Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 00:37
Static task
static1
General
-
Target
263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe
-
Size
7.1MB
-
MD5
bcb9ddcac56508c24f8ec88615480d05
-
SHA1
62efebb82170cba13b7e1261da12260bda4eb696
-
SHA256
263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f
-
SHA512
8d189946684041cd0d0fd7f8869bc782c55baf5bacf9ac7f36aeacdc043b6e9e95a2c2065ceeda1ab5bbeda66a9c9070870383aa387eb247c56feb0076995a31
-
SSDEEP
196608:ET+NaTZPK7rKeccgnie77tGVej4+STJvL1h3ii:EFjTn3tGVe6Nz1h
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Extracted
lumma
https://tacitglibbr.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" JPNND0NEBHG00B3ZPZAX23N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" JPNND0NEBHG00B3ZPZAX23N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" JPNND0NEBHG00B3ZPZAX23N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4y707Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" JPNND0NEBHG00B3ZPZAX23N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4edd1fa5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4edd1fa5ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" JPNND0NEBHG00B3ZPZAX23N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4edd1fa5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4edd1fa5ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4y707Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4y707Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4y707Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4y707Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4edd1fa5ac.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1256 created 696 1256 7764f46e66.exe 50 -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 2ee42aa4bc.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ K3OVUUBZJ6EJRA61DKHUXY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4edd1fa5ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09a71f1daf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7764f46e66.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ee42aa4bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IDHJEBGIEB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2dd37fd6f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1F15c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ipQYBO.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JPNND0NEBHG00B3ZPZAX23N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e4f106378.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4y707Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 811ca7da37.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c86aa5851.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1SA9KUJ6T4H20GM7W.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TB9O7JT5JWV9OOPFVZJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3E20W.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2T0494.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4760 chrome.exe 3524 chrome.exe 2256 chrome.exe 4940 msedge.exe 344 chrome.exe 1736 msedge.exe 624 msedge.exe 1248 msedge.exe 4236 msedge.exe -
Checks BIOS information in registry 2 TTPs 42 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ipQYBO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c86aa5851.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2dd37fd6f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IDHJEBGIEB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e4f106378.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2dd37fd6f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1F15c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ipQYBO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09a71f1daf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ee42aa4bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2T0494.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1SA9KUJ6T4H20GM7W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3E20W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4y707Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4y707Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1F15c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09a71f1daf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IDHJEBGIEB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JPNND0NEBHG00B3ZPZAX23N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion K3OVUUBZJ6EJRA61DKHUXY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TB9O7JT5JWV9OOPFVZJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7764f46e66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ee42aa4bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 811ca7da37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JPNND0NEBHG00B3ZPZAX23N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2T0494.