Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 03:55
Static task
static1
General
-
Target
3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe
-
Size
3.7MB
-
MD5
db1d275a07b6275c167ed6def1efb250
-
SHA1
807b9729054f54a6c21e5238e29c714451143205
-
SHA256
3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3
-
SHA512
d98b7aeca096e59358834989e3bc785c5a632e0460be802e62d903fa50c9ffb9d055d87dc41ba477e4fcd27aabaf53cfa871e2f966ee97fd0ccc37feeb1a47a4
-
SSDEEP
98304:IU3ATeKnEUf715s8yZTtRX52qsBV6hVtHMFgOQXRUcbF8my:TATeGh15s8yZtRp2dyVhAQXRH7y
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 603efd881e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 603efd881e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 603efd881e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 603efd881e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 603efd881e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 603efd881e.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1096 created 3440 1096 tR7DLnB.exe 56 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 0eed444eda.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1M24Y1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2I1036.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0eed444eda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 603efd881e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f343dcadfe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7b43750d8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6111c68c95.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7b43750d8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f343dcadfe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 603efd881e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2I1036.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6111c68c95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7b43750d8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6111c68c95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 603efd881e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1M24Y1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1M24Y1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2I1036.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0eed444eda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0eed444eda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f343dcadfe.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1M24Y1.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 15 IoCs
pid Process 2324 1M24Y1.exe 2076 skotes.exe 3064 2I1036.exe 2648 HRFuUub.exe 1592 PhafoQj.exe 4300 0eed444eda.exe 6916 wUa0W4F.exe 8028 skotes.exe 1096 tR7DLnB.exe 4496 7b43750d8c.exe 8828 6111c68c95.exe 8036 257646a08c.exe 6480 603efd881e.exe 8188 f343dcadfe.exe 5344 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1M24Y1.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2I1036.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 0eed444eda.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 7b43750d8c.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 6111c68c95.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 603efd881e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine f343dcadfe.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 HRFuUub.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 603efd881e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 603efd881e.exe -
Accesses Microsoft Outlook profiles 1 TTPs 56 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7b43750d8c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011167001\\7b43750d8c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6111c68c95.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011168001\\6111c68c95.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\257646a08c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011169001\\257646a08c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\603efd881e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011170001\\603efd881e.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023cc1-12398.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2324 1M24Y1.exe 2076 skotes.exe 3064 2I1036.exe 4300 0eed444eda.exe 8028 skotes.exe 4496 7b43750d8c.exe 8828 6111c68c95.exe 6480 603efd881e.exe 8188 f343dcadfe.exe 5344 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 3004 1096 tR7DLnB.exe 170 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1M24Y1.exe -
pid Process 4140 powershell.exe 1284 powershell.exe 5788 powershell.exe 8112 powershell.exe 6708 powershell.exe 6388 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4368 3064 WerFault.exe 85 3988 2648 WerFault.exe 91 9752 4496 WerFault.exe 171 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1M24Y1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 257646a08c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tR7DLnB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HRFuUub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 603efd881e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhafoQj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6111c68c95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f343dcadfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wUa0W4F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b43750d8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2I1036.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0eed444eda.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 257646a08c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 257646a08c.exe -
Checks processor information in registry 2 TTPs 40 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 9800 taskkill.exe 10048 taskkill.exe 7528 taskkill.exe 7396 taskkill.exe 9952 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2324 1M24Y1.exe 2324 1M24Y1.exe 2076 skotes.exe 2076 skotes.exe 3064 2I1036.exe 3064 2I1036.exe 4140 powershell.exe 4140 powershell.exe 4140 powershell.exe 1284 powershell.exe 1284 powershell.exe 5788 powershell.exe 5788 powershell.exe 1284 powershell.exe 5788 powershell.exe 5788 powershell.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 4300 0eed444eda.exe 6556 chrome.exe 6556 chrome.exe 5880 msedge.exe 5880 msedge.exe 2828 msedge.exe 2828 msedge.exe 7412 msedge.exe 7412 msedge.exe 8028 skotes.exe 8028 skotes.exe 8112 powershell.exe 8112 powershell.exe 8112 powershell.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 1592 PhafoQj.exe 6708 powershell.exe 6708 powershell.exe 1096 tR7DLnB.exe 1096 tR7DLnB.exe 1096 tR7DLnB.exe 1096 tR7DLnB.exe 6708 powershell.exe 1096 tR7DLnB.exe 4496 7b43750d8c.exe 4496 7b43750d8c.exe 8828 6111c68c95.exe 8828 6111c68c95.exe 8036 257646a08c.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 23 IoCs
