Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe
Resource
win10v2004-20241007-en
General
-
Target
caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe
-
Size
6.7MB
-
MD5
52a690e9dfd4381279322db1fc65a8e1
-
SHA1
e91878f0be877337b05421b17034afd527298d8e
-
SHA256
caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b
-
SHA512
92d2c6e4c82fbb8d458c529a93a5a16a3f10f514415f61d8da2ff1d641c5c622ae1c6318789e73f04d0a89614324b82740e665d30f9e4ce2cae4d57c4551097a
-
SSDEEP
196608:D7Gv1sGOIgntxbB3+CiExG0ZtYpnmODqS3skwi:D7Gvi1IgntxbBF3xZZtYpnfDqS8
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Signatures
-
Amadey family
-
Cryptbot family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4C357N.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4C357N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4C357N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4C357N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4C357N.exe -
Stealc family
-
Xmrig family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b056717b24.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1i64X1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HIDBFCBGDB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a4ca5d972.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2I9802.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f41cd7e0c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4C357N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c5796d759.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w99q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2a854e61a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 63df04fc4a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 351a102769.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b056717b24.exe -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/2924-4385-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/2924-4386-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/2924-4387-0x0000000140000000-0x0000000140770000-memory.dmp xmrig behavioral1/memory/2924-4388-0x0000000140000000-0x0000000140770000-memory.dmp xmrig -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 680 msedge.exe 3000 msedge.exe 5164 msedge.exe 4544 chrome.exe 2132 chrome.exe 2860 chrome.exe 3724 chrome.exe 5404 chrome.exe -
Checks BIOS information in registry 2 TTPs 30 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w99q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 63df04fc4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a4ca5d972.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f41cd7e0c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f41cd7e0c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 351a102769.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2I9802.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2a854e61a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2a854e61a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 351a102769.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b056717b24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w99q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4C357N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HIDBFCBGDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HIDBFCBGDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b056717b24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c5796d759.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1i64X1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 63df04fc4a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c5796d759.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4C357N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a4ca5d972.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1i64X1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2I9802.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation a59a20cc1c.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation e780f3bb50.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1i64X1.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3w99q.exe -
Executes dropped EXE 38 IoCs
pid Process 372 Q5b36.exe 4352 x7w13.exe 4596 1i64X1.exe 2772 skotes.exe 2064 2I9802.exe 1608 3w99q.exe 2444 366b75805a.exe 1164 1b730e5dac.exe 2856 1b730e5dac.exe 5916 f41cd7e0c2.exe 5752 e2a854e61a.exe 6080 753788c96e.exe 3064 63df04fc4a.exe 6724 HIDBFCBGDB.exe 6908 4C357N.exe 2004 351a102769.exe 6732 a59a20cc1c.exe 3060 Gxtuum.exe 5472 8b62393c36.exe 6896 skotes.exe 4620 e780f3bb50.exe 1264 Gxtuum.exe 4308 graph.exe 5084 7z.exe 6096 7z.exe 1536 7z.exe 2184 7z.exe 6536 7z.exe 6584 7z.exe 5800 7z.exe 6656 7z.exe 6840 in.exe 6380 b056717b24.exe 6700 7a4ca5d972.exe 5488 1c5796d759.exe 6724 skotes.exe 6528 Gxtuum.exe 6712 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 15 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine f41cd7e0c2.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 63df04fc4a.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1i64X1.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine e2a854e61a.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4C357N.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2I9802.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine HIDBFCBGDB.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine b056717b24.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3w99q.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 351a102769.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 7a4ca5d972.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1c5796d759.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Loads dropped DLL 10 IoCs
