Analysis
-
max time kernel
24s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 00:12
Static task
static1
Errors
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
5c8cb972f2920bd6edc98690f1634958
-
SHA1
73d87008bda6fd11921bfad989b48c09ce82b20f
-
SHA256
246affa1629352f335434a02500b288a55592990b1b669a6a5cb112c20f04f8f
-
SHA512
cc9c4e3d03b493778a2475b02e6d0fa14b27688ca09fdbef1ba2e7ace2bb6c591c5e93d0b4596ce1eb1c85252461089193a14390725f01fd4a2a4f1598e21d4d
-
SSDEEP
49152:D5TQ0VpSQkbo7FoWKxx/X0+fI1HARitBDodeFIbi:NfVpSTl/xxPxfI1gRitao
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
xclient.fahrerscheinonlineholen.de:2489
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
hgzuiajogwnqs
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/dDuwSpUA
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c35-26.dat family_xworm behavioral2/memory/4112-42-0x00000000003F0000-0x000000000040C000-memory.dmp family_xworm behavioral2/memory/4112-743-0x000000001D390000-0x000000001D3AC000-memory.dmp family_xworm -
Lumma family
-
Stealc family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4112-765-0x000000001D3B0000-0x000000001D3C8000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 78549d24d9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c88e6789bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0653c9cc11.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4928 powershell.exe 2756 powershell.exe 64 powershell.exe 4464 powershell.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5612 msedge.exe 6544 msedge.exe 4804 chrome.exe 4824 chrome.exe 5980 msedge.exe 5640 msedge.exe 6556 msedge.exe 2148 chrome.exe 2940 chrome.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 78549d24d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0653c9cc11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0653c9cc11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 78549d24d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c88e6789bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c88e6789bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation vQeyqr1.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation file.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe -
Executes dropped EXE 6 IoCs
pid Process 4224 skotes.exe 4112 vQeyqr1.exe 1760 78549d24d9.exe 4216 c88e6789bf.exe 5056 d07ef980c7.exe 3652 0653c9cc11.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 78549d24d9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine c88e6789bf.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 0653c9cc11.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\78549d24d9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018963001\\78549d24d9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" vQeyqr1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c88e6789bf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018964001\\c88e6789bf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d07ef980c7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1018965001\\d07ef980c7.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 208 pastebin.com 209 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c65-134.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 7032 tasklist.exe 5820 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1840 file.exe 4224 skotes.exe 1760 78549d24d9.exe 4216 c88e6789bf.exe 3652 0653c9cc11.exe -