pid Process 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 6556 chrome.exe 2828 msedge.exe 2828 msedge.exe 6556 chrome.exe 2828 msedge.exe 2828 msedge.exe 8016 chrome.exe 8016 chrome.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe 3428 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1592 PhafoQj.exe Token: SeDebugPrivilege 4140 powershell.exe Token: SeDebugPrivilege 1592 PhafoQj.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 5788 powershell.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 1256 firefox.exe Token: SeDebugPrivilege 1256 firefox.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 8112 powershell.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 1096 tR7DLnB.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 6708 powershell.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 1096 tR7DLnB.exe Token: SeDebugPrivilege 3004 InstallUtil.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 7396 taskkill.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeShutdownPrivilege 6556 chrome.exe Token: SeCreatePagefilePrivilege 6556 chrome.exe Token: SeDebugPrivilege 9952 taskkill.exe Token: SeDebugPrivilege 9800 taskkill.exe Token: SeDebugPrivilege 10048 taskkill.exe Token: SeDebugPrivilege 7528 taskkill.exe Token: SeDebugPrivilege 6480 603efd881e.exe Token: SeDebugPrivilege 6388 powershell.exe Token: SeDebugPrivilege 8684 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2324 1M24Y1.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 6556 chrome.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe 1256 firefox.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1256 firefox.exe 8684 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2324 2720 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 83 PID 2720 wrote to memory of 2324 2720 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 83 PID 2720 wrote to memory of 2324 2720 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 83 PID 2324 wrote to memory of 2076 2324 1M24Y1.exe 84 PID 2324 wrote to memory of 2076 2324 1M24Y1.exe 84 PID 2324 wrote to memory of 2076 2324 1M24Y1.exe 84 PID 2720 wrote to memory of 3064 2720 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 85 PID 2720 wrote to memory of 3064 2720 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 85 PID 2720 wrote to memory of 3064 2720 3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe 85 PID 2076 wrote to memory of 2648 2076 skotes.exe 91 PID 2076 wrote to memory of 2648 2076 skotes.exe 91 PID 2076 wrote to memory of 2648 2076 skotes.exe 91 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2648 wrote to memory of 3408 2648 HRFuUub.exe 93 PID 2076 wrote to memory of 1592 2076 skotes.exe 100 PID 2076 wrote to memory of 1592 2076 skotes.exe 100 PID 2076 wrote to memory of 1592 2076 skotes.exe 100 PID 2076 wrote to memory of 4140 2076 skotes.exe 103 PID 2076 wrote to memory of 4140 2076 skotes.exe 103 PID 2076 wrote to memory of 4140 2076 skotes.exe 103 PID 2076 wrote to memory of 1284 2076 skotes.exe 106 PID 2076 wrote to memory of 1284 2076 skotes.exe 106 PID 2076 wrote to memory of 1284 2076 skotes.exe 106 PID 2076 wrote to memory of 5788 2076 skotes.exe 109 PID 2076 wrote to memory of 5788 2076 skotes.exe 109 PID 2076 wrote to memory of 5788 2076 skotes.exe 109 PID 2076 wrote to memory of 4300 2076 skotes.exe 112 PID 2076 wrote to memory of 4300 2076 skotes.exe 112 PID 2076 wrote to memory of 4300 2076 skotes.exe 112 PID 1284 wrote to memory of 6556 1284 powershell.exe 114 PID 1284 wrote to memory of 6556 1284 powershell.exe 114 PID 6556 wrote to memory of 6920 6556 chrome.exe 115 PID 6556 wrote to memory of 6920 6556 chrome.exe 115 PID 1284 wrote to memory of 2828 1284 powershell.exe 116 PID 1284 wrote to memory of 2828 1284 powershell.exe 116 PID 2828 wrote to memory of 5612 2828 msedge.exe 117 PID 2828 wrote to memory of 5612 2828 msedge.exe 117 PID 1284 wrote to memory of 5444 1284 powershell.exe 118 PID 1284 wrote to memory of 5444 1284 powershell.exe 118 PID 5444 wrote to memory of 1256 5444 firefox.exe 119 PID 5444 wrote to memory of 1256 5444 firefox.exe 119 PID 5444 wrote to memory of 1256 5444 firefox.exe 119 PID 5444 wrote to memory of 1256 5444 firefox.exe 119 PID 5444 wrote to memory of 1256 5444 firefox.exe 119 PID 5444 wrote to memory of 1256 5444 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe"C:\Users\Admin\AppData\Local\Temp\3a673e2272488a4f4efe399f1061257a190058a2672ace31778031c05212e3f3.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1M24Y1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1M24Y1.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"C:\Users\Admin\AppData\Local\Temp\1011118001\HRFuUub.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"6⤵PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 11206⤵
- Program crash
PID:3988
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011153041\eikDQeV.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011155041\CewMt20.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99d15cc40,0x7ff99d15cc4c,0x7ff99d15cc587⤵PID:6920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:27⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:37⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2252 /prefetch:87⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:17⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:17⤵PID:6204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4044,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4020 /prefetch:17⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4512,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:17⤵PID:7184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4876,i,2628053606867649086,12307896062983363875,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4900 /prefetch:17⤵PID:8684
