Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
2.8MB
-
MD5
6ceb0f68635c643029bdcbf6fab01b41
-
SHA1
c59cacff4ad813295a2bdc53d524df6dc62526b4
-
SHA256
e02129bdbea6e49627ffbff6f291a4c1295d15725f47c1ebdae7c85a1a7dbb59
-
SHA512
1031d7f3417905c6df411ff3fed4aade0c5a06494cb3f63701a5f34aa6b05710c83f5893d7517a84cb50316726d5e429e6aee9aa3db33ede4374f5f7d7c464fa
-
SSDEEP
24576:nz+jM8ri0f6RuURd+tvx+OisK5KBI9bd6ypmmpzI9yv2X0IkJAEODpYVHXuXojHf:nz+YAiA633kgL9xpB0k7lzbnhIlgrp
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023b81-172.dat family_vidar_v7 behavioral2/memory/4216-176-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 behavioral2/memory/4216-253-0x0000000000400000-0x0000000000639000-memory.dmp family_vidar_v7 -
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c4b79547db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c4b79547db.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c4b79547db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c4b79547db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c4b79547db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c4b79547db.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5900 created 2652 5900 4c023149c9.exe 45 -
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 2b4d111f11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 7975762792.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e3eeac867.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 202481b4e6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 909eefda71.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4b79547db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7975762792.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b4d111f11.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EBAEBFIIEC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4c023149c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 56039dc13c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a3a13f5417.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\Windows\System32\drivers\VBoxMouse.sys nkCWteW.exe File opened (read-only) C:\Windows\System32\drivers\VBoxGuest.sys nkCWteW.exe File opened (read-only) C:\Windows\System32\drivers\VBoxSF.sys nkCWteW.exe File opened (read-only) C:\Windows\System32\drivers\VBoxVideo.sys nkCWteW.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3568 powershell.exe 2084 powershell.exe 5528 powershell.exe 6128 powershell.exe -
Downloads MZ/PE file
-
Looks for VMWare drivers on disk 2 TTPs 3 IoCs
description ioc Process File opened (read-only) C:\Windows\System32\drivers\vmhgfs.sys nkCWteW.exe File opened (read-only) C:\Windows\System32\drivers\vmmouse.sys nkCWteW.exe File opened (read-only) C:\Windows\System32\drivers\vmci.sys nkCWteW.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6344 msedge.exe 5164 chrome.exe 5720 chrome.exe 4664 msedge.exe 6356 msedge.exe 6812 msedge.exe 3924 msedge.exe 5732 chrome.exe 5912 chrome.exe -
Checks BIOS information in registry 2 TTPs 28 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 56039dc13c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a3a13f5417.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EBAEBFIIEC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4c023149c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7975762792.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b4d111f11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 202481b4e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4b79547db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4b79547db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b4d111f11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 56039dc13c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a3a13f5417.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7975762792.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 909eefda71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4c023149c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e3eeac867.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e3eeac867.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 909eefda71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 202481b4e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EBAEBFIIEC.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 8c129573bd.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation aa22141121fa48729140d45555563467.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation d83a9c4e6d524af8b722d3cbb32fd01e.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 202481b4e6.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation f6d33a6594.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation fefc4ccdf0.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 41 IoCs
pid Process 5016 skotes.exe 4772 3a260f86fc.exe 5072 8c129573bd.exe 4672 2b4d111f11.exe 3564 8e3eeac867.exe 4216 d83a9c4e6d524af8b722d3cbb32fd01e.exe 5104 aa22141121fa48729140d45555563467.exe 4688 909eefda71.exe 1424 202481b4e6.exe 5368 ad86d12070.exe 6832 c4b79547db.exe 6896 81beca057c.exe 2600 3a260f86fc.exe 6308 81beca057c.exe 7044 56039dc13c.exe 3716 nkCWteW.exe 7072 skotes.exe 6380 a3a13f5417.exe 4684 EBAEBFIIEC.exe 1640 d906d1f0d6.exe 5900 4c023149c9.exe 1064 f6d33a6594.exe 6884 fefc4ccdf0.exe 6348 f183f4929b314495801998708b270122.exe 6056 7z.exe 5604 7z.exe 6528 7z.exe 1212 7z.exe 4676 7z.exe 2232 7z.exe 5500 7z.exe 5776 7z.exe 1120 in.exe 6868 7975762792.exe 6412 d906d1f0d6.exe 4160 d906d1f0d6.exe 6128 c6d767233f.exe 5840 c6d767233f.exe 6320 e3c98dbfb8.exe 4232 skotes.exe 2356 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 8e3eeac867.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 909eefda71.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 202481b4e6.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c4b79547db.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2b4d111f11.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine EBAEBFIIEC.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4c023149c9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 7975762792.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 56039dc13c.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine a3a13f5417.exe -