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 811ca7da37.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4edd1fa5ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3E20W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e4f106378.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4edd1fa5ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1SA9KUJ6T4H20GM7W.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TB9O7JT5JWV9OOPFVZJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7764f46e66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c86aa5851.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion K3OVUUBZJ6EJRA61DKHUXY.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 09a71f1daf.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1F15c3.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation TB9O7JT5JWV9OOPFVZJ.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\09a71f1daf.lnk 09a71f1daf.exe -
Executes dropped EXE 27 IoCs
pid Process 1720 o7B55.exe 888 O8D66.exe 3976 1F15c3.exe 4084 skotes.exe 2272 2T0494.exe 712 1SA9KUJ6T4H20GM7W.exe 3144 4ipQYBO.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 2296 3E20W.exe 3044 bEp1dJF.exe 2832 09a71f1daf.exe 1256 7764f46e66.exe 4604 e00d68a022.exe 864 e00d68a022.exe 4208 2ee42aa4bc.exe 1708 skotes.exe 3248 IDHJEBGIEB.exe 2720 8e4f106378.exe 4072 4y707Y.exe 1100 811ca7da37.exe 2088 1c86aa5851.exe 1196 JPNND0NEBHG00B3ZPZAX23N.exe 4364 K3OVUUBZJ6EJRA61DKHUXY.exe 3872 47b8d4815e.exe 3448 4edd1fa5ac.exe 6116 2dd37fd6f6.exe 5768 skotes.exe -
Identifies Wine through registry keys 2 TTPs 21 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine JPNND0NEBHG00B3ZPZAX23N.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4edd1fa5ac.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2T0494.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1SA9KUJ6T4H20GM7W.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine TB9O7JT5JWV9OOPFVZJ.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2ee42aa4bc.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4y707Y.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 7764f46e66.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 811ca7da37.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine K3OVUUBZJ6EJRA61DKHUXY.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1F15c3.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4ipQYBO.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 8e4f106378.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1c86aa5851.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2dd37fd6f6.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3E20W.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 09a71f1daf.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine IDHJEBGIEB.exe -
Loads dropped DLL 3 IoCs
pid Process 3044 bEp1dJF.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1SA9KUJ6T4H20GM7W.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4y707Y.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" JPNND0NEBHG00B3ZPZAX23N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4edd1fa5ac.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c86aa5851.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016391001\\1c86aa5851.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\47b8d4815e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016392001\\47b8d4815e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4edd1fa5ac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016393001\\4edd1fa5ac.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" o7B55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" O8D66.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\811ca7da37.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1016390001\\811ca7da37.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023caa-473.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 3976 1F15c3.exe 4084 skotes.exe 2272 2T0494.exe 712 1SA9KUJ6T4H20GM7W.exe 3144 4ipQYBO.