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99d0146f8,0x7ff99d014708,0x7ff99d0147187⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:27⤵PID:6940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:87⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:17⤵PID:6352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:17⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:17⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:17⤵PID:7628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:17⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:17⤵PID:7736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:17⤵PID:7940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:17⤵PID:8284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:17⤵PID:8924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15004185755475494853,10049545605463897902,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3712 /prefetch:87⤵PID:9872
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵
- Suspicious use of WriteProcessMemory
PID:5444 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1948 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1860 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b5d21f4-6c4f-4c10-b351-c7022bc17577} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" gpu8⤵PID:1460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2376 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {481dc5f0-0cde-409a-9dd4-fadcc658e1e9} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" socket8⤵PID:3168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3032 -childID 1 -isForBrowser -prefsHandle 3040 -prefMapHandle 3240 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04ec3d38-d7ad-484b-a6dc-c5b48fcaf7ea} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" tab8⤵PID:6092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3620 -childID 2 -isForBrowser -prefsHandle 3632 -prefMapHandle 3628 -prefsLen 22693 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8676387c-cf0b-4cc1-b6d0-2616f4f1e0bb} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" tab8⤵PID:6220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4252 -childID 3 -isForBrowser -prefsHandle 4244 -prefMapHandle 4240 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37ea5d5e-af2e-48b8-ae22-a91edc9db6b1} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" tab8⤵PID:864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4832 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4824 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24273c5c-c992-41eb-ad6c-af1d9da3f0bd} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" utility8⤵
- Checks processor information in registry
PID:5456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 4 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e9e3af2-b3a1-445e-8c1b-84158e3e9ec0} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" tab8⤵PID:4428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1556 -childID 5 -isForBrowser -prefsHandle 1356 -prefMapHandle 3044 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e24c2197-fc30-4c44-b7bb-adadfc81e306} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" tab8⤵PID:9124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1944 -parentBuildID 20240401114208 -prefsHandle 2028 -prefMapHandle 2896 -prefsLen 29278 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {33502e79-c9fc-48d0-9793-b7592699bc6b} 1256 "\\.\pipe\gecko-crash-server-pipe.1256" gpu8⤵PID:5616
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011161041\6JTjKQS.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵PID:5152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99d15cc40,0x7ff99d15cc4c,0x7ff99d15cc587⤵PID:6432
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account6⤵PID:6012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99d0146f8,0x7ff99d014708,0x7ff99d0147187⤵PID:6160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1536,14829842866616983672,11190875480828537923,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:7412
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵PID:404
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
PID:6388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011162001\0eed444eda.exe"C:\Users\Admin\AppData\Local\Temp\1011162001\0eed444eda.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\1011163001\wUa0W4F.exe"C:\Users\Admin\AppData\Local\Temp\1011163001\wUa0W4F.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6916
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011164041\ml3y93U.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵PID:7376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99d15cc40,0x7ff99d15cc4c,0x7ff99d15cc587⤵PID:7388
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account6⤵PID:7652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99d0146f8,0x7ff99d014708,0x7ff99d0147187⤵PID:7640
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵PID:7796
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
PID:7868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011165001\tR7DLnB.exe"C:\Users\Admin\AppData\Local\Temp\1011165001\tR7DLnB.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011166041\zi6Jfn8.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵PID:8556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99d15cc40,0x7ff99d15cc4c,0x7ff99d15cc587⤵PID:8568
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account6⤵PID:8728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff99d0146f8,0x7ff99d014708,0x7ff99d0147187⤵PID:1940
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵PID:8288
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
PID:8256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011167001\7b43750d8c.exe"C:\Users\Admin\AppData\Local\Temp\1011167001\7b43750d8c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 8206⤵
- Program crash
PID:9752
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011168001\6111c68c95.exe"C:\Users\Admin\AppData\Local\Temp\1011168001\6111c68c95.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8828
-
-
C:\Users\Admin\AppData\Local\Temp\1011169001\257646a08c.exe"C:\Users\Admin\AppData\Local\Temp\1011169001\257646a08c.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8036 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:10048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:6132
