Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 17:17
Static task
static1
Behavioral task
behavioral1
Sample
8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe
Resource
win10v2004-20241007-en
General
-
Target
8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe
-
Size
7.1MB
-
MD5
de16056f45e6d98f84dd38a78fa355e0
-
SHA1
56d833711751143044398d868c2a3f0d70ed066e
-
SHA256
8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2
-
SHA512
da4045ac6b5f0080233500a4c501e989b899b8916dde5a2f1f92078943615910a51891dd9dec8ab1121b73a28c6c5069755fec426bf392599113a53eea9ba1fe
-
SSDEEP
196608:T61etDwoo14zL28osWzvnp629hdbj6ypDXM5:W1cnoaX2zswnb9Hf68DX
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
gurcu
https://api.telegram.org/bot8009002136:AAHPJrz2-Pn7ZXvJ8icMhaRHpwMHWNcOutY/sendDocumen
Signatures
-
Amadey family
-
Gurcu family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5d60497ec0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5d60497ec0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5d60497ec0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5d60497ec0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5d60497ec0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4o587L.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d29a5547d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4o587L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f0ac6eb56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d60497ec0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a846bc2230.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1k74W5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f4472.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Y27V.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 12 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1968 chrome.exe 6280 chrome.exe 5148 msedge.exe 1872 msedge.exe 2904 chrome.exe 4548 chrome.exe 6624 chrome.exe 5864 msedge.exe 5860 msedge.exe 6736 msedge.exe 5476 chrome.exe 6268 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1k74W5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f4472.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d29a5547d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d60497ec0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f4472.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Y27V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4o587L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4o587L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d29a5547d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d60497ec0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a846bc2230.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Y27V.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f0ac6eb56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a846bc2230.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1k74W5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f0ac6eb56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1k74W5.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation vvcWObH.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 15 IoCs
pid Process 3652 e2q73.exe 3332 L0o66.exe 4636 1k74W5.exe 1752 skotes.exe 656 2f4472.exe 3540 vvcWObH.exe 5100 3Y27V.exe 3096 4o587L.exe 4524 0f0ac6eb56.exe 4012 d29a5547d3.exe 4676 c065e5281b.exe 4512 5d60497ec0.exe 6796 a846bc2230.exe 6656 skotes.exe 3668 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1k74W5.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 5d60497ec0.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 0f0ac6eb56.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine d29a5547d3.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine a846bc2230.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2f4472.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3Y27V.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4o587L.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4o587L.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5d60497ec0.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" L0o66.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f0ac6eb56.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011363001\\0f0ac6eb56.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d29a5547d3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011364001\\d29a5547d3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c065e5281b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011365001\\c065e5281b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5d60497ec0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011366001\\5d60497ec0.