Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 03:45
Static task
static1
General
-
Target
3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe
-
Size
3.7MB
-
MD5
db1d275a07b6275c167ed6def1efb250
-
SHA1
807b9729054f54a6c21e5238e29c714451143205
-
SHA256
3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3
-
SHA512
d98b7aeca096e59358834989e3bc785c5a632e0460be802e62d903fa50c9ffb9d055d87dc41ba477e4fcd27aabaf53cfa871e2f966ee97fd0ccc37feeb1a47a4
-
SSDEEP
98304:IU3ATeKnEUf715s8yZTtRX52qsBV6hVtHMFgOQXRUcbF8my:TATeGh15s8yZtRp2dyVhAQXRH7y
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0b6d2bbb60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0b6d2bbb60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0b6d2bbb60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0b6d2bbb60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0b6d2bbb60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0b6d2bbb60.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f3a8a4814a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0149b6cc1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0b6d2bbb60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3a8a4814a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2I1036.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d133d4fd89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e0b6a0c91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1M24Y1.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3a8a4814a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3a8a4814a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1M24Y1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1M24Y1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2I1036.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0149b6cc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0b6d2bbb60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0b6d2bbb60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2I1036.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d133d4fd89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d133d4fd89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e0b6a0c91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e0b6a0c91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0149b6cc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1M24Y1.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
pid Process 1520 1M24Y1.exe 4548 skotes.exe 3436 2I1036.exe 1588 PhafoQj.exe 6068 d133d4fd89.exe 6700 6e0b6a0c91.exe 920 c0149b6cc1.exe 464 skotes.exe 6616 ce4dfb3eb2.exe 6120 0b6d2bbb60.exe 6344 f3a8a4814a.exe 7084 wUa0W4F.exe 5944 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 0b6d2bbb60.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1M24Y1.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2I1036.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine d133d4fd89.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 6e0b6a0c91.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c0149b6cc1.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine f3a8a4814a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0b6d2bbb60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0b6d2bbb60.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6e0b6a0c91.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011156001\\6e0b6a0c91.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c0149b6cc1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011157001\\c0149b6cc1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ce4dfb3eb2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011158001\\ce4dfb3eb2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0b6d2bbb60.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011159001\\0b6d2bbb60.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023c62-8815.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 1520 1M24Y1.exe 4548 skotes.exe 3436 2I1036.exe 6068 d133d4fd89.exe 6700 6e0b6a0c91.exe 920 c0149b6cc1.exe 464 skotes.exe 6120 0b6d2bbb60.exe 6344 f3a8a4814a.exe 5944 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1M24Y1.exe -
pid Process 4080 powershell.exe 5176 powershell.exe 2960 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1324 3436 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2I1036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0149b6cc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce4dfb3eb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wUa0W4F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1M24Y1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhafoQj.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ce4dfb3eb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b6d2bbb60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3a8a4814a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e0b6a0c91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ce4dfb3eb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d133d4fd89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 28 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 5248 taskkill.exe 3684 taskkill.exe 5784 taskkill.exe 5812 taskkill.exe 388 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1520 1M24Y1.exe 1520 1M24Y1.exe 4548 skotes.exe 4548 skotes.exe 3436 2I1036.exe 3436 2I1036.exe 4080 powershell.exe 4080 powershell.exe 6068 d133d4fd89.exe 6068 d133d4fd89.exe 5176 powershell.exe 5176 powershell.exe 5176 powershell.exe 6700 6e0b6a0c91.exe 6700 6e0b6a0c91.exe 3716 msedge.exe 3716 msedge.exe 6256 msedge.exe 6256 msedge.exe 6776 chrome.exe 6776 chrome.exe 920 c0149b6cc1.exe 920 c0149b6cc1.exe 464 skotes.exe 464 skotes.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 1588 PhafoQj.exe 6616 ce4dfb3eb2.exe 6616 ce4dfb3eb2.exe 6120 0b6d2bbb60.exe 6120 0b6d2bbb60.exe 2960 powershell.exe 2960 powershell.exe 6120 0b6d2bbb60.exe 6120 0b6d2bbb60.exe 6120 0b6d2bbb60.exe 2960 powershell.exe 2960 powershell.exe 6616 ce4dfb3eb2.exe 6616 ce4dfb3eb2.exe 5636 chrome.exe 5636 chrome.exe 5552 msedge.exe 5552 msedge.exe 7120 msedge.exe 7120 msedge.