Loads dropped DLL 10 IoCs
pid Process 1424 202481b4e6.exe 1424 202481b4e6.exe 6056 7z.exe 5604 7z.exe 6528 7z.exe 1212 7z.exe 4676 7z.exe 2232 7z.exe 5500 7z.exe 5776 7z.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c4b79547db.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c4b79547db.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\909eefda71.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018428001\\909eefda71.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\202481b4e6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018429001\\202481b4e6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ad86d12070.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018430001\\ad86d12070.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c4b79547db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018431001\\c4b79547db.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 31 raw.githubusercontent.com 32 raw.githubusercontent.com 33 raw.githubusercontent.com 359 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c70-379.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 7 IoCs
pid Process 764 tasklist.exe 320 tasklist.exe 6996 tasklist.exe 5744 tasklist.exe 6332 tasklist.exe 1212 tasklist.exe 2544 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 2328 file.exe 5016 skotes.exe 4672 2b4d111f11.exe 3564 8e3eeac867.exe 4688 909eefda71.exe 1424 202481b4e6.exe 6832 c4b79547db.exe 7044 56039dc13c.exe 7072 skotes.exe 6380 a3a13f5417.exe 4684 EBAEBFIIEC.exe 5900 4c023149c9.exe 6348 f183f4929b314495801998708b270122.exe 6868 7975762792.exe 4232 skotes.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4772 set thread context of 2600 4772 3a260f86fc.exe 161 PID 6896 set thread context of 6308 6896 81beca057c.exe 162 PID 1640 set thread context of 4160 1640 d906d1f0d6.exe 261 PID 6128 set thread context of 5840 6128 c6d767233f.exe 264 PID 2356 set thread context of 4152 2356 Intel_PTT_EK_Recertification.exe 268 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 992 7044 WerFault.exe 170 6324 3564 WerFault.exe 96 2612 5900 WerFault.exe 225 -
System Location Discovery: System Language Discovery 1 TTPs 42 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3c98dbfb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e3eeac867.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad86d12070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4b79547db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56039dc13c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c023149c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7975762792.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ad86d12070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f183f4929b314495801998708b270122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a260f86fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c129573bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d906d1f0d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d767233f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b4d111f11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202481b4e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3a13f5417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ad86d12070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefc4ccdf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6d767233f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a260f86fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6d33a6594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d906d1f0d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d83a9c4e6d524af8b722d3cbb32fd01e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 909eefda71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81beca057c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81beca057c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EBAEBFIIEC.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1972 PING.EXE 7184 powershell.exe 7340 PING.EXE 2992 powershell.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d83a9c4e6d524af8b722d3cbb32fd01e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d83a9c4e6d524af8b722d3cbb32fd01e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 202481b4e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 202481b4e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3144 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 6 IoCs
pid Process 6872 taskkill.exe 7044 taskkill.exe 6880 taskkill.exe 3556 taskkill.exe 6180 taskkill.exe 6376 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1972 PING.EXE 7340 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6200 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 file.exe 2328 file.exe 5016 skotes.exe 5016 skotes.exe 5072 8c129573bd.exe 3568 powershell.exe 3568 powershell.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 4672 2b4d111f11.exe 2084 powershell.exe 2084 powershell.exe 3564 8e3eeac867.exe 3564 8e3eeac867.exe 4688 909eefda71.exe 4688 909eefda71.exe 4216 d83a9c4e6d524af8b722d3cbb32fd01e.exe 4216 d83a9c4e6d524af8b722d3cbb32fd01e.exe 1240 msedge.exe 1240 msedge.exe 4416 msedge.exe 4416 msedge.exe 1424 202481b4e6.exe 1424 202481b4e6.exe 1424 202481b4e6.exe 1424 202481b4e6.exe 1424 202481b4e6.exe 1424 202481b4e6.exe 5164 chrome.exe 5164 chrome.exe 1032 identity_helper.exe 1032 identity_helper.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 6832 c4b79547db.exe 6832 c4b79547db.exe 6832 c4b79547db.exe 6832 c4b79547db.exe 6832 c4b79547db.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 1424 202481b4e6.exe 1424 202481b4e6.