resource yara_rule behavioral2/memory/3448-688-0x00007FF7C6A30000-0x00007FF7C6EC0000-memory.dmp upx behavioral2/files/0x0007000000023cac-698.dat upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c88e6789bf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d07ef980c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78549d24d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d07ef980c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d07ef980c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0653c9cc11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6484 PING.EXE 624 powershell.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c88e6789bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c88e6789bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 1176 taskkill.exe 1936 taskkill.exe 4292 taskkill.exe 1064 taskkill.exe 2104 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6484 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe 184 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4112 vQeyqr1.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1840 file.exe 1840 file.exe 4224 skotes.exe 4224 skotes.exe 2756 powershell.exe 1760 78549d24d9.exe 1760 78549d24d9.exe 2756 powershell.exe 64 powershell.exe 64 powershell.exe 4464 powershell.exe 4464 powershell.exe 4928 powershell.exe 4928 powershell.exe 4928 powershell.exe 4112 vQeyqr1.exe 4216 c88e6789bf.exe 4216 c88e6789bf.exe 4216 c88e6789bf.exe 4216 c88e6789bf.exe 4216 c88e6789bf.exe 4216 c88e6789bf.exe 2148 chrome.exe 2148 chrome.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 3652 0653c9cc11.exe 3652 0653c9cc11.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 4112 vQeyqr1.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 64 powershell.exe Token: SeDebugPrivilege 4464 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 4112 vQeyqr1.exe Token: SeDebugPrivilege 1176 taskkill.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeShutdownPrivilege 2148 chrome.exe Token: SeCreatePagefilePrivilege 2148 chrome.exe Token: SeDebugPrivilege 1936 taskkill.exe Token: SeDebugPrivilege 4292 taskkill.exe Token: SeDebugPrivilege 1064 taskkill.exe Token: SeDebugPrivilege 2104 taskkill.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 1840 file.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 2148 chrome.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 5056 d07ef980c7.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 5056 d07ef980c7.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 3596 firefox.exe 5056 d07ef980c7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4112 vQeyqr1.exe 3596 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4224 1840 file.exe 83 PID 1840 wrote to memory of 4224 1840 file.exe 83 PID 1840 wrote to memory of 4224 1840 file.exe 83 PID 4224 wrote to memory of 4112 4224 skotes.exe 90 PID 4224 wrote to memory of 4112 4224 skotes.exe 90 PID 4224 wrote to memory of 1760 4224 skotes.exe 97 PID 4224 wrote to memory of 1760 4224 skotes.exe 97 PID 4224 wrote to memory of 1760 4224 skotes.exe 97 PID 4112 wrote to memory of 2756 4112 vQeyqr1.exe 98 PID 4112 wrote to memory of 2756 4112 vQeyqr1.exe 98 PID 4112 wrote to memory of 64 4112 vQeyqr1.exe 101 PID 4112 wrote to memory of 64 4112 vQeyqr1.exe 101 PID 4112 wrote to memory of 4464 4112 vQeyqr1.exe 103 PID 4112 wrote to memory of 4464 4112 vQeyqr1.exe 103 PID 4112 wrote to memory of 4928 4112 vQeyqr1.exe 107 PID 4112 wrote to memory of 4928 4112 vQeyqr1.exe 107 PID 4112 wrote to memory of 184 4112 vQeyqr1.exe 110 PID 4112 wrote to memory of 184 4112 vQeyqr1.exe 110 PID 4224 wrote to memory of 4216 4224 skotes.exe 112 PID 4224 wrote to memory of 4216 4224 skotes.exe 112 PID 4224 wrote to memory of 4216 4224 skotes.exe 112 PID 4224 wrote to memory of 5056 4224 skotes.exe 113 PID 4224 wrote to memory of 5056 4224 skotes.exe 113 PID 4224 wrote to memory of 5056 4224 skotes.exe 113 PID 4216 wrote to memory of 2148 4216 c88e6789bf.exe 115 PID 4216 wrote to memory of 2148 4216 c88e6789bf.exe 115 PID 2148 wrote to memory of 1308 2148 chrome.exe 116 PID 2148 wrote to memory of 1308 2148 chrome.exe 116 PID 5056 wrote to memory of 1176 5056 d07ef980c7.exe 117 PID 5056 wrote to memory of 1176 5056 d07ef980c7.exe 117 PID 5056 wrote to memory of 1176 5056 d07ef980c7.exe 117 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 2540 2148 chrome.exe 119 PID 2148 wrote to memory of 4076 2148 chrome.exe 120 PID 2148 wrote to memory of 4076 2148 chrome.exe 120 PID 2148 wrote to memory of 224 2148 chrome.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2732 attrib.exe 3392 attrib.exe 5952 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:184