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe 6344 f3a8a4814a.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 6256 msedge.exe 6256 msedge.exe 6776 chrome.exe 6776 chrome.exe 6256 msedge.exe 6776 chrome.exe 6256 msedge.exe 6256 msedge.exe 5636 chrome.exe 5636 chrome.exe 7120 msedge.exe 7120 msedge.exe 7120 msedge.exe 7120 msedge.exe 7120 msedge.exe 7120 msedge.exe 7120 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1588 PhafoQj.exe Token: SeDebugPrivilege 4080 powershell.exe Token: SeDebugPrivilege 1588 PhafoQj.exe Token: SeDebugPrivilege 5176 powershell.exe Token: SeDebugPrivilege 4900 firefox.exe Token: SeDebugPrivilege 4900 firefox.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeDebugPrivilege 3684 taskkill.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeShutdownPrivilege 6776 chrome.exe Token: SeCreatePagefilePrivilege 6776 chrome.exe Token: SeDebugPrivilege 5784 taskkill.exe Token: SeDebugPrivilege 5812 taskkill.exe Token: SeDebugPrivilege 388 taskkill.exe Token: SeDebugPrivilege 5248 taskkill.exe Token: SeDebugPrivilege 2960 powershell.exe Token: SeDebugPrivilege 6120 0b6d2bbb60.exe Token: SeDebugPrivilege 4408 firefox.exe Token: SeDebugPrivilege 4408 firefox.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe Token: SeCreatePagefilePrivilege 5636 chrome.exe Token: SeShutdownPrivilege 5636 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1520 1M24Y1.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 6256 msedge.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 4900 firefox.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe 6776 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4900 firefox.exe 4408 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1520 3004 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 82 PID 3004 wrote to memory of 1520 3004 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 82 PID 3004 wrote to memory of 1520 3004 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 82 PID 1520 wrote to memory of 4548 1520 1M24Y1.exe 83 PID 1520 wrote to memory of 4548 1520 1M24Y1.exe 83 PID 1520 wrote to memory of 4548 1520 1M24Y1.exe 83 PID 3004 wrote to memory of 3436 3004 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 84 PID 3004 wrote to memory of 3436 3004 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 84 PID 3004 wrote to memory of 3436 3004 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 84 PID 4548 wrote to memory of 1588 4548 skotes.exe 89 PID 4548 wrote to memory of 1588 4548 skotes.exe 89 PID 4548 wrote to memory of 1588 4548 skotes.exe 89 PID 4548 wrote to memory of 4080 4548 skotes.exe 92 PID 4548 wrote to memory of 4080 4548 skotes.exe 92 PID 4548 wrote to memory of 4080 4548 skotes.exe 92 PID 4548 wrote to memory of 6068 4548 skotes.exe 95 PID 4548 wrote to memory of 6068 4548 skotes.exe 95 PID 4548 wrote to memory of 6068 4548 skotes.exe 95 PID 4548 wrote to memory of 5176 4548 skotes.exe 97 PID 4548 wrote to memory of 5176 4548 skotes.exe 97 PID 4548 wrote to memory of 5176 4548 skotes.exe 97 PID 4548 wrote to memory of 6700 4548 skotes.exe 154 PID 4548 wrote to memory of 6700 4548 skotes.exe 154 PID 4548 wrote to memory of 6700 4548 skotes.exe 154 PID 4080 wrote to memory of 6776 4080 powershell.exe 102 PID 4080 wrote to memory of 6776 4080 powershell.exe 102 PID 6776 wrote to memory of 2576 6776 chrome.exe 103 PID 6776 wrote to memory of 2576 6776 chrome.exe 103 PID 4080 wrote to memory of 6256 4080 powershell.exe 104 PID 4080 wrote to memory of 6256 4080 powershell.exe 104 PID 6256 wrote to memory of 6640 6256 msedge.exe 105 PID 6256 wrote to memory of 6640 6256 msedge.exe 105 PID 4080 wrote to memory of 1572 4080 powershell.exe 106 PID 4080 wrote to memory of 1572 4080 powershell.exe 106 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 1572 wrote to memory of 4900 1572 firefox.exe 107 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 PID 4900 wrote to memory of 3392 4900 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe"C:\Users\Admin\AppData\Local\Temp\3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1M24Y1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1M24Y1.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011153041\eikDQeV.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffec617cc40,0x7ffec617cc4c,0x7ffec617cc586⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,12334306750015812836,6469053956072434204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:26⤵PID:6732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,12334306750015812836,6469053956072434204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:36⤵PID:7028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,12334306750015812836,6469053956072434204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:86⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,12334306750015812836,6469053956072434204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:16⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3060,i,12334306750015812836,6469053956072434204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:16⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4396,i,12334306750015812836,6469053956072434204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:16⤵PID:3112
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec60346f8,0x7ffec6034708,0x7ffec60347186⤵PID:6640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:26⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:16⤵PID:7092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:16⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3344 /prefetch:86⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:16⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:16⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,17684339578398639328,14422790239926402604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:16⤵PID:1816