pid Process 1608 3w99q.exe 1608 3w99q.exe 5084 7z.exe 6096 7z.exe 1536 7z.exe 2184 7z.exe 6536 7z.exe 6584 7z.exe 5800 7z.exe 6656 7z.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 63df04fc4a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4C357N.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" 8b62393c36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Q5b36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7w13.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f41cd7e0c2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019860001\\f41cd7e0c2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e2a854e61a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019861001\\e2a854e61a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\753788c96e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019862001\\753788c96e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\63df04fc4a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019863001\\63df04fc4a.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 245 drive.google.com 246 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 260 ipinfo.io 262 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cf5-622.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 4596 1i64X1.exe 2772 skotes.exe 2064 2I9802.exe 1608 3w99q.exe 5916 f41cd7e0c2.exe 5752 e2a854e61a.exe 3064 63df04fc4a.exe 6724 HIDBFCBGDB.exe 6908 4C357N.exe 2004 351a102769.exe 6896 skotes.exe 6380 b056717b24.exe 6700 7a4ca5d972.exe 5488 1c5796d759.exe 6724 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1164 set thread context of 2856 1164 1b730e5dac.exe 105 PID 6712 set thread context of 2924 6712 Intel_PTT_EK_Recertification.exe 206 -
resource yara_rule behavioral1/memory/6840-3267-0x00007FF7F3FA0000-0x00007FF7F4430000-memory.dmp upx behavioral1/memory/6840-3273-0x00007FF7F3FA0000-0x00007FF7F4430000-memory.dmp upx behavioral1/memory/6712-4383-0x00007FF6AF410000-0x00007FF6AF8A0000-memory.dmp upx behavioral1/memory/6712-4397-0x00007FF6AF410000-0x00007FF6AF8A0000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 8b62393c36.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 8b62393c36.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f 8b62393c36.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip 8b62393c36.exe File created C:\Program Files\Windows Media Player\graph\graph.exe 8b62393c36.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1i64X1.exe File created C:\Windows\Tasks\Gxtuum.job a59a20cc1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 6304 2004 WerFault.exe 163 6600 5488 WerFault.exe 199 -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1i64X1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2I9802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HIDBFCBGDB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4C357N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Q5b36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a59a20cc1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w99q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b730e5dac.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 753788c96e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e780f3bb50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b056717b24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x7w13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 753788c96e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63df04fc4a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b730e5dac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 753788c96e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 351a102769.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c5796d759.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 366b75805a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a4ca5d972.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f41cd7e0c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2a854e61a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4600 PING.EXE 4236 powershell.exe 2908 PING.EXE 5056 powershell.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3w99q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3w99q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 4040 taskkill.exe 4780 taskkill.exe 2176 taskkill.exe 1688 taskkill.exe 5124 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133793111519773012" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2908 PING.EXE 4600 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4596 1i64X1.exe 4596 1i64X1.exe 2772 skotes.exe 2772 skotes.exe 2064 2I9802.exe 2064 2I9802.exe 1608 3w99q.exe 1608 3w99q.exe 1608 3w99q.exe 1608 3w99q.exe 1608 3w99q.exe 1608 3w99q.exe 4544 chrome.exe 4544 chrome.exe 5916 f41cd7e0c2.exe 5916 f41cd7e0c2.exe 1608 3w99q.exe 1608 3w99q.exe 1608 3w99q.exe 1608 3w99q.exe 4108 msedge.exe 4108 msedge.exe 680 msedge.exe 680 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 5752 e2a854e61a.exe 5752 e2a854e61a.