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 5664 msedge.exe 5664 msedge.exe 4664 msedge.exe 4664 msedge.exe 7044 56039dc13c.exe 7044 56039dc13c.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4772 3a260f86fc.exe Token: SeDebugPrivilege 5072 8c129573bd.exe Token: SeDebugPrivilege 3568 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe Token: SeDebugPrivilege 5104 aa22141121fa48729140d45555563467.exe Token: SeShutdownPrivilege 5164 chrome.exe Token: SeCreatePagefilePrivilege 5164 chrome.exe Token: SeDebugPrivilege 3556 taskkill.exe Token: SeShutdownPrivilege 5164 chrome.exe Token: SeCreatePagefilePrivilege 5164 chrome.exe Token: SeShutdownPrivilege 5164 chrome.exe Token: SeCreatePagefilePrivilege 5164 chrome.exe Token: SeDebugPrivilege 6180 taskkill.exe Token: SeDebugPrivilege 6376 taskkill.exe Token: SeDebugPrivilege 6872 taskkill.exe Token: SeDebugPrivilege 7044 taskkill.exe Token: SeDebugPrivilege 6832 c4b79547db.exe Token: SeDebugPrivilege 7136 firefox.exe Token: SeDebugPrivilege 7136 firefox.exe Token: SeDebugPrivilege 764 tasklist.exe Token: SeDebugPrivilege 320 tasklist.exe Token: SeDebugPrivilege 6996 tasklist.exe Token: SeDebugPrivilege 5744 tasklist.exe Token: SeDebugPrivilege 6332 tasklist.exe Token: SeDebugPrivilege 1212 tasklist.exe Token: SeDebugPrivilege 2544 tasklist.exe Token: SeIncreaseQuotaPrivilege 5240 WMIC.exe Token: SeSecurityPrivilege 5240 WMIC.exe Token: SeTakeOwnershipPrivilege 5240 WMIC.exe Token: SeLoadDriverPrivilege 5240 WMIC.exe Token: SeSystemProfilePrivilege 5240 WMIC.exe Token: SeSystemtimePrivilege 5240 WMIC.exe Token: SeProfSingleProcessPrivilege 5240 WMIC.exe Token: SeIncBasePriorityPrivilege 5240 WMIC.exe Token: SeCreatePagefilePrivilege 5240 WMIC.exe Token: SeBackupPrivilege 5240 WMIC.exe Token: SeRestorePrivilege 5240 WMIC.exe Token: SeShutdownPrivilege 5240 WMIC.exe Token: SeDebugPrivilege 5240 WMIC.exe Token: SeSystemEnvironmentPrivilege 5240 WMIC.exe Token: SeRemoteShutdownPrivilege 5240 WMIC.exe Token: SeUndockPrivilege 5240 WMIC.exe Token: SeManageVolumePrivilege 5240 WMIC.exe Token: 33 5240 WMIC.exe Token: 34 5240 WMIC.exe Token: 35 5240 WMIC.exe Token: 36 5240 WMIC.exe Token: SeIncreaseQuotaPrivilege 5240 WMIC.exe Token: SeSecurityPrivilege 5240 WMIC.exe Token: SeTakeOwnershipPrivilege 5240 WMIC.exe Token: SeLoadDriverPrivilege 5240 WMIC.exe Token: SeSystemProfilePrivilege 5240 WMIC.exe Token: SeSystemtimePrivilege 5240 WMIC.exe Token: SeProfSingleProcessPrivilege 5240 WMIC.exe Token: SeIncBasePriorityPrivilege 5240 WMIC.exe Token: SeCreatePagefilePrivilege 5240 WMIC.exe Token: SeBackupPrivilege 5240 WMIC.exe Token: SeRestorePrivilege 5240 WMIC.exe Token: SeShutdownPrivilege 5240 WMIC.exe Token: SeDebugPrivilege 5240 WMIC.exe Token: SeSystemEnvironmentPrivilege 5240 WMIC.exe Token: SeRemoteShutdownPrivilege 5240 WMIC.exe Token: SeUndockPrivilege 5240 WMIC.exe Token: SeManageVolumePrivilege 5240 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2328 file.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5164 chrome.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 7136 firefox.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe 5368 ad86d12070.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 7136 firefox.exe 6348 f183f4929b314495801998708b270122.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 5016 2328 file.exe 82 PID 2328 wrote to memory of 5016 2328 file.exe 82 PID 2328 wrote to memory of 5016 2328 file.exe 82 PID 5016 wrote to memory of 4772 5016 skotes.exe 83 PID 5016 wrote to memory of 4772 5016 skotes.exe 83 PID 5016 wrote to memory of 4772 5016 skotes.exe 83 PID 5016 wrote to memory of 5072 5016 skotes.exe 84 PID 5016 wrote to memory of 5072 5016 skotes.exe 84 PID 5016 wrote to memory of 5072 5016 skotes.exe 84 PID 5072 wrote to memory of 3568 5072 8c129573bd.exe 86 PID 5072 wrote to memory of 3568 5072 8c129573bd.exe 86 PID 5072 wrote to memory of 3568 5072 8c129573bd.exe 86 PID 5016 wrote to memory of 4672 5016 skotes.exe 92 PID 5016 wrote to memory of 4672 5016 skotes.exe 92 PID 5016 wrote to memory of 4672 5016 skotes.exe 92 PID 5072 wrote to memory of 2084 5072 8c129573bd.exe 93 PID 5072 wrote to memory of 2084 5072 8c129573bd.exe 93 PID 5072 wrote to memory of 2084 5072 8c129573bd.exe 93 PID 5016 wrote to memory of 3564 5016 skotes.exe 96 PID 5016 wrote to memory of 3564 5016 skotes.exe 96 PID 5016 wrote to memory of 3564 5016 skotes.exe 96 PID 5072 wrote to memory of 4216 5072 8c129573bd.exe 99 PID 5072 wrote to memory of 4216 5072 8c129573bd.exe 99 PID 5072 wrote to memory of 4216 5072 8c129573bd.exe 99 PID 5072 wrote to memory of 5104 5072 8c129573bd.exe 100 PID 5072 wrote to memory of 5104 5072 8c129573bd.exe 100 PID 5016 wrote to memory of 4688 5016 skotes.exe 101 PID 5016 wrote to memory of 4688 5016 skotes.exe 101 PID 5016 wrote to memory of 4688 5016 skotes.exe 101 PID 5104 wrote to memory of 4416 5104 aa22141121fa48729140d45555563467.exe 102 PID 5104 wrote to memory of 4416 5104 aa22141121fa48729140d45555563467.exe 102 PID 4416 wrote to memory of 2840 4416 msedge.exe 103 PID 4416 wrote to memory of 2840 4416 msedge.exe 103 PID 4216 wrote to memory of 4088 4216 d83a9c4e6d524af8b722d3cbb32fd01e.exe 104 PID 4216 wrote to memory of 4088 4216 d83a9c4e6d524af8b722d3cbb32fd01e.exe 104 PID 4216 wrote to memory of 4088 4216 d83a9c4e6d524af8b722d3cbb32fd01e.exe 104 PID 4088 wrote to memory of 3144 4088 cmd.exe 106 PID 4088 wrote to memory of 3144 4088 cmd.exe 106 PID 4088 wrote to memory of 3144 4088 cmd.exe 106 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 PID 4416 wrote to memory of 4944 4416 msedge.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 5076 attrib.exe 1092 attrib.exe 6732 attrib.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2652
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6092