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" e2q73.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 api.myip.com 37 api.myip.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b000000023c0c-154.dat autoit_exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\machine.inf_amd64_b748590104fe1c15\machine.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\input.inf_amd64_adeb6424513f60a2\input.PNF dxdiag.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dxdiag.exe File created \??\c:\windows\system32\driverstore\filerepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF dxdiag.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4636 1k74W5.exe 656 2f4472.exe 1752 skotes.exe 5100 3Y27V.exe 3096 4o587L.exe 4524 0f0ac6eb56.exe 4012 d29a5547d3.exe 4512 5d60497ec0.exe 6796 a846bc2230.exe 6656 skotes.exe 3668 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1k74W5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1088 656 WerFault.exe 87 3928 4524 WerFault.exe 109 2880 4524 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f0ac6eb56.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c065e5281b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4o587L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d60497ec0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f4472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Y27V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d29a5547d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c065e5281b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a846bc2230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L0o66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c065e5281b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2q73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1k74W5.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dxdiag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dxdiag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs dxdiag.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 12 IoCs
pid Process 1144 taskkill.exe 6340 taskkill.exe 4420 taskkill.exe 2952 taskkill.exe 3028 taskkill.exe 1668 taskkill.exe 4892 taskkill.exe 4712 taskkill.exe 3280 taskkill.exe 5356 taskkill.exe 5832 taskkill.exe 5872 taskkill.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{820042AB-2051-41D0-950F-1EDC9A591BB5} msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID\ = "DxDiag.DxDiagClassObject" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{89F5E59A-F0F5-4C7A-A657-35554C6FC897} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\ = "DxDiagClassObject Class" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID\ = "{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer dxdiag.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider.1\CLSID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\InprocServer32 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove\ = "Programmable" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ThreadingModel = "Apartment" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\ = "DxDiagProvider Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32\ = "C:\\Windows\\SYSTEM32\\dxdiagn.dll" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A65B8071-3BFE-4213-9A5B-491DA4461CA7}\ProgID dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ = "DxDiagClassObject Class" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B} dxdiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID\ = "DxDiag.DxDiagClassObject.1" dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1 dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject dxdiag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID dxdiag.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 4636 1k74W5.exe 4636 1k74W5.exe 656 2f4472.exe 656 2f4472.exe 1752 skotes.exe 1752 skotes.exe 3540 vvcWObH.exe 5100 3Y27V.exe 5100 3Y27V.exe 3096 4o587L.exe 3096 4o587L.exe 1588 dxdiag.exe 1588 dxdiag.exe 4524 0f0ac6eb56.exe 4524 0f0ac6eb56.exe 3096 4o587L.exe 3096 4o587L.exe 4012 d29a5547d3.exe 4012 d29a5547d3.exe 2904 chrome.exe 2904 chrome.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4512 5d60497ec0.exe 4512 5d60497ec0.