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 6080 753788c96e.exe 6080 753788c96e.exe 3064 63df04fc4a.exe 3064 63df04fc4a.exe 6080 753788c96e.exe 6080 753788c96e.exe 3064 63df04fc4a.exe 3064 63df04fc4a.exe 3064 63df04fc4a.exe 1608 3w99q.exe 1608 3w99q.exe 6724 HIDBFCBGDB.exe 6724 HIDBFCBGDB.exe 6908 4C357N.exe 6908 4C357N.exe 6908 4C357N.exe 6908 4C357N.exe 6908 4C357N.exe 2004 351a102769.exe 2004 351a102769.exe 5472 8b62393c36.exe 5472 8b62393c36.exe 5472 8b62393c36.exe 5472 8b62393c36.exe 6896 skotes.exe 6896 skotes.exe 4308 graph.exe 4308 graph.exe 4308 graph.exe 4308 graph.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 680 msedge.exe 680 msedge.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeShutdownPrivilege 4544 chrome.exe Token: SeCreatePagefilePrivilege 4544 chrome.exe Token: SeDebugPrivilege 5124 taskkill.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 2176 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe Token: SeDebugPrivilege 2368 firefox.exe Token: SeDebugPrivilege 2368 firefox.exe Token: SeDebugPrivilege 3064 63df04fc4a.exe Token: SeDebugPrivilege 6908 4C357N.exe Token: SeRestorePrivilege 5084 7z.exe Token: 35 5084 7z.exe Token: SeSecurityPrivilege 5084 7z.exe Token: SeSecurityPrivilege 5084 7z.exe Token: SeRestorePrivilege 6096 7z.exe Token: 35 6096 7z.exe Token: SeSecurityPrivilege 6096 7z.exe Token: SeSecurityPrivilege 6096 7z.exe Token: SeRestorePrivilege 1536 7z.exe Token: 35 1536 7z.exe Token: SeSecurityPrivilege 1536 7z.exe Token: SeSecurityPrivilege 1536 7z.exe Token: SeRestorePrivilege 2184 7z.exe Token: 35 2184 7z.exe Token: SeSecurityPrivilege 2184 7z.exe Token: SeSecurityPrivilege 2184 7z.exe Token: SeRestorePrivilege 6536 7z.exe Token: 35 6536 7z.exe Token: SeSecurityPrivilege 6536 7z.exe Token: SeSecurityPrivilege 6536 7z.exe Token: SeRestorePrivilege 6584 7z.exe Token: 35 6584 7z.exe Token: SeSecurityPrivilege 6584 7z.exe Token: SeSecurityPrivilege 6584 7z.exe Token: SeRestorePrivilege 5800 7z.exe Token: 35 5800 7z.exe Token: SeSecurityPrivilege 5800 7z.exe Token: SeSecurityPrivilege 5800 7z.exe Token: SeRestorePrivilege 6656 7z.exe Token: 35 6656 7z.exe Token: SeSecurityPrivilege 6656 7z.exe Token: SeSecurityPrivilege 6656 7z.exe Token: SeDebugPrivilege 4236 powershell.exe Token: SeLockMemoryPrivilege 2924 explorer.exe Token: SeDebugPrivilege 5056 powershell.exe Token: SeDebugPrivilege 2368 firefox.exe Token: SeDebugPrivilege 2368 firefox.exe Token: SeDebugPrivilege 2368 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4596 1i64X1.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 4544 chrome.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 680 msedge.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 2368 firefox.exe 6080 753788c96e.exe 6080 753788c96e.exe 6080 753788c96e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2368 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 372 3024 caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe 82 PID 3024 wrote to memory of 372 3024 caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe 82 PID 3024 wrote to memory of 372 3024 caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe 82 PID 372 wrote to memory of 4352 372 Q5b36.exe 83 PID 372 wrote to memory of 4352 372 Q5b36.exe 83 PID 372 wrote to memory of 4352 372 Q5b36.exe 83 PID 4352 wrote to memory of 4596 4352 x7w13.exe 84 PID 4352 wrote to memory of 4596 4352 x7w13.exe 84 PID 4352 wrote to memory of 4596 4352 x7w13.exe 84 PID 4596 wrote to memory of 2772 4596 1i64X1.exe 85 PID 4596 wrote to memory of 2772 4596 1i64X1.exe 85 PID 4596 wrote to memory of 2772 4596 1i64X1.exe 85 PID 4352 wrote to memory of 2064 4352 x7w13.exe 86 PID 4352 wrote to memory of 2064 4352 x7w13.exe 86 PID 4352 wrote to memory of 2064 4352 x7w13.exe 86 PID 372 wrote to memory of 1608 372 Q5b36.exe 87 PID 372 wrote to memory of 1608 372 Q5b36.exe 87 PID 372 wrote to memory of 1608 372 Q5b36.exe 87 PID 1608 wrote to memory of 4544 1608 3w99q.exe 92 PID 1608 wrote to memory of 4544 1608 3w99q.exe 92 PID 4544 wrote to memory of 3128 4544 chrome.exe 93 PID 4544 wrote to memory of 3128 4544 chrome.exe 93 PID 2772 wrote to memory of 2444 2772 skotes.exe 94 PID 2772 wrote to memory of 2444 2772 skotes.exe 94 PID 2772 wrote to memory of 2444 2772 skotes.exe 94 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2004 4544 chrome.exe 95 PID 4544 wrote to memory of 2464 4544 chrome.exe 96 PID 4544 wrote to memory of 2464 4544 chrome.exe 96 PID 4544 wrote to memory of 960 4544 chrome.exe 97 PID 4544 wrote to memory of 960 4544 chrome.exe 97 PID 4544 wrote to memory of 960 4544 chrome.exe 97 PID 4544 wrote to memory of 960 4544 chrome.exe 97 PID 4544 wrote to memory of 960 4544 chrome.exe 97 PID 4544 wrote to memory of 960 4544 chrome.exe 97 PID 4544 wrote to memory of 960 4544 chrome.