Analysis
-
max time kernel
111s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 20:18
Static task
static1
General
-
Target
4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe
-
Size
3.0MB
-
MD5
071fd9342e197ab323e93e0395fadbd0
-
SHA1
23bac802089af599de74f3f43c82319bad647a53
-
SHA256
4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
-
SHA512
abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a
-
SSDEEP
49152:O7SbZvl/c4t4L2agJhXhI759UomVfm8RZsF:O7SbZvl/c4tRazd9TmVuWZsF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6ed2614a84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6ed2614a84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6ed2614a84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6ed2614a84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6ed2614a84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6ed2614a84.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6ed2614a84.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IEHCAKKJDB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 57482ebdd3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97bd392c8e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ea0eb0456f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5732 msedge.exe 3632 msedge.exe 5612 msedge.exe 4376 chrome.exe 3992 chrome.exe 2408 chrome.exe 2104 chrome.exe 4436 msedge.exe 5528 msedge.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 57482ebdd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97bd392c8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6ed2614a84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IEHCAKKJDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97bd392c8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6ed2614a84.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 57482ebdd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ea0eb0456f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ea0eb0456f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IEHCAKKJDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ea0eb0456f.exe -
Executes dropped EXE 10 IoCs
pid Process 2072 skotes.exe 4600 57482ebdd3.exe 4344 97bd392c8e.exe 3568 ea0eb0456f.exe 4688 skotes.exe 1096 91b68cd841.exe 5360 6ed2614a84.exe 1508 0c5e5dd92c.exe 3256 IEHCAKKJDB.exe 224 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 6ed2614a84.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 97bd392c8e.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine ea0eb0456f.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine IEHCAKKJDB.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 57482ebdd3.exe -
Loads dropped DLL 2 IoCs
pid Process 3568 ea0eb0456f.exe 3568 ea0eb0456f.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6ed2614a84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6ed2614a84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\97bd392c8e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013801001\\97bd392c8e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ea0eb0456f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013802001\\ea0eb0456f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\91b68cd841.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013803001\\91b68cd841.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6ed2614a84.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013804001\\6ed2614a84.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c1a-128.