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c267826-a7c1-4b7c-ac98-da0932c1b1ff} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" gpu7⤵PID:3392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b8e218d-7e53-41d9-b490-cab5c48a72fb} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" socket7⤵PID:2308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3312 -childID 1 -isForBrowser -prefsHandle 3304 -prefMapHandle 3300 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25bac948-ab8c-4344-a5ef-e6b901583e8f} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab7⤵PID:4588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3620 -childID 2 -isForBrowser -prefsHandle 3136 -prefMapHandle 3660 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afd1b789-0beb-438c-801e-94c2bc06b763} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab7⤵PID:1924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4240 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4216 -prefMapHandle 4228 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f163e569-df73-4ab2-bf3a-890803f58245} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" utility7⤵
- Checks processor information in registry
PID:6096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 3 -isForBrowser -prefsHandle 5376 -prefMapHandle 5060 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {072f44c4-8463-4b6c-9a11-9e06c955e061} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab7⤵PID:6220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 4 -isForBrowser -prefsHandle 5564 -prefMapHandle 5568 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54f4bb87-e55b-4c5a-b0cf-f89f0b598b0d} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab7⤵PID:4084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 5 -isForBrowser -prefsHandle 5552 -prefMapHandle 5556 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8547fef3-ab0e-4ead-8454-02ced22a4813} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab7⤵PID:6636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6176 -childID 6 -isForBrowser -prefsHandle 6036 -prefMapHandle 6140 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ad740b1f-33c7-4e68-a9da-634d4ddc69ab} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" tab7⤵PID:6140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6344 -parentBuildID 20240401114208 -prefsHandle 2140 -prefMapHandle 3544 -prefsLen 29278 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {665d1710-ee02-44fb-8752-c97878ad02ce} 4900 "\\.\pipe\gecko-crash-server-pipe.4900" gpu7⤵PID:6392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011154001\d133d4fd89.exe"C:\Users\Admin\AppData\Local\Temp\1011154001\d133d4fd89.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6068
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011155041\CewMt20.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account5⤵PID:5760
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffec617cc40,0x7ffec617cc4c,0x7ffec617cc586⤵PID:6448
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account5⤵PID:1100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec60346f8,0x7ffec6034708,0x7ffec60347186⤵PID:7080
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵PID:3688
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
PID:6072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011156001\6e0b6a0c91.exe"C:\Users\Admin\AppData\Local\Temp\1011156001\6e0b6a0c91.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6700
-
-
C:\Users\Admin\AppData\Local\Temp\1011157001\c0149b6cc1.exe"C:\Users\Admin\AppData\Local\Temp\1011157001\c0149b6cc1.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\1011158001\ce4dfb3eb2.exe"C:\Users\Admin\AppData\Local\Temp\1011158001\ce4dfb3eb2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5812 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:6700
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:5728
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4408 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1976 -prefsLen 23737 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc23af56-5502-412e-8ce3-d2cf7b5b8143} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" gpu7⤵PID:6924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24657 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be74e4e1-d851-4444-a094-5a7655fa9d31} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" socket7⤵PID:3264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2800 -childID 1 -isForBrowser -prefsHandle 2948 -prefMapHandle 2996 -prefsLen 22652 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0fbe63d6-b7aa-4aee-829e-dd8eeb2a3ecf} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:2880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4020 -childID 2 -isForBrowser -prefsHandle 4000 -prefMapHandle 3996 -prefsLen 29144 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d92ea46-3475-45f1-b902-f8f7258edf48} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:2588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4512 -childID 3 -isForBrowser -prefsHandle 4504 -prefMapHandle 4500 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19fab2ed-51bc-4c3b-b4ee-998a7a386548} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:6440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1736 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4944 -prefMapHandle 4940 -prefsLen 29144 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1b4f724-d1c5-4054-b5eb-5840062097d2} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" utility7⤵
- Checks processor information in registry
