Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe
Resource
win7-20240903-en
General
-
Target
c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe
-
Size
1.7MB
-
MD5
69028d86ffdb8a59a9127b47dfb0ab38
-
SHA1
22d638c41ec4e8edfbb24d6ef6ccde318b581b84
-
SHA256
c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367
-
SHA512
dbb7a989466b49646b44a0635a22188eba4139b57f7308753b6a1fb233f7f3c7a1fac91de399bb40115bb1a4a816caf789c318c44dfcabce8ef16958f11dceb6
-
SSDEEP
49152:1+KLIuC5IRN5Rx3kJoGIFAwgYFT1LYoa:1+K5CpaGlYFTHa
Malware Config
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://ratiomun.cyou
Extracted
lumma
https://ratiomun.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9b084a59d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9b084a59d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9b084a59d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9b084a59d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9b084a59d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9b084a59d.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a4f82d81c5.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EHIIIJDAAA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a4f82d81c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4ca59e7a8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GI59vO6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BhD8htX.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0cc835df23.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc76a107bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a9b084a59d.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1680 chrome.exe 1568 chrome.exe 1632 chrome.exe 1708 chrome.exe 2212 chrome.exe 2196 chrome.exe 2300 chrome.exe 2264 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a9b084a59d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GI59vO6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a4f82d81c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EHIIIJDAAA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GI59vO6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0cc835df23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a9b084a59d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a4f82d81c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc76a107bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4ca59e7a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EHIIIJDAAA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0cc835df23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc76a107bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4ca59e7a8.exe -
Executes dropped EXE 12 IoCs
pid Process 2216 EHIIIJDAAA.exe 1412 skotes.exe 1536 GI59vO6.exe 2676 4XYFk9r.exe 1840 BhD8htX.exe 1236 a4f82d81c5.exe 2644 rhnew.exe 2088 0cc835df23.exe 1172 bc76a107bc.exe 1360 d4ca59e7a8.exe 1512 7d5edb40a4.exe 3588 a9b084a59d.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine BhD8htX.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a4f82d81c5.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine EHIIIJDAAA.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine GI59vO6.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 0cc835df23.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine bc76a107bc.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine d4ca59e7a8.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a9b084a59d.exe -
Loads dropped DLL 23 IoCs
pid Process 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 1692 cmd.exe 1692 cmd.exe 2216 EHIIIJDAAA.exe 2216 EHIIIJDAAA.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 2676 4XYFk9r.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 1412 skotes.exe 2088 0cc835df23.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a9b084a59d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9b084a59d.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\bc76a107bc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012202001\\bc76a107bc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\d4ca59e7a8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012203001\\d4ca59e7a8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\7d5edb40a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012204001\\7d5edb40a4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a9b084a59d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012205001\\a9b084a59d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 33 raw.githubusercontent.com 34 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000400000001d9d8-732.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 64 IoCs
pid Process 680 tasklist.exe 2816 tasklist.exe 408 tasklist.exe 2736 tasklist.exe 1896 tasklist.exe 3836 tasklist.exe 3544 tasklist.exe 660 tasklist.exe 3908 tasklist.exe 2728 tasklist.exe 3884 tasklist.exe 1488 tasklist.exe 3792 tasklist.exe 1512 tasklist.exe 108 tasklist.exe 3428 tasklist.exe 3456 tasklist.exe 3952 tasklist.exe 2184 tasklist.exe 3672 tasklist.exe 3752 tasklist.exe 2692 tasklist.exe 1896 tasklist.exe 3324 tasklist.exe 3812 tasklist.exe 3456 tasklist.exe 952 tasklist.exe 864 tasklist.exe 2388 tasklist.exe 4044 tasklist.exe 3104 tasklist.exe 4048 tasklist.exe 3432 tasklist.exe 3592 tasklist.exe 2804 tasklist.exe 2208 tasklist.exe 1780 tasklist.exe 1432 tasklist.exe 3508 tasklist.exe 2956 tasklist.exe 2764 tasklist.exe 3508 tasklist.exe 3632 tasklist.exe 2260 tasklist.exe 3908 tasklist.exe 3400 tasklist.exe 352 tasklist.exe 3748 tasklist.exe 3908 tasklist.exe 3552 tasklist.exe 3796 tasklist.exe 3952 tasklist.exe 3984 