Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 08:20
Static task
static1
Behavioral task
behavioral1
Sample
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe
Resource
win10v2004-20241007-en
General
-
Target
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe
-
Size
2.8MB
-
MD5
e4a2fce17d20f9501197dc633992b99c
-
SHA1
fb6c2a1c7122d61926d264aea8dc586a393a0948
-
SHA256
e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10
-
SHA512
3f1273c1d69b8af3a538195bda756dc2bb63df74140f4710731454fa0071e4758f129f54cbd46bcbc30afa237e7f3a261953e971da35d9e91e6a09f316a12f40
-
SSDEEP
49152:4D/Gf3HFtXn8J9i2ini7HOsuTMd/6FQcfT2JgD3:4D/Gf3nXi9i2RusuTIIQcaJgD
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
cryptbot
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c4c-2377.dat family_vidar_v7 behavioral2/memory/5356-2381-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/5356-2877-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c7acade8c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c7acade8c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c7acade8c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c7acade8c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c7acade8c5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c7acade8c5.exe -
Stealc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 7571b092fc.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7571b092fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 166140ccd5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee6448ede6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c7acade8c5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 658ece126c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 646561ba25.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7255ad8fc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4032 powershell.exe 5708 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 646561ba25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee6448ede6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 646561ba25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7571b092fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 166140ccd5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7255ad8fc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c7acade8c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 658ece126c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 658ece126c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c7acade8c5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7571b092fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7255ad8fc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 166140ccd5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee6448ede6.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 513a7ba17d.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 6006c4b123ed487f89ebd3afa1bc8790.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 85e32021394d404a8499780a4b027066.exe -
Executes dropped EXE 25 IoCs
pid Process 848 skotes.exe 4036 beb14de1a0.exe 2584 beb14de1a0.exe 3632 658ece126c.exe 2668 b45e37e20d.exe 2096 7571b092fc.exe 3508 166140ccd5.exe 4996 7c1f5c6f28.exe 1040 7c1f5c6f28.exe 3924 7c1f5c6f28.exe 1828 b45e37e20d.exe 1480 b45e37e20d.exe 1076 b45e37e20d.exe 5908 d427fe8be4.exe 5368 skotes.exe 2512 513a7ba17d.exe 3064 ee6448ede6.exe 5400 646561ba25.exe 5356 85e32021394d404a8499780a4b027066.exe 4016 6006c4b123ed487f89ebd3afa1bc8790.exe 2448 7255ad8fc3.exe 5564 b37520b2a4.exe 3948 c7acade8c5.exe 1728 skotes.exe 2320 4a01ca844d.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine c7acade8c5.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 166140ccd5.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 646561ba25.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 7255ad8fc3.