PID:5932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5228 -childID 4 -isForBrowser -prefsHandle 5220 -prefMapHandle 5216 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {833253df-4c96-4c6b-b3ae-901ec9ebfdd2} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:4876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 5 -isForBrowser -prefsHandle 5444 -prefMapHandle 5452 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {628d3262-072a-499a-9569-3fc611d9498c} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:7124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5624 -childID 6 -isForBrowser -prefsHandle 5700 -prefMapHandle 5240 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b166259-9aa1-4263-acc9-438f5e96d8ec} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:7012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6028 -childID 7 -isForBrowser -prefsHandle 5476 -prefMapHandle 6004 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb0c2489-6d16-444d-bf46-33c26fa6aaff} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:4256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 8 -isForBrowser -prefsHandle 6044 -prefMapHandle 5472 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcf9e66c-fb1d-4b4c-a111-cc5df08d4ed4} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:7004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6416 -childID 9 -isForBrowser -prefsHandle 6456 -prefMapHandle 6464 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36d9ab65-9ba4-4230-85dd-de89045f7ecc} 4408 "\\.\pipe\gecko-crash-server-pipe.4408" tab7⤵PID:5536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011159001\0b6d2bbb60.exe"C:\Users\Admin\AppData\Local\Temp\1011159001\0b6d2bbb60.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011161041\6JTjKQS.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:5636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x44,0x104,0x7ffec64ccc40,0x7ffec64ccc4c,0x7ffec64ccc586⤵PID:6608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2324,i,9167443634666495545,13050111083465816749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2320 /prefetch:26⤵PID:5524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,9167443634666495545,13050111083465816749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2584 /prefetch:36⤵PID:6676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1988,i,9167443634666495545,13050111083465816749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2604 /prefetch:86⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,9167443634666495545,13050111083465816749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:16⤵PID:6588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,9167443634666495545,13050111083465816749,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:16⤵PID:5912
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:7120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec63846f8,0x7ffec6384708,0x7ffec63847186⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:26⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:86⤵PID:6560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:16⤵PID:6840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:16⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:16⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:86⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 /prefetch:86⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:16⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:16⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:16⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6187301281629111514,4579602529882067454,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:16⤵PID:5680
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵PID:7064
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Checks processor information in registry
PID:5308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011162001\f3a8a4814a.exe"C:\Users\Admin\AppData\Local\Temp\1011162001\f3a8a4814a.exe"4⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6344
-
-
C:\Users\Admin\AppData\Local\Temp\1011163001\wUa0W4F.exe"C:\Users\Admin\AppData\Local\Temp\1011163001\wUa0W4F.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2I1036.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2I1036.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 16563⤵
- Program crash
PID:1324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3436 -ip 34361⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6884
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6528
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6888
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5980ebd34ef8cdfa9900dba4fe367d2f7
SHA135955645e6324fce99a971a5a80ecae0fc21d971
SHA256d5384308d29f2f9478f0d1354e9f94053300496f3b7cd2f88f5f8d00dbe1482e
SHA512470cce060f4dcca34b26c8c3b2d3d4024c12fb4631ed8251e942e7e992149a422f30526b27f9f55c13d5d9581f022d3b18439893c6b0455180ae70c0fb24430a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\99bfc066-730d-4ba1-8a57-f141074822f7.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
384B
MD5cdef02fb060568e95d219cfc49eb73cf
SHA1dccd8047f739b8d30cde7c6d4dafcae8934714b1
SHA256d9297b9584aa9b439f60750d46bfe992426d2cb3dd7615ace6601dce99d2cfbe
SHA512ff6c6891daf12994dd03af537593ae50d1002679e538009320d80857363b8cb8896856961f4be7d5388806a26590219a87dc5f70644238ea3d96414d3ee22d9b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe588e70.TMP
Filesize384B
MD52d8c6a60740347166cf9ce850f918ef8
SHA1086ca065378206310000316c3b83abd4bd49d03f
SHA25653468219a4626fef671c8f620b72df7c667c54133959f751aa9d9d6ff0916124
SHA5126231d521c56dc2f759dbed4e5c1ba7d6a5c1f054b6a8ff29167130d2d0b346cba1edb8f6d88fbbdea4da6c6c474cda2726936533bc9bf18a977a93c132f145a2
-
Filesize
2KB
MD5959eaf1ab4f4ab71fa7e65077501169f
SHA1cc42d3ea81530fd7476be2096390e90b1d4b20e7
SHA256c8324ed8978442ab647d134826753e479a3576587b2f2a7bf4f4304e7545b8b9