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:8684 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 1988 -prefMapHandle 1980 -prefsLen 23737 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {be911b11-107b-46fd-a064-743acbc331ba} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" gpu8⤵PID:9192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2472 -prefsLen 24657 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {78de7d9d-03bd-4c77-b5e7-2a77e8e2fbc6} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" socket8⤵PID:9720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3088 -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3076 -prefsLen 22652 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4e87a423-f6db-4dc5-92a1-eac2e4c082c1} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:6592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3064 -childID 2 -isForBrowser -prefsHandle 4020 -prefMapHandle 4016 -prefsLen 29090 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80243530-a5eb-4a92-a14a-b8511d3c7b40} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:8220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4212 -childID 3 -isForBrowser -prefsHandle 4224 -prefMapHandle 4220 -prefsLen 26944 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dcbc1d03-f4a9-4783-b1c9-cd5990c893e3} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:8044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4736 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4780 -prefMapHandle 4772 -prefsLen 29090 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {48f70faf-12bd-417d-8cdd-10af7362cbb2} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" utility8⤵
- Checks processor information in registry
PID:7056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 4 -isForBrowser -prefsHandle 5392 -prefMapHandle 5396 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a6e2046-adec-4e3f-9292-53e7f8cd8ff8} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:5008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5356 -childID 5 -isForBrowser -prefsHandle 5372 -prefMapHandle 5376 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6e0fa9e-763c-4c64-b3c2-5a2610249bd8} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:6072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5776 -childID 6 -isForBrowser -prefsHandle 5696 -prefMapHandle 5700 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c9df108-eaa8-4264-a6ed-e09ee3f09014} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:9000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6112 -childID 7 -isForBrowser -prefsHandle 6096 -prefMapHandle 6092 -prefsLen 26998 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d890bc44-b424-44a7-abde-e927f122d49f} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:6768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 8 -isForBrowser -prefsHandle 5000 -prefMapHandle 5056 -prefsLen 27153 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f7a7ee4-1f3b-491e-9e9c-242bc75ddee4} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:8620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -childID 9 -isForBrowser -prefsHandle 5264 -prefMapHandle 5656 -prefsLen 27153 -prefMapSize 244710 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {14c1c87b-f47c-4a05-85bd-4eefcfe7227d} 8684 "\\.\pipe\gecko-crash-server-pipe.8684" tab8⤵PID:3800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011170001\603efd881e.exe"C:\Users\Admin\AppData\Local\Temp\1011170001\603efd881e.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6480
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1011171041\4rXda01.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:8016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff99ab2cc40,0x7ff99ab2cc4c,0x7ff99ab2cc587⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2360,i,15485759553698075584,1326191077264641718,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:27⤵PID:7712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,15485759553698075584,1326191077264641718,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2408 /prefetch:37⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2008,i,15485759553698075584,1326191077264641718,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2592 /prefetch:87⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,15485759553698075584,1326191077264641718,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:17⤵PID:8996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,15485759553698075584,1326191077264641718,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:17⤵PID:4340
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:3428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ff99e1146f8,0x7ff99e114708,0x7ff99e1147187⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:27⤵PID:10108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:37⤵PID:10024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:87⤵PID:8368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:17⤵PID:9628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:17⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:17⤵PID:9884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:87⤵PID:8624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 /prefetch:87⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:17⤵PID:7432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:17⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:17⤵PID:8300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,8542458949129461849,480097136163508368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:17⤵PID:7400
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account6⤵PID:1592
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account7⤵
- Checks processor information in registry
PID:7796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011172001\f343dcadfe.exe"C:\Users\Admin\AppData\Local\Temp\1011172001\f343dcadfe.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:8188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2I1036.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2I1036.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3064 -s 16324⤵
- Program crash
PID:4368
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3064 -ip 30641⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2648 -ip 26481⤵PID:776