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 658ece126c.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 7571b092fc.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ee6448ede6.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c7acade8c5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c7acade8c5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\646561ba25.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018358001\\646561ba25.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7255ad8fc3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018359001\\7255ad8fc3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b37520b2a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018360001\\b37520b2a4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c7acade8c5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018361001\\c7acade8c5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 116 raw.githubusercontent.com 117 raw.githubusercontent.com 118 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c6f-2534.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 848 skotes.exe 3632 658ece126c.exe 2096 7571b092fc.exe 3508 166140ccd5.exe 5368 skotes.exe 3064 ee6448ede6.exe 5400 646561ba25.exe 2448 7255ad8fc3.exe 3948 c7acade8c5.exe 1728 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4036 set thread context of 2584 4036 beb14de1a0.exe 87 PID 4996 set thread context of 3924 4996 7c1f5c6f28.exe 112 PID 2668 set thread context of 1076 2668 b45e37e20d.exe 116 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d427fe8be4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 646561ba25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a01ca844d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6448ede6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b45e37e20d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7571b092fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c1f5c6f28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 658ece126c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c1f5c6f28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85e32021394d404a8499780a4b027066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b37520b2a4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b37520b2a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b37520b2a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7acade8c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beb14de1a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language beb14de1a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b45e37e20d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 513a7ba17d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 166140ccd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7255ad8fc3.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 85e32021394d404a8499780a4b027066.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 85e32021394d404a8499780a4b027066.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5820 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 6116 taskkill.exe 3688 taskkill.exe 1908 taskkill.exe 3520 taskkill.exe 4568 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 848 skotes.exe 848 skotes.exe 3632 658ece126c.exe 3632 658ece126c.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 2096 7571b092fc.exe 3508 166140ccd5.exe 3508 166140ccd5.exe 2668 b45e37e20d.exe 2668 b45e37e20d.exe 2668 b45e37e20d.exe 2668 b45e37e20d.exe 5908 d427fe8be4.exe 5908 d427fe8be4.exe 5368 skotes.exe 5368 skotes.exe 2512 513a7ba17d.exe 1076 b45e37e20d.exe 1076 b45e37e20d.exe 4032 powershell.exe 4032 powershell.exe 5908 d427fe8be4.exe 3064 ee6448ede6.exe 3064 ee6448ede6.exe 5708 powershell.exe 5708 powershell.exe 5708 powershell.exe 5400 646561ba25.exe 5400 646561ba25.exe 1948 msedge.exe 1948 msedge.exe 556 msedge.exe 556 msedge.exe 2448 7255ad8fc3.exe 2448 7255ad8fc3.exe 5656 identity_helper.exe 5656 identity_helper.exe 5356 85e32021394d404a8499780a4b027066.exe 5356 85e32021394d404a8499780a4b027066.