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 2296 3E20W.exe 2832 09a71f1daf.exe 1256 7764f46e66.exe 4208 2ee42aa4bc.exe 1708 skotes.exe 3248 IDHJEBGIEB.exe 2720 8e4f106378.exe 4072 4y707Y.exe 1100 811ca7da37.exe 2088 1c86aa5851.exe 1196 JPNND0NEBHG00B3ZPZAX23N.exe 4364 K3OVUUBZJ6EJRA61DKHUXY.exe 3448 4edd1fa5ac.exe 6116 2dd37fd6f6.exe 5768 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3044 set thread context of 1912 3044 bEp1dJF.exe 98 PID 4604 set thread context of 864 4604 e00d68a022.exe 140 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1F15c3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1980 3044 WerFault.exe 96 1908 1256 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ee42aa4bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4edd1fa5ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2T0494.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e4f106378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c86aa5851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7764f46e66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e00d68a022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K3OVUUBZJ6EJRA61DKHUXY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47b8d4815e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 47b8d4815e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ipQYBO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bEp1dJF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TB9O7JT5JWV9OOPFVZJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09a71f1daf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1F15c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e00d68a022.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4y707Y.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 47b8d4815e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 811ca7da37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o7B55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IDHJEBGIEB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JPNND0NEBHG00B3ZPZAX23N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dd37fd6f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O8D66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1SA9KUJ6T4H20GM7W.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3E20W.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TB9O7JT5JWV9OOPFVZJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TB9O7JT5JWV9OOPFVZJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 3252 taskkill.exe 4008 taskkill.exe 1876 taskkill.exe 1820 taskkill.exe 3844 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133788694635563377" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 1F15c3.exe 3976 1F15c3.exe 4084 skotes.exe 4084 skotes.exe 2272 2T0494.exe 2272 2T0494.exe 2272 2T0494.exe 2272 2T0494.exe 2272 2T0494.exe 2272 2T0494.exe 712 1SA9KUJ6T4H20GM7W.exe 712 1SA9KUJ6T4H20GM7W.exe 3144 4ipQYBO.exe 3144 4ipQYBO.exe 712 1SA9KUJ6T4H20GM7W.exe 712 1SA9KUJ6T4H20GM7W.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 2296 3E20W.exe 2296 3E20W.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1912 aspnet_regiis.exe 1912 aspnet_regiis.exe 1912 aspnet_regiis.exe 1912 aspnet_regiis.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 4760 chrome.exe 4760 chrome.exe 2832 09a71f1daf.exe 2832 09a71f1daf.exe 1256 7764f46e66.exe 1256 7764f46e66.exe 1256 7764f46e66.exe 1256 7764f46e66.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1256 7764f46e66.exe 1256 7764f46e66.exe 4284 svchost.exe 4284 svchost.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 4284 svchost.exe 4284 svchost.exe 2416 msedge.exe 2416 msedge.exe 1736 msedge.exe 1736 msedge.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 4208 2ee42aa4bc.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe 1592 TB9O7JT5JWV9OOPFVZJ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 712 1SA9KUJ6T4H20GM7W.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeShutdownPrivilege 4760 chrome.exe Token: SeCreatePagefilePrivilege 4760 chrome.exe Token: SeDebugPrivilege 4072 4y707Y.exe Token: SeDebugPrivilege 1196 JPNND0NEBHG00B3ZPZAX23N.exe Token: SeDebugPrivilege 3252 taskkill.exe Token: SeDebugPrivilege 4008 taskkill.exe Token: SeDebugPrivilege 1876 taskkill.exe Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 3844 taskkill.exe Token: SeDebugPrivilege 1100 firefox.exe Token: SeDebugPrivilege 1100 firefox.exe Token: SeDebugPrivilege 3448 4edd1fa5ac.exe Token: SeDebugPrivilege 2832 09a71f1daf.exe Token: SeDebugPrivilege 2832 09a71f1daf.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3976 1F15c3.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 4760 chrome.