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:8028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4496 -ip 44961⤵PID:9896
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:9116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD50cbe49c501b96422e1f72227d7f5c947
SHA14b0be378d516669ef2b5028a0b867e23f5641808
SHA256750530732cba446649e872839c11e7b2a44e9fb5e053fc3b444678a5a8b262ac
SHA512984ea25c89baf0eb1d9f905841bda39813a94e2d1923dfb42d7165f15c589bd7ff864040ec8f3f682f3c57702498efff15a499f7dc077dd722d84b47cf895931
-
Filesize
74KB
MD5762e0a6a99c961a5b9112148350036ba
SHA1097f50a20b95653b34fe2a32839677a652adbede
SHA2567f17e91c9567510ce45dfe26b9afffca9c21436172ec086989b46975d2df4a54
SHA5122db8d0ec3dd42b3501b73b02e122a04f00aa1341c33a3a6e7f502c91afcd6311ab53d03e4caeca073efc18cd292b156d14def010ce4dc03d424774c3dfb759e9
-
Filesize
51KB
MD5f61f0d4d0f968d5bba39a84c76277e1a
SHA1aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA25657147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA5126c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487
-
Filesize
31KB
MD5032ec36c68025cd1a817e42f2059b6ed
SHA1e022fc7e86003c8ac7a939db8e87db6878ab4685
SHA25600bf656b4b80cc7f8d7be1cc8d1990726f3dd11a10987c9d2cc7da792c3820fc
SHA512a741915a843cb0ccdbc2b4daec75c4ccbac7524266086b7bce9005524300b7049f1506f3cf714066c72918dad34258380a88d34c895ac60f1727afcebfe5e80d
-
Filesize
88KB
MD5bc829af1eb11b4f7dd64bac4e8899ea7
SHA19906dee3ecc628c9e8a4225ce33ebf8b11d060cf
SHA2565de1babddd9aceb532810c5ccfcca59fad45bb1a34164ab233bec39fe55de4f8
SHA512671ef14becb9a5c85558c3d2a484d93d0f8477599a9c45ab1a575524fa0eba3ab0b43b03f05bbbbb3130fc22449c8158ead924d9822e5654a59d59586b72bbf9
-
Filesize
38KB
MD5cb5a611c29e54b35700e15ee1b2b2324
SHA10ea9a7477f90bb5bdb5be8462ba84bd479cc62da
SHA256f728e6672ebc5b9c31aba1caa0d93bbebd3e210522d411956e99f24d25e70b7f
SHA51294e0fba97ebe61f099bf2231459b484f2c358b5a94a4304be70cae6e7be52af007d315f4da191d169e02874ee7624a74c71e0eae879228680e66092e93f5b657
-
Filesize
528B
MD560f000dc08c9a19edce5592f3c485970
SHA113080847efd3f74e0b09e9b4089b7460852f0ac0
SHA2567ba534917575196da5f1400613bf627b154c9d9c2ca0e8f41c8c690316891c6f
SHA51217e2ae171f8a864aec314ceeae8d8fcd9d7296cae4761f8e07812cfae5a7b7a4aa569b46a1b71b81a1a93614fd6e0b967ee17d55867e37e241be232d0a83a726
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58e4cd.TMP
Filesize504B
MD5b4047074ff8ff41b730ea722f0e0a90a
SHA1fd33051e0e4cb0ef55e8628c29b9348b25b52c82
SHA256eccf195f301f96f6f97c56feea99a3c058415da61032d95c20c7c8b0649b4e53
SHA512e3a3ccfc24d6d69971587fc9c3315efbb3885c25d24b347777757a5a324dae336feca62cae265287c42995c26b3262ab08589a8d920d0535bb179ce8a388abb0
-
Filesize
2KB
MD5a3dcd4f1e34d7ff57fb4681bcece6554
SHA16e7f0fc6147ef4778492bb1254ca4e4d7135fddb
SHA256677d4a8e39e85ca39a20bfc3792ee5c91023fa25ca8a3e053795fbb002df756c
SHA5127559ed0d7608ab9397770ed2e6d8718a5741710191ffd0f4d7a2fd4045c3d66ff5164638dae970038400a0363bd3054d234f22dfbf8693dffe173d56b8d8786d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5ab560766dce2b448091f5b82ae6f0f69
SHA14975ef61153398c9aecf921a70fd7e222e3cfec9
SHA2563e1f4ac8e8d985901dea16279b4543e51f1f81b88aae7a16bc844fb1156779f4
SHA5120a52c64299fe3d90e78707bf0888778d22eb25d2f005965c7097da7f2a75f18c91d6bd75e95a02348a52696b6f3930a705ecb77837aa4c3eb8bfbf505b857b69
-
Filesize
9KB
MD561addbb731bf6c5d938d10413ceeb3fa
SHA1bb788e7b6ab446f88efc0912fc68594adc88e15c
SHA256496cb5a605128afb580890c954dcff3f8b2f7033484f70a5089fcdf9e03a103e
SHA51263c01256f1f7be269425a8d1104e07cc0b9e18671cc9091d9a183cd22cb55bb1ce4a549a6e602fd00e218e0e4033295f8969b2e31d4faf52d0c1cd8df272ec57
-
Filesize
9KB
MD57a399f276d4efb515536f742946e8bb9
SHA1161c13b9c68be4464a2b9b791e1740e5e533e03e
SHA2561d6d27222b592609fa65689d08ddd0cc100869822d5acc9fd9116d665971cbee
SHA5123a0cdd468bf65097ac61040c0822822ef99d885a40b9398cd2ab113ed6e88d1ca921d4e09056885cd63782beeb2c222304c9731c784e308a8d59eef4915841ef
-
Filesize
9KB
MD500c74fc3eca767360d50ad1d1362749f
SHA10f243bc2dae3cd0eeb56e080a581677859d63678
SHA2560abbc527c9bb6611ca058f3815f3918401772fdea38e541088b1ca10532a1195
SHA512728571608336d55aebcf62e66e86ac0f1e7c52a5a940d2ad2da46d15ed7e5eeddfdae9d40d89fc026cd81a5ffed5d4cde05c6a7d013311901c22cb100e19f6c1
-
Filesize
9KB
MD59529282fe62d88988e744dafbdf026ff
SHA17e722107874d3cc59936b7a512b6103812f9d66d
SHA256ca338e90f43c88fad91d39cde55d1d06f0708d0d1c88d2366015ba868230fd71
SHA5120817d81a9e89c79e9db8f800f516bcd8cb21aab0265682f4281b4bd5758f11cf2fcdc1aa3219d72b828041036b7697b780a1f574aa29140f496fa1dd9a58a0d8
-
Filesize
9KB
MD53ebf439cf3f4f5f2864ccf6f878672f4
SHA143101d5c1ef22162c1bd631bf3455d4d9b155b60
SHA25603fb80a4020fc70946885ccb9a7e9cf738699eb47847b45b68dbc4844fb9b0db
SHA512229ca796f8e48ba7b278c1f13af8a72ac529e28a5e173c96ce8e34a9c9d292070c779a63347026255555c24af9366183db523e4970026d44f71bb06b9061f99d
-
Filesize
9KB
MD5e0e9b3bdb90eea1f67bc455f9407f78e
SHA152e5b7951598677e15bf08a0bab25e95676400d2
SHA2564082739a17fb4b92684b87482ddff17cd706f8b9b0fc332bf27c2627fa3e9123
SHA5123a5892d6af91d0458d44f56e758741b530597bf2ad81a392314b6f0880a04e35bc5aee0e332e81714c7fe4652cc2cac8f99f93b1f1d1e3f685c89e17c0f2dfa0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ca3107e4-1004-4050-a887-0d781fe518d9.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
116KB
MD567648fa99c1d054fb795fa71e7015ced
SHA1f3f8f118f6030d6c892c9771edfe308af8fc6c5f
SHA256cd9fdc0aca65523755711160ebaa394ee3431c181fa053e26de45c5affc08388
SHA51225ad260c4abf387908a752ccc19204afbcbf1c37a3e06657cec5f98716a287279c06bea72d7bfb1aff70322c32c8fa14c330b2f0fc8215106ec2739d5989483a
-
Filesize
116KB
MD5175cb0dd0d49bb3364fc5c1053586896
SHA1c36a2875934a8cd2b7e885de84befb0efc4d09ee
SHA25629e4e20cd780cc3b1bfd66b62e20eee794f14e4b720f3dade0e46a813dc9bd72
SHA512ec9bb69e7574bf147465e9bc1ff817c71f1fef198961f61bddf7eeb0b36ca15c18d8d4de9a43404967692f7c6ca8bdfec19abd70f85c9c11bc888e5119a08942
-
Filesize
116KB
MD5b7aaa33b0d28471821f7bbcf2600aae6
SHA10b9f97df0c30b163b9a6609452248a50a3d9918b
SHA256905c9e335168a340162663058c4370fe7bca88d78dfac0d96eecd39b4dcb410c
SHA51230935396aa24bbed8e927bf39b60fd38472c5fc79780bcc6d7a9677cbcbca02c84e31a08fa658d314e2c2db19c60ab67aaf8f2eb51dec3970c4ee3188a722bce
-
Filesize
2KB
MD56d24997f242dc653def8728d9488c068
SHA11b941f5c45e696babad4546c87503452a9520e6c
SHA2569bdd1e8971b3da6d2f9adf8cf3ced4b4a7380c1259aed22ed991732f309e02f0