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4512 5d60497ec0.exe 4512 5d60497ec0.exe 4512 5d60497ec0.exe 5476 chrome.exe 5476 chrome.exe 6796 a846bc2230.exe 6796 a846bc2230.exe 5392 msedge.exe 5392 msedge.exe 5360 msedge.exe 5360 msedge.exe 5640 msedge.exe 5640 msedge.exe 5148 msedge.exe 5148 msedge.exe 5864 msedge.exe 5864 msedge.exe 5860 msedge.exe 5860 msedge.exe 1872 msedge.exe 1872 msedge.exe 6736 msedge.exe 6736 msedge.exe 6656 skotes.exe 6656 skotes.exe 3668 skotes.exe 3668 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3540 vvcWObH.exe Token: SeIncreaseQuotaPrivilege 3352 WMIC.exe Token: SeSecurityPrivilege 3352 WMIC.exe Token: SeTakeOwnershipPrivilege 3352 WMIC.exe Token: SeLoadDriverPrivilege 3352 WMIC.exe Token: SeSystemProfilePrivilege 3352 WMIC.exe Token: SeSystemtimePrivilege 3352 WMIC.exe Token: SeProfSingleProcessPrivilege 3352 WMIC.exe Token: SeIncBasePriorityPrivilege 3352 WMIC.exe Token: SeCreatePagefilePrivilege 3352 WMIC.exe Token: SeBackupPrivilege 3352 WMIC.exe Token: SeRestorePrivilege 3352 WMIC.exe Token: SeShutdownPrivilege 3352 WMIC.exe Token: SeDebugPrivilege 3352 WMIC.exe Token: SeSystemEnvironmentPrivilege 3352 WMIC.exe Token: SeRemoteShutdownPrivilege 3352 WMIC.exe Token: SeUndockPrivilege 3352 WMIC.exe Token: SeManageVolumePrivilege 3352 WMIC.exe Token: 33 3352 WMIC.exe Token: 34 3352 WMIC.exe Token: 35 3352 WMIC.exe Token: 36 3352 WMIC.exe Token: SeIncreaseQuotaPrivilege 3352 WMIC.exe Token: SeSecurityPrivilege 3352 WMIC.exe Token: SeTakeOwnershipPrivilege 3352 WMIC.exe Token: SeLoadDriverPrivilege 3352 WMIC.exe Token: SeSystemProfilePrivilege 3352 WMIC.exe Token: SeSystemtimePrivilege 3352 WMIC.exe Token: SeProfSingleProcessPrivilege 3352 WMIC.exe Token: SeIncBasePriorityPrivilege 3352 WMIC.exe Token: SeCreatePagefilePrivilege 3352 WMIC.exe Token: SeBackupPrivilege 3352 WMIC.exe Token: SeRestorePrivilege 3352 WMIC.exe Token: SeShutdownPrivilege 3352 WMIC.exe Token: SeDebugPrivilege 3352 WMIC.exe Token: SeSystemEnvironmentPrivilege 3352 WMIC.exe Token: SeRemoteShutdownPrivilege 3352 WMIC.exe Token: SeUndockPrivilege 3352 WMIC.exe Token: SeManageVolumePrivilege 3352 WMIC.exe Token: 33 3352 WMIC.exe Token: 34 3352 WMIC.exe Token: 35 3352 WMIC.exe Token: 36 3352 WMIC.exe Token: SeDebugPrivilege 3096 4o587L.exe Token: SeDebugPrivilege 4712 taskkill.exe Token: SeDebugPrivilege 3280 taskkill.exe Token: SeDebugPrivilege 4420 taskkill.exe Token: SeDebugPrivilege 2952 taskkill.exe Token: SeDebugPrivilege 3028 taskkill.exe Token: SeDebugPrivilege 1668 taskkill.exe Token: SeDebugPrivilege 3780 firefox.exe Token: SeDebugPrivilege 3780 firefox.exe Token: SeDebugPrivilege 5356 taskkill.exe Token: SeDebugPrivilege 4512 5d60497ec0.exe Token: SeShutdownPrivilege 5476 chrome.exe Token: SeCreatePagefilePrivilege 5476 chrome.exe Token: SeShutdownPrivilege 5476 chrome.exe Token: SeCreatePagefilePrivilege 5476 chrome.exe Token: SeShutdownPrivilege 5476 chrome.exe Token: SeCreatePagefilePrivilege 5476 chrome.exe Token: SeShutdownPrivilege 5476 chrome.exe Token: SeCreatePagefilePrivilege 5476 chrome.exe Token: SeShutdownPrivilege 5476 chrome.exe Token: SeCreatePagefilePrivilege 5476 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 2904 chrome.exe 4676 c065e5281b.exe 2904 chrome.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 5476 chrome.exe 5476 chrome.exe 5148 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 3780 firefox.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe 4676 c065e5281b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1588 dxdiag.exe 3780 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3652 2940 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe 83 PID 2940 wrote to memory of 3652 2940 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe 83 PID 2940 wrote to memory of 3652 2940 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe 83 PID 3652 wrote to memory of 3332 3652 e2q73.exe 84 PID 3652 wrote to memory of 3332 3652 e2q73.exe 84 PID 3652 wrote to memory of 3332 3652 e2q73.exe 84 PID 3332 wrote to memory of 4636 3332 L0o66.exe 85 PID 3332 wrote to memory of 4636 3332 L0o66.exe 85 PID 3332 wrote to memory of 4636 3332 L0o66.exe 85 PID 4636 wrote to memory of 1752 4636 1k74W5.exe 86 PID 4636 wrote to memory of 1752 4636 1k74W5.exe 86 PID 4636 wrote to memory of 1752 4636 1k74W5.exe 86 PID 3332 wrote to memory of 656 3332 L0o66.exe 87 PID 3332 wrote to memory of 656 3332 L0o66.exe 87 PID 3332 wrote to memory of 656 3332 L0o66.exe 87 PID 1752 wrote to memory of 3540 1752 skotes.exe 97 PID 1752 wrote to memory of 3540 1752 skotes.exe 97 PID 3540 wrote to memory of 2388 3540 vvcWObH.exe 101 PID 3540 wrote to memory of 2388 3540 vvcWObH.exe 101 PID 2388 wrote to memory of 3352 2388 cmd.exe 103 PID 2388 wrote to memory of 3352 2388 cmd.exe 103 PID 3652 wrote to memory of 5100 3652 e2q73.exe 104 PID 3652 wrote to memory of 5100 3652 e2q73.exe 104 PID 3652 wrote to memory of 5100 3652 e2q73.exe 104 PID 3540 wrote to memory of 1588 3540 vvcWObH.exe 