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018963001\78549d24d9.exe"C:\Users\Admin\AppData\Local\Temp\1018963001\78549d24d9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\1018964001\c88e6789bf.exe"C:\Users\Admin\AppData\Local\Temp\1018964001\c88e6789bf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff2addcc40,0x7fff2addcc4c,0x7fff2addcc585⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,16566380699468299298,16591775636459721860,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:25⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,16566380699468299298,16591775636459721860,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:35⤵PID:4076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,16566380699468299298,16591775636459721860,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2356 /prefetch:85⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,16566380699468299298,16591775636459721860,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,16566380699468299298,16591775636459721860,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4248,i,16566380699468299298,16591775636459721860,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:15⤵
- Uses browser remote debugging
PID:4824
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
PID:5980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff318f46f8,0x7fff318f4708,0x7fff318f47185⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:35⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:85⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:15⤵
- Uses browser remote debugging
PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:15⤵
- Uses browser remote debugging
PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:15⤵
- Uses browser remote debugging
PID:6544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:15⤵
- Uses browser remote debugging
PID:6556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12641514971558963907,7889936859370571302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:25⤵PID:1380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018965001\d07ef980c7.exe"C:\Users\Admin\AppData\Local\Temp\1018965001\d07ef980c7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1308
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5956f3e9-6870-4779-bec2-145c4d58e067} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" gpu6⤵PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2448 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7d91943-0b17-49ad-a875-e8c463be6c2c} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" socket6⤵PID:4632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3028 -childID 1 -isForBrowser -prefsHandle 3092 -prefMapHandle 2980 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f066c3cb-1dd6-4850-a4ec-617c0cc2e134} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab6⤵PID:860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2616 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 2764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8b093ff9-224e-40c1-9c33-dd3aa241bc02} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab6⤵PID:3100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4692 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4680 -prefMapHandle 4684 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cfb1ae1-632d-4ee1-b227-1920de7bda39} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" utility6⤵PID:5676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 3 -isForBrowser -prefsHandle 5440 -prefMapHandle 5460 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11ec8917-b157-4021-a5b9-416b60ad5eeb} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab6⤵PID:5416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 4 -isForBrowser -prefsHandle 5768 -prefMapHandle 5772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a660f150-5283-41d6-9ab5-e9f95b939c61} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab6⤵PID:5428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5944 -childID 5 -isForBrowser -prefsHandle 5952 -prefMapHandle 5956 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c5aa18d-770a-4d76-9c83-05df90db5754} 3596 "\\.