SHA5123d5f4ff644491f4e407c0f185caf6feaf7da42969f3052806ae34e763a910b7bff3604095b4eb4725b9648f52f854663c22a64363028fe43d9003c795fe7a33a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ff68a94edc67e6e9d1e9d1097faac08d
SHA10d02b9c23d97f731090a2a9b289fc5db5f6a8ebb
SHA2561a347c4af483e11ee42f715a5b44758022193ed8b2c44b8800c6e8294eb3209d
SHA5128fab7a82e80ae7233f9e380b078ae09791dc6552d12ccabae3478c8d35b426b62f7ef4f3fda7a1c340218a5912c216dbcdf819e7fa221d0729d820f183d6104c
-
Filesize
9KB
MD5f271e94568d11c9a54f3766fa6947544
SHA120056dc8d6a16a26851dc72bbd8dc1f256d49658
SHA256a03ee9c4b2e54ca82d904d8c8fa447176df6320279a5efd78a9e97cc9cfdb1e1
SHA512be453375f5641ef804bd4caa67e6be22d2a2039d1ffc78e083d961231cae9893a617038e8e1d29133da7897bf1798e47101ab04381f9f11817894cbd47b48c7d
-
Filesize
9KB
MD5f53e1cacf5c4bf08e453fe5c9568af2b
SHA14ed6c1fd5b43bfddb9ed354cd51f79033e5ac520
SHA256d4f26389d4eccd7107dc78e02c26817952ff10d947d0fbc9cf5f4cf85e904fbc
SHA5127d93026105c0335de1f684f94ea8f9b40149d97f8531391675be43eee5f3980a5ff198df12ffe2f9b2e65664dbb59ff9d04c2e6fae0b15637f5516998fccd7cc
-
Filesize
9KB
MD5fdd5f8532e2c0758fb64652a8462ed6a
SHA1037ab03aa39873f0ab8036e2fa79af7b0ddf5ce6
SHA256fa81943ea4ddc939c1cab6ce44092fd85bbbbf42de458ae0a92898e26cdf507c
SHA512c11c211c82ff4e0bdc515d4a4f858e000677e1da309c63acb3e02081a8b4adddf83bc0072c04e05f8cfdfe5a67a1d872d43ed806bed26c89642be97a1357a3a9
-
Filesize
9KB
MD513a6fe019374c80c3ea5995d2d6413f6
SHA14ea9c2419cc2f09e735dbcd8c9d1c06a537b6225
SHA2569e91701a364e1c513ca3b895eda275dda2880dde75769f8fc644f54b8d304a48
SHA512eba60fa14d7f76419c296b62aa28ee0e750f5535f2a334959ffbf760be22fa9929b8d9b59a6e3beeaa600ef93fe739479886bef8fdaf58df70ec453cdc3fe61a
-
Filesize
116KB
MD5073116bebf61dcb8c54bf6c383a8ec75
SHA1e59b0ddaddf8156c7a0b1c643217c7241ff156a8
SHA2569e7f1e4fe919b4fe27af136aab032771712b534ab19b5c33544a8f1b92973dad
SHA5129e3f6403e88da7ae44584b860268622b127a8fbb8440a72ea2316f83084997058a4362213fd7af7bc19c782a1cacdaedb5eb7ccd453e0e2ba82a01640e3cca3b
-
Filesize
116KB
MD5d611d65cdfaf23f9260d289d455f6af7
SHA13cd7e2063286b078b20566c464f3f5bf7f02e578
SHA2562cd0b01281ca09149479686affca0ab6131e7ad46f0559bf7cadc0eafc6b7360
SHA51284d2f048a37178460144a4ea2b251ac9680082339e3b89b12a8a8e5448d441a67f777ff017b1d3af01e63d37ed75ff83603299c090da4713e0f52ed36c35e30b
-
Filesize
2KB
MD533943ddf7ab410f98e2bff392ed62441
SHA1f27016ff8b33cb2b8df39364d0ae2bf8a2c00e52
SHA256186b4f81ac762e8bda66248fd38ce38190d108b5c430293f64c1dcef5ff32b65
SHA512918d18568c816149d1dd848e1a5bfba9f3e84c9e4e23d4e4982c05cf9366ceac265ba82333aa2a917d2374fd6eb62877f28a92b226baee03918d8608af2d7ede
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5d9e6b2a8a0dd96048b2bcc6bda93a12b
SHA101f11228630161e77ceedeb4b49a3db0b854bfe7
SHA256f38fc2d56abb4e7b5f08130f82e0b807939f838849090087ea80f658ae384281
SHA51277786f3f65b80f5578adf053aca1c852d2a0f44e12560b6394aeb319926cdb61293ce1d55c33b283a037132ee7c8b4fc481ab9e4f6bfeb67200b9a979887b38f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe588bff.TMP
Filesize336B
MD52afee748037d043248f21a80ea88f0c7
SHA180fadcb7cc37efcd1e0437cd0949f58fff92cbe9
SHA256d3ec93e86e925ed961d8c8fec4340fbe169f3e1502ed06813d07fe3a0e9a3d28
SHA5122ba7b81f75a0592445963f3aa5be5ad322c65931f0bb95c617de7472233bfa8372ebd0ba2cf4beda8e0eddab50ac3f08027145891d855a3e1cfa0fe5032e54d2
-
Filesize
1011B
MD5b2ecf5b83118532abe301240c9048788
SHA12ed7abf6d978350f6aff739f83a9f96b856661ee
SHA2568069e2dfadf397b840a5f54be7bc8e670c97f60f1e46dea44d3dfd3ac7afe810
SHA51226cd6f117b040b526c8a105e87b782ec40429cfc3e29b9ee02a7dfee69a46aeeb8d104873b24e3a22b08d03f9e34cc3e4d449773d97993133fc80f2fb67e0a92
-
Filesize
6KB
MD5631986f5f6f8ac0cdbfa0b6910673e69
SHA13eda1233ca8fc64139c2d82b471da42e30c78549
SHA256bf7219acffca0f8d4bac806352422a19b334eb243f8b5059d4c72cfd8e3a5eb5
SHA512459d4f95c77f870809b043873a37ffb45cc215d1c24709d7437c81a85a4b71bca361bcfe347cd1f649b70dd79973b68acd958b27d76f1759b33c1e3e35656add
-
Filesize
5KB
MD580c5424f86475f0684457e4031825331
SHA1864d386225493400369e2a89fcf932763ed34f7d
SHA2569e861eec329c0e23b086416c30b24b1c5a23ac9be2ccb8ebf3779874a149020f
SHA51270fa92d9e2f00c26b6f7a01eccde9114f7f39eba0769794e0e659ce136f0aaa9711612890eda886a8828589afd1a1333f73b1bbd794499b76e15a2854d90c07f
-
Filesize
5KB
MD5a77af59edc91ffa201cdd81ca456bee1
SHA1dec7f5959f86caf99c0f167190178c775fde82cd
SHA256974b8080958ddde1c90706aa99487d9bd1bbac5bf33dcd88dc8bed59b45fc8bf
SHA512ad661004ae2429555d5cc210f869a46346569f0dd6eb72294f0226125614a1cbeceb78e4d577d34ecae17ebee576a9d967d8c1b2c1268ab3797f83f9ae7a6926
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5d4d04d7ecfe5d6fbda5c6240ee130fd7
SHA12761300444533cd9b5c701a1ebcb97f6ddeae14a
SHA25692777d12b045ac7948a416d6ec9a850a78c2b33628503cb519cc114266400ac7
SHA5124f9fe38b7d2275254360565738da340921f0a6d67d1edef9cb08485e250a1acf6e5249404f4e0d8f21400049e9020a8223e16503dadb9eca3a8f020026adf046
-
Filesize
16KB
MD5ca33abb8e82483d577bca354dab5652a
SHA1d69fa701eacd57113064ce8ce9f62bb26b41e687
SHA2568a9e3c083e21ba8f532a1b42dbafd033dc170802b5c3217db2f928c0350b67a0
SHA512fcdd5448fc542ab2608613610035be40993c25fb23084e3ceb6a6ad18ea6cf7d7a2f1b310b176cea951dcb56a381896c2d818ca4bbb37d0cf2e5171f51169b9b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD581702424532d5649371b8b07f67a1a86
SHA1586237a86db200770e7a02d50e1c43564e72f2d1
SHA25696e125c99de396784c83d1f27e92f8c7732d0edd9216843bfc6eae95334edeed
SHA512673a96c2a8cac35be0bb9a647483408d097f8a8e8544bf00f1d96c734a13c3b442e6afe8f0c9c0c2d5210517301a846e245d817c80f46c2a3e3d4310da95d6a1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD5044e9e9f2b59b68d81bc964a377a85fc
SHA1f605888cb8a64e46fdcba535c3fa30cf40cc8a9b
SHA2560f1aa646ee7fc0ed33feba125da4f0125b104204311ea077b81ca715bb6d7e81
SHA512281014c71705485537b4190c2e5c3191014b80aae7f8861cbb7baf819758ba3a176e70331706f5cf74d566baebd4a0c3dfd763ed0e949bc25ae0f5be0f45bb12
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495
Filesize9KB
MD51fe8497d46ddbdd22f099c36f9a2e2e4
SHA14b5c5f874fef39ad8a6d1dc67038e16e8cfc1e1f