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\1018424001\3a260f86fc.exe"C:\Users\Admin\AppData\Local\Temp\1018424001\3a260f86fc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\1018424001\3a260f86fc.exe"C:\Users\Admin\AppData\Local\Temp\1018424001\3a260f86fc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018425001\8c129573bd.exe"C:\Users\Admin\AppData\Local\Temp\1018425001\8c129573bd.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ugdyhik"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\ugdyhik\d83a9c4e6d524af8b722d3cbb32fd01e.exe"C:\ugdyhik\d83a9c4e6d524af8b722d3cbb32fd01e.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ugdyhik\d83a9c4e6d524af8b722d3cbb32fd01e.exe" & rd /s /q "C:\ProgramData\NYMOHD2NOP8Y" & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3144
-
-
-
-
C:\ugdyhik\aa22141121fa48729140d45555563467.exe"C:\ugdyhik\aa22141121fa48729140d45555563467.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://apps.microsoft.com/store/detail/9MSZ40SLW145?ocid=&referrer=psi5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90e8c46f8,0x7ff90e8c4708,0x7ff90e8c47186⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:26⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:86⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:16⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:16⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:16⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:16⤵PID:5928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:86⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:16⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,2990680949955327222,10868365318322789355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:16⤵PID:3228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018426001\2b4d111f11.exe"C:\Users\Admin\AppData\Local\Temp\1018426001\2b4d111f11.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\1018427001\8e3eeac867.exe"C:\Users\Admin\AppData\Local\Temp\1018427001\8e3eeac867.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 4884⤵
- Program crash
PID:6324
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018428001\909eefda71.exe"C:\Users\Admin\AppData\Local\Temp\1018428001\909eefda71.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\1018429001\202481b4e6.exe"C:\Users\Admin\AppData\Local\Temp\1018429001\202481b4e6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9149acc40,0x7ff9149acc4c,0x7ff9149acc585⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:25⤵PID:5512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:35⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2108,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2572 /prefetch:85⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3288 /prefetch:15⤵
- Uses browser remote debugging
PID:5732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:15⤵
- Uses browser remote debugging
PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4572,i,13251621558542144166,14565308551089838975,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4208 /prefetch:85⤵PID:6296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9170646f8,0x7ff917064708,0x7ff9170647185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:25⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:85⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:15⤵
- Uses browser remote debugging
PID:6344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:15⤵
- Uses browser remote debugging
PID:6356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:15⤵
- Uses browser remote debugging
PID:6812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:15⤵
- Uses browser remote debugging
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:25⤵PID:6472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9521225508028100191,17059708726465765575,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:5280
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\EBAEBFIIEC.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Users\Admin\Documents\EBAEBFIIEC.exe"C:\Users\Admin\Documents\EBAEBFIIEC.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018430001\ad86d12070.exe"C:\Users\Admin\AppData\Local\Temp\1018430001\ad86d12070.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5368 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:7120
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:7136 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1436 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4a28c5b2-9da3-4f71-9f06-21ec02f57573} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" gpu6⤵PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2148 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae49bf21-af22-4076-b9c2-d5445e5e2129} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" socket6⤵PID:6180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3356 -childID 1 -isForBrowser -prefsHandle 3412 -prefMapHandle 3120 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca488f59-7f05-4d1b-86ab-41b87ccf0356} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" tab6⤵PID:6436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4200 -childID 2 -isForBrowser -prefsHandle 4132 -prefMapHandle 4128 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f77d47c7-aef8-4fe0-9cd3-e0a3a5298cba} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" tab6⤵PID:5736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4912 -prefMapHandle 4860 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e42fbd9-4c33-496d-a29f-af86254b1b8c} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" utility6⤵
- Checks processor information in registry
PID:1392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5060 -childID 3 -isForBrowser -prefsHandle 5088 -prefMapHandle 5084 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43705ed5-01cc-4ce3-bea8-34eb5adae436} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" tab6⤵PID:3520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 4 -isForBrowser -prefsHandle 5256 -prefMapHandle 5264 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef1402e7-9afa-4a57-a842-2727a15bbce6} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" tab6⤵PID:2076