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 3772 attrib.exe 6884 attrib.exe 6732 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe"C:\Users\Admin\AppData\Local\Temp\caecddcd71f59b51d42a0269a5e5dc40a6286b1ae666c3f51690c6e67e45840b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q5b36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q5b36.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7w13.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7w13.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i64X1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1i64X1.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\1019858001\366b75805a.exe"C:\Users\Admin\AppData\Local\Temp\1019858001\366b75805a.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe"C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe"C:\Users\Admin\AppData\Local\Temp\1019859001\1b730e5dac.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019860001\f41cd7e0c2.exe"C:\Users\Admin\AppData\Local\Temp\1019860001\f41cd7e0c2.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
-
C:\Users\Admin\AppData\Local\Temp\1019861001\e2a854e61a.exe"C:\Users\Admin\AppData\Local\Temp\1019861001\e2a854e61a.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
C:\Users\Admin\AppData\Local\Temp\1019862001\753788c96e.exe"C:\Users\Admin\AppData\Local\Temp\1019862001\753788c96e.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6080 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:4624
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {332c5d21-db44-4cbd-80d1-3720e74a9e83} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" gpu9⤵PID:5972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e1cf023-7a29-4ff7-a8ec-5e12f433c880} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" socket9⤵PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3148 -childID 1 -isForBrowser -prefsHandle 3160 -prefMapHandle 3156 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1413e921-4493-4370-8446-9fb2c88d373c} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab9⤵PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3796 -childID 2 -isForBrowser -prefsHandle 3788 -prefMapHandle 3140 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b32b363c-8461-4c9a-b2fa-1baf23bb406c} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab9⤵PID:3572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4572 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4564 -prefMapHandle 4556 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5f8af20-62a1-49a0-a677-552d840fe481} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" utility9⤵
- Checks processor information in registry
PID:6816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5176 -prefMapHandle 5172 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6d8dd31-9f50-4f67-a90f-10a81c21e729} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab9⤵PID:4764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5308 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5320 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf81321e-d0d4-4d44-bb32-ee05b6b57560} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab9⤵PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 5 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1176 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e0da759-5bbe-4590-9ed8-46c384ee16a6} 2368 "\\.\pipe\gecko-crash-server-pipe.2368" tab9⤵PID:1400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019863001\63df04fc4a.exe"C:\Users\Admin\AppData\Local\Temp\1019863001\63df04fc4a.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\1019864001\351a102769.exe"C:\Users\Admin\AppData\Local\Temp\1019864001\351a102769.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 8927⤵
- Program crash
PID:6304
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019865001\a59a20cc1c.exe"C:\Users\Admin\AppData\Local\Temp\1019865001\a59a20cc1c.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6732 -
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019866001\8b62393c36.exe"C:\Users\Admin\AppData\Local\Temp\1019866001\8b62393c36.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5472 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019867001\e780f3bb50.exe"C:\Users\Admin\AppData\Local\Temp\1019867001\e780f3bb50.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"7⤵PID:384
-
C:\Windows\system32\mode.commode 65,108⤵PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6096
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6536
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6584
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:6656
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"8⤵
- Views/modifies file attributes
PID:6884
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"8⤵
- Executes dropped EXE
PID:6840 -
C:\Windows\SYSTEM32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:6732
-
-
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:3772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE9⤵
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2908