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 1100 firefox.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe 3872 47b8d4815e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1100 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1720 4440 263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe 84 PID 4440 wrote to memory of 1720 4440 263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe 84 PID 4440 wrote to memory of 1720 4440 263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe 84 PID 1720 wrote to memory of 888 1720 o7B55.exe 85 PID 1720 wrote to memory of 888 1720 o7B55.exe 85 PID 1720 wrote to memory of 888 1720 o7B55.exe 85 PID 888 wrote to memory of 3976 888 O8D66.exe 86 PID 888 wrote to memory of 3976 888 O8D66.exe 86 PID 888 wrote to memory of 3976 888 O8D66.exe 86 PID 3976 wrote to memory of 4084 3976 1F15c3.exe 87 PID 3976 wrote to memory of 4084 3976 1F15c3.exe 87 PID 3976 wrote to memory of 4084 3976 1F15c3.exe 87 PID 888 wrote to memory of 2272 888 O8D66.exe 88 PID 888 wrote to memory of 2272 888 O8D66.exe 88 PID 888 wrote to memory of 2272 888 O8D66.exe 88 PID 2272 wrote to memory of 712 2272 2T0494.exe 91 PID 2272 wrote to memory of 712 2272 2T0494.exe 91 PID 2272 wrote to memory of 712 2272 2T0494.exe 91 PID 4084 wrote to memory of 3144 4084 skotes.exe 92 PID 4084 wrote to memory of 3144 4084 skotes.exe 92 PID 4084 wrote to memory of 3144 4084 skotes.exe 92 PID 2272 wrote to memory of 1592 2272 2T0494.exe 94 PID 2272 wrote to memory of 1592 2272 2T0494.exe 94 PID 2272 wrote to memory of 1592 2272 2T0494.exe 94 PID 1720 wrote to memory of 2296 1720 o7B55.exe 95 PID 1720 wrote to memory of 2296 1720 o7B55.exe 95 PID 1720 wrote to memory of 2296 1720 o7B55.exe 95 PID 4084 wrote to memory of 3044 4084 skotes.exe 96 PID 4084 wrote to memory of 3044 4084 skotes.exe 96 PID 4084 wrote to memory of 3044 4084 skotes.exe 96 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 3044 wrote to memory of 1912 3044 bEp1dJF.exe 98 PID 1592 wrote to memory of 4760 1592 TB9O7JT5JWV9OOPFVZJ.exe 103 PID 1592 wrote to memory of 4760 1592 TB9O7JT5JWV9OOPFVZJ.exe 103 PID 4760 wrote to memory of 3552 4760 chrome.exe 104 PID 4760 wrote to memory of 3552 4760 chrome.exe 104 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 PID 4760 wrote to memory of 3060 4760 chrome.exe 105 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 6292 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:696
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe"C:\Users\Admin\AppData\Local\Temp\263d1cf6ee0322a2e320c3fd5baf21547085d56c0b7d3226f27ea52eed0ec17f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o7B55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o7B55.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O8D66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\O8D66.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1F15c3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1F15c3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\1016214001\4ipQYBO.exe"C:\Users\Admin\AppData\Local\Temp\1016214001\4ipQYBO.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\1016223001\bEp1dJF.exe"C:\Users\Admin\AppData\Local\Temp\1016223001\bEp1dJF.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 11367⤵
- Program crash
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016385001\09a71f1daf.exe"C:\Users\Admin\AppData\Local\Temp\1016385001\09a71f1daf.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /Query /TN "09a71f1daf"7⤵
- System Location Discovery: System Language Discovery
PID:6384
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc onlogon /tn "09a71f1daf" /tr "C:\Users\Admin\AppData\Local\Temp\1016385001\09a71f1daf.exe"7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6464
-
-
C:\Windows\SysWOW64\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\1016385001\09a71f1daf.exe"7⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:6292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016386001\7764f46e66.exe"C:\Users\Admin\AppData\Local\Temp\1016386001\7764f46e66.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 7767⤵
- Program crash