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 5 -isForBrowser -prefsHandle 5364 -prefMapHandle 5420 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2990c7a1-272c-4648-8e9d-ab3f99731ab6} 7136 "\\.\pipe\gecko-crash-server-pipe.7136" tab6⤵PID:7048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018431001\c4b79547db.exe"C:\Users\Admin\AppData\Local\Temp\1018431001\c4b79547db.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\1018432001\81beca057c.exe"C:\Users\Admin\AppData\Local\Temp\1018432001\81beca057c.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6896 -
C:\Users\Admin\AppData\Local\Temp\1018432001\81beca057c.exe"C:\Users\Admin\AppData\Local\Temp\1018432001\81beca057c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018433001\56039dc13c.exe"C:\Users\Admin\AppData\Local\Temp\1018433001\56039dc13c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7044 -s 14444⤵
- Program crash
PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018434001\nkCWteW.exe"C:\Users\Admin\AppData\Local\Temp\1018434001\nkCWteW.exe"3⤵
- Looks for VirtualBox drivers on disk
- Looks for VMWare drivers on disk
- Executes dropped EXE
PID:3716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:5948
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:1300
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:6944
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6996
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:1624
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:1432
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:6332
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:4464
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵PID:5336
-
C:\Windows\system32\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:6164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic cpu get ProcessorId,Name,SerialNumber /format:csv"4⤵PID:1924
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get ProcessorId,Name,SerialNumber /format:csv5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5240
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid,IdentifyingNumber,Name /format:csv"4⤵PID:5900
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid,IdentifyingNumber,Name /format:csv5⤵PID:4632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic bios get SerialNumber,Name /format:csv"4⤵PID:876
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get SerialNumber,Name /format:csv5⤵PID:5680
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C taskkill /F /PID 3716 & del /f /q "nkCWteW.exe"4⤵PID:5920
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 37165⤵
- Kills process with taskkill
PID:6880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018435001\a3a13f5417.exe"C:\Users\Admin\AppData\Local\Temp\1018435001\a3a13f5417.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6380
-
-
C:\Users\Admin\AppData\Local\Temp\1018436001\d906d1f0d6.exe"C:\Users\Admin\AppData\Local\Temp\1018436001\d906d1f0d6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\1018436001\d906d1f0d6.exe"C:\Users\Admin\AppData\Local\Temp\1018436001\d906d1f0d6.exe"4⤵
- Executes dropped EXE
PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\1018436001\d906d1f0d6.exe"C:\Users\Admin\AppData\Local\Temp\1018436001\d906d1f0d6.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018437001\4c023149c9.exe"C:\Users\Admin\AppData\Local\Temp\1018437001\4c023149c9.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 5204⤵
- Program crash
PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018438001\f6d33a6594.exe"C:\Users\Admin\AppData\Local\Temp\1018438001\f6d33a6594.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\zdwjrrvf"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6128
-
-
C:\zdwjrrvf\f183f4929b314495801998708b270122.exe"C:\zdwjrrvf\f183f4929b314495801998708b270122.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6348
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018439001\fefc4ccdf0.exe"C:\Users\Admin\AppData\Local\Temp\1018439001\fefc4ccdf0.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵PID:6012
-
C:\Windows\system32\mode.commode 65,105⤵PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5604
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5776
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:5076
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:6732
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:1092
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:6200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2992 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1972
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018440001\7975762792.exe"C:\Users\Admin\AppData\Local\Temp\1018440001\7975762792.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6868
-
-
C:\Users\Admin\AppData\Local\Temp\1018441001\c6d767233f.exe"C:\Users\Admin\AppData\Local\Temp\1018441001\c6d767233f.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6128 -
C:\Users\Admin\AppData\Local\Temp\1018441001\c6d767233f.exe"C:\Users\Admin\AppData\Local\Temp\1018441001\c6d767233f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5840
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018442001\e3c98dbfb8.exe"C:\Users\Admin\AppData\Local\Temp\1018442001\e3c98dbfb8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6320
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 7044 -ip 70441⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3564 -ip 35641⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5900 -ip 59001⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4232
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2356 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:4152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7184 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7340
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1File and Directory Discovery