SHA512a4a67868c39a5fcb45ea63607709119ebe625087bbf9b79a9d57be87e29432e17e12573f45ddb605f1e030ba1f2b2044746d115e57958c98066256f3cb2f4f2b
-
Filesize
152B
MD5fec6f16f171f3ba55568802a7592f7fc
SHA1d679be0b4270bfd7d811bc8d028052a267160eab
SHA256770fad00532e966f5f2e2a77afb0a177187a92b72c5b55890b3907300f91a652
SHA512c7e88c90b615c353bef4f425d84c8e128d53d12f9a07cc1261b38bcbc3187f47ae63e38a614f2287f22b3ab08dcfa48b317c6f53d8cf391f3502df3966a2381e
-
Filesize
152B
MD537128b4e4883085adb70212099d33acf
SHA19c716ed5401e9dc2c6879b03f0a34d824d2ede99
SHA25691c7f07e7aa52f1e4d6751b4ba31d098072197bf3ba6a4549d213f9fe1de1ab7
SHA5123e3851dbdec3560fc5eb18be51de362acb4bdb889c66d1794b97f29a8a3a86aca900406360778819ace767653d083be45a21673e232be205e81ff36ddd9f63ec
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
74KB
MD58c78e2344e12fc51d00c1e8af4722170
SHA159e92052d13b01aabdbaaa9f6b5a4d6d816af5e3
SHA256d267ddd23b52e73f289cf020e4dc6ba66a6f509d59f6e72bb72c18bc3ba65e24
SHA5126f2676857ef5be8e0a1cf34a8a03af79359ceac2ebe7ff8d33f28c2b0720c23df091671ebbb7b35b753b412c6cb73b78ea8e9b6dbd454c7f86d1891b150ac542
-
Filesize
88KB
MD5a6e17a2d0d36585239438ad03bde49c9
SHA161a099b223a0264f346f0a0a64a0f3ca3d76a20a
SHA2567cd2c66ed46b30daa837f00f48dc18b57fa3e674dadc6f59c9ed9b2d66044c90
SHA512e8992893015ee318637e062d5dbd2572055ba84f5d32a9bf40344bc97dceaa7f557429018acb382117f3b6684887d129c7a4ae120a00be62a371cca245d911e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD57597392092a2f4325f664a5a34a500c4
SHA14356917a8e0370509d6743e439583c869af23095
SHA256a05cf9c80ad780cd8a2fca3dd8d0a9b1086ce8e54a19b4948a92a2114e2df834
SHA5126de21adb0d0b16beb59472f3cabd37070cadc414691584dd2dec3487da99b5e68815a1b9a0a30f3bc0e03192f79473a8647667fbff69fc260d2ee35797e05d0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe58e7fa.TMP
Filesize384B
MD5b677ad96730a63ef9839334bf21d9046
SHA1e3edcd874fb9087d967d617c2c3c25e4f5299624
SHA25633e5f672ae79f46bea0efad1f7fede33060559f43a90358ae94eb3a17e043b2f
SHA512f788ffac0bf3f2ce39edc22ad2d1efe6eed10e23764f60c07ce14e6ca8a7c5c9355d6ea2f6dd624e5731cd2fafdc3bcc68335bacf9adaa8f815c2e00adcdb485
-
Filesize
1KB
MD559843ea38b119a91bbe82a43ee10160f
SHA1a855fb1382298187c317495b7cf057903e17616f
SHA25625d87662b93dca6236c8225b023da9f2e6d593e9ff5fad4b3df75591fe7ccfae
SHA5120a407fb3b61a5f970a3c8437a6643cecaef247854a203845b7909aff42064bcfcbc50fe114a915a3a6a9c80de039c4eaff813d4e6dc5f22b1d93bbc4f6424a68
-
Filesize
6KB
MD5ed59564df5897fe3315d3799a10f3457
SHA168df1146d54e3c360a2ef40d6f7acc27fae2459b
SHA25699834ad472ba7a3897d05dd7b14c67f2580b7754cf615aa145800ea8e3b92151
SHA512832c5ed62ca6661ba7737bc7ef883d6d1f682bf7714657f89af4bb6feaa661b1b916d47de55673b19b0696d7ab184862e346c224e8256e258f01d0e65b10ea20
-
Filesize
5KB
MD5684b2a14c6ea16d8735fbb2aac8c664f
SHA1a3bce3653c7c111032d555c748d2173127ba91db
SHA2563ef9d30670e74a880c9ae9a512eb7ae8f1930312ce98e982ae904e3cbb983227
SHA512e019dd8c088aae484cf7a6ab9691efa365bd30dd89d0bf0eed0a67b691f5a6a122b417f55207fd98753521d0c134ebbe4c38807a3eadad3c0fd7b20bb09530a7
-
Filesize
6KB
MD508b02e0c50c84161e72b8e2f43a8bc9b
SHA12f86d1976c6b03480b0bdfbcedf60318d1ebe76e
SHA256ee3671647c53ff13a050dff649bad21acdaaf1aa1a79976adc286205654b319c
SHA5128cc62f96619378a931a9efa3008f8a4a92b49427883b5ba6321a0ab11fc7d87e3b36333d131e554461f80fb66b2bd981a4d4d7ca8451e9b4fe598ec09cb6c94a
-
Filesize
6KB
MD5868a7a40e751d08fea866ca46c49a4a7
SHA10a80bb8b0fda2c1d475e6bbbb37e19461dab81aa
SHA256cef7359a0c120e674295ad873176bcb6564523be5fb6d5d20a21f4e7109c84fc
SHA51233d4eadb883ec7c375607a51a700c16d413b4cceeeee84c4907eb8f65310cccbc4484b9ab0fbd17456b9e17d026a9271c2a11efcf82b0c65b8012d9bb909adb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a05e4373-ce9e-4689-a6fc-06986ef66578.tmp
Filesize372B
MD5458222ad2433db8601a1bef7ce697dbe
SHA1cf6f55bb9cbfda5ea3ee5294a71841c1469dd3ab
SHA256123f2c7ce505e44d0b4ea0fafac36f94c5d95a326b40886a7be13b25e5912d27
SHA5122fe9108b68e0af080c46dca29dd2508891c896b85c5ecb8e86a4f2f95fa895039b544c3a927843f2fd648f958d23447bbafd749fa1b99d9681f144483de6c34f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD512b60eb42401cd15f0e4ccac976c7eed
SHA126b24f4696ae058931da6164ea4a4b7f3f9824aa
SHA256051dd8f73fdaf2d0aeec0a3543806406a18c5bd4b152ced9a185a128963c43f7
SHA5124d9a84e43f58f57c4ce60c1206709e5dc5bd1c614d14c87f6af8dbcdadc90258bb30b2a76ce69177a28b387a3580fc13e363bf7d3bc9d40632981bf0649b3c15
-
Filesize
10KB
MD55e805d1423f895ac1a5378d447cfa407
SHA1e8417a79278ebda4ab9325cf4783b76c81e8c55a
SHA256fbdeac08c52cb9691ada124c1370816437100b080b4d1dec12b74cd55342ac2a
SHA5123680fef61b8323b2f9591ca23c36a4e6a2855a9b6886c4834aa2e222d6f77fbf4778af13f9256ce4a252c22fc73efba55b04c60098fe85ce311254c106a768c8
-
Filesize
8KB
MD5f2aaf95a8a2f9d63f204d5324df23367
SHA1e234b37355f1095a821d579376603590cc9e172f
SHA256505748d8f624d6ae59c75c8d2af561e1d00ab187000c5f11e9e478a8f44ea8aa
SHA5122dde00a768ed847a7badf9c1202fe3f0b311569e909c1391539b97fec2674e58fddabf5c50af688de400de783a183d5752837d8ac8655700f4194c1e40f83ea3
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
14KB
MD5e7c9e711bc11a216763c07a79eef0f41
SHA1c8d692761028fe03e84ee23c9ce2913b6edd6392
SHA256c10b811d97ff542b4ff26175ec9c5b2900c5e16fc6238cb609f09881ffaedd6b
SHA512943f1195c82530fc4773ff39302dc84d454f2e727842b6914cf7f7f7d034d400f78b615456b49525673dd031c6a9f4ed5c48c750dd510c9942bac6d084d62c88
-
Filesize
16KB
MD58969aba1c633afdeff5f9fe21554e5f1
SHA1bd7d3fab91ef760509c36f05d4397e1e5a180740
SHA2568fd1b94e6f2e300dbc47d670626e774afeb16ff314a49dc79c2bf96b4f0545f6
SHA5122ad28abf00e3ecc7cd20b4a820e42ce9c0736d72f3cd8213d5be4608e320637e9c805279df244a5145239d537963c89b66336944143ea246028300345fba7dcc
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD52eb0ad9cb317bdb918798e59879bd4e5
SHA17e3111bc566e02931d35ab824a882dc130f9cdcd
SHA2563a3fded94f111d8057e63a790cab33c1130fcebc630ea4ddf8aecfc7dac4990b
SHA5124367e2ea67949ba401bb8df05b3bca7734591102c5abb70e0467782abf3e8079046beda5f90f4b23f49b0e257a42620a494429a9848b5e5546ca2b85a3589cc9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\startupCache\webext.sc.lz4
Filesize107KB
MD5126798c0032616f45514340eaa10b994
SHA128ca874474684703dbb643a444d7417c9f80de8f
SHA2561dad14abc4eeedec39933cd0b58782f4963d8490f3447dfc2c1ba9bfab765fe9
SHA512a8c7eebbf3d1aa828475b5d4ce37de8abe257d5195f9f043ea82e24f957f9d3d74649377c35cb11b1f5a9f2b23fb66bd864e3fce627a8c8aaae62b2a1d426712
-
Filesize
217KB
MD598da391545b4823ca67e6cc3a927dae9
SHA1d2f66837884d6d65dfe21372501cc7ba1d91ef29