SHA25657a4e95f6b0348d5c2ddc02c909021033ab46a01184174507c39edd4571dd953
SHA512f670e9489b6e7583a029adb91244d5d6140077c895f5a5dcbf7671d845b706d2088b51ff6dfa00229dc03cb6bc923afc3ae504a6ec18c147a90de881ccbef55e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\3F6BAE390F7FB4267066C23DBD35348B57989359
Filesize47KB
MD5283181e262f84becf170a06d750d03eb
SHA1a4f85c018b6729b10c1f34b68a9092627cf55d83
SHA25667dad14334778474e374014cf27219084f4e7aafffc29f63a067b128cfd25932
SHA5120de19edd4a125acd34bd5e3e3d8d8856b6a2c6a35c30d4d43878fb0081fba7fdf66c97a80ceb6e328f4397ac4740a98ad0d5fe4e3c1a50cfbed0a6387e60283b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\64CAF8D775915A9E706356BD059B60BAE651FF83
Filesize41KB
MD5c80092e5139b9c310b3fde2d3c2fc75e
SHA1f738c2493a5de4f72bbbc398f0299bc4ea32c2d4
SHA25684967f59b85d79c8bd03ee7d4a34bdb1814459ee0d099dc3deb5ef2fe0baae47
SHA512968a4e0c8dda53d24a863e17511871f7815ebd3a6e7f7edabcde6126708f144cd68f69a226ee3b581f00c4b0664db6d7d14b57d7714fbadc61921e0e0ed763f2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\6A9401069D7CA26FCDC6674AD30D2A279D87FE98
Filesize23KB
MD568cd0103162d05a59c7929fe498d7728
SHA1f45049cc3c422877e42ea36d3b519622b4fc6187
SHA256a77b9b034b9707a82a62e4c01a819d766f20d114181643e7d66bf667a47b6f22
SHA512fcc5815e6d3e36765be5ddaf1b1e6209932abd90db436ec3130cc94e7510edfce9415500b889127ae4ebff775e40572a2402e954b58f104199e075d8c54cf1c4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F
Filesize14KB
MD55ccc97ef8a4c5cddcc4e3dbe0817dd93
SHA1837d7289add1617544441f7f2a903227563ddc32
SHA2565d35955d6f23620f806e28ed0d417a7594d3b193373a712a2dd8a645a4654b19
SHA5127181ae80ad54d2e194aec4f693298c68df007b654dd06aed13f14a7ddbed097be35cfe60aedb3c32ba265fd00bc003e0174b041b9a36a616486f967173f77e3a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\8E8FC8C643B1AF5D9B8D92D8E65A7A55CBAD4123
Filesize83KB
MD506f991c0e2eee587992fe93b6532d04b
SHA174af0c41f1294c66d8f519a69a7cab71d4d1e8ff
SHA256f275c80a42ed708f2356941d37d6c21c7e937469e6654d96ab753035b0533105
SHA512079228d2bb8e3b49ff1def15412e67e3e8dd420d4ac303fcaa03f2da35ece48433f6bb3442d91fdd60ac39cc26f39f60313486b945a6ae2946e3af0b78e94ed7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\8E8FC8C643B1AF5D9B8D92D8E65A7A55CBAD4123
Filesize83KB
MD58caa60351106a1a1be9829e38d7f9a81
SHA153c3a0f3a6111ac1e12dbc4f09865ac896bed961
SHA2563b8c9c74b4210c7887bc4edfb56130e7b30bd444abb8390fcd786e55b3bcb132
SHA512fc70e8f0f021391fa086097721158ceebdf8cb11cea80e39ac4d9e8a48cbcfacde5a431bff2b7ba830de952f46010d7c52adc786e229f41c4de2c8e2779b36c6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.4MB
MD503757138d540ad9e87a345bf3b63aebf
SHA183a0b3ce46a7178456763e5356bf4940efa41cd1
SHA256659ef7c3fd01df95231975c36e8e45444f6329da33a70e58690f2ee75c7a722f
SHA5120f08c40ff45829c608a42a6d0d12c1b2a726d315c28f0b4330320a7585506474f72eca550a90b042eece41911174859e95d4b5056c77999a1acf14d43e5279ca
-
Filesize
132B
MD527b9f35dd5e29794e0f254d4006f6fa4
SHA195496ffd85e8e55f57832b24c90a900d3cc96b26
SHA256ca3bd2725a493554e081ea2c5528c7f134edad6374e2747e27230f112cec7f1d
SHA51244dbb780e4e25e3eccc2de8c3edc7b0a4bb18e1f7f9cbbdd046ae74dc4daee526fdc5339864a66eb9d14b48b0871f474fdbe22eb1766eb4e94b0b6460fd5841d
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
1.8MB
MD52426e5ac8ee0bbb03e63d7467cba1df2
SHA16cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3
SHA2564b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5
SHA5125697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c
-
Filesize
1.7MB
MD5868914554c439b7a6b83049364992a6e
SHA125abe8a1a31431cdd953322af0f259b84dcdc1a2
SHA256f2b87185d453c7a71b472af472e1fdb3bf32147990de0b1b24cff92fa1379eea
SHA512467d51eee7390973af084fb4522871cbda0b99fa9531166f4cc92317ef7ca7969c37f8cdbfc0b27bb978becbde4b87f300ba5f3ad9958e3c3c19f6b95b331977
-
Filesize
951KB
MD5179fd003e42d0224546f0fdb62b817ce
SHA12147ec1b1ab5041b6b8f490a88d398cc22738014
SHA256da6e65bd0e61e8acbceb1a7463e3058ea356f3e80849949ff83f288d9d663b54
SHA5129784953c6ebe07f27283f761f6a2934212165001b687b47b2e55bdf97a25560da74260bca59fb0c29531d5dbc5f7377a0db6b53a6503fb04723d8d3a6a572cfa
-
Filesize
2.7MB
MD5efbfb3a86fedf5412820ca7a22b79bb4
SHA1b57d5f3f913aed6c5839792d55a1738cec46d575
SHA256f4e311a2227dbd534801f8e11b8874ceff3f0db73c158f46e3c00eb9cd4ee601
SHA512abe85f2b74d0418a044d914564b447851dc494ee48ee1b348eb21caf3acdb40e020c99e4d654f7e2b2efcadbcb503e893e4be23d2c12d76ead24d8049070cac4
-
Filesize
4.2MB
MD5818532da27c6ed97768ab94607612f66
SHA199216af849b745434d0e728400a5da9ea0eac96f
SHA2560db9cd98808b856cc4e61818330ff6a1ec46621ab9b30e779078f2fb78feb36c
SHA512ae6d4008ad40a08ad23b7b460c53af287c923171973cd8c090e5abe0b3b67f14aa291f8ece578697405e6c263c3316c5f19c8a94c64a8cbe4b7496dc345b6224
-
Filesize
3.3MB
MD54f5b3afcb912cc578ca99e764982fcbb
SHA1b3c48fae3d65996413c3409c46e69f71dcb20222
SHA25645c3382a9c6b97af680eaf0a01d24204708a9a80a7bb4e285814319056b0016c
SHA51226586a27202699c660472855c13c0ff9d6c1722f9739e5ee37773d36304a1afc46a7b35e3892014d65b6b3cf30932211962a79799b577481b3ae4dcd92f56efe
-
Filesize
1.8MB
MD5f8488624049467d9225f383cb4059c81
SHA102cb299d2112bdbbfa31ddfc64690894acd0fed2
SHA2566ed0a91a09ba7b3e60fea4b64d54ca00c121862a8f707de6cf0427adc5190f1a
SHA5127f7da92e69b3762e2fc1ac7d2a323871b69b293e468f4d7f1f11e63b5d9860f38bfd15dd2cc77e80efac2517ff85de39c62cb82327f0c594dfe3f0e0096d110b
-
Filesize
1.8MB
MD59993cb8165c832f8a679afbf89237282
SHA1ab6daa8019bcb4bd94f5585a7e8bcbd1428f0cb3
SHA2564572d447052d29a23b288818b4b95d75e09c336113b1b559401466c74532b35d
SHA512006554a56e8686326e282ab7014dd34be6bd15552abdd7216e64cd237435202fa7371b8d7bcda3109054a826ffb1a30cc52cba7ebbf303703d563a24cc9a0e32
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize21KB
MD5099b3bc3224427811e90cf2f76436edc
SHA1809cdd11eb79680b6f3547615743f4bb1cb7afec
SHA256cafe0cd35d58bdb81b8c35f5875357c5d3292902c9079316a15ee07718e4a256
SHA5128b744b7fb968eb36f6cae83d52deddb809e369e3cf88a93a15ab08a9c45862c686a8e8a702adac9f457bfe431b6a3a3163524e16f8bbb3a51f792396303913ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD553dcf4a9903b76abf3711f1a9408d134
