d78433919ed55f788c913f38f70bf73ea3f76ce93608b52f6fede87e86ef2e746ac77cb05f0d
-
Filesize
1.8MB
MD524f49ffb121e1be75fb379d7feda6ba6
SHA1f5c11a11464c5d8596d14fda54ddcd27edfa9552
SHA256ce24d7881dc208db5f3143e25f74962e16e7961a399d97bf906a43851223c138
SHA512566a4780154d8fc736bc60fd76c144aaec504988137cfff1b5eb21f31bca7632eb70fe1a37ce2312fd6016dd8550cbaca1c804d5495721402f609d7e5043b695