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019868001\b056717b24.exe"C:\Users\Admin\AppData\Local\Temp\1019868001\b056717b24.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6380
-
-
C:\Users\Admin\AppData\Local\Temp\1019869001\7a4ca5d972.exe"C:\Users\Admin\AppData\Local\Temp\1019869001\7a4ca5d972.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6700
-
-
C:\Users\Admin\AppData\Local\Temp\1019870001\1c5796d759.exe"C:\Users\Admin\AppData\Local\Temp\1019870001\1c5796d759.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5488 -s 7807⤵
- Program crash
PID:6600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2I9802.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2I9802.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w99q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w99q.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd0c56cc40,0x7ffd0c56cc4c,0x7ffd0c56cc585⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:25⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2088,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2208 /prefetch:35⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:85⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:15⤵
- Uses browser remote debugging
PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:15⤵
- Uses browser remote debugging
PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:85⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:85⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4904,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4956 /prefetch:85⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5232,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:85⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5176,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4244 /prefetch:85⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5476,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5480 /prefetch:85⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5444,i,15873088369998522576,17940363087538637864,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5396 /prefetch:25⤵
- Uses browser remote debugging
PID:5404
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ffd0c5746f8,0x7ffd0c574708,0x7ffd0c5747185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:25⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:85⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:15⤵
- Uses browser remote debugging
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:15⤵
- Uses browser remote debugging
PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:25⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:25⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2676 /prefetch:25⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2748 /prefetch:25⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2708 /prefetch:25⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4048 /prefetch:25⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3968 /prefetch:25⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,10371454920323449251,517538718180492814,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4212 /prefetch:25⤵PID:5524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\HIDBFCBGDB.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6684 -
C:\Users\Admin\Documents\HIDBFCBGDB.exe"C:\Users\Admin\Documents\HIDBFCBGDB.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6724
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C357N.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C357N.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6908
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2004 -ip 20041⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2004 -ip 20041⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6896
-
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5488 -ip 54881⤵PID:5712
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6724
-
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe1⤵
- Executes dropped EXE
PID:6528
-
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6712 -
C:\Windows\explorer.exeexplorer.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4600
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Query Registry
9Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
10KB
MD50e4ef5f68636eda43cf3146a46128094
SHA1118872f90f7dea7946bf44cbe6a82be6eb5e3fdb
SHA2566de175e68c9739d1b03af2a4d9e8f544c23a04dc52aecc87f016154d1fb6877d
SHA5129e5492486f57cd60d28efafc6d920d74c2db7cafd833afaee969796736af746ca57216d9654ceddfe1bdaf6a0110bf35d2b736e993f5049fa5fa596d5e02f021
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5813b7c52a41026f90ba8be757d054837
SHA1a6b2f54b5b5891ea90cb560399c70743b62fa1e1
SHA2568d90ef0e092ebb3fe483f9276b10bbf7d770cbe78ec36d2a32541714557573c1
SHA51266470413c7443978808f98d28625e26e3693dd04f2b03120395d056bf8dbaace03fb791caa3a3109f6241d4f1ba4f73600c1b9abfaba8b82733281366ce12e7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
150B
MD5fff6969582b1a7505a3bbfd932383c7c
SHA1e5d7bdc24a4728b46e358134efd8ac14783f5e14
SHA256a269aa2d5f88a532ccf1749fe26d9579e8e29494c789293b0b54d5f8dc3bec45