SHA113caf98cf7ca40a08a6a3e04ab03e247e353c40e
SHA256d731ebb6c06eaa981914f25639e0849d7a4f666e62f682d0dc35cb7f1b4a0358
SHA512f2c06da5cab94f851289234e59c1a546879b0a69b3c12e232b806964d456fd330aea8d01986c99a1a0b44cd4ae2d8bacff18e60e7d6b4a6c92255f1ed60f6f60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD56d677b5c8451177057dd85d9f45fbfe2
SHA19ca0f43141c6dbfa5b97da0dcd85281e90f8e03c
SHA256cdb2f4f25ead187767292e57097a76e1aeb9397b1342b6753c8b3228894bd6ab
SHA512c1e4bf021fea98f17c11a23f7978051494cea7459fb6150f5ba98541a3ae5837e236709998b1e1c0732edfbc46a0e5a18258eda738b0b29111573ed52c5e44ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize12KB
MD58df5df6b970591594a103c16e5eab71d
SHA147031cc33fe6a3ea05c3cf504fc587765eca0894
SHA256c4cbf8c07e0e5ab81d565c0186e8229085768d34774939b6cd5e728c72a087e9
SHA5125fef84ce1f699098f1442aa3ba874e72c923826ad51b9f60b19be039e9d221aaa45d6919bb817b15bb7ac513fc5496c67c7b6cf3bfa4eff399a542167d4da2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize15KB
MD57d6063ee1b7982f2820ff8974dcc5b1f
SHA16a655c32d1fb338b8d881571a29874f11d73065b
SHA2561a911245e2747a01d6ad6200c5c0c93397838b6f21e9dc89e676b7f30a53e411
SHA5124455cdd810e9f7f8bc7b77869402ff89b934c49df10a055e0a75bfc99ba7153885981bfbe0c5bd1d7fa2da27a046568a129d0eca5bb7802349afea4e359a9387
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize17KB
MD564a7f968db7b8a1e5c1d7fbdf842ae51
SHA1dbdf77670c22c44e94b5d1dd3a7d39c70a6d3e01
SHA2563008dac79cfff3c0fc6a747bfe411910d7a85ac0060d1a07874217551fc00af8
SHA5122f50dcaad5045238d18f561c0aff2bf5154b99d0facc650d525280f5e0c8300ce77da0d2019d78ff499c8c9a3cb9e620e0f9ceab908d8cc51a9b322f95f9524a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD5ffd8aebe252bce3feeb214b6c2cf5c07
SHA1f99584063442c4500aad55ea5772cb520e721300
SHA2564b6e63df6542d0fca28a4e40f967ad5881a88aa9567942dd67c685fbb31e952f
SHA512d8cd0c99a5a81855b7cf2c90af8e1c7ee41f676a5ab9652d8f3487ef051e1dddc725de7c543013a9ec26d761c6f0494b89b5bd8dac48d4e34b4c14b315393981
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\SiteSecurityServiceState.bin
Filesize1KB
MD512ca56784087757d8ba5b22c4c5c1342
SHA1e9889fcced5edede33e54f959fd7c12c052673a6
SHA256384e1433dbaa0e55e0a4098c061eaa4991f1462fee88705755d82d73338a3cc1
SHA51203972d069405756a84b15d1cd1b48001bb1aacfaaddc6787c1bc803b0002fb2946138351a609682f6b0c20a79b217955f731cb99b7b16123df6c26b581e6f2fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\addonStartup.json.lz4
Filesize5KB
MD527edd1b56aa0f3ab9985c85ca39345bf
SHA1cd08d996a03dfd672e46583cca80d659c36d1097
SHA2566d4efbddfc47641893ed5ff9863767521e72f4ef30e470ae49ebbec8914d59a7
SHA5122442f3c02c29b68cb5511963826406b2482b0249646bf594537f23c11dfdd05762647871e707ac9a3e164e0e09a57fd65a30404dc8d51f93ff4a9329a9dea14b
-
Filesize
224KB
MD5aed35c2a0268f077afc3e967aba5cdfc
SHA1afb02a70c0bd73d8103ac5f6348d3c86b6a71942
SHA25659a9dd32fcdacea9ad11c99262d5cd94dbe2e1c5eab95cefa852a2d4fe8bde1d
SHA512e639a08de4714a2309b5c6249b1863d35de5d781fdce03e5175d19ada4c4564034b790039ef2d5281b710510b281034420dbf611eef8edee9cf0e8b98846048b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\content-prefs.sqlite
Filesize256KB
MD5b41ed219e2c8dac47f2701562d092621
SHA190d507eae3ec943a121dbe5a080412e40470b54f
SHA256cfed019635a1e14f74ae78f2c03fb96b40ac3da37b67489bd98c144afc200f1f
SHA5125c6027ec701055efb3b6c055727af5ed261e8f1d5ba954e64e8a34e5c791679b1e4a6ef49896ab8089ec151fd758ba41efc7333611af42b851606a0544a9b947
-
Filesize
512KB
MD596cf45236f600cb5f088b9b73ce13244
SHA13ea9e29751e515db510fa7aade99b08bf42e9ed9
SHA256fb1ddff6a73ee36ec5d8803768a0b6d37c62c1ac92d461d3d886896fac50446a
SHA5128fe1eaeeaa72ca58bd07212ef201dd298564ec1b9d254500b99c87465dbfccc62c411e7c21ce77b4cb50901592d979945b53c9c9fe529f81a35fa2c204ff3869
-
Filesize
512KB
MD59218d8378dba27c3451db75c8f17a614
SHA138a7e42d29e8262f2e8087eed0b0a925dc382e4a
SHA2563e359f815edd4f3521a738b9721568d41e7198389f226ad659b2629ddaad6760
SHA5121d49d77f65a8218c46738758cb95ff3e1f6596359d8a2368004950d5c03e51cf9cda5afebb92fa692a64393074eea3887c9493b85d266495b44caf3ab7293a97
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD514ec94adc4d47d902801ba575fdfe2e3
SHA11967db2d3e4e80a33f092bf78f1c2f25c6861a90
SHA256c2f17ae71f7ef124296d7ddd76f83d9fa59b4742f43339bcb9c985274617e1a4
SHA5124199aae8662ae19dcaf8793afda91b4020f92513ad58de1858ea5dac110ee95c2d9f394fe6601be4a489a15dd75054506411cfec07688bc8b5e69166e405babe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD538c6104ed59ce72b022f91b40610c0f4
SHA1b087b38418dc9f2f35e9d4f0bdea9e39e77f987b
SHA256eb69951714b3c8aa1729c015247272cd11aef6e10b87d00026d531c210e4b550
SHA512f2111d15bc5a1d93c82a2fe12720bce3dd8d1329f5148b7fb505a00d50f3dc337127d1c38c26bce0d10942263ac03a9c059a3fd07cc4dfaaf7841c628c873a1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD54eff465f74edb672a540fa887ca2a50b
SHA1b57aa2d1f70a768292403cd906f0fceb2256ac35
SHA2562f3e5587db716cd7159eff06eb3b5ab1c37ecd81a630d15f35606a73bbc18aaa
SHA51202bc44b28960650c2b8f8d6bfc5abe272313a16325790184aa8e6c9c4a826e5889ad21502c725211dcbf05f4dd2fa5ede30cccb19a3af24e1c7c214b1ac98419
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD57e5fa633f61d979a2f05885f22687a38
SHA1d8ed84e3938f74e60557b14bb3482a3b34cd63c0
SHA256caa6b04a55939cca388d453df9140faa95282d30a221be534e70500bde6b5613
SHA512caba70f1ce70dc58b3a3e8fac7b8fa572f9b238c68a01399c24bc96ed1374f37d4ffb3312d706afe5a967bfd087efe9e573825e7a14307794c84a84d6fbd5de3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD586c121bd86b7f2cc8a345c21cf6cb111
SHA1bf4186727d5a6704bba8d41efef2400141165c80
SHA2561718c8536e41c40d751ed9d2cce91a5029ac7f09ff5a05f19ddd0b463c54e384
SHA51212695ab5f82dc8361b5a9f26df7e314e74cafe2b5d0aa5c77ccaa7328f4b3638c5e1fd13ce3fa1eec15829b25a2cd3acdd01dc67dca2a2df73b8548048cad0e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\events\events
Filesize104B
MD5defbf00981795a992d85fe5a8925f8af