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 3948 c7acade8c5.exe 3948 c7acade8c5.exe 3948 c7acade8c5.exe 3948 c7acade8c5.exe 3948 c7acade8c5.exe 1728 skotes.exe 1728 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 2668 b45e37e20d.exe Token: SeDebugPrivilege 1076 b45e37e20d.exe Token: SeDebugPrivilege 2512 513a7ba17d.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 5708 powershell.exe Token: SeDebugPrivilege 4016 6006c4b123ed487f89ebd3afa1bc8790.exe Token: SeDebugPrivilege 6116 taskkill.exe Token: SeDebugPrivilege 3688 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 2668 firefox.exe Token: SeDebugPrivilege 2668 firefox.exe Token: SeDebugPrivilege 3948 c7acade8c5.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 2668 firefox.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe 5564 b37520b2a4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2668 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 848 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 83 PID 4380 wrote to memory of 848 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 83 PID 4380 wrote to memory of 848 4380 e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe 83 PID 848 wrote to memory of 4036 848 skotes.exe 85 PID 848 wrote to memory of 4036 848 skotes.exe 85 PID 848 wrote to memory of 4036 848 skotes.exe 85 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 4036 wrote to memory of 2584 4036 beb14de1a0.exe 87 PID 848 wrote to memory of 3632 848 skotes.exe 89 PID 848 wrote to memory of 3632 848 skotes.exe 89 PID 848 wrote to memory of 3632 848 skotes.exe 89 PID 848 wrote to memory of 2668 848 skotes.exe 98 PID 848 wrote to memory of 2668 848 skotes.exe 98 PID 848 wrote to memory of 2668 848 skotes.exe 98 PID 848 wrote to memory of 2096 848 skotes.exe 105 PID 848 wrote to memory of 2096 848 skotes.exe 105 PID 848 wrote to memory of 2096 848 skotes.exe 105 PID 848 wrote to memory of 3508 848 skotes.exe 106 PID 848 wrote to memory of 3508 848 skotes.exe 106 PID 848 wrote to memory of 3508 848 skotes.exe 106 PID 848 wrote to memory of 4996 848 skotes.exe 109 PID 848 wrote to memory of 4996 848 skotes.exe 109 PID 848 wrote to memory of 4996 848 skotes.exe 109 PID 4996 wrote to memory of 1040 4996 7c1f5c6f28.exe 111 PID 4996 wrote to memory of 1040 4996 7c1f5c6f28.exe 111 PID 4996 wrote to memory of 1040 4996 7c1f5c6f28.exe 111 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 4996 wrote to memory of 3924 4996 7c1f5c6f28.exe 112 PID 2668 wrote to memory of 1828 2668 b45e37e20d.exe 114 PID 2668 wrote to memory of 1828 2668 b45e37e20d.exe 114 PID 2668 wrote to memory of 1828 2668 b45e37e20d.exe 114 PID 2668 wrote to memory of 1480 2668 b45e37e20d.exe 115 PID 2668 wrote to memory of 1480 2668 b45e37e20d.exe 115 PID 2668 wrote to memory of 1480 2668 b45e37e20d.exe 115 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 2668 wrote to memory of 1076 2668 b45e37e20d.exe 116 PID 848 wrote to memory of 5908 848 skotes.exe 117 PID 848 wrote to memory of 5908 848 skotes.exe 117 PID 848 wrote to memory of 5908 848 skotes.exe 117 PID 848 wrote to memory of 2512 848 skotes.exe 120 PID 848 wrote to memory of 2512 848 skotes.exe 120 PID 848 wrote to memory of 2512 848 skotes.exe 120 PID 2512 wrote to memory of 4032 2512 513a7ba17d.exe 122 PID 2512 wrote to memory of 4032 2512 513a7ba17d.exe 122 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe"C:\Users\Admin\AppData\Local\Temp\e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\1018349001\beb14de1a0.exe"C:\Users\Admin\AppData\Local\Temp\1018349001\beb14de1a0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\1018349001\beb14de1a0.exe"C:\Users\Admin\AppData\Local\Temp\1018349001\beb14de1a0.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018350001\658ece126c.exe"C:\Users\Admin\AppData\Local\Temp\1018350001\658ece126c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"4⤵