105 PID 3540 wrote to memory of 1588 3540 vvcWObH.exe 105 PID 2940 wrote to memory of 3096 2940 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe 106 PID 2940 wrote to memory of 3096 2940 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe 106 PID 2940 wrote to memory of 3096 2940 8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe 106 PID 1752 wrote to memory of 4524 1752 skotes.exe 109 PID 1752 wrote to memory of 4524 1752 skotes.exe 109 PID 1752 wrote to memory of 4524 1752 skotes.exe 109 PID 1752 wrote to memory of 4012 1752 skotes.exe 116 PID 1752 wrote to memory of 4012 1752 skotes.exe 116 PID 1752 wrote to memory of 4012 1752 skotes.exe 116 PID 1752 wrote to memory of 4676 1752 skotes.exe 117 PID 1752 wrote to memory of 4676 1752 skotes.exe 117 PID 1752 wrote to memory of 4676 1752 skotes.exe 117 PID 4676 wrote to memory of 4712 4676 c065e5281b.exe 123 PID 4676 wrote to memory of 4712 4676 c065e5281b.exe 123 PID 4676 wrote to memory of 4712 4676 c065e5281b.exe 123 PID 3540 wrote to memory of 3280 3540 vvcWObH.exe 125 PID 3540 wrote to memory of 3280 3540 vvcWObH.exe 125 PID 3540 wrote to memory of 2904 3540 vvcWObH.exe 127 PID 3540 wrote to memory of 2904 3540 vvcWObH.exe 127 PID 2904 wrote to memory of 3652 2904 chrome.exe 128 PID 2904 wrote to memory of 3652 2904 chrome.exe 128 PID 2904 wrote to memory of 2120 2904 chrome.exe 129 PID 2904 wrote to memory of 2120 2904 chrome.exe 129 PID 2904 wrote to memory of 3592 2904 chrome.exe 130 PID 2904 wrote to memory of 3592 2904 chrome.exe 130 PID 2904 wrote to memory of 3156 2904 chrome.exe 131 PID 2904 wrote to memory of 3156 2904 chrome.exe 131 PID 2904 wrote to memory of 4548 2904 chrome.exe 132 PID 2904 wrote to memory of 4548 2904 chrome.exe 132 PID 2904 wrote to memory of 1968 2904 chrome.exe 133 PID 2904 wrote to memory of 1968 2904 chrome.exe 133 PID 4676 wrote to memory of 4420 4676 c065e5281b.exe 134 PID 4676 wrote to memory of 4420 4676 c065e5281b.exe 134 PID 4676 wrote to memory of 4420 4676 c065e5281b.exe 134 PID 4676 wrote to memory of 2952 4676 c065e5281b.exe 138 PID 4676 wrote to memory of 2952 4676 c065e5281b.exe 138 PID 4676 wrote to memory of 2952 4676 c065e5281b.exe 138 PID 4676 wrote to memory of 3028 4676 c065e5281b.exe 140 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe"C:\Users\Admin\AppData\Local\Temp\8896bb6c5d1a3e0afae8143e4520676f72feae12c7b23b600e7b689d5e7c54a2N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e2q73.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\L0o66.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1k74W5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c wmic path win32_videocontroller get caption7⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_videocontroller get caption8⤵
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
-
C:\Windows\SYSTEM32\dxdiag.exe"dxdiag" /t C:\Users\Admin\AppData\Local\Temp\dxdiag.txt7⤵
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=16630 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb384bcc40,0x7ffb384bcc4c,0x7ffb384bcc588⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1748,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1740 /prefetch:28⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1880,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1876 /prefetch:38⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2032,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:88⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16630 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2904,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2924 /prefetch:18⤵
- Uses browser remote debugging
PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=16630 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2940,i,2272495318656064496,11189506106874561400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2964 /prefetch:18⤵
- Uses browser remote debugging
PID:1968
-
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM chrome.exe7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=13817 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb23b2cc40,0x7ffb23b2cc4c,0x7ffb23b2cc588⤵PID:5492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1832,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:28⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1844,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:38⤵PID:5924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=2116,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2324 /prefetch:88⤵PID:5984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=13817 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2936,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2952 /prefetch:18⤵