SHA1796910412264ffafc35a3402f2fc1d24236a7752
SHA256db353ec3ecd2bb41dfbe5ed16f68c12da844ff82762b386c8899601d1f61031d
SHA512d01df9cab58abf22ff765736053f79f42e35153e6984c62a375eb4d184c52f233423bb759a52c8eed249a6625d5b984a575ca4d7bf3a0ed72fc447b547e4f20a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\00201bdd-6e7b-4ae8-9984-92fa021ca4c4
Filesize659B
MD588b3cea8ccab7f070d37720442a32d4f
SHA17b237d56bceb1daaaa1457388add9dd936e2c38f
SHA2569ebaf14a79ca3521f0713f798ec8a3fac3270d6d59003eac5bc00478c53e4714
SHA512105cbec38e2f5b5aaea966e04be2bf32f8f278757bcc9a6e87dec40196b591957d8a2bb08f6bb4bb75162fcbdda860ac68f2ff82342b2a25f8faa276862102a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\00553368-c6f9-4bf4-8fc6-82feb84b8d43
Filesize905B
MD558c6e8a21981c8c0d417e4cbbc5d4333
SHA1b2c1558dceaa7472a0d95c1a1e17a3178c72b316
SHA256a45354b93dccaf8fc48fc50b6fd079d394ab403a2a1f61e20f45b7f0e914f80b
SHA512f05ed220114ee437ce514b0594e01a039b5bda43810e4b572eea43ae9a30eb2ad81ae0ad1b2730d272d30ae22db94cfd6c63d8c72715929764edaa7f72d1c071
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\11fec77e-8cb1-4063-9f78-3f47a1fe581a
Filesize648B
MD5f4700d45560398727e77978f4a308571
SHA11816894a0f7955a510cc8f72b7a8918b80992b66
SHA256c3d922f71faba2b96328aeedd72eeba8c927a548aa008e24c8eafd8bc5119c78
SHA51228801247bb57ee5836fd9ef88e0b0cdcbcc37ec6c316bd6b06b47a68fee63200922467b2e2d7734ad5b963f6811dd1f687f59b0a824721594356b05e9e6c5c23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\52874144-b422-4cec-8bf4-2a1113b3bec1
Filesize982B
MD5053109aed2ba8c52c27ff00032bdb51f
SHA1893844570d1098954cc734102b0dac32f48da0e0
SHA25695d5d6826d97d4be82ca5672c0840ff1a69e425bf10b2d3bb8afb76b7c331a13
SHA5122f6a09cf521cba73efc8aa838ca51fc9fffc1a0fd5eaad9470c047552db734d1cb382a4cb5c3e7354b75a754e86c1310a1b179c1b401d8951281e059d582f2d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\6be576aa-6dab-46d3-912a-48d4e6a9799d
Filesize653B
MD57832a011480367c5a80b13cf820692c4
SHA171971344ac3b158afc79c9e2053c0cdb2fce17dd
SHA256ed6df94a4c5cc55cbeffa31c933226f1118d5a15dbe28f1ed5a910a575a62b75
SHA51259dbc73994c413f56228a513f944c139c0729284cde2aa02e99808d1fb003775ee8bc156eecde474731698350edeb4f8363124b3dd4464574a2ea70113e3d005
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\favicons.sqlite-wal
Filesize160KB
MD56c8e169ff2edc1d8b13cded6539cf3b1
SHA16257865f81959311ba4b3115ecec7e71a76aa95d
SHA256f859307399e221c708e1de2f1d7e7dc529ed049c6770ac69d6fe21fd7e92b54a
SHA512f54190aa4f13d946bea8b64b99110775661170f3511cfdc24b520f780060155b091e975c59129e801f666986295d4f9a103abaa0ce50bc84ba867abcf8c6551c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
96KB
MD55d3387f5ec2ea480af5c4e1be0d3969f
SHA16825e43dc46f51fbe980effb72bd76ece1d20fcb
SHA25666b1c5aed8582e2ed46b4628e35e98e23faca83dce101e26f5190837e6d37bc7
SHA512f9b4989d7f6d685de0b4aa33d258e0d3dfccf48c1a9b035c10ba9f15c40050ccfe9e1aa52e53a182224928d14f931244f7a64a8ff6beddbc854aa6b1b8cccd1e
-
Filesize
2.0MB
MD5e0b0128fc924ae9b178ba755ec492295
SHA1988e964be304529b12985cd41d3cf9d951db174f
SHA256009fa36c22c5bc4620138f29e109ca4466f4ff7ba640488f428255b470d72137
SHA512610071e0bfb41cb4836faf5ca7cf547b2f372d87f4e9dfe6c67fba7286d9d2593706404b606c0847384c752f887972c3b624513534ac70627964078f815832fa
-
Filesize
10KB
MD5e08d331952b0092250de7c2b5793a6b0
SHA1ade8e900230962defbec2c98c9ef3295afce84be
SHA25616125a29df11be389a18f3c8d263f5e01425d8e30d1a2a6cd59e49de463969bc
SHA51228568e8ce11f7477642825aeebd97b25b702735a0bfa0791b60de057d44d4876406fe4d4f636c4d424ef10ce49c6dd22dab459ca7934be74df60079a5f326807
-
Filesize
11KB
MD5b6abe81522340e8aaf4351270fadbe39
SHA164485d6863854e737737b8f88c83b49f50869149
SHA256c045742db89799624b0d78c220868ef412cf48cce82f0a76e020d6d0c9e2f38f
SHA512c8529ddcf261476bc8f1d222f9573325bc849aa0885e6af8bc531cbe761374d418a194a334b5e02238affd6c2ed332979a70d8c757de87e6e4f780c7edb5fa1f
-
Filesize
10KB
MD5bc39d219b084fd750b3c2677223c23f6
SHA15d7360a381bf39cbea969f9643414e6c2c86e063
SHA256babfb1c36c66f7d47f3deac14fc4fe62d487da3e37a73c4eb60a040e3aab23d9
SHA512bad8edef29ccbbdc0f9d848617d82106fd1dc5796b57f741f268db778a068a871a0b561874c02380a0f4a0c4e4b3fe2306fb52f22358717a216651f0c3dba7b1
-
Filesize
10KB
MD57487347538b9bc1e70bd4cd89c133069
SHA1e923a9d9df1fcdf77aa8b06cfb0f5accc1ea3b99
SHA2563ea91ffadbd21999a12535515ba50d2b0fbb83c2f285c0dd04d1a33a87535747
SHA51244d36bff0a8aadb4b15b69afabac50e85c4b1ae3181293d15c16e0ea2c3b6b21d42bb050117681f3edae4ffab6c53460ee8fef6e7f8ac63ed087e5c7b9712566
-
Filesize
10KB
MD5514e7a758e1c595d838593165a820b27
SHA1982b543fbae42e069717e9717e5eb522e680c4ba
SHA25672f077401b48bc43e0fa754a7f6a4c6732d201db9ff36c62c86009cbc9dfd4ec
SHA5129c5a2cfa0f25a6a9920c3e3b2c174fce6fff1d68386e838bb185f67d5956c7f3aaf1e42d6fd246b88b6b5f2877d4685efd9bd82276377b82517fc702735297e5
-
Filesize
64KB
MD576786a4c0dd19d88d6d3ed95a293bf2f
SHA1b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7
SHA2561a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31
SHA5128cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5e263cc6ed07769722f19a01dadf06c24
SHA1365a7c5bc530c520d66941e4da53fa3542156998
SHA256c45c0b07b8c835690916b070228d5b474e96919cd40ff3aff83831ba8e1e0193
SHA512be9417de291bab484200a6a8736e3b5e10fbef9fe0b9318d028534a65ad6f5cbb9cd448a3f4e8774f02b372abe933977ddaa2c44f12c3db92c6f0e8017a9051b
-
Filesize
4KB
MD5059b2ff6f7d80594a2c3ddf610eeb76c
SHA18a7709265c0067ac4371ebeb62b93fd2407f8a1e
SHA2561f15aa35b799dc7de17cb71291a4bc96a942048fa4f8ae43934ecfe5ff6c4a1b
SHA512e717c5dedb0d456fea52b70c4f7def798612bc64e3541fd444d53ccc2b1078a8bb100f3563bef7201353c01c600f66e891883931edbfdc7a748aad347ea7c911
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize584KB
MD5a148a516c36ce03e8bdd4959824b058b
SHA1a6a9ae6ba0686d5ba52bace4f0aabfeb2af48d51
SHA256485f794c30e8fbd7304c2f3642e5ccad2c93722d21a1fb88e7fd32d87be00860
SHA512f6d2f92e542a4e0f47e31d80afbe8289afdaf7e472057d8e9e4c1a99407a8e689447feea72c6bf067dc1bc32b19f694dd97c7b731184cbef465faf13486969b3