tasklist.exe 2164 tasklist.exe 1704 tasklist.exe 2428 tasklist.exe 1020 tasklist.exe 3452 tasklist.exe 3864 tasklist.exe 3420 tasklist.exe 3344 tasklist.exe 1516 tasklist.exe 2864 tasklist.exe 2840 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2216 EHIIIJDAAA.exe 1412 skotes.exe 1536 GI59vO6.exe 1840 BhD8htX.exe 1236 a4f82d81c5.exe 2644 rhnew.exe 2088 0cc835df23.exe 1172 bc76a107bc.exe 1360 d4ca59e7a8.exe 3588 a9b084a59d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job EHIIIJDAAA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GI59vO6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc76a107bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4f82d81c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d5edb40a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9b084a59d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BhD8htX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 7d5edb40a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EHIIIJDAAA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cc835df23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4ca59e7a8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 7d5edb40a4.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 3480 timeout.exe 2928 timeout.exe 3944 timeout.exe 3488 timeout.exe 3920 timeout.exe 2236 timeout.exe 4080 timeout.exe 3600 timeout.exe 2436 timeout.exe 796 timeout.exe 2184 timeout.exe 2416 timeout.exe 3088 timeout.exe 1520 timeout.exe 3452 timeout.exe 1536 timeout.exe 3568 timeout.exe 3304 timeout.exe 3928 timeout.exe 3088 timeout.exe 4012 timeout.exe 1976 timeout.exe 2904 timeout.exe 840 timeout.exe 2312 timeout.exe 3344 timeout.exe 2880 timeout.exe 2944 timeout.exe 1032 timeout.exe 4040 timeout.exe 3404 timeout.exe 3608 timeout.exe 4072 timeout.exe 3556 timeout.exe 2592 timeout.exe 1636 timeout.exe 484 timeout.exe 3688 timeout.exe 1668 timeout.exe 3304 timeout.exe 3728 timeout.exe 3372 timeout.exe 3920 timeout.exe 3884 timeout.exe 448 timeout.exe 3972 timeout.exe 876 timeout.exe 3816 timeout.exe 1408 timeout.exe 2392 timeout.exe 3568 timeout.exe 3780 timeout.exe 3488 timeout.exe 1572 timeout.exe 2184 timeout.exe 1660 timeout.exe 3356 timeout.exe 1392 timeout.exe 2272 timeout.exe 3408 timeout.exe 2348 timeout.exe 3968 timeout.exe 3532 timeout.exe 2840 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2300 taskkill.exe 892 taskkill.exe 1264 taskkill.exe 2448 taskkill.exe 2636 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a BhD8htX.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 BhD8htX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 BhD8htX.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 BhD8htX.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2196 chrome.exe 2196 chrome.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 1568 chrome.exe 1568 chrome.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 2216 EHIIIJDAAA.exe 1412 skotes.exe 1536 GI59vO6.exe 2676 4XYFk9r.exe 2676 4XYFk9r.exe 2676 4XYFk9r.exe 1840 BhD8htX.exe 1236 a4f82d81c5.exe 1236 a4f82d81c5.exe 1236 a4f82d81c5.exe 1236 a4f82d81c5.exe 1236 a4f82d81c5.exe 1236 a4f82d81c5.exe 2644 rhnew.exe 2088 0cc835df23.exe 1172 bc76a107bc.exe 1360 d4ca59e7a8.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 3588 a9b084a59d.exe 3588 a9b084a59d.exe 3588 a9b084a59d.exe 3588 a9b084a59d.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 2196 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeShutdownPrivilege 1568 chrome.exe Token: SeDebugPrivilege 2676 4XYFk9r.exe Token: SeDebugPrivilege 1120 tasklist.exe Token: SeDebugPrivilege 680 tasklist.exe Token: SeDebugPrivilege 2816 tasklist.exe Token: SeDebugPrivilege 952 tasklist.exe Token: SeDebugPrivilege 1648 tasklist.exe Token: SeDebugPrivilege 2428 tasklist.exe Token: SeDebugPrivilege 1204 tasklist.exe Token: SeDebugPrivilege 1516 tasklist.exe Token: SeDebugPrivilege 2804 tasklist.exe Token: SeDebugPrivilege 1020 tasklist.exe Token: SeDebugPrivilege 2012 tasklist.exe Token: SeDebugPrivilege 408 tasklist.exe Token: SeDebugPrivilege 2864 tasklist.exe Token: SeDebugPrivilege 2392 tasklist.exe Token: SeDebugPrivilege 2904 tasklist.exe Token: SeDebugPrivilege 1896 tasklist.exe Token: SeDebugPrivilege 2736 tasklist.exe Token: SeDebugPrivilege 2252 tasklist.exe Token: SeDebugPrivilege 352 tasklist.exe Token: SeDebugPrivilege 1512 tasklist.exe Token: SeDebugPrivilege 2208 tasklist.exe Token: SeDebugPrivilege 2840 tasklist.exe Token: SeDebugPrivilege 864 tasklist.exe Token: SeDebugPrivilege 2388 tasklist.exe Token: SeDebugPrivilege 1896 tasklist.exe Token: SeDebugPrivilege 2764 tasklist.exe Token: SeDebugPrivilege 812 tasklist.exe Token: SeDebugPrivilege 108 tasklist.exe Token: SeDebugPrivilege 2728 tasklist.exe Token: SeDebugPrivilege 2636 taskkill.exe Token: SeDebugPrivilege 328 tasklist.exe Token: SeDebugPrivilege 604 tasklist.exe Token: SeDebugPrivilege 2300 taskkill.exe Token: SeDebugPrivilege 892 taskkill.exe Token: SeDebugPrivilege 1264 taskkill.exe Token: SeDebugPrivilege 2388 tasklist.exe Token: SeDebugPrivilege 2448 taskkill.exe Token: SeDebugPrivilege 2252 firefox.exe Token: SeDebugPrivilege 2252 firefox.exe Token: SeDebugPrivilege 1780 tasklist.exe Token: SeDebugPrivilege 3324 tasklist.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 2196 chrome.exe 1568 chrome.exe 2216 EHIIIJDAAA.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 2252 firefox.exe 2252 firefox.exe 2252 firefox.exe 2252 firefox.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 2252 firefox.exe 2252 firefox.exe 2252 firefox.