- Uses browser remote debugging
PID:6268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=13817 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2956,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2976 /prefetch:18⤵
- Uses browser remote debugging
PID:6280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=13817 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4092,i,9182300557105319082,10962612480020825465,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4076 /prefetch:18⤵
- Uses browser remote debugging
PID:6624
-
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM msedge.exe7⤵
- Kills process with taskkill
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=11986 --profile-directory="Default" --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb231446f8,0x7ffb23144708,0x7ffb231447188⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2096 /prefetch:28⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2148 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2628 /prefetch:88⤵
- Suspicious behavior: EnumeratesProcesses
PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:18⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:5860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:18⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:18⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:6736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=11986 --field-trial-handle=2084,3371283286643708990,9217412396627180900,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:18⤵
- Uses browser remote debugging
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM firefox.exe7⤵PID:3284
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe8⤵
- Kills process with taskkill
PID:5832
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM firefox.exe7⤵PID:5128
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe8⤵
- Kills process with taskkill
PID:5872
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM Firefox.exe7⤵PID:5620
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Firefox.exe8⤵
- Kills process with taskkill
PID:1144
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /F /IM Firefox.exe7⤵PID:6060
-
C:\Windows\system32\taskkill.exetaskkill /F /IM Firefox.exe8⤵
- Kills process with taskkill
PID:6340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\1011339001\vvcWObH.exe"7⤵PID:6120
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 18⤵PID:6568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011363001\0f0ac6eb56.exe"C:\Users\Admin\AppData\Local\Temp\1011363001\0f0ac6eb56.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 16847⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 16807⤵
- Program crash
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011364001\d29a5547d3.exe"C:\Users\Admin\AppData\Local\Temp\1011364001\d29a5547d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\1011365001\c065e5281b.exe"C:\Users\Admin\AppData\Local\Temp\1011365001\c065e5281b.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:784
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3780 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3e0e004-9259-42d7-b0aa-fb3225accb8b} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" gpu9⤵PID:5048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2452 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d77683-04fa-473e-89de-7e59c6a2fba2} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" socket9⤵PID:3928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3380 -childID 1 -isForBrowser -prefsHandle 3096 -prefMapHandle 3292 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b28e24d6-734a-4ed5-837f-ef7a313d27a7} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab9⤵PID:492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3900 -childID 2 -isForBrowser -prefsHandle 2960 -prefMapHandle 3888 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d163c454-dd34-4e4a-af5e-24f0efe0a8a2} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab9⤵PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4420 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4600 -prefMapHandle 4596 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04609ec6-78bc-4258-838a-d9dfe6100bf1} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" utility9⤵
- Checks processor information in registry