SHA25612862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7
SHA51259130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9
-
Filesize
1.4MB
MD503757138d540ad9e87a345bf3b63aebf
SHA183a0b3ce46a7178456763e5356bf4940efa41cd1
SHA256659ef7c3fd01df95231975c36e8e45444f6329da33a70e58690f2ee75c7a722f
SHA5120f08c40ff45829c608a42a6d0d12c1b2a726d315c28f0b4330320a7585506474f72eca550a90b042eece41911174859e95d4b5056c77999a1acf14d43e5279ca
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
132B
MD527b9f35dd5e29794e0f254d4006f6fa4
SHA195496ffd85e8e55f57832b24c90a900d3cc96b26
SHA256ca3bd2725a493554e081ea2c5528c7f134edad6374e2747e27230f112cec7f1d
SHA51244dbb780e4e25e3eccc2de8c3edc7b0a4bb18e1f7f9cbbdd046ae74dc4daee526fdc5339864a66eb9d14b48b0871f474fdbe22eb1766eb4e94b0b6460fd5841d
-
Filesize
4.2MB
MD5818532da27c6ed97768ab94607612f66
SHA199216af849b745434d0e728400a5da9ea0eac96f
SHA2560db9cd98808b856cc4e61818330ff6a1ec46621ab9b30e779078f2fb78feb36c
SHA512ae6d4008ad40a08ad23b7b460c53af287c923171973cd8c090e5abe0b3b67f14aa291f8ece578697405e6c263c3316c5f19c8a94c64a8cbe4b7496dc345b6224
-
Filesize
3.3MB
MD54f5b3afcb912cc578ca99e764982fcbb
SHA1b3c48fae3d65996413c3409c46e69f71dcb20222
SHA25645c3382a9c6b97af680eaf0a01d24204708a9a80a7bb4e285814319056b0016c
SHA51226586a27202699c660472855c13c0ff9d6c1722f9739e5ee37773d36304a1afc46a7b35e3892014d65b6b3cf30932211962a79799b577481b3ae4dcd92f56efe
-
Filesize
1.4MB
MD503233712acd5f013f87b7a1d80a70a8a
SHA1d597bf14b98c31d7079368110527e229d5653323
SHA2569707d11827331b9babc2f2b426630d63c7960234ec3ddfc2dc19a529690d96c2
SHA5126e8d3b175efec3955005d748ea2008a03d90eab35799f732389e6428ebe7a9a56f1044d43f79f75cfe69ff13b1848d4f4d89c7242088bb0b26917071562585dc
-
Filesize
1.8MB
MD52426e5ac8ee0bbb03e63d7467cba1df2
SHA16cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3
SHA2564b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5
SHA5125697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c
-
Filesize
1.7MB
MD5868914554c439b7a6b83049364992a6e
SHA125abe8a1a31431cdd953322af0f259b84dcdc1a2
SHA256f2b87185d453c7a71b472af472e1fdb3bf32147990de0b1b24cff92fa1379eea
SHA512467d51eee7390973af084fb4522871cbda0b99fa9531166f4cc92317ef7ca7969c37f8cdbfc0b27bb978becbde4b87f300ba5f3ad9958e3c3c19f6b95b331977
-
Filesize
951KB
MD5179fd003e42d0224546f0fdb62b817ce
SHA12147ec1b1ab5041b6b8f490a88d398cc22738014
SHA256da6e65bd0e61e8acbceb1a7463e3058ea356f3e80849949ff83f288d9d663b54
SHA5129784953c6ebe07f27283f761f6a2934212165001b687b47b2e55bdf97a25560da74260bca59fb0c29531d5dbc5f7377a0db6b53a6503fb04723d8d3a6a572cfa
-
Filesize
2.7MB
MD5efbfb3a86fedf5412820ca7a22b79bb4
SHA1b57d5f3f913aed6c5839792d55a1738cec46d575
SHA256f4e311a2227dbd534801f8e11b8874ceff3f0db73c158f46e3c00eb9cd4ee601
SHA512abe85f2b74d0418a044d914564b447851dc494ee48ee1b348eb21caf3acdb40e020c99e4d654f7e2b2efcadbcb503e893e4be23d2c12d76ead24d8049070cac4
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
1.8MB
MD5f8488624049467d9225f383cb4059c81
SHA102cb299d2112bdbbfa31ddfc64690894acd0fed2
SHA2566ed0a91a09ba7b3e60fea4b64d54ca00c121862a8f707de6cf0427adc5190f1a
SHA5127f7da92e69b3762e2fc1ac7d2a323871b69b293e468f4d7f1f11e63b5d9860f38bfd15dd2cc77e80efac2517ff85de39c62cb82327f0c594dfe3f0e0096d110b
-
Filesize
1.8MB
MD59993cb8165c832f8a679afbf89237282
SHA1ab6daa8019bcb4bd94f5585a7e8bcbd1428f0cb3
SHA2564572d447052d29a23b288818b4b95d75e09c336113b1b559401466c74532b35d
SHA512006554a56e8686326e282ab7014dd34be6bd15552abdd7216e64cd237435202fa7371b8d7bcda3109054a826ffb1a30cc52cba7ebbf303703d563a24cc9a0e32
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize15KB
MD512f2e5548a53d4c77c08660c27905996
SHA1b26d955b3ccfb675a541b6881fd9173c44b03120
SHA2561cba9cc76af8e91e0ca66c20925ac8bb77d150e02d48f0b7ec34eef1d3948b95
SHA512213f70302c7a491c3b9b69f4ae89d5ab708bcd4e6797f4b82d8be9f89b1ff5808f20b9c31df2d2f29e2682caed1a788e565d7a6598e94f43b9faa1c37826b706
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize16KB
MD56f2bd0f7fb51ad6ee51507941c7f86ee
SHA117a5b8aee52a5037c446f7cbf644c048b8c759e3
SHA256b95bb75316d824a51033a75fad6aad127dacef15b8c12f01376379428e3cffe6
SHA5129dcae5e519324b804426f3618fe23b06fcc4657e96fccbb19873d05c9dfbae7c08b5eefebf62c232a830f7b5c0a0952a953c5a6661321aeccfcb4ca52ada12d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize21KB
MD555507c7dc25080d738317406c92387b1
SHA1d9bb016d6a48348fb0b7e32fd054f4d675d3da71
SHA256be03d498e775ea2a0d451c47ca496c850c80ccb9aeaa02a8c64c33e2baa7e47c
SHA51248b4b3ebd334ed0dbbdee915a0e8fa5adb79aea06e8b97476a7f7c5cd90f12df9266aee36cfca424a082d6b43d5d9ebaa7b316c2d7c4f0f41a2b564b253a2221
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD5cb06e6898c916442cadb4559cd837062
SHA17d2de0de554bf4c7bb80912ebbd382e64d966c93
SHA25626d70f35c445a0c5a0db4d11e7130b7a61c19fe0454bb9e834c4002e31260082
SHA51203ccefca167e46a3b5f6298586c62225c699206746b78091b454401cd36df52eb76ab9f0bc8c8e72d02ed9b783e746834c73adf83c021a48482a2d0a346820f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize7KB
MD5f5f4c1a761e9166833fa743e6d31b8db
SHA15ac17d997a1994e59ce5981154ff48a97c15d211
SHA25663382862393a90adf19c0debcaf9744b9351f6624b33f3285bc1172921cfd567
SHA5129c0e820f29780ca67e44aecf311dc8bb37ed716cacc362defff6c9930b10a9c9edb178ed851660ccf69225bafbeb1c674c81baf4a05b45f2921450c2f0793b15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize12KB
MD53631acbf22c29e89677bd668b668b255
SHA1c9f06b07a11ee2caf7fa97eba52de3e94d52db37
SHA25694553984394e6a44dadac0ed4bcaa4c46772ce740d75990b7d31091c35020fa1
SHA512a4babbe8decd0ca0a9b9ae2d4a62a24ec19075c1b385f1166e688ba534cbf79c68901d06274921c505065cbba8fa6832ed69840a102c4621b8dfb02c602d4587
-
Filesize
512KB
MD549a1c80ebc0e95034954d8215647269b
SHA1c206cd79d2b909d3d787db785a6a13a4b4cfc264
SHA256a8e6100946117d13d2cdfd1eba135467ff956ae951296c2f713b5b59d2d610f6
SHA5126a789c5c202383154aa0ac29d3a7e47466d3690ce3ce676091499f7768d40092774a016439d5d10a0bd7ec5c24a9ca59590db21749b7e2ae4f8a078dbe795b74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD56ad9ca9ec64bb5d3fbb4c1dea7826db3
SHA18d078b8ced0f2b37738060772a09add38ed4bb85
SHA256a1a3c70cef4e42f5864e43154f54ee45e0703e3511ad9c5e2be5f164535b5814
SHA512ffbbc8783442d687f944912c619bf8c5b91adeb78e0c9b1c9a5a2c7682fe8a21f328aee9b5c384dd57ec24814b7a8072e436e087fa7695bd987d1ad4d9a36901
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD548c6b0254afb43eb8325acb2fff9bd52
SHA1a37f91db6977350d343aaeea6b65e21d54a5c828