2Process Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
284B
MD5efcd4d9f5899b1086c4f2a327309c37b
SHA10dc8b3238aad42b5e97b963831929d80e034d814
SHA2568928161242629d90e43c58ea939d409e2d7b5347fc775f414fc7b2d736e4d89a
SHA512e2c53c8d3c9a31469b79cf58034e201e783d320272f0998584544d730483ca57979806bafe52be299658e657d86ead235280ed8d3b81ba249512a0067dfe58e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\350b03a7-7675-4c6e-9f26-8d28605f55f0.dmp
Filesize830KB
MD510b838e01e6b77b14a351d4e13f3aa3c
SHA1ea5ab7f30b429ba92658b89cf4fcb3d11d953cbc
SHA256f4ebc90e6f19b62e24983f84de4a613ef2ae2317bdd17c7380bcee047f9069fe
SHA5127cb6e8f2352a0a1ce7cd23aac13bff301db39ab7d71acadd2afdf51c3f98890da428bc32265d8e4dc7874827fc2223cc90e36508696c0c6804ff434c72ea3fd2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ccde75b3-03ed-4058-8926-67e59910bfb8.dmp
Filesize826KB
MD53f4757627a90c313ffd3966a55641cf7
SHA1555b6213ae9ffbe7c210fc9ef65032afd9a07e9f
SHA2563be55d9db3c0229956963270fa45624b4923aedab86c6b4b47295f59d701054a
SHA51235dc9abd3c5753cd3c2a514476087a14ed3470dde76ac69c21fe7c26315cf1819a1bbb461739c5deedf161f371ebef10482e3c3ab3b484f6e542f8ce408844e3
-
Filesize
152B
MD596d122bd685c5e06ff401b37af09887a
SHA1c7033f158aa15c914d777340ec4cc19e23de24cd
SHA256e30d5732be6e7bfc2f8e79e0507c13ea05e209404646457e27fd2444afec0786
SHA512837589b48e2686e4f386b1fc025579aa339d182345e064a8754644206056f575ff4fdf5378a64813d1aaf305221656dc13419516aacaf0ed73d6bd59d8004a8a
-
Filesize
152B
MD5da9c8e7199eb47709d7084aff6730b59
SHA1a10130600eaaf9064c851256b3713f4134f2a4c8
SHA256b37715f0fa0d5ba5e0b1eef2e9a3b3004447605ef427b9e250f30da60f7bef0f
SHA512134e25bd762bc429dfedec98e971f8a5122ac0e906d35c1f8f95ca15baf5ed5954fc2bf4fd2cbdb640996d6fe2bbe1b0fcf3597fd504aec0d331139dfbca9242
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8b1a6953-f7e1-4449-8a52-91de1e19e852.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
14KB
MD5660e32b38bf220b2dfec2f8acbcd8bcc
SHA1c6116cc4a33be8e15677c939f17368d6906d3294
SHA2569db6a703e14b6fda6f256ed7567b0027a0c41707d1277a98dd2ca8774904e4d7
SHA5122eff4a4159f178746b3bdd1472cb455cbaf1853730692b78f620f934990725bd5152cb364fc45bc1c58530ef78cbf1eef46daf412e14991622f465916cff6259
-
Filesize
28KB
MD575c09552ae5a5207068572339eb4782c
SHA189e03f58980d7f30dbdaa29009a5e9878a391143
SHA2560256b9e327a4c0170b51a0ffd7c9e64543b63109bfa0e854a7c31fcef1389682
SHA5120293338264abff816782a093de4225b29cb431b86845808a35143b77fe3f939fe538b1079a5d3f47118679371703226d39ed611d36a7a6082ad45e2cce4b128d
-
Filesize
331B
MD51e3f82335648e401b67a8ddfd6412716
SHA1c2c9d66100f4d4cd449889d58fe1c9e577824c26
SHA256e63eeda51d1fc22a92eb43b89d42438468ecc8dc730ee0c8ed44d3bbd3233968
SHA5125c51f3a8e247efb0848ea1e54f150929a1f276b32762d2cfa31427d0fbcb0b90b1055eec1bb980c713fe05298aee1351b0453e25c0690a80059a1bd10c46f5af
-
Filesize
5KB
MD5d519b38cfa8ee06aa4a78ec749e90d94
SHA19ff0a7374dafc9422199629323bf16d1e2e9f25b
SHA256be121665c785ae6475f1bde6e0a43da6f68c24662511001e98ce9cd249a11971
SHA51233abbd1a51bbb4228af65fb3be2ad6899231e6c228924d3a08beafd849b61d0586e54102b8558b562836e1c516fc6883f63707fe9d8b99f71904ca20d0aefea9
-
Filesize
5KB
MD59586029de3d03f5266e070b59f9d2c95
SHA11588ee5a59975d5165f3b15414e63403a4c2d8a0
SHA256d993d524697a77444231c2e4b3ccb84de0ed9f8148aaec2e6dd02ebee9cc2c09
SHA512484acecfaa514a51d1c25ecaeda5cc787f62420b9ac80abec03344199c21080b751e71ffdbb0dee753b47257057e7def082a6ddaf78e6d547ffbc1dc17e0c790
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize109B
MD53b4a286faf07cc57d89d37bac74af743
SHA1695274b7f76e1615ba1bc33c5311b7a5f37e7b50
SHA256243edd92b17e88a0ec6ae6ae08a902fc056fb03ab8fefef8cd589d56ebfa1007
SHA512de5df2987fedf2b480db4ee745db9dcfe136ed4e350cf3ab0850bc92b74e37aa0e5f50f2a86ac962a2a2a33ec755e2370dad08811f5c819ed5343cb5188af1ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize204B
MD50e8ad538fa6888e59e277affb587c37d
SHA1d1f67a99d52cecbfd9deaddf1347e3262b0f8e7d
SHA2565a9770945f7c43f4ec6144895b61aacc91572af400d912b902f35368bf368ab4
SHA5122baa898ad2dacdbdaf11ea6bb755b413df79fbda780839250c245180f59bd7fee978fd628ca071f5ba07f8d227a404afeaee656f5a5907b5711ef426d259ece5
-
Filesize
745B
MD5d5eab5601b6186b7a3eb92a2340dbb1a
SHA1e75c0f2b5b9acebdd450b0b56d7f403e7d526b8b
SHA2567805dd0c15fc358f841457134303e2add53125f6995f508e01f8e28de9b73818
SHA5124c26421756b0fd1ae1d8de6805420994b21670fc853d8ce1f778ed0c13b49447a37950b016b432ea3678e499ca4c96b07c74ade10cc900990cb76e7704945692
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
295B
MD561d530fc6f551ccd092b63c2cbf62cf5
SHA1d4d8d7ee3f2fccc4150b5a2aa941fb20eb14a55e
SHA256693716ba8c4db03fe9de7f4771f69289a7797994bde2d00d76670c749b4c483e
SHA512daeec3417295926515d49b9db5db152b200509e9b5e7dfd9f6331bedf687aa24acb35235df4c0fd558be9694fe3d58eefb2df707a083e30dd54d6a8264e6b58b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
1KB
MD5cb0e9fded0946c4633c3de82053eda18
SHA18148e9adf81b103357573d9327cf0eab2a19dea6
SHA2569f28442f60ac6597738e1c5a134b3c4c7ec0ed319ac61338aaee156542a4c057
SHA5125898833842cf8f3f26f73e8711938c38c79ab44f48a3309bd251b45caeac9cf32f817f2d55bb3c4ee88611b2bd26a0e7fa152818328d98a57ebf7eeecd67662e
-
Filesize
933B
MD525b9bf64d919fb50ac47cf6dc415fb94
SHA17f28f53608d0fc1b0f32d094772e39348fcbe937
SHA2568127ade78cfbc8eb9c58fbd07e813e60755639cb5024cb6075bac403418e32a5
SHA512316740ae364d4c93061cc02603d65ccaa0773ea5749481fb865e703f49a059e1066bc45cbffd247b164ef91ac06cccca2bb84af1bcb75931d83d66ec2efc6eab
-
Filesize
350B
MD546a4e13c9bdb36abfd7a0002a2f074d3
SHA1a5017a8c229760c3019efaaab03018d34fdfc449
SHA256ff54897c7601b8dc02cdc9c47ae9fd49a08dca8a13ba7ee69b40263b07a28827
SHA51217c9b208edf6387297b52e045528e9967e3ea76abbcca809a7da09aab6c94b9d4db8dd3b2d5a2f314ce549381b63a51fa4451567fdb425522fcd6973ff23b37a
-
Filesize
326B
MD5eba752739c02062aa0ad992f7a0c9c55
SHA19f28606f454667d127feb22a3b4d46da6598dafe
SHA2563de68d717022b21753086fdab1e0a713c44ad1669b862abaa4c2c60a950bce22
SHA512600f866c52384ed9c32665c75c5e1aac22fc332636cc2ae094590854328bebef6c18f0366fe1a7dbd703cd1863b95a25b7258b29de662dbd534ca0d4f5a3dbd6