SHA512cbea187f140fe35b77070afb5cca7cd8898d0a6f4c1af3b16f10e550dfb0d8ac42327aca08d8bf7026032b334157f26632eb2003324d8f2493003ef20b6f4da5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ee112085-413a-4689-9e0b-14e97af161b7.dmp
Filesize10.4MB
MD519af92f4508f7c5e584282e89f822b3a
SHA1cd003a489560f53c30b885bb16aed2eb2ff13349
SHA2563b0710a74463c77b53fa3888d9010ff846856c69bf8583532c73a585df758ea0
SHA512d7ff885ca0135bf7b7cf8e3a2feb268d3399ad68970f4a40842f1ac9dd36d8dc3a4366c8d1451a1d9d67d18e8bba45b7f2b01a4d289cf6be05f773882e3ac811
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
5KB
MD57dc3df72cdc2786bdf7f32897e60e74c
SHA146af88cd47bf59e1db5870aab59cdd6cc2dd6d97
SHA256d2f4fa00c70eae25e8372f6d85995ff0100d4ece53810b4db085341a2ddb9c58
SHA512eafc1d79a77d365757373643d131b29750e97f8cfe5b512fd7cf754200e7bfe1e590b520ac11b9de359997bf0854fc3a27d0d614b270c26f93c33e86993a441f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a430ef45-b4f7-4947-a333-a67c74cfdbc0.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize23KB
MD55906a5d2a0f25456bc44014da61af4d4
SHA108604eaaab44a9954610d50685410dc6d35537d0
SHA2565e8ef575aa34e2db154283dfffc652991e389f59d18b153ae550555aee132e6f
SHA51236681530bb7c9f57e1a179f415e9daeac920885de14212673fc2794ca066b8c434cd288b17b141b4d481c95c5db9d92fa875b7dc023835cc20018b810453ca9e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\6653BC7BE242C21AA1988A4A42D1DEDA18231C31
Filesize13KB
MD5c14c6e67485591043f02abb00d18886f
SHA1e24563a94ebe9bdd57e107db41de94d7d2488ed8
SHA2563ce145e717f10bef571f3cec2eb58c60a5a0440ea52bd6dcbddfb0561d193cb0
SHA5128ef8d9277cc6cb06ac78b35f8ecc213afeeac15fd2dfbbe395831ac4adeb643dd73f6d74f0c9c685d700e3b8a290c61073be9ac7d10feb2dd9592959c057df59
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5aed7eb427c1b2d26cb1cb18625bce3be
SHA1b83bec279a9c4c7cc8c96ab5688e448384cb73ad
SHA25643aa9b88f472e335eadb14f67d25462917083fce0f57a603c7fb3b1abcb28052
SHA512d0e96f149e02e6a841f848b9e9cbe23c9f27e73c7d2f309c5eb193f747fbaf04ad83003bd005b952edb84f466cb979ababa623c5b38cdc91d42ea6115529332c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5ce91cd142b8b587ee83014208782b1d9
SHA167a74a5df228275beeffb2fcf19c144010d04b3e
SHA25648ad13ee68395fd5a53aba2c613d4c84c5be487f99054e0b7cc6042ddb53103b
SHA512ae9bd42a97072f7735ef20459344bbf0cb3314d722593b8e45073e13254d49a7743b71ff5858af5b2c06b4526aa1dc73647ecea0b30415a3e931d5cf8599b82a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
1.8MB
MD5f9f07e06bf4187709de621a0cbae5b6c
SHA12a728d28f69d07e3aad391758e01ff88bc69a62a
SHA256fcc75ebbf13031db63db04ec67665f6fb3247e92c58268d60e40b1de45a484dc
SHA512c12e72b833b84bcd8292d2a9e75ebc0cca5411d604744b52ac8a26aa863be4f3035efd0a8279631c998e1ab554adf6e3e6b92552103e6fc9b4269d4d407f3dd7
-
Filesize
2.8MB
MD58ea0abac189af983f6146d5d449ba1b3
SHA1f7329dbea54fa4f0827b7957e1893f6fc66fd88a
SHA256afe849d1b68d20fd3497eb2591ef7a44f94909abd8e912d683dd618c584981ec
SHA51234539dbf55446b1c15fbbe57e7cec1d573d955a7a95391ace83670a2886b479123a8a659a1e64779aa223d761d0a7c0ee001a01a9f27dd38a7486bb66fdb41df
-
Filesize
942KB
MD5daa8d515648afb5c90988946b5281157
SHA1f63b38ba6869ec18dd9906967e195030e7b72b13
SHA25679e712459f65d39971e842a08b72d56f642203930cd6d5c866e42afbe266e096
SHA512aa9b85e5e116116a1ac1284c35a62ad4236a1eb223645d106212f1c5bc9fc779af0250b87684ba42dc70b0ec1aea3e29703eb93d63cc1bc601389459e6f642b3
-
Filesize
2.7MB
MD5ba91936401701b66241f22bcff1e57f8
SHA1730b7231ab593a4fc9c8b194a04f3daff64ec85e
SHA25694799ac4701cbf18dcf7ac3fcf7486a141015ed95f64019d7b2493c6eee12f02
SHA5122246e9f4d51246c969ac220b85f617685b37409c28cac68e65915dca2568276bc89308be762718de52afe11ebb5b8e68f7a01924be2cf15e391f6a90858958d5
-
Filesize
1.8MB
MD515709eba2afaf7cc0a86ce0abf8e53f1
SHA1238ebf0d386ecf0e56d0ddb60faca0ea61939bb6
SHA25610bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a
SHA51265edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9
-
Filesize
429KB
MD551ff79b406cb223dd49dd4c947ec97b0
SHA1b9b0253480a1b6cbdd673383320fecae5efb3dce
SHA2562e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e
SHA512c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
4.3MB
MD529e26186e733127fe58a92d8fa5710af
SHA15a898e03714aabec25ea798d04d75772f7180951
SHA2565953c30c6e6687316eecad90085082496519f158efee2c29153e90c8b7e61aae
SHA512eba0ea5996d19b22b015112c4d620e5042c415a6e82bb32014d13eabb04b72aabbc99111e4dc6403c601a677c7c25abb01078ead945e702b9fc31210fbacf1d2
-
Filesize
4.3MB
MD5416736895f3b6021b4ebe4173c814106
SHA17e2e1ac6dfcac96522dd5610290119d778086dbb
SHA256135caea7497cca4a151d49412a1594be435ae2af9827221d8ef67a66ed75a9f4
SHA512d6989c5553265c58ac5b928ab3f2035a8b55bc2c94f52a135380bfb3ef132601970a52c3afcec9dd15d385a9b0c7fc12a5612870a5e6c9050f1cfde1335f5bf5
-
Filesize
1.9MB
MD5487e3b0675d3f03948a804f57bb2db85
SHA1bdc7d056c9258128bb275393d96d72a09b938e0c
SHA256aceb23e8155c967806683f0c64a59328a05f135a33593abeafbe3f4fb9e98b97
SHA5122d02d540f7270a3ecb78f7690aca923d9ca1075218bcc324ab2e6f1a00a94e0325c7f24b371cc0adfe9426dada16ad1ed9d539fffd0fa6bad13a58f23bb3f8ee
-
Filesize
2.7MB
MD5924b9cde47b9957ede7465edd607fc47
SHA1d6c1932bcfd2b1ba320bfbf56f133ed7d87cde04
SHA256535eecafd723fff74e56d999de527eae4e9a91792f4b8b85228e8eff038e893e