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 2072 skotes.exe 4600 57482ebdd3.exe 4344 97bd392c8e.exe 3568 ea0eb0456f.exe 4688 skotes.exe 5360 6ed2614a84.exe 3256 IEHCAKKJDB.exe 224 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5200 4600 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c5e5dd92c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea0eb0456f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 91b68cd841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ed2614a84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57482ebdd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97bd392c8e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 91b68cd841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91b68cd841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEHCAKKJDB.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ea0eb0456f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ea0eb0456f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3688 taskkill.exe 116 taskkill.exe 2172 taskkill.exe 2568 taskkill.exe 4236 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 2072 skotes.exe 2072 skotes.exe 4600 57482ebdd3.exe 4600 57482ebdd3.exe 4344 97bd392c8e.exe 4344 97bd392c8e.exe 3568 ea0eb0456f.exe 3568 ea0eb0456f.exe 3568 ea0eb0456f.exe 3568 ea0eb0456f.exe 4688 skotes.exe 4688 skotes.exe 3568 ea0eb0456f.exe 3568 ea0eb0456f.exe 4376 chrome.exe 4376 chrome.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 3568 ea0eb0456f.exe 3568 ea0eb0456f.exe 6068 msedge.exe 6068 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5732 msedge.exe 5732 msedge.exe 5360 6ed2614a84.exe 5360 6ed2614a84.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5360 6ed2614a84.exe 5360 6ed2614a84.exe 5360 6ed2614a84.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 4376 chrome.exe Token: SeCreatePagefilePrivilege 4376 chrome.exe Token: SeDebugPrivilege 4236 taskkill.exe Token: SeShutdownPrivilege 4376 chrome.exe Token: SeCreatePagefilePrivilege 4376 chrome.exe Token: SeShutdownPrivilege 4376 chrome.exe Token: SeCreatePagefilePrivilege 4376 chrome.exe Token: SeDebugPrivilege 3688 taskkill.exe Token: SeDebugPrivilege 116 taskkill.exe Token: SeDebugPrivilege 2172 taskkill.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeDebugPrivilege 4836 firefox.exe Token: SeDebugPrivilege 4836 firefox.exe Token: SeDebugPrivilege 5360 6ed2614a84.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 4376 chrome.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 4836 firefox.exe 1096 91b68cd841.exe 1096 91b68cd841.exe 1096 91b68cd841.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4836 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2072 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 83 PID 4540 wrote to memory of 2072 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 83 PID 4540 wrote to memory of 2072 4540 4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe 83 PID 2072 wrote to memory of 4600 2072 skotes.exe 93 PID 2072 wrote to memory of 4600 2072 skotes.exe 93 PID 2072 wrote to memory of 4600 2072 skotes.exe 93 PID 2072 wrote to memory of 4344 2072 skotes.exe 97 PID 2072 wrote to memory of 4344 2072 skotes.exe 97 PID 2072 wrote to memory of 4344 2072 skotes.exe 97 PID 2072 wrote to memory of 3568 2072 skotes.exe 99 PID 2072 wrote to memory of 3568 2072 skotes.exe 99 PID 2072 wrote to memory of 3568 2072 skotes.exe 99 PID 3568 wrote to memory of 4376 3568 ea0eb0456f.exe 101 PID 3568 wrote to memory of 4376 3568 ea0eb0456f.exe 101 PID 4376 wrote to memory of 3192 4376 chrome.exe 102 PID 4376 wrote to memory of 3192 4376 chrome.exe 102 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3280 4376 chrome.exe 104 PID 4376 wrote to memory of 3324 4376 chrome.exe 105 PID 4376 wrote to memory of 3324 4376 chrome.exe 105 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 PID 4376 wrote to memory of 5040 4376 chrome.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe"C:\Users\Admin\AppData\Local\Temp\4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cbN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\1013800001\57482ebdd3.exe"C:\Users\Admin\AppData\Local\Temp\1013800001\57482ebdd3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 11924⤵