-
Filesize
128KB
MD5cefcbef3d921540830a369d4b5f9e0c9
SHA116d1dc10be620e04ef12cd332086176357601d76
SHA256878c5594aa83fa12bfa0f29762d7bb5d8f4a44e17d782f5199dc3178f133ad09
SHA5127035c37651312efac5c11664bcee20a586b588b2af4d322c2d8c764bdc32eacdefc4a454a7f94eb6d1f9aa1aa8ab8f25e4326de63dde4b3bc47707409bee0802
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
177KB
MD5d8640c045a1d96ae70189b36b7814dd8
SHA157c1ae00bee3fdf39deb104cf6fbef2b343a266f
SHA2563bbccb203d19fd2a854d5acc1a6469f810eed4ebb9976d54f975be561e0780f1
SHA512d8e5bddc16366b97a1987f8d1f1cc2c25b55a67010008b408a91254a13c18e6f521cdba0eebd46d349772bd406ebb5e04a0efc4ac1ef91e973a47b287ef61f82
-
Filesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
18KB
MD5fb7fd6c17962483143b0e34ece7aa7ed
SHA10e7d5e1e149eb15d21dab9c3302e5f24e2bca36d
SHA256f545db2973ae65d1566c1fdae51965666ed2360e7e558e7a60c7f8c1f292f2ad
SHA5123c2edb6038e090fcc8a035b4e31f52bc796b76df4d8a94bfbebb36227eb03f40d33d7dcd26873cf8f878a0a73549d6fa52004cbe297d5592daacbe6b98971ee0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD592eb2dc7638f47d99eb6e1d3a425a722
SHA160b61439ec9d7c1ee46e39ca2f86451f25c96b04
SHA2568a9195083ab37400e747752c29db95b69b6b631b55de149c7db0f72c9597665c
SHA5127275e84eaafd05eb29dde5cefb40d767bfda9ac644e815c7ee9c41b3cb82ec531e836ca2af2bd3f65892abf603caf3b2bb7a1362d2e6a494dbee96456fcdf612
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31
Filesize13KB
MD5a724373261b10b3db0b93f667c2f0f6d
SHA1e4786b09ede8f0ecd5a33fd186f5a05e042b3035
SHA2569a791c757c2507caabd53421e0fe2b835d69cb6b6c87b3ba7517386a329d3d67
SHA5121ffcd17f10ad8def135b8e048c0cdaba85ba2fa186f9150ab754eb5031eb42ce1d53d87c66a0274415969b16959156ba832d3902fed97e42e9b514ef2a774abd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD58bd5abf799e46cadec068227539d8656
SHA1865c83362dbc27f8ac86500dbab8df8e67d7dcd3
SHA25608047df9627ccfd48ce3a8995c0244cd708dfe156fac5243a85f789004eb8b76
SHA5128e1d97e018629c2f798a7219ca3e549f4044c787343eabb5faa4bc9773d664a78ee15c40af868f595e1a60611c259efea7276e4961f0cfbcd80b08e8de0c775a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
3.1MB
MD5c00a67d527ef38dc6f49d0ad7f13b393
SHA17b8f2de130ab5e4e59c3c2f4a071bda831ac219d
SHA25612226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3
SHA5129286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
4.2MB
MD50e6e12f9a9c017b4be17933aeacd543c
SHA14c8fda6bdcbb813081a6d72bd6ad3ff430e17bee
SHA256738cdc197a8ece363679b55f005dccd3a943e4b333d69e946f80ff6c0445cd87
SHA5124050a406f72c3842fb207b40c77a153f96b863029e191cddae1ab1f59b3ba6a8f49a5de46e0a7159382fc101e1199a5c14d54f8eff29d55a246dfba4a232cf91
-
Filesize
1.9MB
MD51f39fac8d8f8c1e3e0697ebf585af36c
SHA1f98243a6bdea8f7de4cfa02d157e94b1cf925f51
SHA256ec2349f4f55242a8328a7f11c5013a7525fa05aa18a680c1d82f2d6d93e6e1ad
SHA512ebf1551cc77e6f815f18ebd38ffc3b581fbc0b07642175db9178652e3cad6be0a38bf978ea09d46815ca64b1482a87261ac5e34303b14420ce89c7c684a7aaed
-
Filesize
1.8MB
MD52df47222a49eab61fd1ed5f6f983ed1c
SHA1d9fd640987daff7d0d5c904842255e6e41257cae
SHA25678f68367c6d4a5ce002704176476bf89236dd83230b4742c40d3a3ec3d816d81
SHA5128f17090dcb8d4d00db9226ee3f5abf15075c42ad866c7f863f3b46026df2a333024cd07bafcd5bb30018a318052db9bd688428d9c77e7c6852b75894c9a258d2
-
Filesize
2.7MB
MD5323113bc721571d0455a110dd78830c0
SHA1a431b5d6b46ebf680036b9aef9595e0d8e735719
SHA256c014e987c802ab3ed34ade7a1727af3d7915c6836c0012787c61779dd8ec735e
SHA512388b4fdc39c2079b05f3944345c19035a8ec78b7e29eedaf24a4914ffe75c4824ed479a20cb84f636d55a590661f402d0f060a472ac8861ace8d8168924501fb
-
Filesize
951KB
MD57e5c2110a07fcc79b87d39de76df15d2
SHA1753c742c747ed32fa22b1977b895ba434f6ce3b6
SHA25643465f3826468bd7c9a436a26c111d1e166bef5ea769cb5076ffe9cd0bef3f6e
SHA512c16db79d68b341b6e25a25c5ffc572baab9ee0f3b3627a98f6cd3fb8d633650ee91917224dffb306052984230ac7715fdc7539566c426d245be3bd79f3a2b230
-
Filesize
2.7MB
MD54d64b08ffd5993c585d881fa55708e10
SHA1c23cb8dcc687f5ddc5c8dbd206754d4e87e824c2
SHA2563f8f313e21d610230a865a4842ae8cfc9b8e6f3067008ab35353bc6248ea6a28
SHA5127da6567fc69d4f8402e3f84d3fef2a833e8114f982fca0b70d85375bf8b8108491f6e3c15cdfc34967eba1fc613a548a5af0b6327f429731355f17fdf32d1644
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD5ff279f4e5b1c6fbda804d2437c2dbdc8
SHA12feb3762c877a5ae3ca60eeebc37003ad0844245
SHA256e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378
SHA512c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967
-
Filesize
8.7MB
MD51c848c274240a7b5561550c4867c336f
SHA1fe286e578f0652077cd858850939a152835dcc6c
SHA2568b5af8709908fa9da7792816d03feb6287ded45a9cb5a5afd4f061113638a092
SHA5127d96fd7398ce1a3199ea4cb0c7bc4e0f7b76692d9200dd27499b3f96e50a0b91cc77169ad542be46c74fc09e13a84597d180c4c4f0fd23ce45e8c3fa99c8042d
-
Filesize
1.8MB
MD525fb9c54265bbacc7a055174479f0b70
SHA14af069a2ec874703a7e29023d23a1ada491b584e
SHA256552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c
SHA5127dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668
-
Filesize
1.1MB
MD5ef08a45833a7d881c90ded1952f96cb4
SHA1f04aeeb63a1409bd916558d2c40fab8a5ed8168b
SHA25633c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501
SHA51274e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97
-
Filesize
1.9MB
MD59b43474fd844676d97d016d9d037bbcf
SHA1078b35dc7f41594097c7b44c48355ecc69561705
SHA2560bf7baaeecf805b63fb7c3db3a1e0df9be2d92cedc384108be9cc676bdf8619e
SHA51203c71fa8b1f58ff01e9a73b0788e65ccc2ffb7a56e632ca2c1d316c9114f3c3472a3639553cabc92ba6ac43d98f72cb852055bb46af21c929a5b6842f28c8b51
-
Filesize
21KB
MD514becdf1e2402e9aa6c2be0e6167041e
SHA172cbbae6878f5e06060a0038b25ede93b445f0df
SHA2567a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a
SHA51216b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
4.3MB
MD563014ddb15ca6ee8aed525a9e2df6d85
SHA15739c8445d8dd442d361cfbbf46944ef24e7bc32
SHA25620f1886866cbc38597da35d91a554c4078744d74a07c46ca2633c76a62216c50