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe 1512 7d5edb40a4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2196 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 31 PID 2112 wrote to memory of 2196 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 31 PID 2112 wrote to memory of 2196 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 31 PID 2112 wrote to memory of 2196 2112 c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe 31 PID 2196 wrote to memory of 2856 2196 chrome.exe 32 PID 2196 wrote to memory of 2856 2196 chrome.exe 32 PID 2196 wrote to memory of 2856 2196 chrome.exe 32 PID 2196 wrote to memory of 2452 2196 chrome.exe 33 PID 2196 wrote to memory of 2452 2196 chrome.exe 33 PID 2196 wrote to memory of 2452 2196 chrome.exe 33 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2252 2196 chrome.exe 35 PID 2196 wrote to memory of 2956 2196 chrome.exe 36 PID 2196 wrote to memory of 2956 2196 chrome.exe 36 PID 2196 wrote to memory of 2956 2196 chrome.exe 36 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 PID 2196 wrote to memory of 1096 2196 chrome.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe"C:\Users\Admin\AppData\Local\Temp\c006fc45ccd90fd47319f6aa0ee4694d8b17e4fd35b237ada54db1cc649b0367.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7309758,0x7fef7309768,0x7fef73097783⤵PID:2856
-
-
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:23⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1432 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:83⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1536 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:83⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2476 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2484 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1612 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:23⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3848 --field-trial-handle=1360,i,421704711659222504,13317946633645560201,131072 /prefetch:83⤵PID:1640
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1568 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef63b9758,0x7fef63b9768,0x7fef63b97783⤵PID:316
-
-
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:23⤵PID:1932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:83⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:83⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2416 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2732 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2752 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1152 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:23⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 --field-trial-handle=1272,i,8170887170249128748,2260712797491795042,131072 /prefetch:83⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\EHIIIJDAAA.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Users\Admin\Documents\EHIIIJDAAA.exe"C:\Users\Admin\Documents\EHIIIJDAAA.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp7677.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp7677.tmp.bat6⤵PID:288
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:2612
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1464
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2672
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2908
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1520
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:660
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2184
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:840
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:1692
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1732
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1976
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2196
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:236
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2592
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2272
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1532
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1636
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2624
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2808
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1672
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2944
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2880
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1668
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1472
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2184
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1644
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1660
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2380
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2920
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2788
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2792
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1912
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1032
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1700
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:1968
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1872
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1408
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:352
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2472
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:876
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2568
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:1672