PID:6148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5108 -childID 3 -isForBrowser -prefsHandle 5100 -prefMapHandle 4996 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e4d3c13-7f80-409d-b34d-ba5d59568ee5} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab9⤵PID:7132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 4 -isForBrowser -prefsHandle 5300 -prefMapHandle 5304 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2181e9ee-bdfb-4743-92c5-65a53d1bcbe5} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab9⤵PID:7152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5488 -childID 5 -isForBrowser -prefsHandle 5532 -prefMapHandle 5540 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99bea529-44ac-45b6-9bde-a5f207d63bdc} 3780 "\\.\pipe\gecko-crash-server-pipe.3780" tab9⤵PID:7164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011366001\5d60497ec0.exe"C:\Users\Admin\AppData\Local\Temp\1011366001\5d60497ec0.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\1011367001\a846bc2230.exe"C:\Users\Admin\AppData\Local\Temp\1011367001\a846bc2230.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2f4472.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 17085⤵
- Program crash
PID:1088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3Y27V.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4o587L.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 656 -ip 6561⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4524 -ip 45241⤵PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4524 -ip 45241⤵PID:2624
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2100
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6656
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3668
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD59e930267525529064c3cccf82f7f630d
SHA19cdf349a8e5e2759aeeb73063a414730c40a5341
SHA2561cf7df0f74ee0baaaaa32e44c197edec1ae04c2191e86bf52373f2a5a559f1ac
SHA512dbc7db60f6d140f08058ba07249cc1d55127896b14663f6a4593f88829867063952d1f0e0dd47533e7e8532aa45e3acc90c117b8dd9497e11212ac1daa703055
-
Filesize
320B
MD5c115182d3fcc4e8d354b95bbdc3857ef
SHA1137ee479b0963a95192940a773fb9b27137478c1
SHA256f1858646c7926ec79eb80cbbd191c6e4c75c4303206aa0bc67f794fa66df131a
SHA512f335592363c2410fa05c41350f86d51b85092b506d49ee306968d1f22bd57c0f149c4e565bc1a0bd19ec9cb5e934bdb590888564a39af335cf2fc6abc88fa53d
-
Filesize
329B
MD595e1e3010023d3ceaeb5ed90f3827df7
SHA13415dfa980f237365072b75158c2b3abcc528129
SHA25614a826a93370c7858c7d78c9dd2948252b414c83f53b7216601480f973efa169
SHA512531d2928342d56ef84d56174e322d80fea32b89a987996d6d79fdc05d8e91889d1a1c3d7ef28cf3236bcf5dc938c6c6263ea6162a29006e6ac6be02a85ee63a9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\29749d94-bbcf-47c7-9c0f-f206902fa83a.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
333B
MD5b6e386064faf0ed080b7e070fe592ba2
SHA1c32c0b8ad27153ceb36dd0179049fee0af07e387
SHA256978185cebc207478ee31f59d9e3676abb0d2c6a04d1177a53883d86d6e95068f
SHA512c0dd5cdfb6137c2b854b923e8d7ad20ed0b2da0ccdd47deef44b24eeadc7dca2b830b79ae54bf9515514da443f14d999d4cc0210ff605f432e26724dce9734dd
-
Filesize
308B
MD54e7982b86b3d7d916b7722aa3b3f0669
SHA1ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd
SHA256cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340
SHA512c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb
-
Filesize
317B
MD5df7b67201e483fbdafa7bb2b8c8e46a6
SHA16ba134c4c20d207b5143361b626517c4e0f15f51
SHA256395cd37a1b01ca08047561a6e69d04d54c7d8fd3820e1f2a7d5a2fa84d86ca3b
SHA5120d2e47a95a1520e91dca9c8c962d50e3e678d332f18481fca60924867355fdfdb5d1b6444105f8693af6a4f5ea5fb7ae52733bbc5e86593a10a7ff23a18f4bbb
-
Filesize
345B
MD555adb595b579c8c957c7c65ba8445ec6
SHA1b30340b7419bbf3e905ac53566d7271683c870ed
SHA25699b6413e8b157e974a167eee9a9bdfbf11a343934f6fd176f7797205aaebee0e
SHA5125bcc315c8c533db0c4562ad2349dc48405a152b4019606962c91fc88195552baf1a190e8686229080dbcdf3e6726db80d9f186823d0f317c0b2b988b20d7c97d
-
Filesize
324B
MD562b8b67112cb27f2a4e180096be0247e
SHA1a82682d243276423b18b4529ae7352b3fb564340
SHA256d87e1c4ed83a77b816d0278848016b019dcd8d1f23dff6d25da75174428bf519
SHA5122d45dab800aaf8c3a7dcbb2b023d6a5f1439b5de0e97b3e2b2e9fe8dfe75c02e47c67af044c70ea9c31311cb8fa86297cacba34a01138c619cce8c5b1cd946a2
-
Filesize
8KB
MD561475be663440a24ef8cc48c77d957fa
SHA18c4de79d85ee5886b0106e76ffbe460da545b2dd
SHA256b442fb2a256dca3fc7aa16af645fab3d2c138551af3086a76a3a0285f56c2c26
SHA512253b87747c4492b92129bc74fc53c6c09512cdc622ba1cb12124e1cde0ab1c3e9e77d8e2a9693ec5a0826e847c2266ab3b085c9ada7f6b4d091960ecfd2ae68b
-
Filesize
14KB
MD5d9132c8c45b4fe3a7b3bda53b300032d
SHA1a1e2377f4b1e7fba66ad780e48a29547e24f18f5
SHA256d2e14cabcbb5553092cad535ec57bdc323a14ff7380ba7f01a847fec96b329b1