PID:1908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016387001\e00d68a022.exe"C:\Users\Admin\AppData\Local\Temp\1016387001\e00d68a022.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\1016387001\e00d68a022.exe"C:\Users\Admin\AppData\Local\Temp\1016387001\e00d68a022.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016388001\2ee42aa4bc.exe"C:\Users\Admin\AppData\Local\Temp\1016388001\2ee42aa4bc.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\1016389001\8e4f106378.exe"C:\Users\Admin\AppData\Local\Temp\1016389001\8e4f106378.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\1016390001\811ca7da37.exe"C:\Users\Admin\AppData\Local\Temp\1016390001\811ca7da37.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\JPNND0NEBHG00B3ZPZAX23N.exe"C:\Users\Admin\AppData\Local\Temp\JPNND0NEBHG00B3ZPZAX23N.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\K3OVUUBZJ6EJRA61DKHUXY.exe"C:\Users\Admin\AppData\Local\Temp\K3OVUUBZJ6EJRA61DKHUXY.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016391001\1c86aa5851.exe"C:\Users\Admin\AppData\Local\Temp\1016391001\1c86aa5851.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\1016392001\47b8d4815e.exe"C:\Users\Admin\AppData\Local\Temp\1016392001\47b8d4815e.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3872 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4920
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5cf7ac7-27e7-4662-88c8-8e1d1bfb3154} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" gpu9⤵PID:1032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2472 -prefMapHandle 2468 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3d6b916-72f0-4488-b025-6425d3499107} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" socket9⤵PID:860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3008 -childID 1 -isForBrowser -prefsHandle 2724 -prefMapHandle 3180 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {658ec625-663b-4d7c-a397-83e719dcf33e} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab9⤵PID:4596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3988 -childID 2 -isForBrowser -prefsHandle 3984 -prefMapHandle 3980 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {152c7c9b-dea4-41dd-ad2d-abbe815350fa} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab9⤵PID:4616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4820 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9fd9468c-9d78-4c6e-9a8d-846088515bd7} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" utility9⤵
- Checks processor information in registry
PID:6344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5436 -prefMapHandle 4808 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19833f16-7f2c-4d4c-8414-134774aef35b} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab9⤵PID:5384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5516 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44eac4a5-18a0-4808-9756-1e507e49d950} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab9⤵PID:5408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5524 -prefMapHandle 5528 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {85f59d1d-c3f2-4252-8e1d-6a4bfcf977bf} 1100 "\\.\pipe\gecko-crash-server-pipe.1100" tab9⤵PID:5412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016393001\4edd1fa5ac.exe"C:\Users\Admin\AppData\Local\Temp\1016393001\4edd1fa5ac.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\1016394001\2dd37fd6f6.exe"C:\Users\Admin\AppData\Local\Temp\1016394001\2dd37fd6f6.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T0494.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T0494.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\1SA9KUJ6T4H20GM7W.exe"C:\Users\Admin\AppData\Local\Temp\1SA9KUJ6T4H20GM7W.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\TB9O7JT5JWV9OOPFVZJ.exe"C:\Users\Admin\AppData\Local\Temp\TB9O7JT5JWV9OOPFVZJ.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffeec7dcc40,0x7ffeec7dcc4c,0x7ffeec7dcc587⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1872 /prefetch:27⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:37⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2388 /prefetch:87⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:17⤵
- Uses browser remote debugging
PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3244,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:17⤵
- Uses browser remote debugging
PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4268,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:17⤵
- Uses browser remote debugging
PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4812,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4844 /prefetch:87⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2960,i,7736886019520447903,17889791781659613637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:87⤵PID:1148