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3008
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1648
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:1856
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2920
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2904
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2444
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2416
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:484
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1536
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1920
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2236
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1784
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2348
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2648
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:1408
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:352
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2624
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1436
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2312
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2656
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2392
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2444
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:484
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2904
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2164
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3332
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3372
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3452
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3460
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3488
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3500
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3508
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3568
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3724
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3732
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3760
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3836
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3844
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3872
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3884
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3892
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3920
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3932
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3940
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3968
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3992
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:4000
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:4032
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:4044
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:4052
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:4080
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3104
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3216
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3304
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3320
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2164
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3344
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3324
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3332
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3408
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3428
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3432
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3480
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3456
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3460
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3532
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3544
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3556
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3512
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3508
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3548
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3568
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3748
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3744
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3780
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3812
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3824
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3868
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3864
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3856
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3872
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3908
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3904
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3920
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3952
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3936
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3928
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:4028
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:4024
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:4040
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:660
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2816
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2928
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:2184
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:864
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2840
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3332
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2908
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3404
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3424
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3428
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3608
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3620
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3628
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3656
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3672
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3680
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3708
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3592
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3464
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3452
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3552
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3560
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3600
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3756
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3776
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3728
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3796
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3788
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3816
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3812
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2584
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3836
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:2260
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:996
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3884
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3908
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3904
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3944
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3952
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3936
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:4016
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:4028
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:4024
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:4072
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:4048
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:4056
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2212
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:1488
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1988
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:4040
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:1432
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1572
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2880
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3984
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3988
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3088
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:2300
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3232
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3304
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:2164
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3340
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3384
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3420
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3416
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3476
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3444
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2788
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2436
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3432
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3428
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3640
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3632
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3616
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3688
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3672
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3680
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3488
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3592
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3464
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:448
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3456
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3720
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3556
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3508
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3576
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3568
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3752
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3728
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3796
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3792
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3832
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3824
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:2584
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1252
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3872
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:2260
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:996
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3920
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3908
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3904
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3972