- Executes dropped EXE
PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"4⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"C:\Users\Admin\AppData\Local\Temp\1018351001\b45e37e20d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018352001\7571b092fc.exe"C:\Users\Admin\AppData\Local\Temp\1018352001\7571b092fc.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\1018353001\166140ccd5.exe"C:\Users\Admin\AppData\Local\Temp\1018353001\166140ccd5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\1018354001\7c1f5c6f28.exe"C:\Users\Admin\AppData\Local\Temp\1018354001\7c1f5c6f28.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\1018354001\7c1f5c6f28.exe"C:\Users\Admin\AppData\Local\Temp\1018354001\7c1f5c6f28.exe"4⤵
- Executes dropped EXE
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\1018354001\7c1f5c6f28.exe"C:\Users\Admin\AppData\Local\Temp\1018354001\7c1f5c6f28.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018355001\d427fe8be4.exe"C:\Users\Admin\AppData\Local\Temp\1018355001\d427fe8be4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5908
-
-
C:\Users\Admin\AppData\Local\Temp\1018356001\513a7ba17d.exe"C:\Users\Admin\AppData\Local\Temp\1018356001\513a7ba17d.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\vcgnzryg"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5708
-
-
C:\vcgnzryg\85e32021394d404a8499780a4b027066.exe"C:\vcgnzryg\85e32021394d404a8499780a4b027066.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5356 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\vcgnzryg\85e32021394d404a8499780a4b027066.exe" & rd /s /q "C:\ProgramData\U3WL6XBA1N7Q" & exit5⤵
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5820
-
-
-
-
C:\vcgnzryg\6006c4b123ed487f89ebd3afa1bc8790.exe"C:\vcgnzryg\6006c4b123ed487f89ebd3afa1bc8790.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffb42ec46f8,0x7ffb42ec4708,0x7ffb42ec47186⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:26⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:86⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:16⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:16⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:86⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:16⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6521868952078976466,12963913400556721143,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:16⤵PID:6120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018357001\ee6448ede6.exe"C:\Users\Admin\AppData\Local\Temp\1018357001\ee6448ede6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\1018358001\646561ba25.exe"C:\Users\Admin\AppData\Local\Temp\1018358001\646561ba25.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5400
-
-
C:\Users\Admin\AppData\Local\Temp\1018359001\7255ad8fc3.exe"C:\Users\Admin\AppData\Local\Temp\1018359001\7255ad8fc3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\1018360001\b37520b2a4.exe"C:\Users\Admin\AppData\Local\Temp\1018360001\b37520b2a4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4556