- Program crash
PID:5200
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013801001\97bd392c8e.exe"C:\Users\Admin\AppData\Local\Temp\1013801001\97bd392c8e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\1013802001\ea0eb0456f.exe"C:\Users\Admin\AppData\Local\Temp\1013802001\ea0eb0456f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffca153cc40,0x7ffca153cc4c,0x7ffca153cc585⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,12377260045152893149,10623081924978593728,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:25⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,12377260045152893149,10623081924978593728,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:35⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,12377260045152893149,10623081924978593728,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:85⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,12377260045152893149,10623081924978593728,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,12377260045152893149,10623081924978593728,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,12377260045152893149,10623081924978593728,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:15⤵
- Uses browser remote debugging
PID:2408
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9e3646f8,0x7ffc9e364708,0x7ffc9e3647185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:25⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:85⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:15⤵
- Uses browser remote debugging
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:15⤵
- Uses browser remote debugging
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:15⤵
- Uses browser remote debugging
PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:15⤵
- Uses browser remote debugging
PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:25⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:25⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2556 /prefetch:25⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2548 /prefetch:25⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3492 /prefetch:25⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3524 /prefetch:25⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3712 /prefetch:25⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3992561239480556649,10004928102214439067,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5232 /prefetch:25⤵PID:5196
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IEHCAKKJDB.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Users\Admin\Documents\IEHCAKKJDB.exe"C:\Users\Admin\Documents\IEHCAKKJDB.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013803001\91b68cd841.exe"C:\Users\Admin\AppData\Local\Temp\1013803001\91b68cd841.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1096 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4472