SHA51245d5491d15fa1ff1f8b209366506316f56ea146f9e770fc863089aa8ee3b009f2ccd1e6ccbf4eb3177784ccc35f8ff3a1bcbffa04a0aa78cf49d1e29b5fbff52
-
Filesize
320B
MD5afed09aaf305b3341cd2591676959416
SHA1c7550ce42bee741f79f8b423fda3fd24647bba8a
SHA256baf74821c9ef4e1eae40b1a3234af632c768ef5488e1960bd67b1c1d947710c2
SHA5129705843953f1d9102bd7669e9179efec7bd367062c8e168bb0064534b4ef6e229f1157677b9ee758d300aa69ebced502c09d8bf7435aa486369668ecbd645668
-
Filesize
1KB
MD5e8be80aa28ff20d2fb5db4164beb089c
SHA1e077bc1dbd9691426fc12a965d5eb7a0a7e054c7
SHA256b9fd78e2d20e48e7157356b6dc202b9d7e69f2cdc4873eb71ab2c4cfd4393e71
SHA51242f8b26c5178b5291327abda5f92fac051e2cbc61a6d4bee2a96e89a4ca6d0caa0679f241e75de438836aedce9a081c161daf1d1681c83b308b5802bb8994b84
-
Filesize
338B
MD5876b984158968ee5e1bf31dd256b98bb
SHA19aa9744cdc9835f8f0b9c94e8c59fb8160c8154c
SHA256529bf94789c0040fdfdde30f42852afdb47aebef03bbeb4ddec137af09d93f80
SHA512b18341de1307d6e0c2afcfed4de948d9439ef42631c3fdc1bf288dd01769f22e3e4da2660d955b2359ffec02aecb965569a8cfe8a253a7633f4fb69864ba6f99
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\369730ed-ffde-4954-ac19-89230703a418.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD5ea262adae8e1fb903bcb3783e3241791
SHA1f88127e9b8b5e00bdf61bd3ffb4a604b2d12ea5c
SHA25609014e7a1e946e4527309fbd27273d60897d60f6022b5d49bf73af907278ffe9
SHA512aacf688cc0bb7ba73c3a23ddaa71fcb0ed93e8c5f0e179a8cd11506fe1d0c4a08483703efc2ae02aaf0f0ce4fe9f7ac4b94ed44f75b8f6df2d2d07cda109906e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD58c9384c0ca51308cb9c7c6d41e2e8674
SHA15db273f79f0c08b5370a19fe74a285750c7d2f4e
SHA256d4429ea03b8fa283b4a3f4a10c5e51a84273a85bb7522b45eb07204f1b486249
SHA512316a1eabb3ca7b44e640134f0c4b58be59da5f059739bb56c1ad3016fe889ae5ab7214c82a93ed35b5a2f689cb5f03e59b324eacdf6b40ab55ef77b84940fcd4
-
Filesize
560KB
MD5197feb829312be2d9505c1492b6ddd16
SHA14e521c36e4fd6c7755d93f8281cc028a980b0979
SHA2562a08227ca39953cd8f967682f4f101f8debdc323b63b37aa1e9ddc38b9009a12
SHA512fa9b18fb32f2892a4844fcf3d29823c1375daca8b3c46ce2dd048e3b11ff2ba2acf6ef73c38e57d16712e75304c8961cf7f2dee4213dc10798f645f9d59c8cb9
-
Filesize
1.7MB
MD5d0f2c0640871f010112184d7e059d71d
SHA14b15d98aa959f70998734981c6c57a12538c71a8
SHA256cb3d8ee15d2b14e807c77b92a7c48675b1f9524547c163ab787f82aa56ed023e
SHA512f7f355f8593cf8c913638e246698c9a184279ab0eb523c5ae60939ce3387cda78dc6210d1f5eae110269162f75b3b3b196c3dd123e6d69d0e31b34decc9857c8
-
Filesize
1.7MB
MD599dbc3dc8a5a570531e619921a3da5a4
SHA1955d1394d9074948e6f2a4ba90d316930580d9b9
SHA256f9f42f3b2bf9665693451da26453f988ab5f0c636929bc5e39203e24e65e9b92
SHA51236da7b98b3ac918f33498fc3f46b0e1c0790580b223ad1600c53dfba8e9078a69984b65f259d20e164ed34d0b7b386f2983558d84069d007b8858ec63c242e03
-
Filesize
947KB
MD505ddc021a4b3ee147c8f107bbe549fa0
SHA1f0dabac9cac119dd4eeb8540f51e92cd3dcfb543
SHA25678bf23bf9328f0dc4d586a8534eadcc7e5db0c227b3bab76af4be20be2aa2722
SHA512cc44c10831296ee0cad1143bc814745d63e872e3668d7f35a520ab43a262c335bd97d77a16374d9bfa514e722e4614b59a8ee0f9c7a068fa2b1b3b8d5e305c81
-
Filesize
2.7MB
MD5d074af8129d64ccd7455fa7691582b25
SHA128ab71be91261912fa60093680f852ef29004d48
SHA25679e9912fa56d1e8a79defd3db070450e34a253b2bdc36f7b6eca42bc9cf18fb5
SHA512c2570d7a2f5a3d6f1fecf672e6a1832186fb005a9cbd2a5456382a1ac4906ecc0f2f182cd5e297ef3e3ca79c4b2ada3f85f241886ced64e82925022bbb67444d
-
Filesize
1.9MB
MD5972aeaccbec56da479e178a53d3b24ff
SHA1af7d676bf5c59c2ac6cfaaaaad067ed34090e675
SHA256c4a071a267dabdb052c37972911874070424f210cd7f3aa6e33cf4e08efbd87d
SHA51253599df300461312f499a4c8ef303724d74417b5d26a9cf189a35dcf6a76d0aa686c8341af6e50c35182d769c2223407cf9076878fbaf52e0f6c2933dff319e1
-
Filesize
2.7MB
MD52490b83d42152804dd6911dae9d57b9d
SHA1f0511fa429173266a5fc4173bc2317f44db1bf76
SHA2566f8b8367498695d4e0dde1072b4b31e4aa5e11d73bab3dbda858a287186e9c3e
SHA512a712e56b9aa52901ba13ed6ac00d3565f890ed69e81fd661b5df651903c47b9389d4ee905041f34b3cb3381b29c1762907db1551ed7cf16b2b468a6caf765cea
-
Filesize
5.5MB
MD5efd1c6bfa8e79db02b5081e9e941a9c5
SHA18bcfe0d602b90daa5f98fc1e7f43355ca8fb8775
SHA2562f7e38f1eea5f968083a60254110e43f35bb578280f7b34147eee19e1e2d3e4c
SHA512e700b7e3987f33122dcb474ecbd8836b8f54f1cdda39105949a5d80f9c8428666e978db7eab80aae40f2c0524266ab12511b05876c15b7af31c18fa544ca3e32
-
Filesize
1.7MB
MD59c9d3e584df24ab3e393e1cf3a1d22bb
SHA1fc54421a0f10399c33daa802018fa55d1cb3fc1e
SHA2568c32a93b51b5a8f3dc864634df9e64033024814f88d4724d321f4af591b5fcff
SHA512548277217b14c89bced03e197f6bfe1039c22b36bc831263a3c28ef73d454317fc3d5ce6b96d6c02f80b24660ee0c1d563ba659365c3e51a432e89beb4f1957c
-
Filesize
3.7MB
MD52ad344cd9ba7765d4aef5ae48b9f9de1
SHA161233c777d2c1e920d48a62febbbfb87f8cb0385