\pipe\gecko-crash-server-pipe.3596" tab6⤵PID:5440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018966001\0653c9cc11.exe"C:\Users\Admin\AppData\Local\Temp\1018966001\0653c9cc11.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\1018967001\3825ef3f93.exe"C:\Users\Admin\AppData\Local\Temp\1018967001\3825ef3f93.exe"3⤵PID:5960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵PID:4328
-
C:\Windows\system32\mode.commode 65,105⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵PID:5864
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵PID:3448
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵PID:5668
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵PID:3448
-
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:3392
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:2732
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:624 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6484
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018968001\d867a3146a.exe"C:\Users\Admin\AppData\Local\Temp\1018968001\d867a3146a.exe"3⤵PID:6316
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move App App.cmd & App.cmd4⤵PID:6844
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7032
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"5⤵PID:7044
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5820
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:6348
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2453475⤵PID:6576
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "profiles" Organizing5⤵PID:6516
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Judy + ..\Sheets + ..\Another + ..\Wanting b5⤵PID:5968
-
-
C:\Users\Admin\AppData\Local\Temp\245347\Dry.comDry.com b5⤵PID:6804
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:6444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018969001\4f7e378370.exe"C:\Users\Admin\AppData\Local\Temp\1018969001\4f7e378370.exe"3⤵PID:7076
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
150B
MD51e51f97692a84f4593b621fb4fa7449f
SHA19f2cf0b6da5b11e52d7161adaf9f549a923a458b
SHA2566badb00b6f885b5f664a283589ee7387f95d5462347070ffe6431b80d29f04e4
SHA5124b2944446f2bd52185f48417d9467c7e024cd30e55c2eb91d840b0942d3e1c07ea0f3718f2b82d66bcab033feebb44c09843c3743bb13114daa1cc9133c947bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bfcbc98c-9e3d-47d4-b629-f77c7beba06f.dmp
Filesize826KB
MD54768efd48f38f677a0f926f1bf33d233
SHA17b7c334fdffb0037c26c46743bb17ecbf0181f0d
SHA256f9072cf7deabace3c94fcb6b5c25a740b31f800263c9e56436e79aa1f1919deb
SHA512f2accefe5ffcfc9970e6a2d2c49ae173c5ab7a3cd0b98e22faabcb7c4c23df2a61cae75a385ed512dac893cfe44e4d5d96918447eca28e9c6907cd447e50f3de
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5daaead698394b5b290f4f1cfecdc8661
SHA11e6a07e6094ff1a64c5330f4061a465100156de9
SHA25657ec8f5636a2859c0cb2402fa85c45d69ffd102c61667bf386a86d238f16a4e3
SHA5120b21dc7f46ccc36c2738ed1bb01382ab0a61a7b77e1e2085eed17d29b2033916e2c6933b6ae242ccaa2f7e06ef7fb2a96e2ddca5282c9b539203cca29f77e6df
-
Filesize
5KB
MD557a6d54f6f8aa6391cbe3db365dbe2b0
SHA117e3b1e0c092b0177179746cfc0aff168bbb167d
SHA256ee7e485ce8452b44ae62cc6f59e2360370f86268ec80013c8d9b21c4e8a4a74a
SHA51237ebd66f1a4fcd3d0ef070f1fdb296d9ce9b67997e97b89dde84885ef988f031da91bf9bc73ac156ff13bc13b2489b1a5160ed11e2b309b3809e9ce5b1c0634d