SHA5125fc0d017cbaee34bab83480d819a9803605716d57ad787a48b033216974538f272a97c70be223dd518f518ba207201174585d0d597b767d190246eb83eaee641
-
Filesize
791KB
MD5e8af4d0d0b47ac68d762b7f288ae8e6e
SHA11d65f31526cc20ab41d6b1625d6674d7f13e326c
SHA256b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e
SHA51280fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
1KB
MD5a10f31fa140f2608ff150125f3687920
SHA1ec411cc7005aaa8e3775cf105fcd4e1239f8ed4b
SHA25628c871238311d40287c51dc09aee6510cac5306329981777071600b1112286c6
SHA512cf915fb34cd5ecfbd6b25171d6e0d3d09af2597edf29f9f24fa474685d4c5ec9bc742ade9f29abac457dd645ee955b1914a635c90af77c519d2ada895e7ecf12
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.8MB
MD56ceb0f68635c643029bdcbf6fab01b41
SHA1c59cacff4ad813295a2bdc53d524df6dc62526b4
SHA256e02129bdbea6e49627ffbff6f291a4c1295d15725f47c1ebdae7c85a1a7dbb59
SHA5121031d7f3417905c6df411ff3fed4aade0c5a06494cb3f63701a5f34aa6b05710c83f5893d7517a84cb50316726d5e429e6aee9aa3db33ede4374f5f7d7c464fa
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize18KB
MD5f56fe3de84c1214fe75906ef4cc29dbd
SHA1e3ec6288245e25350af49f5a3b900a7a6d8072d1
SHA256a5a4a52ad6fe5441dcd60ed556cb83da1b0beaeb381b36e1ee95e0e24a844aea
SHA51283bd1f6b3afe0daad3cc58ce0b757f42ae0866877611a0ca3008ef26aaeb1fd091cf7a946ce1962c1c059e9760a23b92ae91a1777e599e34dae48c53f48f1c70
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD57af62bee0458e5d47dda6fcc2de58ad7
SHA109769a7e60ce4f136a9376277b3ce53c6cfffe4d
SHA2566c5f6a3a8ae9683c23e8b7f4debb9c54c967d66822da78518bdbc83be740113b
SHA51231a4411b1e464c2d8b74689a86519dbb4493206aceff6d76d5d5488bf470ba82fa2fdb6da731b113959f151f1d1f600f05433dc1f64ed1e146368aca97dead6d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ae6be1adc5667aa595c792d5569ab77c
SHA1013c2abee132ef378c96b8c11826f015b7801ee7
SHA2560421149511052c2674b23c39653bb51f06a0ff3e4737c5b5fb69ddc5d31ebd11
SHA5123a139c702988c3fe8d53eb917a0011a4dc965447ae26738e300f1ef98fc3339ba26541f7fa04434064890c619ee4aaf0fa134d0ca3843e9e776aef0c3b757b2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55d97a3aa651a5799726d360dd2675b3f
SHA198b2104ff11ed52c814db1712b5722a5480dc3de
SHA256693eb4f876febaf8ec779545ea3a4b8fcf656a41348e5364a649b79c4a6c7256
SHA5122e21bc342e52200e455f4e7048b4f99285235a4055f803c846217ee06f56d3a45151fb28837ea15898cc5d8f4fc513635a81b1b2836d39750883a4cff6ab9936
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e612e0c7d2cfb26f69ef25524f9dca27
SHA1b9e9671be68c44cd4f8727e89fe1a7f22af67ac4
SHA2561aa60ac321d35ecef93984d98c2ad11e4b9a9e2a47d3797045f659d5c3e343af
SHA51256bba4efec0a4163c6958738c8b5aded2a220d527d98e7fcb8d2f73f25ff40524a3ac5c3ed5eac05883763ff7afb2a5b5d0a1a9cd3f5a9f0804a26a2a9ffc476
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\4548587b-6f1d-4791-a2fc-9e10efafb8a6
Filesize982B
MD5b754f5ec2146ebf6be9476eeaa0c1e44
SHA1ecd3d9ad3fd828290f8542facbb6eaf00c6e0bf2
SHA2562579aa0c1ae278ba9f09be1fd2d7ec2005776709cddec69d76589acf49c0a8ea
SHA51254abae1e328c036541a32aeec02594f2913f881fe2a20cbecb7f94f346e35761e1dfabf4c47857170c2357f1d408142147dec50837d5dd84bce1fee07174b72b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\c36dbce3-a210-4757-9344-782f0eb251d8
Filesize671B
MD5eda40cc62885a365ac90b520cf1843a5
SHA1e36286d9ff7e0cdb62282066ad2351bed4801d53
SHA2565cbb8ea2fb623702ebe2103e82ae860b74dc8e7fa90e6c28438f101cd903bffc
SHA5122c39c2e5ae1f90d6042b19d41d9aeaaccc92086441c32908da9bd1d3247e88f70ce300a64b88c99c6b074aabfdaa4da385396a38329e14c6553b9ce3bc53b1a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\ffd12227-0deb-4600-9f2b-12882f388f6c
Filesize28KB
MD54a4a7a16b04dc96f6ef910db5fd3acce
SHA1fe1c788a925cd373ce74be186628c43df5fb2b85
SHA2563719743a2a107c645a02eb1eb12d9f0e6a6614bf7cb2e4ddac51cdb3b4da7290
SHA512973a4307ddbfa0517ed55ed7308c54d4b6855d38f5c6489dd30673e3997013214056af598065fabe7c7caa8fb873f8af22c025130ffc2668509bc7ba39bad14c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD554fd3b8c240f7cc13bb6d2ec6c512871
SHA161bbf3e9e1a90d19f3dc39f80295959e8ee108dc
SHA256ee8c94027a9e4db10abd1eb3d541ebdc61d470c42f9ce6e60b3b27f08d256cf6
SHA5123da5a4eefe8a194b27105bfd10394815b80710df9349f3df90f6c77c69e7fc3d846238679591a853ef050decd5e747730d4c376fee587a2baab8b5bd46a5804e
-
Filesize
12KB
MD5929af712a99087ab845285e6d4d3a3ba
SHA1258e546a50fa2f3874fa88d0057a9334bbb55afa
SHA256e5c8d0d02b2d067863635016f5779380536380576818d1dab9e7487f586d8de3
SHA512ccb3d3c5b98bb6691d524602607a22ad348baa31156e13ad3be8766e8171b5f47546b04fd2b7fe80a9f7f1196e4266027b097d2362bc74e0e279d160b380b4d7
-
Filesize
15KB
MD5146ffd98e9498e3242d75d07ddfc4c34
SHA18572db5d01d7c501a487ddaf84e3693132a96934
SHA256467998a0ce8695d0100654d85565113f924b25192fb6eb8ce023832fc412a6c9
SHA51212fa4e4434bf676d353a7a81b1093208ac97ab9cae6bb86d23cb0c68549405fd8b3e67b31937f834999942890d7aa6c49be76676656f59f898113bf00da102a8
-
Filesize
10KB
MD5ac0fa4bf8713d76e4eadfe84efa943b7
SHA1c885741fce94f165c68e529dc45698a0e7519342
SHA256374b6f19bfe640d73d6f04346a2b2b859c52185c91b7da51a11b37b8f481197e
SHA5123f5c2c71f0e51e78de904b82b13c7c86d0428cf547a02a864cf97d7af2527f7894b681f4533da934691027922fecee1a12448cb325886ce1ecf2671a76c4c938
-
Filesize
1.0MB
MD5971b0519b1c0461db6700610e5e9ca8e
SHA19a262218310f976aaf837e54b4842e53e73be088
SHA25647cf75570c1eca775b2dd1823233d7c40924d3a8d93e0e78c943219cf391d023
SHA512d234a9c5a1da8415cd4d2626797197039f2537e98f8f43d155f815a7867876cbc1bf466be58677c79a9199ea47d146a174998d21ef0aebc29a4b0443f8857cb9
-
Filesize
144KB
MD5cc36e2a5a3c64941a79c31ca320e9797
SHA150c8f5db809cfec84735c9f4dcd6b55d53dfd9f5
SHA2566fec179c363190199c1dcdf822be4d6b1f5c4895ebc7148a8fc9fa9512eeade8
SHA512fcea6d62dc047e40182dc4ff1e0522ca935f9aeefdb1517957977bc5d9ac654285a973261401f3b98abf1f6ed62638b9e31306fd7aaeb67214ca42dfc2888af0
-
Filesize
1.2MB
MD5577cd52217da6d7163cea46bb01c107f
SHA182b31cc52c538238e63bdfc22d1ea306ea0b852a
SHA256139762e396fb930400fab8faab80cb679abbe642144261cba24973fb23bcd728
SHA5128abad4eaf2a302dfd9ead058e8c14d996437975730125c46d034a71028921ff36ff5d157ad3671e328ac667ec8095db19fa14a9e8eaaf1a7738aa3d0120b5474