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4836 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {40481bb4-b276-4a87-aeeb-43d061d8677c} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" gpu6⤵PID:4784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f07cb0b1-5443-453d-afe6-d8c3880453a2} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" socket6⤵PID:3868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3060 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 2788 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33a245c7-3747-4fb3-869c-a5eafcceebb7} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" tab6⤵PID:2232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3852 -childID 2 -isForBrowser -prefsHandle 3844 -prefMapHandle 3828 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08da1c62-d687-4216-a4e6-50d4d34824a6} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" tab6⤵PID:2688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4864 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4868 -prefMapHandle 4856 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {751d205c-2f0a-47ee-b508-c9bd01ca203e} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" utility6⤵
- Checks processor information in registry
PID:5560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 3 -isForBrowser -prefsHandle 5288 -prefMapHandle 5292 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df3b93b3-a892-447d-8591-68d8f86f6004} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" tab6⤵PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5416 -prefMapHandle 5420 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03c813bf-e7e2-4084-bb44-66a3c5956be7} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" tab6⤵PID:6012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5684 -childID 5 -isForBrowser -prefsHandle 5492 -prefMapHandle 5580 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72687c3c-2e4c-46a2-88db-da3748ddc2e1} 4836 "\\.\pipe\gecko-crash-server-pipe.4836" tab6⤵PID:6040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013804001\6ed2614a84.exe"C:\Users\Admin\AppData\Local\Temp\1013804001\6ed2614a84.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\1013805001\0c5e5dd92c.exe"C:\Users\Admin\AppData\Local\Temp\1013805001\0c5e5dd92c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4600 -ip 46001⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:224
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
552B
MD54ac4c4e836a4a0ef31f5cd7a5a8aaf18
SHA1f55781ce8183f7db06036b8c2c865cc3ec16df83
SHA256ea5e7bc17f1feed79153566b744e4a2bc43897ec047cf956d351d495208827bf
SHA512ac4071f54772064100a6fb093864fcfb6b1ec069cfcc9979d610d6f22e39f24ade1ae91603180812f4bbddd11bdf9d8333289b4cbd5ec56008310d3d7d383207
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\094371d0-6333-4567-8225-17664910605f.dmp
Filesize838KB
MD588497052a29cf179be1d19064e771831
SHA1da43c88c9e8b67e4b660132801b0548fce45901d
SHA256942308b32ab2ce0fd358a4867c23bef8b103b359ffdd654664d9bbeeb908f44c
SHA512b7716bf04e9b6aa89d18d3a20fe045b38ae231b4512248fe709ca72f39a28fbc3401e1d64b09d7531de7becd5e103005e68fd391f768d8f61f5f20336cf9eee9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0e3f79f8-223e-419f-9063-5f81f087e270.dmp
Filesize830KB
MD553bcdeb1747af16fd9ed0d7bd9f2ba2f
SHA1b5cef3c2c4d4069f0c6c3639a617f58097bf76af
SHA256c76f04a56e153ce75b0debfcd1a1442c55ba9c392ab04b37e22baf9d67ce115f
SHA5120bcac8fc9d4cd018212b3cc2614b2431f5814f464bd40164a59b4fd4cefbff175c3225ad7e96a5c17be9bec2bbb434908d9faff156af5f6beb10a65173727c56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0ec6fe51-93dc-4315-a9e0-9cc0024e49c6.dmp
Filesize830KB
MD5f57c6f2d2a79419c0841020610a3998b
SHA1201da10de89fbdded17aa7579c74bc3e2c23c93d
SHA256532ee92a983aae90ca5d7a4bcc189e88ec1042b323e216cef5091d167fa38406
SHA512a6d25de2750407d70059b08c8e9146aac2544af5cc348c7c36e143402e1a9d5473d54a64648b7213f74242013e4311c020425a65350f8c3c42c8b11bb28a9411
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1a7d18af-014a-40a1-a85b-9c7a14ed912b.dmp
Filesize838KB
MD590bbf636b3ea308c3214161c4e6eab37
SHA101f1e5cb42398528bea038bbec94f45730a59762
SHA2562fda970a3e54e7611e9edd2f60fde26088e94a6c06cdbda134dfd11d92c6eef6