SHA25686cf79f9f533df46c30637e1f74819804d208ec56d05334eb5ff6aa614f311cd
SHA512ccd552d2dbc53b11863d237dd82d6d3a9fedfa2b2ca43191eb55fb1080ccfa21f565f5629a24339d2ece34e2d5370cbbac15bc910a6da749f56880f47a56a286
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5fc1a7d2ebc8894ab3a7fb08f9a5727bc
SHA1b939ea831cb0b9074244ef069691cbeb20da3075
SHA256218e26b2a7a94c16099691599e1fac143fb0afe45e452fcbb140b267bb68abd7
SHA512acf39f5182dddf3c7cac52c79f05e450c4adefa4da60c68be2b58858e36a60f94f58934bd6386721d704e1a6ded7878b81c01054ced899786a86a3aedf592bf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD57c082feb34446aaf1d49a9163c490d3f
SHA1cc3230d685702364b94d36dca85d6bc90fa3e8d8
SHA256bb909d30301ffd82732a9be187c80e0d5f0e55ec24d7a5c765cfbcb21d926e51
SHA512b210bdfaababe8944cbcba906c84ff36c04d77e0bb0514f3b2370b3f20d30bd61f8619827a799fd2d5c638cd621b4f85c081892a093a5662db7c57dd846ab7db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD56c6d7c2dc358fe0d70a1fc7e136508b4
SHA1d6e15031cf9553082c083a4c2653a4afb81e11ef
SHA256f55e7d1332ef572fb894bef36324d2d1dcd131dfcfdab5c3041a73ad54cfbbe6
SHA512d86fd7b30071ae7d32f9c6550bf516b996c14d1f8705aa4c94e211a4db3394b4a46418b3836bce8ced014682e9a214b4d5223981565fd7f71f6bc053f6c8a307
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5053ae9be119171b3fe63f8fc35a09514
SHA1f0a7a94811681c27961e976c683aa702f46a66c7
SHA256407ea18fd2f2ae8820df45b21948bfcfae4247a5cd4377f9b562b36a8abf1a25
SHA5125cfc6f358f8993e1e75e1424b690c9847a9fc6ca74744a97d7abc585a1c8c02abfe92824382764a66b505bd6eedfcb11b1692573bcbdb6a89abbd5e564c258a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD58de2c895a61649adbbcd062319c52851
SHA1816a8b82653b369686d4f8ba1ccf76483ad83ced
SHA256b872e6a662604785bb6a6588f22c3fdba945a218dbf277a0f201030871f690ad
SHA512815b243948c42dd9f9855c56ce8a5d2ff441de2d3223ffac02356bc14be3da848d6a905ef7b85786c5a58ed1d79014d89050d35239d838f0952194ec16f7618b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\06cacb9f-05d0-4af9-bfc2-4a9376069f15
Filesize659B
MD5a0c93f21db174b63d00bb9cd5fbc440b
SHA1d10d7e9cd18443b40ef422d679292f9b841799ec
SHA256383b2ef0695afe8ad51b79b228029517fed008ecc6cdfdd0c6182fcc9a016cfb
SHA512a37a385aa6e133bc20b17937e978b14d5f44870dcc9f7c559e9b71173c59a32280b85f2ae81ef85a92978c194ef24a7a4bd67ee0e5f349f19a4f44e6a8187d03
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\16f9d418-99e4-4d38-9407-1578f8708ab3
Filesize982B
MD5e541f68c1b5c6cfb2a9ef59525952306
SHA1ebcaf71dfcde628db89d769657e10ac6db02aab2
SHA2565ea49659b9e95a64059a2808b76c106db1907277836508a4ed6ccba0aab2f6f3
SHA51292d3785230b65929d61e6e39b5e571dd58fa17f440b99cec0f6db5061f1904812d00915f01aafb3954e7e91a0f0c93299b5f87b298a7eb293d481e715020ddf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\937c855f-f86d-46ba-a47c-a3477ca4de27
Filesize905B
MD5f2406153283b1878de5e45286d33524d
SHA17bb54bc8f52e2a982b26b56940eaa49bc588b5ce
SHA2567327cc470988841b8f6b5888ea5ae83298790a26024296d532dcbbe21f8b5513
SHA512b5930b8562b48fbe50c3d867adf558ca708a13f1a451fbd48db83e28dbce41cb18d69e1165dcf85d47a4d69a08fa98c154382ff232795dd16b0c485b08e34aa5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\acb13d50-2d91-4857-af5b-fe1b64155043
Filesize648B
MD5d915792ddeda04aa0aa32bf39d7dd06f
SHA158e0ba0ae462901bd6060c6abc2402fd40972247
SHA256ebbbe099c8d1210088b0b90e800d5423abc82d41d9495b8c7af2fdb69a710fc6
SHA512f0c6749eb342c1e3694e99dc1f3ad8eed4dc78ee19ae4a9d1505ce46559a194d29549e306c0ce69b9de3f06af4464f7dbce3e14f4646cf3f0df0d5c43b8e269c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\f8d7ba3e-453b-4d55-960f-43ea95415465
Filesize711B
MD5b2946ebbfb9d254be788cb65811480fd
SHA11588b937d1257577583cf9b2bc55e6efd3cb93a6
SHA2562ce0b9d57605b2a2e50de8eae945c5ca4232003107a221b7ec254b39f11c2525
SHA512ed00ed4b0d2a403813ec3f87e9b647d858b58db563f52a99789cc42d0d8dd190342f40fec503d4b80f5445009b3f0eb47e8ebbf627fbc63c5cdc2db13194d82a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
5.0MB
MD57e4dc18f0196c15985bb3ff2298dccf2
SHA159d324ffb2b82a43346f66fa895916a87d2f428b
SHA256660e5a55ab2533a3240e46531bfe97fb03780b1b9ffa57643b17a0f3671d95e7
SHA512eee4691e1f8e7831098162872ff076bca38b24c5095c8de8c217cd79d6aa435a33521fc037c8a68286b58befb6934c1a8bca8d2507da57fb3337446c352e1f2f
-
Filesize
11KB
MD5ccaa03619a65ab0314bb1d4b1e7de6d7
SHA1ba59c9fedf92c1be5281e7d45028ad82117b9ae7
SHA256b6e59dd30fcf15a99a32c38ed49ca31fa26a2a8933e6f559c67c071c8611600c
SHA512b7d3a015252d3b57c64bc00797f6bd3bf323090b874380051c4a943f1d7714a7e5ee61134b88424a21accaff34510963a06b30e9d364cc6fc0b7a9d055ba3b94
-
Filesize
10KB
MD54d91e276f39809546090350a3b3532b2
SHA15feca80051fea1aee3552b79fd9b32b567b9f341
SHA256d2040f18681f26a24903b99b2441930c11716bfbca4f84e7b93f3eb6bb1445a5
SHA5123dbcb209f483003754319d0ef01dc929e4e40b582fb4da1be8928fa79c00625457426502dc9f9fbe994dcaa03cd7be88ec5e743f57cc5109751e9886dc769cf7
-
Filesize
10KB
MD588a9fee1164f366ed788531e58b5b155
SHA1e7fc97dccfd0c9c7a92328b29bdb50c0f401f6cc
SHA25670c412e43f6776b041b47c1f55e6b1abf1e5f5c2d31d15bef84108bbc76eae0d
SHA512ad4f5246d970426d8f6bcf041feec945cd828fa57d97931ff89079c3578171fb49929012d9437c6a34ce2133525947e280e2ac5af1883e8e80027556ddc792c7
-
Filesize
10KB
MD575b53a507a7996402147450605297914
SHA1442938aa4812a799f467f8a14d2739e3786e5905
SHA2560710c0ff6bc9053ca24845e7d6138a0212c4b3bd526618f942402090e9d8a9ae
SHA512c8239de17a22b7bbf8ad193e18aa8386d60f6973ed609117f7a1680207d54ad40cdc1971f92cbf602fe68fde29c0ee32364608bd5c71934d96f5d6abf31d1d0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5b104a1d5a6ee4f41fcdb2c56d89d63f4
SHA1485b496e472025495d86c4ef0a811d0d44c9f3a6
SHA25666ed64a6c39051df02aa1e6daf1dc272d7c18271824253fea44202fc124744e6
SHA51251409bc84feeb44d3a07a5e2b9f7a3dd3d0f04117fea3ddc388f2f61391659b102b9b4108af186258c386dfdd5b0f3c060a69080fa7d96e60a143a2527055394
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD522e7f6108122fb53a01f7f8fa84e7ceb
SHA178ff1057d7c8ed06901a61dd7a425a5dc475b191
SHA256062ce26d83a471318a813d0620173f110fa77929bd0b870390557aa010586c89
SHA512f6730c541c036da665c8d7ae5dc4a81fb81fbba38a45819f57c395d9422c429aa8ecfa42d841551c74f14ac82b3aed9a1ca12f6475c950b7321bc80f87eea4dc
-
Filesize
126KB
MD5b48e172f02c22894ad766c52303f087a
SHA161da0ff26dfc3759f7cd79696430b52f85073141
SHA256712e46f7a4f9da7fabd0b1acd5e848527bd70b6c4444dc92c8479ac108d71753
SHA5125b8a888a9d87a4ee34f57799d3d6baf69cd556a2d1336afb109adc488a5efa1c7cd094c3785cf9af726a0c41be3a56a0ffac933b7fa7fb5dec9643f3af08bdfd