SHA5120605a1bc3140143868a54455b4efbdf9f31644bf18c278dd2b91f9328e308d0c82f7d5834637fd64d8ece261804d12959f7118dac60d350bc0db7de1f912a14d
-
Filesize
5.2MB
MD500727670295907dd6cf768df10a50b76
SHA1cc294470a7f27bce84c2f897728ed82acd3ad91f
SHA25660f33c359006cd3995332acc37fc906f9c7550c72dfa4ce8ebaaeb6428ceb490
SHA51234546089a54c74bb387579d09035e37691fd47e8f61f7c2eafc8ff8a89dac925bbeaa6063742694d1ee57b55f9019569e23c32f4b2326ba4ed4609407633cdae
-
Filesize
2.8MB
MD5e48ca69b3f439cf66679ffe60efd564f
SHA1fb466d0297ee39819d14dffb99c69bab52dcef4b
SHA256c9b2322743d3daf2d975110637d09f00bf2481eae2a447f718cf53696eac35c4
SHA512529b1693ab4415484b20a9fa0bd6a7d7ca017da3341abebf900be63425fa77d9d2296b7506059696e383307d24ec4ecb7f6e3936551248642cc7ff71d0aca194
-
Filesize
3.6MB
MD519d84f8395d57732607159bb53935610
SHA18d51768b3b3563e95dd82c07e582ff0cb469ebb7
SHA256082e10ec71391e90e0246b0499e90aff78d8c8beac9b1a4703327ccff919b8a8
SHA512da6c0f948c077bda48e97845c21015a3305bd66e0285d9b8f7735abccd0d68b9fc09e37b0c9a1cc934b90a96d2794dedeaec6f946ad0da40d81462c969463d96
-
Filesize
2.9MB
MD59d38889192a887e1128ec41dd417fb6d
SHA1bf6b8a7c9ea4519ee2b4233375b9cf2cc9c7840b
SHA256b23adb76c30005dc9d5391fd1f1218b36b6b0cb85b63f5cb9aeeb0cb01d77963
SHA512d4e8aee2c1318e34537d0803f137282b5e9ec58b9a8113e38e8576f0808066f5a690149ea97f720d02642645e85edeba5c1dc482e6d730da25cb99caf604c8e3
-
Filesize
1.8MB
MD50cc471c7099d858cc1e17ea0cbb7667a
SHA1e59170940dd734f2db4b5d10b7df5951aa37d829
SHA25667c8aaa4be23aff386d5a5ed1438f1d980db74096d9a1295a55d84f59dfb9377
SHA512cea701bed25944f2e82aa33a50a28001de9e92f59b7aa1af4b2615d0b008e71f16c8cced5cd9986108563cc2a984f67b3f52a8533be7a0292a289edc3a53b837
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD5d71f7cfdf7850bbbb3d55b02d20d021c
SHA14eb3f10543d2904ec8f46a4529f0745b586244b9
SHA25601431af8c693b730a248d5f4aae12a0cc01e8846733835c71b680e8cea80511e
SHA512efbf8e9ecda4ad8e4c13b2b6b792510e98df4b1c9ddcf612fe7ec85096e5398fff4ec5370756ac12add46df6e82ef51ac812bb3a184ca2135672b8843ea0c012
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD57c2538d077ec9b349d13a2dcee0352fd
SHA12ffddba3686197e15062659f82a4107a70980195
SHA256f8ef6c9d9d378c0618f3d74cf5b427de3b86bc5c0c5a9171067d7ce77c1cfece
SHA5121afb2f64ff49585a5e66e4764c634297311139a5debd35a297e0ef6266bd0e2f12adc28001fe53bed3eec363dddb2908255b21c220b9899dadf3f680fd55f368
-
Filesize
256KB
MD5ee3b774da7aa719591b9f9eeb8e63398
SHA1b38504319d8b632b74f13b20f82238230583bf13
SHA2567ea2b4d03c4d7cc81408ce73dca31df58e8b59c6ffc7e626f864c0d2781a76a5
SHA5121d7f91e2e4646bb9d86e2962d1f7f4085df2bf61d619c6f116ed8536055d2c932a2e73c7177a5338e1ceb63454d9f3280278428e052d0b2b9b59ea7be96fee00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD519bcac65c2fff9fa839049e71d4f1361
SHA19974ef5e09af75f461a5d69fb531d17fad9c6dbc
SHA25610d3358576e673f03953eabb5a84928b99e1e2ad653a9dc67cd0bb9881624972
SHA5127bf6efa9a4f96f46bf56a94784b4da7acf7a19e718b350d1a446c32ac455bc8645ae0fc34fa60e80ec71ede0f3592ddd395c4607457de68ca049f4717b0f856c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5506a944f31da832338e92eb21e3c197d
SHA1dfb2f29379685aea82777aa0836c0762ae2d83cd
SHA256c65ebbf67d29d1720a1123c9bf991809bff14b360ea8f28d6b6c833ac27a2034
SHA51230c3e874d3cb09b98b6026c0b23ecbc98cdff98b25b96b5915b48d6481aaba6dcb5119803bc44def6407724f1f386afbb7026ffd215ff9d19ebf0c95dea06827
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD5437c63ee94d87b980d6dccde79abaaf3
SHA18387c872639dc260ff7f6414bdfaff5ccdc20628
SHA256d153596239a08b40982c8106cdc0f68f84581161e3df792d4d1a0e5f7ced00ff
SHA51286c98e118e10738cf5477b27373bca58ab26035f1126fe8c981994868de39dd0b20d90aaaf2e26e384f89f0c5078d5744daa12433bf51d4c470358b1dc74c781
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD572a45b139c49cd0e73707e75d9ee95d0
SHA157acfab6527fc1faae43299a78755b7545841a60
SHA25622ff531976ad5e1effab9b7276f9b6a7183eb9aad9f67e6426052aef5f242cb6
SHA512ccb314c34b55e9ccab5d6a5e84a1fb7f114e8252085c22993b82c5aee6bbfebfedc58b43d82e047c7bc95fdb3935111bfb9f94cd68b50c7fce72af83dc281b72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD56fcae44b27731524343467e08c8b3e7b
SHA117d6cbbde1c8fc23f8d2991c20b8737c041fb9cc
SHA2562813bb15942d35893c94cc000ce1023c978826d175e22461a2711753996fc11e
SHA512b2df258b72f69689dc4ae794fe4b17f7affe8a9b268e086a67b0cab0cda4fe0c564da9294a59a636cb1a07d2fab1e289a064e44fcc49f0b8c0b49b30100082e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5053ac2777798a01541d84ab1a7ef1ed3
SHA165f5657381aaaa7784aa986df961586fa1911fd0
SHA2565e1ed9cfd7a585437f49786ed408337915e356e527f1d0d10ea21b0d07129331
SHA512af933a27904365b5ba35095d7424775f16d20c80b40372379ca9c09e1633f1b5836dbd2e999ce0661a02c9af255987dad62ab2fe3bc330476ae937fef408f43c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD58d7149a2ae3b028d64a6ee3f2fc0f50c
SHA154c44b31049ba2d6ab192f74ffe23dae76aaab55
SHA25623811675666cdd52799a94a546aae55dfc4282df31fd5fb03dec5dcd0883ddb2
SHA512357a4a8bfa68828a554c02a36af7e15ebc151e906fe2403bea6e5da8f9f0a328e261a81cbc4742eaa53de9ca3c3251d28d0ea61760705f2adad6c1f6b69bf5bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5563e91eb848b2bc833255169bd766ec9
SHA1d0a6b60ceb7b1e9773f68ca432eb0bc2bc1b3aac
SHA2569c69b0e529c0c001b53e81e266837e04e952db97eb15596800779b16e3aec800