SHA512248954e46eecb2cd0cb688f2e8741a125a2c700c5f1664834bebe5b835a6e412163521d4e253970a94d6ffc836e91e1ca8e140e47636b39da4d9d7438a2a1e1c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2534f355-83d4-4cf5-afe5-35fe71d1a5a4.dmp
Filesize838KB
MD5caf4bbacaea3f0e60aa129fcc67a0387
SHA1657bee87c0cfd587ebd27dde93de3350525c9832
SHA25626f168ad6fc2a977f9ade2c946ff21c0b364eb82b7c715159560db9c5944bedf
SHA51264f59fee7251a0f4448665bd75fbeffe3ad83c0f9c521890594d311abe3e3a053abb965b8d40345f5c834a99ffcb11eb9be68eed07c885a55e0c0e3e42214e13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5c8b76e9-ff83-4bde-9284-23bcebf60277.dmp
Filesize826KB
MD5f9fbfb984d56758d79594439d764c3f6
SHA1c37230c4581762c25e7fd821df7029d93f108e77
SHA2562e1aa4048c698146016f5a96f66c04220b26f2ff9370dcf347d97ae3487bb86e
SHA5129779421767f237b74015ce8585568babff58e4509cb06e3e9e22e247bb59274383557e71cb188356a05044351f16528699c89a5f16f38bde2666f19bce94ace9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\985cb613-6979-4011-b754-b2ec2d5690cf.dmp
Filesize826KB
MD5bd541fa0f23b7b947ca465a2a282ddce
SHA15adedc117f94b1b13d4ebd1ae2c708beee5c5ad5
SHA256c1a61f3b2a62b63bb0e61a6f55da740bf655d69be6f2d340d77baf54bd99579a
SHA512bff1ceff0fcd8ef52a64157be00f57dfb1d7458f9bd3ae049197b6dfb348d1c312d8d62032d96be68d17e93095a419f8a9dfb39720793475d0107248434d30ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\cefe31ce-bf31-4e44-b526-d19fc65851d8.dmp
Filesize826KB
MD5e4c34fe8795334efe74e60585afced6d
SHA1e4617b08aa52404c1c510c6b9ff9eb940d8ea270
SHA2565453fafa7d71478c96e27bc33b4a0897ac6060944b315415b58d87029146c6f1
SHA512010f284767c6f1aa22dd324c3bdaadba3591cee14a58affe337d371c76c0be0b8c870152789ec745fa892a1bdbf5f185c6dbfd362b70cdebe3510e410ddd8e1f
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD593dbcef5f4dea9017519c6bb6abdffc6
SHA189e5205cb8ac4e62a229dd0fbc3f77ece85476ba
SHA25600d514a05c9e6474e0037ec3f3a9e360e217400f83583e815f02ffbdc8d2e17d
SHA51239d0118601317c8f10bcf945213091320b19146b5c0d1f05e4d0e0e0ff151c312a54bfea074d79b9df9bdf26a261f73be4f2031500d631d0a07d1f16a554c0a5
-
Filesize
152B
MD5b1ad0ca00af78a2302f3d2f7a3e77f93
SHA17f354814eb5a42c413353cdc1fa1c9fcdc527aae
SHA25653e61f9436aac37404f1f17edad8643c24cbbf9466aea5d1a9f334cd33270f10
SHA512acb0866b2042aa07b75de2a3c93a622f8d95ab4ed061cd5a691a0460ea035f639e1ef5861629e048ab922eea9a7ddc463053d28fce1b198f3a19bd2084fb4f2f
-
Filesize
5KB
MD52f9ad5b843b38ea052fb0a6c37258d4a
SHA147b64f105c28ed4c65601e3fb2d2034370b30081
SHA2561c6eff50329b047a76d01561b1e4006a029993cf7649fb426f76023180b4bd8d
SHA512f7d0c1aed5d5160fda32f7af02a53bd256e6395663e2608a7d8882f84061f2fb48512d556d91ceba04d1e4017364901c305419860d34a3714eb788c80e4afc28
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD544140e27d4a551415d7b4891d28f3d13
SHA1b847d80b79591902dd34624f8aac76394ca4fb26
SHA2565daf089818736a7ecc51de05bc69bd61b966e1e46e4c8a5f5f30fe98096edc94
SHA51267c7952bf2e83290ef9e0cb5273d92d541274974c180a07678c0068ea3a7910e996aa369e88317242c967c665db7d17bf42fad6291c0bdebd48cd53344647e26
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5f7481cd86fc8ab7110d67bb4fba5f136
SHA1bd50302391f13d8d4669692021de0b1736355def
SHA256aa42ae57128088c7274e06a0891725c693ccd5cac2aa7e3eb0aaa9c7f3820a90
SHA512e8a28cac8848099e3a11b3448799cb84f637a56206479c7c98df73568a4177075f4098a5c063a90168abbfd592b7a19d8ed99d9b39af0a95f6ba87fa728e93e3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.9MB
MD5fcf0bc8b1fa8d11d7b4deb6d36984b04
SHA168adab1a3267460eef1969d6e8b8a573c2f8213e
SHA256ab9d97632285feeeb86e9cb6cb54513704469d3b5eb6501b27a07f0215d2a00a
SHA51289116a34ade27747f1915643761bc071df8b00227cfd56633e54278c1d07991b25b9766c71ca359ed9ffb3439f5c2b7ec4d96b891c9c0b91c167afc167f2951c
-
Filesize
1.8MB