SHA256a681dc8677a089ba5912b93791a1c8911adaa5ff58da99c25620f8a738e1ad97
SHA5127938b9ac2201164dba801473335dc9eeb16950a6beb36a5405f00de73052b45f1a7372d2cee0ad9cadf0cd3b5d8f7d52139b2f43f99a0c9bd23fc1f634acf280
-
Filesize
1.8MB
MD544880800383f2d1e6ba9415f3ab244f3
SHA1e0c65a51792be71d737c657164eb71dfc33e756a
SHA25682460b8569927f518661f783b5690e7feb08d8cb43afb5d0ecd01127c2672ef6
SHA5124505f7fd96770a6836e74208cccdc14e4692bef80ece4ac2bdd76d35e47c12254973e3cbcd254aff0a81eb370ac91edc3cf1b7f158227defed1b4235b5a517c4
-
Filesize
1.8MB
MD5ce43ce23bf4d7d8900e1d2c977a21485
SHA1abfb344c9e741d65422f860b6a264427edae49c4
SHA2566d880676ae7d6879ae8a558d891980c4ea1ff1f35fe389e611939a89b3ed5763
SHA512a1ace2a775c4c3928bb6db2f1355f700ef87394704ad4c94c130dc12642473063a56343a5417315276df3ca0ab013b5a4862a01cc5fe749d92365a75da639958
-
Filesize
86KB
MD55cb5d9c71ade118899e3d494c32f5eb1
SHA1be1ccb4603b67edee76af3b4096c5dbc08e1ebfe
SHA2566c67994ebf90ab1acd86e09295d81788db497f384fbf6c8fe3a9fbca58e968f9
SHA512ff61f5f465acbd5fcff7e3c6eb64364b8b189c756edad52cc986f51b4c4c4288d42c76550dbdd239c525c1e43a73c33bac2c6b742ab3539368684669c54b2866
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD508924cc45e262187ef29d73737d510bd
SHA12059b5dc9847c989a9c49d1fa2cfeece4499bcf0
SHA256fae7828a8c9cdeefd5aff832cff6cde75bd25b97a15db0f5a13b392adb215e36
SHA512cc4f16c0c4e947e4732566dbd3465fdf35ee142a49b8dbe1048ae5488403a071b4421754b265b4d3e4f28b89572fdc9c185eaa33836d7217cea7305d3f0fce54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize13KB
MD5ce917ece0203b3fdba614c00e2f3e8e7
SHA1f23e0e8e66edefe6f3418372e7b2d8c99c3b98ce
SHA2561ac2f4412c1a293759943d2d890d7adf238b465943ba573e24a35305955da5c6
SHA5129ccb564f4dc229090e83b3249a15681c17cb3a777fcb34e19ac698ddf70de716da3cd12fba78f0f95133e61c2e4f1c2b9aca48678c4b48e7fae71eefe9d095a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5c76751e89a768902f3c6363fa738ed60
SHA1fa3051c14e6d144f8d78efa0ab7071dc0af95a8d
SHA256b80c4674d79cd58f402c511a64488fefd3da54e79e1d2bad865d01df04fff08e
SHA512856a77881df7da0a164d7dc94cd0cf20d1a1af139e195060a540cdace873a5def9485b8a3f975631cd3f78a3abc5cd274571e5cfd579d06baea18bd837a6afeb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD51b86aac2d790542f0ca284c5c9b09430
SHA18e014f45ed54c043bd7a2c6c8450a9d1deeb0bc5
SHA25626f1b8773cb780fc3058cc6f51905131a1d20886da4a1edbaa2a17b12354813f
SHA512a3dd4d5ce83798192e4c4f3dda9509552ed4bbda0d4507f6f6eb5fcdf199ee4cd5d28a3719f1de70d34b7a21a6016ca77c2446808feedcbfee71db665c78831a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50c705c930ea875bebe9b6e98e2ec6663
SHA19d7fcab78dab578404e09584bb1324c50ea0b51e
SHA25660281a196b4eaea4338c4371f849c85ccce4551bf5e2b81c97dd7d9b6daa79e2
SHA51206626671d70cbb7874e816ab82941eeae76fe36c8966d77b3a73179d8ad0d753b69f3af9f06e3c98dd8baade63e50b808ae5f4d3d6b1e2f8e77868d6ada0d19c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b67d6f71c690dddbb863174976c3a2a1
SHA19cde284637afb2f04dd8ee7170b798f2a95e61df
SHA25605987bf67230db6d192f799cfa55cf82c57d0f58acd5304b3308f1471aab33ad
SHA512c869fb11fc2f2f3f84e092c7db55acf63569341a6a0e5e321ca328cb3f5789fe470b730c049f1d6d9c28f4266763d19eb8eeb548993a1bc63d2bd815d26f8c34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\009d3c29-cb82-44a8-a732-b469ea5228a2
Filesize26KB
MD5732fa6c5e78ce3a455b4616491855b5a
SHA1c0536d97dcdface42e64ad0a14cf3de9cfd2695b
SHA256b48b967de6302c0202614e3dfa8a37de32b91f1496fbb4708b32391d6864235e
SHA5124202ea373c3b0102fbad3c188f13d57277ac090451fb494fb16d4559a7a54a292e9bec0d47c1ea5e7f349406104037ba833676d89b7b7fd97e1c028dddfec33a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\61f2e214-3ae3-4e08-99e2-d8bad2c2a613
Filesize671B
MD542897c64c380449cce5926dd14c0c608
SHA1a6667c2d75db5fa84d8f67b4aef192b18398db41
SHA256a3225b7700bdf2ced91646ce30989897e88f9a895709fdb358fbcc5f3595d6ed
SHA512b0583fd72118fe6e73649245815c0e9e74970d5b4c1441201081b2672d4a9c368b1cad781f48fdb60dce980c5031c6e6ae355874f398c83662a2c99606e5af56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\bde9faa7-4be5-4368-aa65-d3f6b903630e
Filesize982B
MD5ad77e3dfa7db28b750f9e4b9c6a4bce6
SHA1f78432b9ff7bd04da17760158bcd60764589b301
SHA256de173c6268788735892de8d00a5648ab48b0d26e53a6286e4f9b7eada7888352
SHA51219c24a2bc908e12e6fa34d8a1a7af5bfb1784f139a6f2ac78d15d5ea143fac0f55aa1aaf79e58a3a67c1a2792372c57610c85cd3032e0df5c9fcb8944b317181
-
Filesize
10KB
MD5f4585357a6e5a18da6fb8af8b5b1c253
SHA17ac635414f3b7b9f7d0c7210b1f23d7f59959af0
SHA256a50eff36888b04c15fef177dadadbfda9b1cf4add64682c613cab7c22233ac91
SHA512f970ac12c319c0417b21319959e6a09dab6ae6545e61d4a62258eef4e512545fbca53e51cded6c61edef9959b06b9c340bd42de2c87d57b36677ac89281051bf