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f81702f-80b4-4629-8c66-7748e4863fc3} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" gpu6⤵PID:5164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5e3441b-81c0-4282-bf69-2f3201198288} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" socket6⤵PID:5412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3048 -childID 1 -isForBrowser -prefsHandle 3040 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7eeab9e-5d8a-43b0-b776-1285a74bc887} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" tab6⤵PID:6012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3896 -childID 2 -isForBrowser -prefsHandle 3976 -prefMapHandle 3972 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1edcf990-e815-45f5-bfea-f648ded7c1c6} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" tab6⤵PID:428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4768 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d9d6220-ab6e-465f-af30-3a4a6a24c7ee} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" utility6⤵
- Checks processor information in registry
PID:5192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 3 -isForBrowser -prefsHandle 5400 -prefMapHandle 5396 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee7a6016-9be9-4ce0-b22a-4bfdbb195f9c} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" tab6⤵PID:5032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 4 -isForBrowser -prefsHandle 5552 -prefMapHandle 5560 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08804625-bb4d-4548-8c04-dd8fb9f0f302} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" tab6⤵PID:5780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5740 -childID 5 -isForBrowser -prefsHandle 5820 -prefMapHandle 5816 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45f1c11f-7e9a-4461-9445-49de8137d244} 2668 "\\.\pipe\gecko-crash-server-pipe.2668" tab6⤵PID:1388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018361001\c7acade8c5.exe"C:\Users\Admin\AppData\Local\Temp\1018361001\c7acade8c5.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\1018362001\4a01ca844d.exe"C:\Users\Admin\AppData\Local\Temp\1018362001\4a01ca844d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
5KB
MD51172d66bf98845395b826647db00cda7
SHA17db28fb3efa1f9c9ddb6e04c7d638071ec22bd8f
SHA256f80f15db5052cba3c2016e89c15319e9d5ceafaba1b1bd72c02ba07880d09475
SHA51235e234ad6a8f3b20446815dc4b5d6ff2528eab90e808b3620d5c15725330ff3b85a989d827dfa0fbc0550c1220481f8044fc4257eefd37cf591b3040a58227a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize109B
MD5b49f0c5472212c553e25ddbf0e09c2e7
SHA18a62d748a094ad219c9e649e8474a34eadfb9274
SHA256a3355749b95a051c675551cf87fb88ef2e1c67b134ee93084a93d6e0c58871e0
SHA512fcc38089426bdb2ae67fb2673a38fe9171d456a16a21db352185f7d6be4884f2a60761daa4b2a605617e7fe475c70f0a2daa793b1aa192b2ed1ea8bff8d435a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize204B
MD53bb8b2ef51b5897b0b38434a05fc13bf
SHA155b4ad39d990421a2d75abfc51e7bbbbebe11b86
SHA256d2f1262e1b9338fe2590b7f8f412a55c5636cca6b8f831a31ffb545935a34d94
SHA51291741596721006c429fedfcfe0143b3000a05db2bb6477870bb0178d4b0666b16788ef33737d93f4a105efea6b2688de6c619db1616154899a5f42d3290dd5b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD59c588e85e23056568b42ddb72584d9a4
SHA1d79879814e7aa878013a74c88e40f625a50f20d5
SHA25626087038e7dfea5db43e889dde5b37331f8180546203675d129718b93564666b
SHA5129f442f5fab3c5bc070ad5a18a7772fa43b55c6ff0ace3e7bdfa2a284f60efba1e700e19cb63521cfb746012df39402f93cc5f40286098730f3a3ee4e19ca2e5d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD59aacb35b74ab8fc1571cca0a067e4de6
SHA1a2e051ecc3c8c8ad83bda12eff79d60552f3c289
SHA256ae47b5a1f820466a783a5dc957c5422103841aba2d4f0c8740bde31a9618651b
SHA51213071edc8e350d71f90e21285904188b1a7d5699729e62f92ecb604e6b061110742b8f6e816c5f9367ee024272e69f9bde2f16acd4583e0050d8d820600ae2f6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31
Filesize13KB
MD5f76b0b433622a5fffdede5497ad162b4
SHA17ed750edc6883f70226134d00db2e20348d891ce
SHA2569131084ea8d7569f101ba383387e88e1cc87aff6769e93f760d4dcdcb83e8de0
SHA512337616af499352de740248907f305c255fead88774de3b4ba5708b58bf5b72c3c4062cbaedd62d0fae42c20e5de0fc07b908ebacfe2b9ebee1d0b1b154bed77d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