MD57377c86883a20d0707c694a772b483e5
SHA1a4c59054f5008f4a1da91497c119676b48eece08
SHA2564f39848cfca537ac444b141483ba417595e1d6a48a763a0cd08cabf0d77549ac
SHA512b560e9095449cc87f69a518ccdd223741536ab6fd6206fc6587edaf5aa78bde2197becf1793fe38f2e5b29800875405975e884c4083f47db4ece5e124f09d523
-
Filesize
1.7MB
MD591a1368159c5fa7be897bd805f0ded2b
SHA1b0b0a97f62510bb9a3f668a50164367d199d5f7c
SHA256743310496ca9c7ca2f4a589a0a053cb6a6c39eb72ac9065ec24a3260a7d4b98f
SHA512866acdd3e276246996562960b91203934a3f200565725578f7a0e511d33ec42425d185cd6f3621cf1747c5ce6aa21790f350a66b669a539b333cf0ec2e2ef080
-
Filesize
946KB
MD5305bc8039b38faece3abc63c978aef2e
SHA1c803a0109d52cfed216ec3c278c6b962ec567bae
SHA25650fa1b69868093a86237b69f5859a8678fabbf67a897564897d7b2eb2bd0e8de
SHA51251ced6ad2c4d2199691f274026620c00d8e00dc70ed1401da11051ba6980c7b56705df0d7cdefcae879f2ca855c7d6e77a594a149f97e0682b18277a212f01f6
-
Filesize
2.7MB
MD58540e95f2fa09f04dab94fe3c00fb14c
SHA13dd775c01fddead4ad85b092dd6e6804fadf0e0d
SHA256446c9d7201dd6f58f2d19503cbb784ea42ccd52c7b499eb6a53e9bfdbd9e1e69
SHA512a1848852aff19538d210da8512c5e1ae32fb3b8d7b25057c87b6249de12c46860ba163f06b4d7b34cc4de279fe2f169f0fe752c0efd1e4110349d337c7e3b33f
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
3.0MB
MD5071fd9342e197ab323e93e0395fadbd0
SHA123bac802089af599de74f3f43c82319bad647a53
SHA2564b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
SHA512abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD5ca3d7b8eaa8cc9dc1bd0445cf3a52bb8
SHA184635596867e1fa1262877b95b99829621c34f17
SHA256275e794dcb3aab84da1cf1902ff6283aeef53610c5e0d97c91af98e613c87aba
SHA512b49193adecd6787c821e4e268fa6bc27d98345bb66952253f7e2124b65bddbb3f32c2131b9198ed6047b493c185ec0fd0e547a2ee74e96a9ab5ef9d3b00e5c5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize10KB
MD5978600b638c078d3029cc97d3eb7fdd6
SHA167ca8252c4c9a55e4b210c2ead75ed1e1223a87a
SHA25668dac97571c85b7ed106537b0133e4df8bf6ca711555f7229c1ad1ea436954f1
SHA512e2e95199d20ad165b6fda11a8cec5826e8cb408bb5210f1b36d18f8e12f2c49bb631c07666fed5d0ba0b32ad2b8ee9ed92a75fd01c0cb2c69d1dbf58649ec6dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5c4d5852efd81117651bc4574ca98aae1
SHA193eec6dacbb4e20954bf65d83a3dae78c36b231e
SHA256e783d18934893e1d79557d6bb4f019e0f0f5181fb777ccc31aae3c33886b8da7
SHA5124ffa2cbe5d1be42824e1d232ecac4964bbd3e5b1710cb3610563a5ac11ece3a681b69bb6b2807a7c6d5875b6ad9b785f6f3081e4db20eea266028a5e4ffdec6d
-
Filesize
256KB
MD54bb7657bd7b255db68ca56f6d52ca889
SHA1cce8c78ca3dadc02a725143677b1d7a967b50d76
SHA256e1fba2e98f31c755619496b1a8ba934035223ec21ddc85447c869252a98cb357
SHA512bb38f407f43fb2ab7fb933829270ef6dc28cfd4bab1eca9f09a761107b1dc6c2eaefc2fc1adea41b04d865deb05f67b856f446bd9499ad74cf0cca301e0e644d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5e34a76bc507d3384bedd57d8d35144b3
SHA1e9acd15ba61615fb617085d80fe6b916583fe707
SHA256d4d2224cf597a25fb1f20b77acd883135f85260160b14a0bb56b17cd1913c10e
SHA51250a9966b2b09b3349d86159e378819d15d0f7be563fc67f85b3dcb6c3cc3a356643fe53a5925fd8731aba7256c60e172f1e0da545a7ba277f9eb689ec3e566f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD571871c0a9be71fcd57931ce23545d4c3
SHA10ca0d83bc6c0f940c96e9c385b730e64336f9cad
SHA2561840761a9ce408705389d9b4f1344287384e6d08f3a0bbd4d9a69eff47407cd5
SHA5127edfbef650f381e4fce1bea7cea3e7002467a3eecc3ed623726e471faf650ea80fb119d4ccaeab658f4bcf8f5547a8dba3d8c7687dd9933b28f33bc1ee2847fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\1aa2fa18-7593-41d0-bc26-738eae289782
Filesize26KB
MD5c9c96a7cb45411555e3e7d8cf2ff5396
SHA19d7d635064e228466f6edeb9909829f252c57730
SHA2561763f115151cf8e7df30b62161abfbbdba7b7f9ac3abc3d9ab5900ba32262691