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffee8d946f8,0x7ffee8d94708,0x7ffee8d947187⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:27⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 /prefetch:27⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:87⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:17⤵
- Uses browser remote debugging
PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:17⤵
- Uses browser remote debugging
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:27⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2456 /prefetch:27⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2708 /prefetch:27⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2940 /prefetch:27⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2940 /prefetch:27⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4600 /prefetch:27⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:17⤵
- Uses browser remote debugging
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:17⤵
- Uses browser remote debugging
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15825673088659288976,3693813376562274974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3572 /prefetch:87⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IDHJEBGIEB.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Users\Admin\Documents\IDHJEBGIEB.exe"C:\Users\Admin\Documents\IDHJEBGIEB.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3248
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E20W.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3E20W.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4y707Y.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4y707Y.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3044 -ip 30441⤵PID:4792
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1256 -ip 12561⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5768
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD508bc7ef29d4f5b01d45faff95020d30f
SHA1f83e8bbbbc6085074b09f484fb73cce1aa41b377
SHA25686507026d9514e7c3eff8fac70393728381b5043db1a80b77d665e03202e0973
SHA512a091e05d168c2845b738ff6b02bf03abecaaa25ed97fa186b49d9e1d9ba3c28830f4e655bf0b976c816ced1d40139ffaf770ea3b1531526fa7db5ebc85e2f5fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
5KB
MD59e81c91050624d171b00264150332c82
SHA1f8d0ba6d0d705ae806ed05896a0698a332904c64
SHA256a29ab029e7d65eaa90ddc18dd531cdf2c660555b78ca1265e75aea965e217bbd
SHA51201b9e2fb23a49e5a633e278f1a5a326b988e2740dcccf2342870f7327c1f85d914219d42262a055a6eccf55202f61366d599a7461fbb91af5c79acd063f5fbf6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD55851f819f1fb12db37561008a9c25241
SHA18c3dceadae21c9da2ef558a60f7a7721ed767dd8
SHA25625f3c7c9ec49b2382e6d864f89d24fc53f247c14c2c9e8a4eee34a9b3fc884d5
SHA5120290d09d6eb1e6510199e937535fc30b7ad39a1d23cbe455f35c864e7bfa8762545cfb8b6c3ab05a44af6c1c4bc19aea73909bd1ce0792eb21997e5e2e6bf43c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5b3d32f1efbed88ecebbf823067b6696c
SHA16950cd7700a461aea7f44200d6e6c0217395145f
SHA256cb54344b415c4665604b36171ed78573f194d9bc607e64a85ee8b84a0580d167
SHA5127f0f3c959c735962e98bdf8d60f4b6ef5c05bbf52ca8c287694c9ad1027ca6b25088bd5cd361bf2cfb153e9ef76053b70350c7fde6801f23950875d185f2f094
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5fd17d712c627b434e99749cfc82c7d51
SHA1bf00a1fe4d9efc63e963751201a383bf9df7d25e
SHA256af8729a17698880e54e9f23b48e6b68d73672179f58868c201c8cf54d1a578bc
SHA512b3f56a4457df967d9355f42316e8332813c46003b4d2e216fbabded7edcddcbefc72ee01fd706722cf81e2fb3e0986c31358a22270f7b36106e77a88b6c25c85
-
Filesize
709KB
MD5c299bc91f8ff13b5c061ae547a904b39
SHA18e417e07a1b7a14c07c0d607fc2ca1443de92ee1
SHA256d9e68de0e0928d896b9e53ed2068744cc539bca74508cd0a544540f3cd64d5d4
SHA51279fc6b6ac7d2c3ae5cab4db34002ad8d90fef944c9696135d1b60f53b6f76bcb6b6395b3e66b46269012e05a11d5a3fc4413b4cfda19542fb41f7ac7cb156c45
-
Filesize
1.7MB
MD5d37dab4c59e707f632bb0b91eaa87ff9
SHA10e153debcf54805a0543646620511b57865d6fc9
SHA256375a067be10250dc045ea14025444ad7ec0662cf189abbbd393e6f7ffe85b35d
SHA5120ae81abbe56f0a20c8066c52672d969c962a20b19c7e7165b12c7b16a4f0681c4f96ce2cedde50ade5975ced262d581fc99d0947c188cec847c8a82eb85bc0ae
-
Filesize
1.9MB
MD5e77d6f82f6ac60e5d6d7bdfc595e4890
SHA1d71c11f0596885d81e195530ede5be7f36a6a1df
SHA2563cdad55d54fe131588ce90d5524a8fac0c0a3f36093b1c6fc4bc099e9e805894
SHA512842b147ce19200c882e315d1d7c07ead557b6db18d32bb70e3161865720bda7a1ae49387b0c725514a1b98a8585b508cfc4a5062fcf1d6cde4d2b4a47e31858f