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:2236
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3996
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:4012
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:4024
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2848
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:4088
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:4048
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:4056
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:2836
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:2956
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2068
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1572
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3100
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:1172
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3088
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵PID:3308
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3216
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:3356
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3344
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:3316
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵PID:3324
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:3400
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:696
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:1392
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:2692
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2336
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:796
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2676"7⤵
- Enumerates processes with tasklist
PID:1704
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:2296
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:2592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\1012195001\a4f82d81c5.exe"C:\Users\Admin\AppData\Local\Temp\1012195001\a4f82d81c5.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\1012200001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1012200001\rhnew.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\1012201001\0cc835df23.exe"C:\Users\Admin\AppData\Local\Temp\1012201001\0cc835df23.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\1012202001\bc76a107bc.exe"C:\Users\Admin\AppData\Local\Temp\1012202001\bc76a107bc.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\1012203001\d4ca59e7a8.exe"C:\Users\Admin\AppData\Local\Temp\1012203001\d4ca59e7a8.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\1012204001\7d5edb40a4.exe"C:\Users\Admin\AppData\Local\Temp\1012204001\7d5edb40a4.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1512 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:236
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2252 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.0.1307285514\1404607519" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1244 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c348f74-f126-4608-a925-6b03be4ec94c} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 1348 100d3d58 gpu8⤵PID:1232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.1.1884701206\34514109" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1528 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f3beb3e-3233-4107-99bf-59c0bac856d0} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 1544 41eb258 socket8⤵PID:2412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.2.332332992\1680277050" -childID 1 -isForBrowser -prefsHandle 2044 -prefMapHandle 2040 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3db538e5-2f8b-4f6d-b13c-2d175615214d} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 2060 1a8c9858 tab8⤵PID:2804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.3.189976501\238026433" -childID 2 -isForBrowser -prefsHandle 2668 -prefMapHandle 2664 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {03f87a50-30f4-4415-b1ba-8ada08c5229b} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 2684 1cdd6a58 tab8⤵PID:2500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.4.1997855887\218577045" -childID 3 -isForBrowser -prefsHandle 3860 -prefMapHandle 3856 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec51221e-841a-413e-a316-31e1eda47255} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 3872 21046658 tab8⤵PID:1524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.5.616240006\1786707791" -childID 4 -isForBrowser -prefsHandle 3980 -prefMapHandle 3984 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8ca2ffc-1766-425e-a501-671b3d79823a} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 3972 21044e58 tab8⤵PID:844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2252.6.647824377\1093253642" -childID 5 -isForBrowser -prefsHandle 4148 -prefMapHandle 4152 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a293168c-ed33-425e-9180-a5aeb6bbf0bf} 2252 "\\.\pipe\gecko-crash-server-pipe.2252" 4140 21c10b58 tab8⤵PID:1780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012205001\a9b084a59d.exe"C:\Users\Admin\AppData\Local\Temp\1012205001\a9b084a59d.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:952
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:920
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
40B
MD51d6994c9e7456e30a9c2dcecdc184047
SHA1ad85ecf6f00da14dbde2b4b22e52809a02ad11cb
SHA25632d641a0b1a4d012ac26b4511e84b1ce3a0c129fccd4e85a78a31d46b14f1a8d
SHA51245820fc375361f0518efc53e283a5421a58ace75b2d4d94c9a190ac75a3b3717b9b797e8d27cec3014fcc9e9ea27f2ffc586777d8d658e0e24d379fe7604c607