4.3MB
MD567844ee11cdf53db1185db90d33cf907
SHA133dc77a1ae23d6a5bc0da0429ad3f0f855c8d4d9
SHA256f00b4916dfb8458f46a8e4d556884b185676d28d3253be0f561db7d1f9bf3c09
SHA512f317adaa600efbe4db4fc630a8d971328b40e44c6b94fdc5bc8aafcf1ad47626a94db815dbf62e655de4600ba4b89651ad76ff7df71ec39543ca301f94524a76
-
Filesize
4.3MB
MD52ba7ee5357b8762915d320630e9a59b7
SHA1f4995defaafe3b084242e2b9f382c7b379938420
SHA2569249b72e3a0443ec9df0569d0a3fbe76c52d21c1b5d69f9dfb41d40b819e3181
SHA5126bd830e6c4aa7fce70f7dd0ca2ea5f99ae5bda4374a318a9595285e57f81ffa92a19f0e9e6c4b025252b4a54afae10a18c3182a006827791e79af98485d1c4b8
-
Filesize
791KB
MD5e8af4d0d0b47ac68d762b7f288ae8e6e
SHA11d65f31526cc20ab41d6b1625d6674d7f13e326c
SHA256b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e
SHA51280fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
1.9MB
MD569a94137bf10488dd980bc600b3735c8
SHA1da3d908540863d0466fb2d7acab950afaf47d75e
SHA256b53ffd4fc8c3b8759852c9742c3e26b4e3b8ba115ca15229a235db74f59a82db
SHA5122c4737d12aaf57967b0ed3aa224b6e836fa4adc25438ebd795cdb1204e4357f24ab5872bb9d8d47ef34f8083e0dd48e34fb3d53498cf50c8fdd48e36c22a81bf
-
Filesize
1.8MB
MD5c2ee21e005182322d1792a22392aa6c9
SHA16ef13b85b674e6bd5069982c3088f6cc6f5bbfa3
SHA256e712d62ab5c62709920cff6b910d773221a97bd3bb8c9f2e5551bc8b7ffab74e
SHA5125a76b62abe137041871794a24096a9b90fda5d3d87f77d48fc7f68151f3850019e549c870043d6b271a4188de2e27157997630aef2de0a23aa394313e2a38bc6
-
Filesize
2.8MB
MD51fd791df8d70ca8540b4692ada3b53ca
SHA111c2de8866b3718e9517ad4d712b369cc4fc3211
SHA2564ba0bbd1ee2428d4122ad9a8449429240e0ae2d27931b05827b76fc6c5075cdb
SHA51213c9a6dbc97544bba153f43b37541d25d4ed12483e59ac469790e04fdbe87ad8351ec2a0a14c3dc1c4b3933408cc7ae9a6225eef8519442ac7ca0ccf89b2226b
-
Filesize
947KB
MD5c6b3389b5f923e3fde254209e8dd9c8a
SHA19b2cff213550c79f358b7c7e1b32390cea55d342
SHA256492722a0f847204c4253be5a4ec7aac28ab9b0138dfaa0af17c57adabff6f0be
SHA5125f0d31a4190b8b85662799a78b4218958907e926f1abd648de5deb987a4f7d53c0b1586ab364865339460e897233df318bc851a806196693b2843fa86b897b58
-
Filesize
2.7MB
MD5430b6fcde50800b262ac29d690d8f20a
SHA1c48f996d0bc7de9b94fdd606822be1706cb7798c
SHA2563febcbdf5a0930a2e485dd30f6dec2613e8c18d0f897c1b17dc27a2c4bef772f
SHA5120d5ae71196859a35367af04b6115abdf5371ca69d88afd6a8e4a00a94e14e2a2d3f8599066329773e921b438ee650558fdcf23564f432b640229a3a2baaad930
-
Filesize
2.7MB
MD54d45e3fc92a1bc3e6350099bfdf0ddec
SHA163f495b32fb4cad9beb9e4c8a254293236de2a4a
SHA2569c5250c9b536574fe35ad0943fadab1483b180ec407312e57fac372ccc5a41f4
SHA512f058a4a7d942c9c8aa0893eec4d2a9eafde24510f1e6b9b8c935d4cd02939fb16ead791a388fb6559bef25cfe9c8a933ef09424c32ef17cc13c6947fbdf77394
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.8MB
MD5e4a2fce17d20f9501197dc633992b99c
SHA1fb6c2a1c7122d61926d264aea8dc586a393a0948
SHA256e52f866a206e57b906e45d77dfad0e0a3ec7fe5cf4d127b59c37a68563c1ac10
SHA5123f1273c1d69b8af3a538195bda756dc2bb63df74140f4710731454fa0071e4758f129f54cbd46bcbc30afa237e7f3a261953e971da35d9e91e6a09f316a12f40
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD51f16ea5cf446c93bb30349e96eab924f
SHA16b33298e96d92f9a861d5efc0b22952ee6684b80
SHA2568cf1ded6684c41e9ae7df092c77c70b27f7592c612a72a02bb76d98bbceac976
SHA512f5244e30e520b73c6db038cfac427379348557bac8dc316253fdfc27aa951c53142ad0d913ba218ebde86603a48b082703cb3103a7eedeaa93a413f07e477da8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD5f8030c20f4ea8333adbfad5d2615248f
SHA16fa640bc1ce7bb19f2d1211cee1dc88df1a8485b
SHA256a4e02298a04320b26b8bd47fb86aafc8c1c7324f0126a1913df524f63f7d52b4
SHA51250ae394df228dcdac85265f0941efc437e6b92e0eee04f2002014c0ba3e63556086e69b3581cbe78c8aa6476d802595b05ddc90952fe382efc6cdc41b9cc283c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD593540ef428ecfa6946b2b7d919c752fc
SHA1565abb4075d506bcff6da766d303bcac34c7b737