SHA512e3c92d0d1cd32eb663bd788e94670d56bb268db2ab1977e7a53e11ecdf0b41e32a240e9db5d3eaad64a5e07b40f4db830e5e6f682053ff7e7e87d632be5c4faa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5f0f596216f1ce36a10138566d56a7422
SHA13c06bc1a3d2eb991a9991efa998d48045138ed8b
SHA2566195239ee750612a40907d4dad1d27ba936dcafb4b76c9b304f74628bca9c2bd
SHA512b5ac15d4eff2224f221d871af983cccc950ab360b384a844045b9d7900081f63e2724d6ab139c607e31a5b66ca345c81f95406d46629cb6948576e98dbd843b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD565811042b93bf08b45b14be7f7e9d589
SHA15919cbf7f8f9111765a51718121bd4908cd73143
SHA256e02f2d8e32f8f86e9846916d9187e55b4caa7af14734cbdf96d9ec7e0dc913b7
SHA512f2ac2cc24eeaa5df8515c6cdfd13e713e04d56fa3576c64e637dea2f831bae585d3fbf4e84149ce239f40652d4184274e304d26c151cbc4d4687c6fb394a6112
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\1a97a7cf-2d1f-49ce-af5a-fc95ec868463
Filesize982B
MD53db915f6431808c94731ab910e2afecb
SHA139287906733b6fca8d165a133101d10d508d249d
SHA256cccfa83d120bc85d1a26dde086bf6a1308b17a21aeafee5fc6f568d473cd6bd1
SHA5124231ce9e2852d565bae2d48afa5297c50786305a566811adfae9626849e0e0f5be270b24e2fcef1dfc0fb1f1ca5d57193bf924df8d982a98153c003dc0f297be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\49efe6db-bf12-41fb-967b-0c920fe70dc6
Filesize659B
MD5fe0a956dfbc1e6c894b8bfa8df83c5ae
SHA12c774d9472858171bc5c8141402b6c29110f14bc
SHA256e280b41021ac8b51f0ce6a97213a864d88dad5b05717eaac67d5f40c7a4ea9a6
SHA512f42cd73f780d340da8b89f68953ec8d9e58c2d7c942dbfc0776952dd26cdf4c5aec24a3a0efafda04b6b9aa01eaebe7dbafddc7a7ea8e0136c79177f3cf22ca8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD55ad9924abbc3e87338b23b16768563ca
SHA16030dd687f071536738b0177a6f68bdea859f00f
SHA256673b7e4e9ceac43f73074a7896ae2daa613c0e87373a0c1efad1a894e6ceebd1
SHA512dc3f16bb3b57ab813b7edc6cf8e829ba8b720ad706e15202502553707e3181d4aa5f803916d88270fc3c04b137df74a7c23d555e8342a1a4de2abc4d198a313c
-
Filesize
11KB
MD579abb612ea7b752d6b14c4bf83824406
SHA1d7fb84cf41d474b306f32e91b3d8f035306d6dea
SHA25655b4aae96863dfd6e8de4eb3a64c3946e51febb114dcf81d5ddbaffe42acd075
SHA5122ef897943a021ad028a646e03d4af81e65523d282cf324b573cf66fe7a544157e4d57fcf665f0eb7846eb0154e629544175fc015f5ec696564623ae67764814e
-
Filesize
11KB
MD5a446e809087d186d64915a47011ace39
SHA12b9def036cb7afd09453f6788d724b8fd5622739
SHA25695884ed6716b0a52826173efbac04588317723eac4c03c7bf4a7e6ccca0b87bb
SHA51284b5013afe2a5fa7315b79b9f26aa794309153628e814dcab795ca9d70620296e8d5bbffb52357deaf41bcb6f7f735ab772c9dea72d0ad62742eac38f0fc1102
-
Filesize
12KB
MD571a17de3e6b66928b61a5b6b5e396f01
SHA11454911ae4dd60b661115995b2a3850f30078186
SHA25682cd9a2a49e771eaa2543fdfa7b07b55f423be8d40cc651b1c2d582725600c7b
SHA512c1c892d290cf6d85dcf483fd7ba8b36bda6e63cf76b78785504d26f028d0736ffb121782487754c529ae0570e37ca900cf21125d8d68120faa2364fd864713c1
-
Filesize
15KB
MD5153a908702d1f2b76805e7d177b08411
SHA13f85b090b30c37ee75b0fe50d8c96b7585d5487d
SHA2563ec01ba7905a9017365915aec604bdd25915676373192d18663f6556ef1fb53a
SHA51247ab9e2dcb3d251d06d5c83a99125027a24784a1c936c463f5a97a969bd1764ffd3065dd33f972a03d32a8870fd64e206f1d0f041cec479b45ffbde3224cbae8
-
Filesize
10KB
MD5af98c43e595136713f0406465fac5b3c
SHA11e9881c7189807f4eeadc549c2d37a01fc676dc5
SHA256e566f7c1be93a2b0eaccd7a56004c6156c4958bc9bcb7cff7b23211c878c9a63
SHA5122e18eacd603838626de259c5d9431bc50af54b5ddc57b71f78d2e6681841acde82bcee6e93bec22ecad4c2803944abbf287e88d9a13348439afa067cc0d1924f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\security_state\data.safe.bin
Filesize2.9MB
MD509b136ce16a665b7c4fa18a5bd2d9286
SHA144b6f04c46520d36ea424659e42b22251c95c759
SHA256d6f5712db0f7ad09ed832db20a3bf1da072581fe65c309e5bcf733424687ff51
SHA5122cf08bf7ac36747bab9ac4a665b71a5d01b9653f92ea93275e4f8216b4909b384e5d5987052ea84e0b2a8e9c378db2140509e8c7c4234c66c43e0cf9ec2e432b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.2MB
MD5851a279492c9166c1a3cbe4014858de4
SHA1b3f7567b6c6898505c46ed21f1c971c1863115fd
SHA2567d8c62e09be8799d31722c524af038998e5e316353d412a92d125eb5b29326a6
SHA5124a608435dc47e78c97229a6836dabcdd00976e85a11796dd020d9e2705d59511e32dbd49077ba299c830ce04e7dcd65b195913b20f741812c446db6b7ce9ce66
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.4MB
MD59da8e15ed971f7c308e7a18160d64313
SHA14b3b89a5eef1d338c5be7d862ba1b7fabea1286f
SHA256fba181bfb8b58da88dccfd5caeb23297a296e2dd8adfd9eac7c33eb16232a780
SHA5122a842788dba511c066875cee20820fa28cdc94dc39213a7acf3fcb17e2a6c78ad161035c41d0a595d12d38a9c6d7d7f924f19de0c16db61adc045a0077e4ffa3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.3MB
MD5b4a4b7d2ae8155e3fff4613d616167a8
SHA1323ef4e807af146f0faed4bc703a843e181c87a0
SHA2562a574273be3c35acf2bf81132f7a9edb8ef34cdda8b92fc77c9d2bc3f164717a
SHA512e69ceb752b76a4ff28a8e42964dd346828b4ecee81595d6de71477e52d774e09f7008541bce99370d2d8a85ca547d47377894d5c9ac00c8ae6a3f06ec5ea4ec6
-
Filesize
3.1MB
MD536799cea6d5c3535f8debe08619965a9
SHA159d8c247f00ae3a48b2ee1de019d681dbf1220fb
SHA256aa6e733a2be885068d9e8f4d8134c49102893676c80b60b1b876eaf1f97786ee
SHA512b6381637a3e7a8eff98020855bb131fc43b348914b4f6a0f0335e9a7671682f23553a0a62776248bd08e0cba42735c4dad5fec86110fecb6b10b6d7340483eae