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD5def54bfbe133494db62fd46a771b9876
SHA1193736607ffd40fd18b3f5617999a96e7304190b
SHA256bbab1e8694775ade8f5e6be579ab5cc063bd06cff3ebb7aef8f459f26e31e78a
SHA512a45e7fe91b5514069d9d3ffa107f9cbef98a99812102ab86655504bc5ab70088362e7eb538c65b32e8d7dddb28fb55577fe13b936426d00fdd072e3dea4ca3a6
-
Filesize
192B
MD56810cd72bd126dd88025c34c33acac19
SHA192dcffd9dea83d9a21ef7b8a1b72838650dd3333
SHA256800dc985d4bec34f2706f016f174ece523c68043cec7768060de74a77a50152f
SHA5121e40a0797d5bdf4554705e30e093619a1e89cee33ad2bfcaef71b01de11ac5c057df9a4d59344332bdf688cc0bc246f20d622fddac413d4ba2c448e0243e0952
-
Filesize
20KB
MD53eea0768ded221c9a6a17752a09c969b
SHA1d17d8086ed76ec503f06ddd0ac03d915aec5cdc7
SHA2566923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512
SHA512fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
196B
MD5382989bb90bcbf400064519eedc3c35e
SHA165c075c94f655fdd9c0681a801b99953836c6642
SHA25699543204a88ac35065751c6188e0cc5ff7c12259a34242d4dcd1adb482aeefa8
SHA5124be0bc1492851cc2f309037e75181978057c0a1c292d939c5472c7e59a9bdc78d2605939b9cbed2b8b07f8264e653c4df87f6fa0493517fc3fbc51e887dfc996
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG
Filesize204B
MD58c53f9dc5e877a2037350e94f11233bf
SHA11bd99069e3829d3dc548a280c5c45fc1f6f6be6a
SHA25663eb79654bd779cd098fbabac6f52f1c95bfe9b637f35116270e4b0b3913b0e6
SHA5121d7e0f7401b5e67edf4c1010819bbbd9d9e566fe5081c7bc87bc6a5774d8e57eee635fa0f7fefb3f15b7517bd2a883e3bc8fff05254e06d8e72fd415f7b58aed
-
Filesize
192B
MD59b799ac63e219b6f40e0ac2a5da9b8c7
SHA1a08d3a4911debd7d7058eb0e78133988b24f0c5e
SHA25636d713015f9025b3e4f535a60464736ece99354e8b11f6764c0818a54db02b85
SHA512c66b2c24a6966bb5535bc964ac7e265ad91f3b02141c71db3b5b8d84592e4ebace1304a380f217b5110bbe044d2ad8f914016a3217e1a3d28bb067a6234140fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
128KB
MD5e3799b1689eda88fc295d3308a97924b
SHA1626d6c5e6e35b2c195dcb41430a3722d36b9da1d
SHA256212d8048cf7b8208bf906d9b63125bd08a6ef77a79ced6c095b10230affd7138
SHA512200ea1538b4ceb0983683c0c38e6e1c0ad4705dc7496d688d80a617d89bc843967d0fa1b1fe8b6dab5c585e578a2de7568f73de496ad1949bb9320bfa9157ba5
-
Filesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
32KB
MD569e3a8ecda716584cbd765e6a3ab429e
SHA1f0897f3fa98f6e4863b84f007092ab843a645803
SHA256e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487
SHA512bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\js\index-dir\the-real-index
Filesize48B
MD54f0c529b179935dcb3cdd4ae0efab76c
SHA11443d8e098d38dbf20c1740ea4a6c6e461ab739c
SHA256c8e0c9b5998aca964047c6ec72cc8bd2d1daefcbb30e40586d7b8ce069eda189
SHA512d85800c8f693687c9abfebe39661528cccb07cef9e82b0616afff3a4a84d6d4648a765d7463edd920bff6a197f2e219391a99d006f28a80e88554b2e5bd7ae1c
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD51d754965f54b4f8cbd389623a514e190
SHA1c29a51b5f2d17e7e4951a0e2c023080e5bbb9c16
SHA256659ccc4f5ab56727c123465a28b5ffc955b9f537b8851f905ab04a8819413044
SHA5127a1018000444e2a19b341de03bb347451c2dfbe16f7f180e03eecd708ec33a691774f12bd32660330c3965c7098906d5bb9cdface6e9a7c9263e3a88c0a561f9
-
Filesize
76B
MD5cc4a8cff19abf3dd35d63cff1503aa5f
SHA152af41b0d9c78afcc8e308db846c2b52a636be38
SHA256cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a
SHA5120e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
193B
MD587b7d627ff7d276766449e4fa22533cf
SHA1c644216ed8280829d22ba6856be069c83bc8d572
SHA256f0f0f9c1016c0353fab249b3b1f186f3fd5321e6c146d5a7487a0cc2c7acaa22
SHA5125e1176b3df1c1d621739327cfaa2191cba129fa4a854cbc822b0a9dd8339043bd10056a9ca3a8d3afab33e0f561a69b802896969fc81f112bab9159af9d8880c
-
Filesize
197B
MD5260daff6b45386b998892149aadf6605
SHA1a2f17bdd86a6b40a93d7a8ee396464a8bacb3fef
SHA256c49611c820c93864baeadfd24bca1fdb582bfafb27999d7dc81af66c73f39b24
SHA51226f729574f6d36c70f3ac5fec7ae3fed2582fc692e3b8318adbab843947b8f83ba31de40de5c5b20165083254388b38be9796473603adaa05a10619f8a5c4295
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG
Filesize205B
MD5b14735221fd4669af16e5c5d872c72ff
SHA1e91bf396e5fa62f4e871550e132358a9ad270e53
SHA25681f0029d826dfba1e7a29f365a2d33bb6d7c2b81b67f885d20a9f815e1fb4f7e
SHA5127073f6a0600264056ffeb05aff454e7400f92e4bfe17ab0c89687d208e92d9b8b6e5bc8e557b08884d15a1a6787251c274fce778407bd24c9c3cbb1d220c2e3a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\MANIFEST-000002
Filesize50B
MD522bf0e81636b1b45051b138f48b3d148
SHA156755d203579ab356e5620ce7e85519ad69d614a
SHA256e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97
SHA512a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0
-
Filesize
46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT~RFf76c0c0.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
193B
MD5cf94d130bf3fea0da3bbe3db47a82c56
SHA1392757596baddc682deaccf405ad313a2db118e9
SHA25667caf0b48806e7ee9c911f2479dbbeedce3eb5f94bbb39d59760021d1ebd06b9
SHA512c3a02f0dab1759f79a21234e2621779b101873fc4c8d70d7348cfda3e00846b328ada9775fa1a947e3712068eae3049bbdfd316f88ebbdf51f7b26afdb2a38ff
-
Filesize
128KB
MD5af9038754cc5ccf50054439c6feec380
SHA168935bb7c50205151588226fcb85688e4a616143
SHA2560d1876e90a6d039c724ce51b0f33b6b0fb88ebd207ad542d81d5f5ce26cfa714
SHA5120f00e6692ebab270fbf60be7f55e00a218c72e346ac93397b504fef1839df9a5f9831588c65af6d8c053dffceb50272817359bd8d0cf1bc4d8c592fb5abb734d
-
Filesize
92KB
MD57273510dc07d47f3986142017c918c67
SHA18286c9f9aed7ef8f45e44506595778acce869c78
SHA2560c5224d0545d1757117315780638d929a70d2ab04e54acf3c4fe110e28259175
SHA51285bcdf18ca4a7d67df32f813b5fc02871ecffee224f39b25838c3c70e77a9ea4bdf4eb84eb87228cc303938b5742d9e0f3c4dd4635ce1d6d29bad95ffd8bf797