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
4.2MB
MD585cea0d2fa18da07d24daa648971117a
SHA10b50f57223bef54f682715f7944267a419004cb4
SHA256845229081df392891048243c2c4b8502c10b68eacf8345d515ed5d0485c24bd0
SHA512a460a2c1552b44c5df55203c90bcba0603fc39ef106bfdd9ae95751c48788f132318fb7dc5a1d8560a33fc548ec8f5204ae4a295bea3160854773ead08b343c0
-
Filesize
4.2MB
MD50c9ac016b38263da875782e7fd32cd5c
SHA1c81138a0fd251982dd17ec26efa677a84babbc39
SHA25651ad49a33d4116003b1bbfa4be0009c232eb8309728e6903ceebeac326def1c0
SHA512b0f023a55887b60c1eb432caf2db4a4d90eab5838fd8411e7e7b606da3fa9a53ce8a65f153f9d3ce30cfce82d848a5aae3637bbfca01872233a304efff99a197
-
Filesize
1.8MB
MD533f9e889016b41140afdad01332d5a26
SHA1f4de250dbaa6b3f9c8801498526e0bc22ad340a5
SHA256599086e8d07adba2a1da0154abc7ec0c3517e4b13ed3f2cb0c6091bde27cc1eb
SHA51240bc464738fe493630dc133edec1f7e02c5ae3aa8999a911636e3ba071b6e2080400f73d02f4f268526b0fa218d30a35361a7df69309c67b0e470be2392344b1
-
Filesize
950KB
MD565ad21f7a8a47263b4c7acd943efd140
SHA1a1379c3fe6fafffc6ab6ec7e4003d7e18802402d
SHA2564c0367bc660cf73465b5e1e9f47aff22709c05abbd3b5fdb88b9aef577d117d6
SHA5123044c95db4b3dcf71ad55251fbb998bdde71b7baaaad093f874d53fb133b7a22e4912e2dcc1b863d81488fb0eaa367ff5bceebba1367a277849926b918d6a928
-
Filesize
1.7MB
MD5c07b01af18efd92367ed44ab96bb6562
SHA118484683aafa4933e4ffd59640b4ea9df33d2cd8
SHA256ff16e4b2824ca8102e810f3101d709ffa1f09aca620d07872183cbb4af64b441
SHA5129d5b830a270c0198bb9788f10758a1fffe83c130d21eebd6a5c2590032d6fcd36cf2958ab794b4283a98a9e38e0a842878fc474ae3ba5c4d659eec9acdf17b8d
-
Filesize
1.6MB
MD55627434dcd51ad8e6ccd2f2e910244b7
SHA134d10cae708d0a50b771e27c4e3fa341119bffa8
SHA256c2cb09db1f95c2786c59842f48adfc1bc4f89a039066f5848c4b7a6743a6c173
SHA5124a8fef280317f2f95eb61d1f1fa502a1666dd6f29edae97132dd7d25fe789f0a20f6d7b922bba5519ff7775aacebf4471213fd23b026d174260b3e1ef74ba149
-
Filesize
5.4MB
MD5ff9d41538a5cdbeb34f228c481876e85
SHA12ea42106c9a8eea0a1d11ab7114409c305f83e95
SHA2565d2d2e9f97d9cf9f152f679f65e521392b152593421f154b9bacc769c2faba02
SHA512ae9e23d8b2c6c56c6c9280c8533e01575dd17d42a794e6bfc28b56c9b758358c21b897288e108f993ace8261255885a2e88a624751d7199a89d9ab270f30bcb2
-
Filesize
2.8MB
MD5378c6fb769071786359387f4775f1956
SHA10f6f0969ce99c10885acf1c55bbd6786d8665db5
SHA256d6d93e9798642ad2e081b4eaa8c99c09803b4ae8d5d700c6c9dd764ddd0f70c4
SHA5127e33c67a4a4a95836fcd484ff72684b43e2c36c842c5ed5b2101c41b08ad514004799f9774f540d0c060f84c17442f79b629ba99103ca84fd31c231aba671e50
-
Filesize
3.7MB
MD5fd2276c345b6dc0c103a28165d54ac71
SHA151563867710d08b5ed68eb089c12c71e494a3cf6
SHA2567909ee5a0a0e2417ef87c97fbaf6989ab651c3a23eed0dc1c5757d5c486e5527
SHA512a816f39413e39c85ded06b80c6c0d517eef3306b9aedc1bc3c373e701d2e61a0fb29065720f242bceeeca72312da3fe0dc8f7175c976a91a4633fb015f6cc3f2
-
Filesize
1.9MB
MD50a33d6a84e76fbe67e55cb586eee180e
SHA1128121b3c02799a5878179b2105081fb186a00d2
SHA2562991c28484a6cbf790d2b9cc6e55e0dd4b24b5d94eed9b1ab4a6ba23ad7a9e4d
SHA512d9e816bc9bdd8d6cd2249bf6b868f2aa9e1cb7420b4c3989517e313f25bd874b11427a88cb406b7dd8e2c81b4ceabd064b49f03402540630d75a9849a47db9c2
-
Filesize
1.8MB
MD5d904d432f6ec77928f1330ed4afc1d73
SHA10b525e00fdc7b989e2725f0e03c93185deac6c24
SHA256ecc41494eae1e27988859b355d7911b7efb5186b57dbd3b77a85dce3f0b4935a
SHA512794a1548d71e2fdfad7da8c3d71e458eaf07c5f1aec2a98a6c8cd34115fc23341fad53879daef89db14f6a807d0e5bbc528e493bd798a49e8ab7773a86ec48df
-
Filesize
2.7MB
MD5b4c1dba163af3b5402e1746b69c964ed
SHA171efe2f7ec13586ae2578c60a56f23732392bc2c
SHA2567ec038e9dd03aebc33ae61653612825040d6ede00bc677f73e1ae6c13378dd3c
SHA512ce80a035481af64cfb46370ea38daa4ba86ba5341579e34a3e82debb14c7599b1512d35229502655a9307c4e3557276248dba7baa971af4444290d7e6533ecdc
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD5be0e726b45aef6a49847e77eecfd19e0
SHA1936e7b52987174bded841e594ebbb32a532c778b
SHA2563a32d890a0f7535eb0d5d9bd90e665f18e10661627151afb11075113ffe1e23c
SHA512659e4381d1970033f418d5ace0c29d734fee20aa305ec6e3a7087deb62ca2fcb20fa6dae61b4eddca0a029bf05779a99cd0267de89b9e31b12a45bd4b876eaa5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD575061fe4d291e2eb9a40344e688047a4
SHA1e28ccdc840798fcf37e7a3fc1a0ddfe81ffec2ef
SHA256d2825107909482cfeae39a0d5684e4ef4422cc6bee62e0f635982edaa83f2b11
SHA512f05da4386a63dabb82c3d727f3aaa45014dc74bf6f04ed49a2989e88a2e2cf60a350230b169e71ff87876da45af196a76fb1eb50322d83d50d07fb0c1521d77d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD50f54bafb09ca55b8db3cf6b2f75e672a
SHA17d6c303ca0f603ffc8a9497bd8cf0f34247edd69