SHA25625bf9a305def56cbb411ad6d4a02011815efc0988e1ee09ee637452bd3c44cec
SHA51296138fbafb82da14fc1457393391af7da7720c6e66942d6947e41649119781873986c1e5f215ad95d7888ff750f22a5af29014045ceb7e07a854b1bc993a12e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54be240c0795b7ad6571ab441192d10bd
SHA1e5d3cc7061b8a6924aa9f59465c27d6f22209a7f
SHA2567c8d9df4b89de7b53b4872b53eae433eb2b150241da0e8d5ded8c81881f26875
SHA5129f0125edcefd5d99a12b2fdac617fb339aa697d79fc8093501ecef86a9f8a795daf949f6c58612d10719f09813d1c11ac5b3f495f9d9809aa63cd14c950f5633
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5065452ca96e646ef1d31179d80882b4b
SHA1d23f28a2520c89ea3923778aa25710267c7a591d
SHA2566dcef239779c14a7a89a5b686b1ad32c99a368c640dd4cfc36cdf6c7fea47878
SHA51291727bc40ce4407c4bf6ede4a2b012251e3bb908e5e6b0f1cc4982d3103c75ed354a8c22a5f24f653cdfe93e038dd31b802f23536e30ac56997be9f9e7eee0f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\4f2b7a61-e311-4726-82e4-a228c3b741d0
Filesize671B
MD5ab5e1bde6be3d0882e2ec52d56c3362f
SHA1e967e33085ab0c333eae8e16c32fd2312c21bd47
SHA256cb0eed85323618d809fb5c143095ecd3cb5ccd47cee3c6bab2b537a690c864e1
SHA51269529dae2f0d22c6b89d4b657468f7e7804ce66934fb6515ce4bda201b3e1f0dd772c9c95060873915b7b1788ebda497195f9c6c33d4b5f9376cce15c9188283
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\d28e73e1-1f50-45e2-9bf9-3df21d1e6ce4
Filesize982B
MD507601c3d30e4afb214f453803a854b18
SHA1dfd4a8ee8d4bbf1cc4d000d1361ae4508fb92307
SHA256c8cc95ba35e2851b4d194164a2550ec1281fb46fca361d1522c8f5b192e3242c
SHA5129b64eab644a883fbbc47216f06d64524ac38fd5cb7db380601d03b2e6e7d2e433fd73f32f1487cbef0142a6f92cafac20bc18f6efd7d8af829433fa3043efe34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\de19ae30-31b4-4cd2-b94f-e58c44b082aa
Filesize26KB
MD5a252912c454141377ccab3e4cfe8354c
SHA105e88106c11914f67670545a188f31d3880fc1e5
SHA25692f4fdd3492267a97e62ecf51d7cd5e016c119c64efd551280f650586c17b4db
SHA512b0b0760762db4e6a56ffe2fbd0fa8d26236ebff2a9fc96bcd99adc1e869dca62b7a7e105890a114d50af12d18772fa06d05b9914d464afc24a619e90d90d99d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
Filesize
11KB
MD539c66a5dc9b276218a7e907dde7aff87
SHA147875becfb4a4e3b79c2d7e6148b2735744e84aa
SHA256bdcb2fdb8affaa97d86223137729057bab8eace599eda06db0f2eaa70b18cfd8
SHA51202c77d25dd500c16821d2afd1c87cceb7f84829e7c1c1478495581f2cbcc4a90889b53c6a5063a1d1565c7a1234d1fbc3dd39f50dab02e3d2b7d4ae081e7bb0d
-
Filesize
11KB
MD5768165f09336dda7452feb00c010defa
SHA14dbc7435d73fd03f37a021a47830380d8b06715c
SHA256547bb78e6f2cf1892c2c339052c84ab060b624788ae15dda269f05417ad4341a
SHA5129b4fc978187b0bada2238dfe9c1795836cad231f57f27658c02122a97acd6c834397ac31a7896d0978290922333e822f46dbf9fe0b04c1988b5389e8f90c8b83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize760KB
MD51669fd087aaad71421eafad09d80e10a
SHA1342f2ade3c4ad7bcd22b93ec4f0f3e80d35b3305
SHA256416a42fa80239600a0b43001d32af65fa4c08fbf345d1df9aeab400ba7bedc64
SHA51236d01f2cf93755bde0f80f5753d99a2ef9c1cbc68e1daaa65bb99517389301fca9f9eaa73e139d0eaadc79c3424b770294b3708023c95ce1c42c9e46ea6985b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.3MB
MD5747de8de24c624abda9e2dd562fb2ef8
SHA1c78658964ead6ca17f28dad9d8b880b0daf0ec7a
SHA2563ec99b1588ce53a3e655922087ef7f41d4d419dfd76db8c0009cd913825c85d7
SHA512b6c3e767ce925ae1b3fc5bcb170c4126e57d5a62b1a63e20581f6fafd3cade7a2c674fd8ee2f80ec0fbb496a3c3207a4d0a28fe7d3dfae92104ef0ba78614175
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.4MB
MD5c161150e3c51e15199940d145d9531f7
SHA173f6c5b3ba67c3bb8dcb03674ff4c087a91313be
SHA256ceb2aba77f19f1fdd48f2ed637bdc7d066ba493bb4123a476bab5a61898d88e4
SHA5124d12db531b941788b60a57ad29f0371e51fcc6612306a08d5add77d817b68dc5526f1280e747b8af02ecc49b5a469a0ebea61fd7c79ffc32d89d02a34ec4b8d1
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0