-
Filesize
944B
MD546b170302a5821687d8c622f10947f27
SHA147a91ea3e248bd99dc87211be7e2844dda0687df
SHA256e3cdd1b49dca63bf255aead7a7535cc6fc085425ff5ac48975d62c37af6a689e
SHA512e6f9e562876591cb959d5650cf9ef1eb2a87d5a154bd5f8c37f6697c7fd48d959014bcb2aab96b9c41498a465e9d0f114be276514e2be59dcb019334e3dfe7cb
-
Filesize
944B
MD5d8cb3e9459807e35f02130fad3f9860d
SHA15af7f32cb8a30e850892b15e9164030a041f4bd6
SHA2562b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68
SHA512045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5eb033be02578f9635ec47bdc1de5c3fb
SHA1ec356bc87381354a06baa9c30e8c3ac3d30e0f6f
SHA256bd827af3192bf83c75a32e51ed2de83bd3b90d6b99350721a189a57cec15d063
SHA5124d8778503646f7016df73ff9d204760f4fe4d2b24157920ac3e5651653373975b2f2d229530143059f11b16c42822ad7963e628ad6066022ee712c17d90595ed
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD5245fc466e7b39a0ab10a95b39f565c2a
SHA13070c23a9513f7416828c794196d8d634f43bc00
SHA256b5af32bf0c34ad3f05a77962cafbb3f753a22a354b2f530026758786fc30b516
SHA5124671269f2d3fc82dca7714246c99e41d79e13b7dc4f4c7aec251322e201a39d27c35484d123dd46b91ca7b3a5a22c9d6e6b7fb38f0c040d1f57ebd0ec44258d0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
88KB
MD507e410214a2aeb8f577e407154252f3c
SHA1697fac558b66c0476c3f04d80764fa75eb6de77d
SHA25612e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114
SHA512470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc
-
Filesize
1.7MB
MD5c5ca891ce623060483df1a102a20324b
SHA176eab0783681b3e927607df3680bb03d17d2d87a
SHA256d1f78909a1c18d4e7355057efbe56c8f55802bbf5e2f52775b8c86fb6abe61d9
SHA5120b59246b44b494edc81582857f73d46ee7f5e16abb6ff038ccaa8330683d10462ac8561c2aa5c37071e27dcbf798abcd7f7a580e21e0aa12fe15c032b2f19618
-
Filesize
2.8MB
MD550ac31ca3622476b9bb8bf58f573aca4
SHA1069ca3c71c9f51f38946f53ffcae2f40e8fbccea
SHA2562402746c25bd727ed3aaf74de34e4125a0bee60788673b02b98b87aca157b778
SHA512dc81d2239617836cd2cd49c008590209584392ed308b99c795ba27f63d55f2e73de8a15500ca66d50b9a1b50519013d43b9937b7f59aad4b31382a4b9578ac9c
-
Filesize
947KB
MD5b025557fab4412f760cfe0319d850bbe
SHA12dd2cadebe76ea856c35751d29199844f00fc654
SHA2563c42ac2c64d11256799d13c18c097d5f64b5dc5847ce640e3d439d85af3d039b
SHA5127394326053023e08edd145e20b37e38741c083cb205957a15ee3a419e3be730d7d1e724f78a317633734849e0c8ace13534c12c1f0f55e3850810ddc720eaed1
-
Filesize
2.6MB
MD5b06230bf0fef099162809eca0776598b
SHA1f00de0a4a9fbc49bb9742e052f7f8b547b67c32b
SHA256b663e541f983d7bbd28b05ed70d7c844de3c8bb7f3a9bffbf22508e49b4bccc6
SHA512dec05dd62b80f6d3c5edabb44e6e5c6d1f7ea2d9c80b1c5650e90adf466d15920b21e018e892f20055c8c655c90d54b78ef1d2cccde4fa6dc88c9f8c70f2d44d
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
842KB
MD58eb4f92605e35c57a42b0917c221d65c
SHA10e64d77ef1b917b3afe512b49710250c71369175
SHA256b57d78d93f74f7ae840ab03d3fda4f22a24ad35afcf9a53128cf82a92a67a085
SHA5124cc5db426c8de3d7afdcfa26440d5bd9a885f5148e4307b8d04c5d56c96672d5c82ed9989bf346ce7aecea07d980735c46a930b885f824ba53738ac76dbb05bf
-
Filesize
1.8MB
MD527c1f96d7e1b72b6817b6efeff037f90
SHA12972cc112fc7e20cbf5952abe07407b8c1fbb2a2
SHA256aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d
SHA5129a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD55c8cb972f2920bd6edc98690f1634958
SHA173d87008bda6fd11921bfad989b48c09ce82b20f
SHA256246affa1629352f335434a02500b288a55592990b1b669a6a5cb112c20f04f8f
SHA512cc9c4e3d03b493778a2475b02e6d0fa14b27688ca09fdbef1ba2e7ace2bb6c591c5e93d0b4596ce1eb1c85252461089193a14390725f01fd4a2a4f1598e21d4d
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD5579a63bebccbacab8f14132f9fc31b89
SHA1fca8a51077d352741a9c1ff8a493064ef5052f27
SHA2560ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0
SHA5124a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f
-
Filesize
1.7MB
MD55659eba6a774f9d5322f249ad989114a
SHA14bfb12aa98a1dc2206baa0ac611877b815810e4c
SHA256e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4