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize29KB
MD58cfc4a64bf1c17c4f6b568a38846f15f
SHA11d77e24beda85f8f27058f4729a719067ae33a32
SHA256be8d3208d73ab7340668d5af3260e3bd56a1289355ed29a4f305ab2ac1b6af70
SHA512bbeaec10fdafcf3336fe1971ada0ed78ad071b9beb0d2c55b9c5ef4a2c8fc30fdbe99ab02b0874d6e94427d69385900bdf853ed7eeee1a73d7f81680113c50eb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD55fa72774e9d750628857a68d84275833
SHA17eebff7d14817544cc11829e354c1dfc7f603628
SHA256a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56
SHA5129ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838
-
Filesize
5.6MB
MD523b25ce90f70ffa0435db8df6a6764f2
SHA172d0c052f26309704f13c090495c3cdea4ed1bf2
SHA2569165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3
SHA512b6c81131119b95df9d789329ffd4553c1624f7d9e38c46924ac4838e59ccb59b538646f36d8c80b9361412842f8c0328aa4177e93e72e22c15077669ee9904ec
-
Filesize
1.7MB
MD5ff4cf493ac5f7663d1cfc243e6646eb7
SHA1ff7184eae695580f1e86fac340925c7f01f4de6d
SHA25672a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748
SHA5121eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b
-
Filesize
4.2MB
MD588bf63a8e16a403ede877c51371debe2
SHA104dfbf773b963149cfbe1787bae7a3c8a5bd1f34
SHA2566da015a4d07aaa513f90f351e52f6789345826bf255e5ea616b2bfded6ed4477
SHA512886629e4f4d041cba51659885ad27451f4103cf1c556de21439b52b362b6f03a046b1c245a6b2259d6726fbf9db9f0ea1fee72dde86303fe7aec8a597dd6da9f
-
Filesize
1.8MB
MD5a84456172908e096d0ac6272b9503e08
SHA18b64d38bae9fc390e621323e9e91eb8f7def421c
SHA2564f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128
SHA5123237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800
-
Filesize
1.8MB
MD506b66556e8a2389c099c0da6e0db3dd2
SHA153f96909c6ae94499b790eba12ec355a275388df
SHA256ccd13fcd2302d16a0fd2d9cc2653869ce0551d464145bf264f75163f03f874bc
SHA5128623c835b552b000749405788eba8cc221f505d5285ff5fe8c5d79d81ae5d9a18985427e1f98c4baf2defd38ece14af11683524de636612d69d9b913a6869ce5
-
Filesize
1.8MB
MD5dd6f16b384883ad6d715bb1cd3fe210c
SHA1e33a7a624695229c4f32f5354f9f40295f3cc9f1
SHA256080d798f7ebfb05b33ea075b9cb9ebdffce54256c6b14bc598f3c72c66b5876f
SHA5120ece117b7d01b99eba79eaab060dbec6aaf7e6ffc246557569777f6e1a1537160f99b45164b0af5e83a3ad5dba04a6a3bc272a0ccf5978d753afafa3826b69e6
-
Filesize
1.7MB
MD5f9d2886aab1af3c7448def9aadb3a28b
SHA102c46e228989b919dc91ff830bbabbd758cbcc68
SHA256a8bf08d5b6bf577f7db86e048b026ad9b0478e3f663dd019bc009cb60af256e2
SHA512f071889aa321950b78069d4635c101095a13a224aaf1349bee2af2875d229516f8d576912c6b4f73157cfd9ecfce72aa04ee124dbfbab3e42356ab05fc5d852b
-
Filesize
950KB
MD5942269bfc6cde762e3236ce2f146dc6e
SHA1dcad2745b4a6553afff1edf28240080c40e1d05d
SHA2564cb1d6194fc2f5954812406c9e0a05925e59d60028001f3a31630aa3ad21f6cb
SHA512ff1efc966045bfb1d274104b6d0e857681ddcde65f20862343eb69264644374f4a40bbb11c69b3163981a7f4efedea27c972d2aa387b4eaa512721005d02dc7d
-
Filesize
2.7MB
MD5816b8d10d3f7cbf3f963c81fcbd80657
SHA1c660cf58419257d777a25de45c553293c3456bb7
SHA2566828cf0f979875c0ee3c058e657548746bee3c2e1e953ee19f332daf79443bef
SHA5121975527764d62d23373b5e7063e17a821a6aa6492db26a289a826fc81e8def83b749293956246edba190afd4eac99d7b341274d6e6b003dcf57f3d09da1e6166
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.1MB
MD588a79b9d2ae702ee50793a84721e4666
SHA1ee7f0d82272daf6663489994bdf7d0e76cbe11ea
SHA256b78ae1f327ddaf310e3c2fc3852543eeaafbd3207adc7030dcfc1bb055ae4320
SHA5126582dafb29a1b7085a1afd4c53c7fbf534dded261466a1116440d3a26f92f0a497d6a496e4ce435bc56978ffff3447c73eeadc9811fc00ad3b56a83b313db6f9
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5a7908496d323099a0558ea0e4d3989d4
SHA1616e0567093bee77f4728ebaec58cd981e33dc83
SHA25624d153723fb428228c6704fa32fee2848df929cb9d73e9cdf682472257f7b491
SHA5124b76037cffc6202e335bfee1f99b7db59704dab5ae2cd0613088aec7489a36bf75106e20ca46bd59bdd3253970889d0bda83a0ad8338be299b1c32dc6b4ac100
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\5a63c392-6b9d-42e6-a234-3df2a6719c05
Filesize733B
MD55e777776536b528d697c697a0cd58d4c
SHA114de8e328d7c6099b6cb51342f806cf89878b8bd
SHA2563683c06042224bd343a13a5f18f4972a5f04b60c8a65ba802efd91cdfa5afa4d
SHA512f07b89c424ca0f587754b5f1de67ad53d49129309d3876c754078091485acdb1774ce3c9bca8e2aa81c34082a258281f7a26e006239f9291bc7e64d444f47664
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD56d16139e6dab1a30162b8e11bb384904
SHA12fbd63b679bd8c6721988f4df21af0e41fc7e66d
SHA25647a1384ddca2c373a06caede120dadc9c26865b89dcc22f9d1e73ad58a71d88f
SHA5120b31051fb9e82a1f8297ef8ce817cd73528c62f5e1557709fcb2224f74474f8688ae9449fd004d6ccbfd224d532acd257fca2ce51c14c40d51657d2b1635dfc1
-
Filesize
7KB
MD55fde8852c131741a802d92ad6dc69f28
SHA103e966e69e6d7d237a47c9b5a79373cd98823cf7
SHA256f0feaf9a8092cb7205b0ce6db4f417ce2497b1edbef07534d1698a5fb0d4f402
SHA512bebc0d22a3a35a77ef2b0d21c2c2363c247f79057ca5ff62f7e4671d83ba42f985731f609570f70d59850e77133f42649006653235666b8b0a6b861b62a24752
-
Filesize
6KB
MD5e7f1ecb7222b9253e2fd19ed6a3fbd0f
SHA13e82af51630f77724ca7b44752b5b4252e56df82
SHA2569593e549fec94734b094bc32247afff4eed7332f9e82f08bb9dbb787dbef4b26
SHA51202cd321501f8ba314ae1cd1f1d7f39248fb0eaa71f3609a34880cdb10fa35a6f6d9c4c7ce1b6b7d317d343a6db27416dff86f6354e10b4532c8fb852a1b9f4a3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5996dd8f92b184b71fb66ec2346063dcd
SHA168ba4e11030c9e05ecea8cc9d8be5d2f5d4e90f7
SHA2561a76fc01b5922bf0ed6d74c1b381405d01093fc99e5cd05d69b1c8e3dccbcfa5
SHA5121eb4bc77415ed727dc63a76e825f5338e2e743e3790ea337b146377c0c8a5603ba77f80ea42c72fe831ac190233ebd503992999e741aee48a5a59e4b482af17b