SHA256c045725e893b8a92d3c0dc8c225dea2828d371fc7f38347190f67b737d789467
SHA512f31f59231857e74ad760ad0e2105052f6a437e0f290e8bec34182ce9ebc83343bec696cd600841791a527ca32782062ea95ee3aeea9573c28e276b79bd16aec1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD50cff2bb368152ab58b0a531ce4e5435b
SHA1d65036b15bf50dda72da4c5182436bf3f7ed619b
SHA2568820d39f5821be1097a29c1447d139e71c8d3a1319cd4d62ae5c733f5978ce77
SHA512c7573c97d2596bc8da6bc1a263698a5703eea18aecb112140ccc95725c370b2095821523fb34d7e864108ad7f830e5f43d67e063478501fae43cb76aded9600b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD55263466450e4d4224a6f2571d57c2003
SHA1ff75781f130ba3da9222679c600b7508ebf6b613
SHA25635f32fa869520b5f003b91a2a794e61f16d87a35142d03b0748be17947b81909
SHA512871d6d61cae22270684e1cfef84b261a7c7b334d937e4604e4ed889a420da52619e62723ed2a385d49511db9d6d4f99894c78baf1b1688588066f353185533b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d8fc5b6ebfd63a22dfb95a30ddf69e69
SHA1285daf8c2777e5f5fbb4461dfa7846c8d72327cd
SHA256f237726305ce8fe986fe8941e1f73b37fb68ee38880934a61baf26b966786e22
SHA51251545cadc5a02d2d39cc0fee5f5037bf0d99f1a0867d0197435a737fce702078a2b244be12f197eaf3d50af8c835ff7821767c96827891f95c96dfe40e134ec7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5674e540f485c5a22d296f64ac4cf6834
SHA1e50430cded8c9c931b6e01dcbcaf65926638ce7a
SHA256090b7219775624138311728101950d807bdb5be0c4d57b730cdee87f969b9683
SHA512761ad66930a6fc90a171f1e5ee5fd1ab45c1b4dd644c6c862797ffbfa5038fbe0ff877f9c0d932a0252d8304e00aa5e64fc1b05f0fd34ddfc9467a8500567c0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD543b0cb452d94ca9118f61a2cd9623201
SHA1a9353f0cbf9b58eec22060c2ceba093fcf29064b
SHA256dc39b6443f60f03071bf49ea26845e28b0eeb08759b7baa8955da42dae42185b
SHA512fb9cce84a238f5a30f7e92adf10af607487c3e6bee150299b8322ed8f0e7e7613e55be2adc0b84440da45c3954cd3fb27372ded29789019dfa1947d01cdc0acb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\3be38284-ce8d-4feb-a54f-daa22cd2b599
Filesize659B
MD51ce67ec54fd756a711e207dc622fa40d
SHA16d4014f2eb2e924602a95da1a9d1ba69322f36db
SHA2569ae41a70d195a72d6fa71ebb74094c121c4c59754c29461740334dd0fafccf42
SHA51254aaac53c238c66781ba8999a088c415ce34ca85abca5c79d2dd48cba18d242d57535018d05c74bd75bada74a1b4fdcb8c0a5ec5852cb28b760478f0d51efb94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\9bea1a94-ff70-4954-a3b8-28acce40e6d9
Filesize982B
MD53138c1f06ebe0805ee0edbca19b8ea9d
SHA1f129ebd01a628831c8c2f67d90d36aca70bffd8a
SHA256bfb82a8441934eabdf848999249ad0665a8e410b6f0a0a026ac510c3d3b1b571
SHA5122a2936529efa07bd376b4d31c5eb442898dc64e56a9747c0e25acd8ccc3f842234223c56415d079cce3b8df22d1fb5c6d895837d7de8f1c25d76daa42794feac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5950a093e334f5b69a0011f2adfddb35f
SHA10bbf8e9f9f1b7804b9f55ceae451ded7ac41c0ca
SHA2568feedfeb78d31ccc99b180f1d36891d0909c596a8ea22036995f5a8bfe985484
SHA5127061018c488a9eeae5f6d22fe756b5e8ceb09594c0ef5ca63283e3bd47b6ca99af42c0f37d872d60ead3c2ea024268631a14e93433ed9d1a7f4f246198e68231
-
Filesize
11KB
MD5c113b80a795884d6fe8fb6bcec06558d
SHA13d1c0c124b4e2267e5a12ffe51cfa24ad84921ab
SHA25610cd2b05d8ff513fe0960e2216c38cbfb4c6214e885bc9df1fe71121b2d66a16
SHA512d6fb316eb4a551b26124a54e2feaf19609f5f3cca68ba82fea379d9596f8555927cd7a1dd4dabdb4192c4531164ddf9f592744a72ef854be0d8a5495b7cd3969
-
Filesize
15KB
MD5f4ef09f9944fdd8f02158fd7bd67264a
SHA103b69c7a6b2ed7e307dd35a34cae9e3d72a72c67
SHA256b816a7bca72488939397b15eb9cae6144df5388a8e97a3974263369e702dbce1
SHA51202760657de18dc6f6f84785432b95935fd6281eb7423a6553c2d640ba5ab3d263c3b064ed3774a37fb54336837adba95c2b7cc2ad72b48b4118a7f57602b6778
-
Filesize
10KB
MD5f29f3418132dbaaeda98752647bd29cd
SHA1997a42bac1c0cce1cf4473a3d2492984f50d7a19
SHA2561349bfd723d9a88dd0081222ea4849423b25ea8751cccba40d49083c4f1b85c7
SHA5120d6fd231f95d607110c0c1fe98ea03ffe3a48c3c650dc00840d586bf20274861517eb55a2216ebe4dec1f6ac7b45fc59226067983d16d478ee11ec26a0fc682c
-
Filesize
417KB
MD5016370d35f13013e081b67f55e20aba8
SHA1b0ad8fc7b8adf8d969840bfa80b7c8868af209db
SHA2568b409a2f186559e9f9b9528a76ad1913eca20d601173fcc858e13a23e07517ef
SHA5121df0a8afd1bb0819b310123504b0640666a0680bd43cceca0530372fa22eb6399710b1e8b014b843c748ca82bfedc148a04bf95a515f2c03fac1af0a6c2d5911
-
Filesize
2.9MB
MD57cf236240d235f35fbfd37f4abfed7cd
SHA1eb904f17eabb2837a239e3c6b55490657a3a00c7
SHA256da8d837276d6ed969359c92e63e8bb6d9c3531f48dd84358031978939b0ca1e4
SHA51291aa97e27ea392efc654fd6737875dcf910ac3630f55cb2140782a49a7bc108df55a5292613fe01fdee9e63b46ac768e62c1e41299f93e9e4f240e6d2c426a8f