SHA512f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4
-
Filesize
1.7MB
MD55404286ec7853897b3ba00adf824d6c1
SHA139e543e08b34311b82f6e909e1e67e2f4afec551
SHA256ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266
SHA512c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30
-
Filesize
1.7MB
MD55eb39ba3698c99891a6b6eb036cfb653
SHA1d2f1cdd59669f006a2f1aa9214aeed48bc88c06e
SHA256e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2
SHA5126c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e
-
Filesize
1.7MB
MD57187cc2643affab4ca29d92251c96dee
SHA1ab0a4de90a14551834e12bb2c8c6b9ee517acaf4
SHA256c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830
SHA51227985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3
-
Filesize
1.7MB
MD5b7d1e04629bec112923446fda5391731
SHA1814055286f963ddaa5bf3019821cb8a565b56cb8
SHA2564da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789
SHA51279fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
1.7MB
MD583d75087c9bf6e4f07c36e550731ccde
SHA1d5ff596961cce5f03f842cfd8f27dde6f124e3ae
SHA25646db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f
SHA512044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a
-
Filesize
771B
MD5845ff27cc027bb1b093a43347ec8928f
SHA168371047870a73744e697c8c32bfef79b76afa1d
SHA25637bb76480792daa02a734351ed44351c86bb536233dd0bb947025f2fe6a15c74
SHA5120641e1fcb19475e6ff05c414d75ffe7ba5176fa705dcbf911ca01bf7c710b3b2455a0d93ea6a145c420c44aed77950c173410be0bc1a6240410bed18f11d9321
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize8KB
MD59034f30d29d072491a8ed71b2df2e218
SHA18072fc05e2df185fd292e87d43efcfa4bdfdfa92
SHA25608f197f01451dda34607cc7b81b6aa8d56cf193e67db982044ddc2ee4e324add
SHA51251faa837ba48bfe4bc201fefeb033b2668584d5f80a7df9aedbe1deea44575b6c6021962169c1ba544b0d7075fc46dad1d678e57e566ad7816733cd114abe365
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD501a06a39fa381f519e99f77ef738fe38
SHA1bfa265615f2e372bbf10abae68d539c52c2bf9ac
SHA2564136311e6d7a6928616c1ffbad24cc1623dd1bda90df614746e015a62d88d3c6
SHA5124c0adabbb32de0ba4296985d61e938c8fc6b475226e65af84b3a6084c3e304754bb398dd07395daa390a6edd68f355aff87b892e7856e6a06e2a2318261c8889
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5863aa53929979fde6be4ac5a616bbca4
SHA1d377e9522f0d2f888bcfe19c0feef3193f39cc7f
SHA25693a9132a61052eff645a7252f5bb69e5285d9f5c96f2172798e9d9edc13f8236
SHA5128f5658b79d707fd6a8f6e4b3228f6e4ce42646e3893116e4a1244b50a76340d89447f4c0d0167148da39d38aabe75bd23f825d54568cd6af6273fa608eee8795
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\83eb5bf8-5304-4727-a975-f6f25f48032c
Filesize659B
MD5fe32218df3d214aebd5a3821d4a21137
SHA1517d91f0066dee10ed9fb4e79fbb845fe2bad1a0
SHA2562861f5681fa1d928147f0b1c591f41f942f11f39f18be0e7cba21d2e54c4bf05
SHA5127d56ad0bfed5139e1f4e86fdf9666f5fc137fff4b25c5950e5c477e65b69cd432b7c9e45bbb4ad40146ec48d1adb1be815caec600aacdb0b6bf3a7e480c26750
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\e0adfb6f-a3f1-4ca5-a363-76ec7c56e4ce
Filesize982B
MD5ad06b189f5fbd5708825d85f557bfaa8
SHA1c84dcd02e6171566d7f6ab5468f700b1743ffa69
SHA2566240e04136135aa004f66d8b9d08738cab19d513d1657707b15bb8b3f477ad6e
SHA512c4830789c6c61dcf892e4b635ebc5fd21eea7286d741491ccbf7116e824a6674c65015261bab5628046c9be37b2a6de781a1510d6946eecc0da6ff76631f9a30
-
Filesize
10KB
MD526eeded326322082382d181d72266236
SHA11fa6f1ba054717779058f9b47b3f3a77c80c2d35
SHA2562aacad7e6b6e615ed8f1a9994afeeae6ac3de6fde6aa2ae1f38e969cfc9a71ce
SHA5127ffd6aadf4ed0d337a917aaea071932742fd743064ddb255012fc663c6cd5c81626289cc3e408038bff37eee9f35d63adb7d963f30a1d80375a06b590e918a39
-
Filesize
10KB
MD5b68094aa7ac7b363588e70a85786fad3
SHA1b24f1b7432ad63863d494f1625f0b67d05029ae7
SHA256f42acbbeba426ababe5f8defa9d79ec5dd42df194efb2e5bf2ccc2901b0ce675
SHA512a537729d146c87ff49ce8c2632a8bed40a77b1d1c459cd55629d4b5660e939d842bdc2aa853fd51b9b43ee439b133005847d155c3eddb438c1d0839fa9239061