SHA512b160d6e67ec58cedbb0e2dc3d37ac7304c74e9ea9e708341dce11a5c68528574e1ed7df2e06fb0f76488aadef267c71ca9af6dcbafca6f881b2d3e07f01d9d02
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\8dd03e9e-61bc-4305-919a-2d29c93cce39
Filesize671B
MD51f4584422e49fbdcbe614fe87cdf8ce3
SHA1d1c3e6155c41be86aae6bd1c13ffc989505ac1eb
SHA256a0dac56234a5addea82f458bee269d66b3fff70c35bd79c480406c50c0509af2
SHA512c21031727135612835863758eb2a69e7ff186cb34b472971686e8339ba8016bed4e0d52f062fcb3ef5f317ecf5cb79069830f96d9c0ce834e6beb9907d4cdb60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\922ac7fa-48de-442d-b000-cddb95a9c337
Filesize982B
MD58c714dbafc570269faa7ffd34f9cd420
SHA1e3fdd60a07192da4e8b427fd2607076b332086ba
SHA2565968084a6093ace451f7884a57c9b3c918ec44f0e0c80f4f5fce6d7b18195c0d
SHA5128a410cb3f118da26936c09fc4d857aae74f1c74d841d49d7981992e0370170812d7a04d7ba1f169f0de28d7c97f63c46d8ff65469a38374f8c4d349e185da2c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD52eea34464447b8352c060897b53e9e0c
SHA1160cfadca6451b6c7fd7c976404c269595a948cb
SHA256b18548fb5c00a9363b471c065eb8aaccf9b0910a0b204ea4482277f517c9c82c
SHA512c2ff0bf9dbfcaf34bc55e882d360974444b7eee23ada6b9d72668c31f932153b2ee3abd68aa9e42cb70540a75d6cf33e3cd1e60d0cdf3c085bd00cb762d14412
-
Filesize
15KB
MD5fbfab437a1eaf85e2454c62dea7d65bd
SHA1a7b59b064bffc3bd8b686e06ca4e9b91ab225e93
SHA25637ad9bd9a0c3039aeff8b106502d44358933e5c8ee203a78afc4795c30d1c689
SHA512776cb39ce3e5f6660efb15297f8d163c02ee4a9bd1c2a781205ef313dd726cd25f0223b9b4f309a297c024f0d9181e298175be1dd66d58934f4f425370f476e0
-
Filesize
15KB
MD5379b9a6149f081e45d28a10bb70a1ef2
SHA12b96a229231136644f08e355fe64d14cc6e39b93
SHA256ea651350db6ad72378add84be76b34adca85835d63b7a7ef04be3d56444502b7
SHA5121e7a14b6724db318837e6bf92594cbf1631d9c5cd1663a09f9dc3a3828625c013dbab7be8683372c305c0e39539fc5f74f2ba91f8970579c4808f4c5ad32d3a0
-
Filesize
10KB
MD5dd95d42aea2a0d1b1f243dedd42ce5f0
SHA128256abd4158a877bce38e472a144850c5365ce8
SHA256f61251da5e213954f9570d37d8d77cc52b9a92669e6becac3b10a19f295a8a6e
SHA512d736ffab6c1c4699f03278ec2a12e16f76740a791fe815b97cdcd16a35f351536646b4ab95eb9277b78edbecec82e47d46007afa2867c026262b41863c510c20
-
Filesize
10KB
MD59b86a010ecc958fa302ed2accd883f0c
SHA1731f79be855f123b9ef4f86062a01940f4bdf447
SHA2560c3a585248d10406311770a32f56bd71ee2b82addd9d7c2cedff996171362a60
SHA51289dd063418302bc285ae411dc0c7b6f7c56f353172fc8f310d178f499d140863b0157cf7375e5c8b4d0a986e9a641fb48038bb3f84828a66e9cd9ccd96841ec9
-
Filesize
11KB
MD59aca1b84109946dc1a0b585f70f5074e
SHA146124bf7de5eb041b2aa8728acb2618ca7d245b8
SHA2562863569eede597f2e17eaf5a72da74a9fe0cb9836b8c5bd3365a73fc541ff706
SHA5127ef953c1dd637f77fb00727090913bf6bd45d189760a0f734d8952aadd741584aff9ca334076b3ffb48317b82dcb1f99b8c0f7f568705f24ca9394092563c603
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize848KB
MD56c24eccd3068b940ad624bf1b4852117
SHA10fa8d4e21b2d6e65f3d3f3209700b3096f858824
SHA2567a23c3f74fca37d308376c4036ea90def9be184e5341ae88759ed94ec56b6080
SHA51205aa1f0c7c2109cd82f38edffade6453963dbb1838660557562df4ef027d49328c76d329a9c4695f1bf927528719bd23e210aa8b9094ad462114816522774c92
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.8MB
MD5ca4b975a3f94170314413c614e6edf38
SHA1b065caa38ea9d4172f3988648f502f98110d1768
SHA256bc4c2c6844b0162a613cec0ec8e22afe0af1043c66cf29e6422447e2ca4b3bf8
SHA51254a3df511bf66cd8fd7e0e659840af9238f2fb1c6aaa6a71b2c9b16156cf7224a7d025216f4ded3282519a4e5975108e1a9a1f2ab00ce250806b97a5d5138a13
-
Filesize
3.1MB
MD5149e46576855d85be14e7161a3f7971c
SHA17e58b15460c3e54ec5e314afcc697a9354fed126
SHA2563dcc150549bdb47384919326ac06f3194808321f7175a1f52394d45831eaef16
SHA5121b1f5a82794713df971e0e9ede0b3036fe526f2ee01e262c0302dec0d96769fe10aafa850ae61a9c0bb297fb86c85823407e74dec52169b0b65ceeb0aaa1060f